Professional Documents
Culture Documents
for
investment
in
September 2014
Table of Contents:
Page
Sl.no. Particulars no.
1 Objective: 3
2 Caveats: 3
3 Disclaimer: 4
4 Executive Summary: 5
5 Valuation Summary: 6
6 Company Profile: 8
Industry Overview - Outlook on Synergy Multitech Products &
7 Services: 10
8 Present Proposal: 15
9 Valuation Methods and Philosophy: 40
10 Financial Projections and Valuations: 44
10.1 Sources of Information and Data Limitations: 44
10.2 Annexure I: Capex Cost of Projects: 45
10.3 Annexure II: Projected Balance Sheets: 47
10.4 Annexure III: Projected Profit and Loss Account: 49
10.5 Annexure IV: Weighted Average Cost of Capital – Year wise: 50
10.6 Annexure V: Valuation by Free Discounted Cash Flow
Valuation: 51
10.7 Annexure VI: Price Earning Capacity Value/Net Profit
Multiple Method: 53
10.8 Annexure VII: Valuation by Sales Multiple Method: 54
10.9 Annexure IX: Fair Value of Share: 55
10.10 Annexure IX: Financial Assumptions Considered for
Valuation: 56
10.11Annexure X: Revenue Estimates: 58
10.12 Annexure XI: Manpower Estimates: 59
The objective of the Business Valuation Exercise of Synergy Multitech is to assist the
Company in fixing up of enterprise value for dissemination to potential new investor(s).
2.0 Caveats:
As part of the evaluation, a fair value of enterprise is determined for the business of
Synergy Multitech under various methods of Business Valuation.
The report has been prepared based on the information provided by Synergy
Multitech and various discussions, which we had with the management of the
company. We have placed reliance on information like sales, operating margins
etc given by company.
No separate due diligence exercise is carried out.
This report and its contents are confidential and have been prepared for the sole
use of Synergy Multitech management.
The delivery of this report at any time does not imply that the information in it is
correct as of any time after the date set out in the title of this report hereof, or that
there has been no change in the operations, financial condition, prospects, credit
worthiness, status of affairs of the Synergy Multitech, since that date.
The sole purpose of this report is to provide detailed information to assist the
recipient in obtaining an understanding of the business of the Synergy Multitech
and the Business Valuation arrived under alternative methods normally adopted
and also recommended by the industry.
No part of this report shall be reproduced without explicit and written permission of
Synergy Multitech Management.
The valuation has been carried out as of September 2014 based on the
discussions with and information provided by Synergy Multitech Management.
Hence the financial projections have been finalized in consultation with the
officials and management of Synergy Multitech. All the projections and forecasts
in this report are based on assumptions considered reasonable but the actual
outcome may be materially affected by the changes in economic and other
circumstances, which cannot be foreseen.
The advisors role is limited to the extent of arriving at Business Valuations by
applying prudent and normally adopted valuation methods and techniques to the
data made available/ finalized in consultation with Synergy Multitech and
presenting the same before potential investor/s. The decision of fixing the reserve
price for the purpose of acquisition solely vests with Synergy Multitech.
3.0 Disclaimer:
Synergy Multitech Ltd. was established in 1998 with an intention of making it a house of
research and development in the field of electronics and other allied engineering segments.
Scientists from the disciplines of Electronics, Physics, Telecommunications and Information
Technology synergize their talent to skim the best for the industry thus making Synergy a
reputed private R&D organization. Synergy provides a platform to any scientist or scientific
community to undertake research & development activities of common interest. The toiled
efforts of Synergy had led to prestigious patents [total R&D] registration as well as design rights
as the case may be.
Synergy, working in the area of high technology, to develop and maintain sophisticated
systems. The company’s main objectives are to invent, develop and manufacture Specialized
equipment, measurement and control electronic products along with technology and embedded
devices to give ultra designed gadgets, which will not only incorporate the latest technology
features but also at affordable prices. We have the domain expertise that has been acquired
from implementation of various projects in its long and strong technological track. We offer a
wide range of services to address a variety of industry segments and information technology
applications that includes, Design and development of Solar driers, Solar devices, Green
Houses and green house automation, Real-time data acquisition with data loggers, large field
experiments and design of software related to data collection and analysis. An Artificial
Intelligence based decision-making software for engineering and manufacturing units.
Mr. N.V. Satyanarayana, promoter, is a serial innovator and hold 2 Indian patents. He carries
with him, over a decade of experience in wide range of technologies in the areas of embedded
systems and solutions development.
He specializes in architecting & development of complex systems and has extensive knowledge
on Mobile Security Applications, Oil & Natural gas Exploration Solution and Portable Energy
generating devices, and has been awarded National innovation Foundation energy
category award in 2002 by President of India, Dr A.P.J Abdul Kalam. His vision for the
organization is to develop a world class product range with open system architecture for Low
cost solutions for High end Technologies.
The valuation has been carried out under various methods, which are normally used for
business valuation:
Synergy Multitech would negotiate and bring in a new investor with appropriate
experience for the intended purpose and the above valuation as the basis for infusion of
funds.
Free cash flows for the forecast period have been discounted at weighted
average cost of capital i.e. 10% for arriving at the present value calculation of
the terminal value 6% growth rate has been assumed. Value of surplus assets
has been added to the value under DCF method. For calculation of WACC the
risk free return is assumed at 10% which is the yield to maturity of 10 year,
Central Government Bonds and expected return is 16%. The enterprise value
under DCF method is Rs. 169383.36 cr.
Maintainable Net sales for the forecast period have been arrived by taking
average of present value of future sales discounted at WACC. The value of
enterprise under this method is Rs. 9749.93 cr.
Maintainable Net Profit (PAT) for the forecast period has been arrived by taking
average of present value of future PAT discounted at WACC. A PAT multiple of
8 is considered conservatively as the average PAT multiple of industry. The
value of enterprise under this method is Rs. 16209.19 cr.
The Net Asset Value Method is not considered as it is not appropriate for the
company and the nature of its business.
However, considering the merits and limitations of valuations under the each of
the above methods we have arrived at a composite valuation giving appropriate
weights to the value arrived under the each of the above methods.
Introduction
Synergy Multitech Ltd. was established in 1998 with an intention of making it a house of
research and development in the field of electronics and other allied engineering segments.
Scientists from the disciplines of Electronics, Physics, Telecommunications and Information
Technology synergize their talent to skim the best for the industry thus making Synergy a
reputed private R&D organization. Synergy provides a platform to any scientist or scientific
community to undertake research & development activities of common interest. The toiled
efforts of Synergy had led to prestigious patents [total R&D] registration as well as design rights
as the case may be.
Synergy, working in the area of high technology, to develop and maintain sophisticated
systems. The company’s main objectives are to invent, develop and manufacture Specialized
equipment, measurement and control electronic products along with technology and embedded
devices to give ultra designed gadgets, which will not only incorporate the latest technology
features but also at affordable prices. We have the domain expertise that has been acquired
from implementation of various projects in its long and strong technological track. We offer a
wide range of services to address a variety of industry segments and information technology
applications that includes, Design and development of Solar driers, Solar devices, Green
Houses and green house automation, Real-time data acquisition with data loggers, large field
experiments and design of software related to data collection and analysis. An Artificial
Intelligence based decision-making software for engineering and manufacturing units.
Synergy, with its rigorous quality controls, is proud to assure cost-effective quality on timelines,
that too, with a complementary of smile and right attitude. The vibrant nature of Synergy
percolates down the line may be a customer or a consumer, with a mass of opportunities and
strengths that gives tangible benefit. Our process includes a flexible horizontal hierarchy that
enables a speedy project delivery. Above all that, the company is primarily based on morals,
ethics, and transparency to our partners as well as our indirect business partners, namely
employees [known as Synergizers].
We ensure our clients to achieve a competitive advantage and thereby leadership in the
competitive markets they serve which we ensure by adhering to quality practices in both out
sourcing as well as manufacturing of our products. Synergy is in the process of joining hands
with various organizations and Governmental Institutions to fill in the gaps in the development of
mechanization, electronic instrumentation for control and automation, Green house technology,
Non conventional energy projects in comparison to other developed countries.
N.V. Satyanarayana is the quintessential inventor with a fore thought and passion for inventing
products and systems for implanting and enabling various in day to day life. His inventions have
a very practical and economical value. Like a true inventor, his mission is to commercialize his
inventions and make them available public.
Mr. N.V. Satyanarayana is a Post Graduate in Applied geology from Andhra University, serial
innovator and holds 2 Indian patents. He carries with him, over a decade of experience in wide
range of technologies in the areas of embedded systems and solutions development. His
association includes Indian Navy, National Ship Design Centre Visakhapatnam, Innsoft
Solutions Ltd, Ministry of Science and technology and National Innovation Foundation. Mr. N.V.
Satyanarayana has worked for major projects involving an exhaustive study of embedded
technology in Missile development & Russian warship equipment indigenization and process
control, enabling considerable performance enhancement and implementation. He specializes
in architecting & development of complex systems and has extensive knowledge on Mobile
Security Applications, Oil & Natural gas Exploration Solution and Portable Energy generating
devices, and has been awarded National innovation Foundation energy category award in 2002
by President of India, Dr A.P.J Abdul Kalam. His vision for the organization is to develop a world
class product range with open system architecture for Low cost solutions for High end
Technologies.
Mobile Tracking Software is an efficient solution of stolen mobile finder system, in the era of
smart phones. MTS’s proficient technology perfectly integrates key facilities like SIM change
alert and phone book retrieval from the lost
. Printing phone.A 0 Laser
capabilities
2 tone multi color, B&W,Image
with 2.5Mtr.Resolution.
Vehicle Tracking System is a high performance, cost effective wireless communication device
with inventory tracking technology, vehicle monitoring and remote data collection. The VTS can
be configured to monitor and transmit real time data. With its rugged construction, the Synergy
VTS can be installed in obscure places to prevent tampering.
LPG based Cloth’s Iron box is implemented to provide a user-friendly tool to the washer men in
their routine work. It will reduce the daily maintenance cost up to 50% on the conventional
method. The device comes with a small cylinder that can store up to 0.2Kg of LPG.
Stolen mobile finder is an efficient stolen mobile finder system of full version, in the era of smart
phones. Proficient technology perfectly integrates key facilities like phone book retrieval, SIM
change alert and handset location. The software would indicate a change made on the mobile
device from the instance it is reported stolen/lost. This software ensures a one-stop solution for
high-level security.
A pairing device comes with a transmitter and a receiver that provides physical intimation/alert
whenever the distance between these devices is greater than 2 Mtrs. The pairing device is a set
of 2” X 2” X 0.3” (thickness) Boxes that can be fixed on to a commodity to ensure continuous
surveillance.
Synergy Multitech Ltd. hand free audio system helmets are a quick solution to the never-ending
hassle of call handling while we are traveling. This device provides the facility of an in-built
Dual Temperature Helmet helps us experience the comfort of air conditioning within the closed
environment of the helmet. Our technology blends the benefits of the Peltier technology into a
helmet to optimize the temperature in the protective device
Two wheeler vehicle tracking system provides remote accessibility that allows us to monitor and
control a particular two-wheeler. This device attempts to control and locate the direction, speed,
latitude and longitude of the two-wheeler by relying on the operational information about the
device itself, including signal strength and location of the cellular towers.
The street Light Management system is a micro controller based system, developed with the
above need in focus and works by making use of the twilight timings (Sunrise & Sunset) of a
particular place.
11. i -AMR:
Intelligent Automatic Meter Reading System with multiple features like power on & off, Load
increase and decrease, status of reading..etc
This Micro windmill is used to generate the required power for the vehicle during motion and
reduce the dynamo load on the engine to reduce the oil consumption. These windmills can be
connected in series and placed in panels at front portion of the vehicle
Coal water fuel is research project developed to establish a feasible solution of fuel
consumption. The coal water fuel energy is processed using Coal Beneficiation Plants.
PETROSCOPE addresses and eliminates the uncertainty involved in oil drilling. Application of
PETROSCOPE starts after completion of exploration and before start of drilling. A Relational
Intelligence (RI) based Prediction Engine (PE) for Oil and Natural Gas Exploration, this
technology builds a multidimensional space from the vibratory seismic data.
The Ultimate Solution for Predictive Tracking based on Relational Intelligence (RI) and uses
Quantum Measurement System (QMS).
2. Legal expenses of filing anti infringement suits for Antitheft Mobile application.
Field of invention:
The existing Patent issued in respect of Communication Device Finder System is a broad based
one. It includes Antitheft Mobile application and also applications for location of any application
system.
As the patent has already been obtained and there is a huge market in respect of mobile
phones, it is planned to develop and commercialize Antitheft Mobile Application.
The present invention relates to a communication device finder system to recover a lost /
misplaced / stolen device used for communication.
The proposed system of recovering a lost / misplaced /stolen device used for communication
can be implemented on all kinds of wireless telephone networks that support communicating
device networks that employ GSM or CDMA or TDMA or WLL or any similar technology.
PRIOR ART:
There are a number of prior publications which teach invention relating to finding a lost mobile.
Some of the prior publications in the field of the present invention is as follows:
US 7,103,367 entitled as: 'Network-based services for misplaced cellular mobile stations'
teaches about feature for a mobile station, wireless network, and method of operating a wireless
network for locating a misplaced mobile station and preventing its unauthorized use. The
wireless network and a base station, transmit a misplaced mobile station signal to a mobile
station, causing a misplaced mobile station to ring at high volume, display a text message, emit
an audio message, and deactivate normal mobile station function
US 7,113,803 entitled as: 'System and method for enabling instant messaging on a mobile
device' teaches about a method and system for enabling instant messaging on mobile devices
is provided. A customized SMS message is created that awakens the mobile device so that
instant messaging may be initiated. Once the mobile device is awakened by the customized
SMS message, the mobile device responds to the customized SMS message and initiates
processing. Based on information obtained, the mobile device creates a reply customized SMS
message. The reply customized SMS message is translated into a reply instant message, which
is transmitted over a persistent Internet connection to the sender responsible for awakening the
mobile device. Alternatively, the mobile device may respond by creating an Internet connection
and establishing a chat session over the Internet connection. The chat session allows the
exchange of instant messages between the mobile device and the sender responsible for
awakening the mobile device.
US 7,050,797 entitled as: 'Remote control system in mobile communication terminal and
method thereof teaches that disclosed is a remote control system in a mobile communication
EP1139116 teaches that a method is provided for searching for a lost asset equipped with a
short-range wireless transceiver. A finder service sends out a search request including a lost-
asset identifier, this request being sent over a mobile radio infrastructure to a plurality of mobile
devices. These devices transmit on the request in their immediate vicinity using short-range
wireless transceivers. Upon a mobile device receiving back a response from the lost asset it
returns a found message over the mobile radio infrastructure to the finder service, this message
either including location data concerning the whereabouts of the lost asset or enabling such
data to be obtained by the finder service.
EP1630757teaches that method for locating lost or stolen items has the following steps prior to
loss of the object: marking o the object using an RFID (radio frequency identity) tag containing a
unique identifier and central storage of the tag details together with owner unique identification
derived from the owner's mobile phone SIM card. If the item is lost, a third party who finds it
scans in the RFID tag and the owner notified of the object's retrieval. The invention also relates
to a system for implementing the inventive method.
EP1684535 teaches a system and method of locating a lost wireless communication device. A
remote server is contacted to indicate that the wireless communication device is lost. A lost
device policy setting is then activated in a database coupled to the remote server, the lost
device policy setting indicating that the wireless communication device is lost. In response to
activation of the lost device policy setting, a remote location command is then transmitted from
the remote server to the wireless communication device via a wireless network. The remote
location command is subsequently received at the lost wireless communication device, which
processes the remote location command such that a user of the wireless communication device
can locate the device.
EP 1545141 teaches that the present invention generally relates to a system and a method for
PIN blocking on a terminal for mobile finance to block a smart chip not to use a mobile finance
service with a mobile communication terminal by transmitting an SMS(Short Message Service)
message to the mobile communication terminal, when a user lost the mobile communication
terminal in which the smart chip for using the mobile finance service such as mobile banking,
stock exchange and/or insurance is contained. A system and a method for PIN blocking on a
terminal for mobile finance in accordance with the present invention can remotely block a smart
Object of invention:
Primary object of the present invention is to propose a communication device finder system
having a non erasable security features installed in the device, which enables location of lost
communication device independent of a specific mobile network service provider.
Another object of the present invention is to allow these security features to be disabled /
activated only by the original owner of the device or by an authorized service center, remotely,
by means of sending an SMS to the lost/stolen device.
Another object of the present invention is to use one or more methods of communicating to a
central server/ another device i.e. either by messaging or generating voice
Further object of the present invention is to provide the device with a security activation element
for activating and bringing into auto answer mode said communication device finder though a
telecommunication service provider network on being triggered by any other designated
communication device or through internet from a predetermined and designated internet
protocol (IP) address or on entering incorrect personal identification number (PIN) or pass word
with or without changing said SIM. Further object of the present invention is to provide the
device with a security activation element is designed for enabling the device to send
prerecorded short messaging service (SMS) and /or multimedia messaging service (MMS) or e-
mails etc. after said activation, further object of the present invention is to provide the device
with a security
activation element which is programmed for generating and playing voice messages and visual
messages in the device.
Further object of the present invention is to provide the device with a security activation element
for auto re installing the data when attempt is made to delete it or a non erasable read only
memory (ROM).
Further object of the present invention is to provide the device with a security activation element
to find out the present location of the device.
There are various steps of the communication device finder system to recover the
communication device. The recovery technique makes use of different types of programmed
communications according to the stages of recovery.
a) Simple voice appeals to the person having the lost/misplaced/stolen communication device:
Voice messages, requesting the person holding the device to return it to its owner, are
automatically generated from within the device, by the software that has been installed in it.
Details of the owner will be mentioned in pre-defined messages. There are very few chances
that the stolen device is recovered with this minimum effort.
b) By creating an environment where in the perpetrator gives in: Mortifying ring tones are pre-
defined in the software and they get activated as soon as the device switches over to the
security mode. On receiving a call in public, this would cause embarrassment and humiliation.
Also the caller/receiver on the other end will be intimated without the user's knowledge about
the devices authentication. These features would affect the culprit psychologically and thus alert
the public around.
c) Also there is a provision that will cause disturbance to the user by working abnormally. Say
switches ON the device, when it is switched OFF, alarming at wrong times, and making
unnecessary calls to numbers in his address book, etc.
There is another way to enable the security mode of the device. When the user tries to switch
off and switch on the device while changing the SIM card, the software prompts for a password.
Any password entered by the user is accepted so that he continues using it. Implicitly a check is
done whether the password encountered is the actual password. If they match, the security
mode is not activated. Else it does. This happens every time the user tries to change the SIM
card.
The modules and methods within this software will work over and above the inbuilt security
features provided by the manufacturer. Services that are offered in this application are:
(h) It captures the screen content whenever desired and sends it across through the
MMS facility.
For all forms of communication, only the existing connection is made use of. And for all these
communication, the current user of the device is billed (be it pre-paid or post-paid). If one of the
emergency numbers is an international number, then the billing would be even higher. What is
visible to him/her is his/her balance getting diminished in case of prepaid service and long bills
in case of post paid service. Thus, causing financial loss to the user.
The "auto answer mode" is set ON along with the "silent mode" so that all incoming calls to the
device are answered at the first ring without the user's knowledge. This would allow the caller
(investigator or owner) to hear the conversation (with outsiders) of the person having the stolen
device.
To trace the exact location of the lost device, the software informs the authorized owner about
the location of the transmitting tower under whose range the lost device is and the strength of
the signal received by the device from the transmitting tower (which gives an approximation of
how far in radial the device is located from the transmitting tower). Also a central server and
another emergency number will be intimidated in the form of an SMS message.
The received details from the stolen device are plotted on the related map of the available
network towers and/or GPS information. The Mapping system automatically detects these
towers, service provider to the lost/stolen device and also the kind of connection (pre-paid/post-
paid) being used. With this data the location of the device can be calculated precisely. If the
person holding the stolen/lost device is moving, the rate at which he is moving, direction in
which he is moving, etc. can also be seen on the map.
The device passes on information about all the available networks that are present in the vicinity
of the device. Also the strength of the signal received by each network is also shown. This helps
in calculating the distance of the lost/stolen device from each of the towers in the area. This
information will be directly fed into the server for our retrieval. Also the time spent in a certain
location can also be calculated. This information can be viewed at the server end, and the
movements of the person holding the device can be traced.
If the intelligent device realizes that the sending of SMS'es is failing every time (due to nil
balance or removal of message center number), it will automatically communicate with the
emergency numbers, which may be toll free ones also( for example: 100, 911, 112) in the form
of either messages or voice calls. The owner has an option to give one toll free number which
connects to the device manufacturer directly. These numbers have to be predefined by the
authorized when he is customizing this application.
The security activation is carried out by a security activation element comprising an embedded
in a Read Only (ROM) or a flash memory of the device; with the auto re-install option, so that all
attempts to delete the software component will go in vain.
Once the security mode has been enabled / activated, the security activation element keeps
track of all the outgoing and incoming services of the lost device and communicates the details.
These details can then be provided to the investigating agency if need arises to trace the lost
device, the security activation element performs the following functions.
(a) It reads the IMEI (International Mobile Equipment Identification Number),IMSI (International
Mobile Switching Identification) number and SIM (Subscribers Identity Module) card identity
number (if available).
(b) It indicates the current location of the missing device by giving details like the device number
(changed or existing one), name of the device (given by the authorized owner), the
manufacturer, modem revision details, modem model number, modem co-design and
network service provider's tower in whose range the lost hand-set currently is.
(c) It reads the strength of the signal that is being received by the lost device. This would help
us in calculating the distance of the lost device from the service provider's tower. It also
gives
the MCC (Mobile Country Code) and MNC (Mobile Network Code) which tells us when the
roaming facility is availed.
(d) If the device is GPS compatible, along with above mentioned details, the latitudinal and
longitudinal details are also communicated. Also the speed (in km/h) at which the person
holding the device is moving is sent.
(e) It also tells us the status of the battery and whether it is in the process of getting charged
currently.
(f) Also the noise level (in dB) of his surroundings is captured and is sent.
(h) The software tries to prompt the owner when the current user of the stolen device tries to
switch it off.
The received information is processed and helps in tracing the exact location of the lost device.
The details are sent to the emergency numbers provided continuously so that the movements of
the person holding the device can be traced and followed.
This security activation element works only on the device in which it has been installed. For this
the element makes use of the Model number of the device on which it is installed, the IMEI
number and IMSI number.
Along with the above mentioned security element, a supplementary module is installed in the
device. This supplement periodically checks for the removal or attempts to destroy the main
software module from memory. If it is detected that the software part of the security activation
element has been removed, it will immediately re-install the main security software module from
a duplicate copy that has been stored in the device at the time of installation.
Similarly the security activation element software module will periodically check if the
supplementary software module has been removed from memory. If yes, it will re-install the
missing software module from the duplicate copy.
There is a provision in this security activation element that no one will be able to detect the
presence of it in the device. It is only the authorized owner of the mobile who knows that the
software has been installed in his / her device.
In case the current user of the device attempts to switch it off or does so, this security element
has provision to switch it on from a remote source. Unless the battery has been removed, this
method will not fail.
All services related to the emergency software activation and working will be automatically
erased from the devices' history. Thus the current user will not be aware of the transactions
taking place without his knowledge. Also this security software module is named in a cryptic
manner for hiding its real identity in the device.
According to one of the embodiment of the invention a communication device finder system
comprises:
- A keyboard or touch screen and optionally a mouse, connected to a dialer element, for
entering the number to be dialed or an alphanumeric short message (SMS) or a multimedia
message (MMS);
- An embedded or discrete subscriber identity module (SIM) for enabling wireless connection
with a predetermined telecommunication service provider network;
- Optionally, elements for providing visual cues on said display panel and/or generating voice
cues when said devices is activated; wherein
- Said device is provided with a security activation element for activating and bringing into auto-
answer mode said communication device finder though a telecommunication service provider
network on being triggered by any other designated communication device or through
internet from a predetermined and designated internet protocol (IP) address or on entering
incorrect personal identification number (PIN) or password with or without changing said SIM,
such that no visual or voice cues accompany such activation, said security activation element
comprising flash memory with auto reinstall option set for auto reinstalling the data including
the message center number when attempt is made to delete it and/or a non erasable read
only memory (ROM) containing said data.
Fig. 2 shows hardware devices used and the flow of signals DESCRIPTION OF INVENTION
WITH DRAWINGS In accordance with a preferred embodiment of the invention a
communication device finder system includes a transmitter-receiver(1) for transmitting and
receiving data in electronic connection with a microprocessor (2) to process the data received or
to be transmitted and to a memory element to store the data. A keyboard (3) and/or a touch
screen (3) and optionally a mouse are connected to a dialer element for entering the number to
be dialed or an alphanumeric short message (SMS) or a multimedia message (MMS). A display
panel (4) is also connected to the microprocessor (2) for displaying alphanumeric characters,
graphics and optionally video and/or streaming video. The system also comprises a read-write
element. The read write element is provided for reading and writing data from/to said memory
element.
The system has a embedded or discrete subscriber identity module (SIM) for enabling wireless
connection with a predetermined telecommunication service provider network.
There are some optional elements in the system such as for providing visual cues on said
display panel and/or generating voice cues when said device is activated. The said device is
provided with a security activation element (7) for activating and bringing into auto-answer mode
said communication device finder though a telecommunication service provider network on
being triggered by any other designated communication device or through internet from a
predetermined and designated internet protocol (IP) address or on entering incorrect personal
The said security activation element (7) comprises flash memory with auto reinstall option set
for auto reinstalling the data including the message center number when attempt is made to
delete it and/or a non erasable read only memory (ROM) containing said data in an embodiment
of the system, on activation, said security activation element is programmed for sending a
message to said designated communication device or designated IP address about location of
nearest at least three base station (BS) transmitting towers including mobile country code
(MCC) and mobile network code (MNC) and the strength of signal received by the device from
each transmitting tower.
The security activation element, of a preferred embodiment of the communication device finder
system, on activation, is configured for copying, deleting and sending a copy of the phone book
stored in memory of said system to said designated device or IP address.
A communication device finder system which has the security activation element may in an
embodiment automatically dial the conventional emergency numbers and such numbers are
stored in the phone book of the device.
In an embodiment of the communication device finder system, the security activation element
may also be triggered by a codified SMS received by said system from said designated device
or IP address.
On activation said security activation element of the system may communicate details of all
incoming and outgoing services of said system to the designated communication device or IP
address.
In a yet another preferred embodiment of the system, on activation said security activation
element communicates latitudinal and longitudinal details of location of the system to said
designated communication device or IP address, if said system is GPS compatible.
In one of the embodiments of the system, said security activation element on activation, reads
one or more of details comprising international mobile equipment identification numbers (IPEI),
international mobile switching identification number (IMSI), subscriber identity module (SIM)
card identity number, device electronic serial number (ESN), name of the device, the name of
Such communication device finder system, may be any one of the devices such as mobile
phone, laptop, palm top, i-pod and a PDA.
The communication device finder system is compatible with or based on WLL or GSM or CDMA
or TDMA type of telecommunication service provider networks.
We claim:
A Transmitter-receiver (1) for transmitting and receiving data in electronic connection with a
microprocessor (2) to process the data received or to be transmitted and to a memory element
to store the data; a keyboard or touch screen (3) and optionally a mouse connected to a dialer
element for entering the number to be dialed or an alphanumeric short message (SMS) or a
multimedia message (MMS);a display panel (4) connected to the microprocessor (2) for
displaying alphanumeric characters, graphics and optionally video and/or streaming video; a
read-write element for reading and writing data from/to said memory element;
an embedded or discrete subscriber identity module (SIM) for enabling wireless connection with
a predetermined telecommunication service provider network; optionally, elements for providing
visual cues on said display panel and/or generating voice cues when said device is activated;
characterized in that said device is provided with a security activation element (7) comprising a
flash memory with auto reinstall option set for auto re-installing data including message center
number when attempt is made to delete it and/or a non erasable read only memory (ROM)
containing said data, wherein the said security activation element (7) is adapted for activating
and bringing into auto-answer mode said communication device finder through a
telecommunication service provider network on being triggered by any other designated
communication device or through internet from a predetermined and designated internet
protocol (IP) address or on entering incorrect personal identification number (PIN) or password
with or without changing SIM, such that no visual or voice cues accompany such activation.
4. A communication device finder system as claimed in claim 1, wherein said security activation
5. A communication device finder system as claimed in claim 1, wherein said security activation
element (7) on activation is configured for copying, deleting and sending a copy of the phone
book stored in memory of said system to said designated device or IP address.
6. A communication device finder system as claimed in claim 1, wherein said security activation
element (7) on activation is designed to automatically dial the conventional emergency numbers
and such other numbers stored in the phone book.
7. A communication device finder system as claimed in claim 1, wherein said security activation
element (7) is designed for getting triggered by a codified SMS received by said system from
said designated device or IP address.
10. A communication device finder system as claimed in claim 1, wherein on activation said
security activation element (7) is programmed for reading one or more of details and sending
the details to the designated communication device or IP address, the details comprising
international mobile equipment identification number(IPEI), international mobile switching
identification number (IMSI), subscriber identity module (SIM) card identity number, device
electronic serial number (ESN), name of the device, name of the manufacturer, modem revision
details and modem model number.
11. A communication device finder system as claimed in claim 1, wherein said device is
selected from mobile phone, laptop, palmtop, i-pod or a PDA.
13. A communication device finder system such as herein described and illustrated with
reference to the accompanying drawings.
Fig. 1
Physical
network
Lost device
with CDF
Change of SIM card software Physical
network
Mapping
Internet Server
User
access
Fig. 2
Y
N
Is the
Y N Is it the case that
entered Y
Security code not enabled. the user has forgotten The device decrypts the co
password
the password?
correct?
Intimate the authorized user ( to the predefined Retrieve password from the web server
number provided) regarding the change in SIM
Y Is there N
Y Is the billing
Deduct balance any balance Charges accrued In the monthly bill
prepaid?
in the card?
Able to
trace Y
the lost
device?
Nevertheless, An the entities of infringement are MNCs with global presence and big corporate
companies of India, the filing and enforcing of infringement suits, a highly competent and
qualified attorneys in patent laws, more particularly, those acquainted with patent infringement
suits. This requires a good amount of investment.
Since, this is already an established scope of revenue platform and huge revenue potential
involved, the task is justified and worth pursuing.
Apart from the below mentioned companies nationally and internationally, there are so many
other companies also providing Anti-theft software for mobiles/Tablets/notebooks/Laptops in
INDIA. As per our patent claims, they have infringed our patent :
http://www.samsung.com/in/article/protect-your-phone-and-yourself
http://www.samsungdive.com/aboutN/forwardGuideTracker.do
http://www.knowyourmobile.in/samsung/samsung-wave/1236/how-activate-mobile-tracker-your-
samsung-wave-525
http://clip.dj/anti-theft-mobile-phone-samsung-mobile-tracker-cheil-india-download-mp3-mp4-
9XkFfw6wduY
http://www.huffingtonpost.com/2013/06/13/samsung-smartphone-antitheft_n_3436873.html
http://indiatoday.intoday.in/story/samsung-adding-anti-theft-solutions-to-
smartphones/1/353343.html
http://www.knowyourmobile.in/samsung/2013-samsung-portfolio/8073/samsung-launch-anti-
theft-feature-its-devices
https://in.news.yahoo.com/samsung-adding-anti-theft-solutions-205814442.html?.tsrc=lgwn
2. Nokia:
http://www.indiabroadband.net/nokia/15964-wavesecure-anti-theft-software-nokia-mobile-
phones.html
3. Apple :
https://itunes.apple.com/us/app/prey-anti-theft-free-security/id456755037?mt=8
https://itunes.apple.com/en/app/find-my-iphone/id376101648?mt=8
http://www.apple.com/icloud/find-my-iphone.html
http://www.apple.com/support/icloud/find-my-device/
http://www.zdnet.com/apple-google-samsung-agree-to-support-smartphone-kill-switches-
7000028503/
http://www.makeuseof.com/tag/kill-switch-secure-android-device/
http://www.makeuseof.com/tag/so-your-iphone-was-lost-or-stolen-heres-what-to-do/
4. Sony:
http://www.sonymobile.com/in/products/business/xperia-z1-series/it-resources/
http://www-support-
downloads.sonymobile.com/support/XperiaInBusinessZ1/Xperia_in_Business-Security-Z1-
Z1_Compact-Z_Ultra-January_2014_IN.pdf
5. LG:
http://www.lg.com/in/mobile-phones/lg-GB106-basic-phone
http://www.lg.com/in/mobile-phones/lg-KP107B-basic-phone
http://compareindia.in.com/specification/mobile-phones/lg-c375/254962
http://blogs.wsj.com/digits/2013/08/26/samsung-lg-plan-anti-theft-tool-for-phones-tablets/
http://www.slashgear.com/samsung-and-lg-considering-an-anti-theft-kill-switch-on-future-
devices-28295226/
http://www.youtube.com/watch?v=xMQfFVzny4o
http://newsroom.mcafee.com/press-release/lg-partners-mcafee-bring-anti-theft-feature-lg-g3
http://thenextweb.com/mobile/2014/06/12/lg-teams-mcafee-bring-anti-theft-feature-new-flagship-
g3-smartphone/
http://www.fonearena.com/blog/105788/lg-brings-mcafee-anti-theft-feature-to-lg-g3.html
6. Google play:
https://play.google.com/store/apps/details?id=mmapps.mobile.anti.theft.alarm
https://play.google.com/store/apps/details?id=br.com.maceda.android.antifurtosms
https://play.google.com/store/apps/details?id=com.avast.android.at_play
https://play.google.com/store/apps/details?id=com.mobiloucos2.pegaladrao
https://play.google.com/store/search?q=mobile+antitheft&c=apps
https://play.google.com/store/apps/details?id=ducy.android.bestandroidantitheft&hl=en
http://www.makeuseof.com/tag/how-to-trace-a-mobile-phone-location-with-google-latitude/
http://www.google.co.in/mobile/maps/
http://googlemobile.blogspot.in/2009/02/locate-your-friends-in-real-time-with.html
https://support.google.com/gmm/answer/3245654?hl=en
https://play.google.com/store/apps/details?id=com.mango.findmyphone
https://play.google.com/store/apps/details?id=com.fsp.android.phonetracker
https://play.google.com/store/apps/details?id=com.alienmanfc6.wheresmyandroid
https://play.google.com/store/apps/details?id=com.androidlost
https://play.google.com/store/apps/details?id=com.locatemy
https://play.google.com/store/apps/details?id=com.nextin.gpfindmydevice
https://play.google.com/store/apps/details?id=com.myboyfriendisageek.gotya
http://www.cnet.com/news/google-to-release-apple-like-find-my-phone-app-at-long-last/
http://www.techradar.com/news/phone-and-communications/mobile-phones/absent-minded-
android-owners-to-get-find-my-android-app-from-google-1170723
https://play.google.com/store/apps/details?id=com.prey
https://play.google.com/store/apps/details?id=com.lookout
https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity
https://play.google.com/store/apps/details?id=com.kms.free
https://play.google.com/store/apps/details?id=com.ralok.antitheftalarm
https://play.google.com/store/apps/details?id=com.amalgame.totalprotection
https://play.google.com/store/apps/details?id=com.ralok.antitheftalarmpro
https://play.google.com/store/apps/details?id=us.trackview
https://play.google.com/store/apps/details?id=com.cleanmaster.security
https://play.google.com/store/apps/details?id=com.fmphone.findmyphone
https://play.google.com/store/apps/details?id=com.findmyphone
7. Microsoft:
http://www.windows8downloads.com/win8-anti-theft.html
http://www.windows8downloads.com/win8-zapeze-dsnoozeb/
http://www.windows8downloads.com/win8-norton-anti-theft-jkoxywrm/
http://www.windows8downloads.com/win8-notebak-anti-theft-nzejjtgr/
http://www.windows8downloads.com/win8-mitracker-pc-anti-theft-mjvyfrrm/
http://www.wpxbox.com/microsoft-kill-switch-windows-phone/
http://www.wpxbox.com/how-to-find-your-lost-or-stolen-windows-phone-8/
8. Tata Docomo
https://www.google.co.in/search?q=Tata+docomo+anti+theft+software&oq=Tata+docomo+anti+
theft+software&aqs=chrome..69i57.20427j0j8&sourceid=chrome&espv=210&es_sm=93&ie=UT
F-8
9. SatNav Technologies:
http://www.satguide.in/mailcampaign/how_am_I_drving.html
10. Micromax:
http://www.micromaxinfo.com/resourceContent/Press-Release-Canvas-4.pdf
http://www.mobyware.net/micromax-a110-canvas-2-device-3092/system-utilities-
tag/mobileback-antitheft-get-free-85894.html
http://blog.gsmarena.com/micromax-canvas-tab-gets-announced-in-india-for-rs-16500/
http://gadgets.ndtv.com/mobiles/reviews/micromax-canvas-4-first-impressions-389739
http://skyneel.blogspot.com/2013/07/Canvas-4-Mi-Security-app-for-any-Android-phone-and-
Micromax-A110.html
11. Celkon:
http://gallery.mobile9.com/topic/?tp=anti-theft&ty=sw&ii=7292
http://gallery.mobile9.com/topic/?tp=anti-theft&ty=apps&ii=7292
12. Karbonn:
http://gallery.mobile9.com/topic/?tp=anti-theft&ty=sw&ii=4342
http://latestprice.in/tag/karbonn-mobiles/
http://gallery.mobile9.com/topic/?tp=antitheft&ty=497&ii=5748
13. I-Ball :
http://drippler.com/iball/andi_5c#!735632
http://drippler.com/iball/andi_5c#!1151030
http://www.microtechnologies.net/outerfiles/Productsms.aspx#a
http://www.microtechnologies.net/pdf/print-
media/2013/16.pdfhttp://www.microtechnologies.net/outerfiles/prints_media.aspx
http://www.thehindubusinessline.com/industry-and-economy/banking/micro-tech-ties-up-with-
insurance-broker-for-car-antitheft-devices/article4505414.ece
http://articles.economictimes.indiatimes.com/2004-11-18/news/27379955_1_car-owners-micro-
tech-car-thefts
http://www.motortrend.in/autonews/1502200802/micro-technologies-india-launches-anti-theft-
security-device.htm
http://profit.ndtv.com/stock/micro-technologies-_microtech/reports
http://www.merinews.com/article/anti-theft-security-device-from-micro-
technologies/134100.shtml
http://www.indiamart.com/rad-communication/
http://www.indiamart.com/company/9219466/
http://www.indiamart.com/leointegrated-technologies/
http://www.indiamart.com/manassvienterprises/
http://www.lotmobiles.com/media/insurance/Insurance-claim.pdf
http://www.faasteducation.com/2013/11/how-to-claim-mobile-phone-insurance-if.html
16. Guardian:
http://www.guardian-mobile.com/configuration.pdf
http://www.guardian-mobile.com/default.aspx
17. F-Secure :
http://www.newtechnology.co.in/mobile-anti-theft-software-price/
http://www.f-secure.com/en/web/home_us/anti-theft
18. Blackberry:
http://telecomtalk.info/rim-introduces-anti-theft-software-called-blackberry-protect/33518/
http://www.makeuseof.com/tag/using-lookout-to-find-or-remotely-wipe-your-windows-mobile-
android-or-blackberry/
19. AVG
http://www.avgindia.in/AndroidAntivirusPro.htm
20. Norton :
https://antitheft.norton.com/about
http://www.winsite.com/Utilities/Antivirus/Norton-Anti-Theft/
http://www.appsapk.com/norton-anti-theft/
https://play.google.com/store/apps/details?id=com.symantec.anti.theft
http://gallery.mobile9.com/topic/?tp=anti-theft&ty=sw&ii=6465
http://www.gizbot.com/mobile/xolo-a500s-launch-rs-6999-india-price-competition-news-
013241.html
23. Airtel:
http://www.airtel.in/forme/whats-new/mcafee-mobile-security
http://www.zyxaw.com/2008/03/anti-theft-lost-mobile-tracking-airtel.html
24. McAfee :
http://www.airtel.in/forme/whats-new/mcafee-mobile-security
http://service.mcafee.com/FAQDocument.aspx?lc=1033&id=TS101597
25. Kaspersky:
http://usa.kaspersky.com/products-services/home-computer-security/security-for-android/
http://support.kaspersky.com/9235
http://blog.kaspersky.com/beware-of-vulnerable-anti-theft-applications/
http://blog.kaspersky.com/our-walk-through-how-to-locate-a-lost-mobile-device/
http://blog.kaspersky.com/saving-private-mobile/
http://blog.kaspersky.com/step-by-step-how-to-find-the-new-number-of-a-sim-card-in-a-lost-
device/
http://blog.kaspersky.com/how-to-wipe-data-from-a-lost-device/
26. Avast :
http://webcache.googleusercontent.com/search?q=cache:http://www.avast.com/en-in/free-
mobile-security
https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity
https://blog.avast.com/2013/05/15/loosing-your-mobile-device-does-not-mean-its-lost-install-
avast-anti-theft-to-become-protected/
http://www.avast.com/anti-theft
http://www.pcmag.com/article2/0,2817,2421107,00.asp
https://play.google.com/store/apps/details?id=com.lsdroid.cerberus&hl=en
28. Deltagain:
http://www.deltagain.co.uk/
http://www.softexinc.com/pressrelease/2013/01112013/softex_launches_secureDisable_anti_th
eft_service_in_india
http://dcsglobalsolutions.com/contactus.html
30. Winsite.com:
http://www.winsite.com/anti/anti+theft+for+mobiles/
http://www.winsite.com/Business/Miscellaneous/Anti-Theft-for-Symbian-Mobiles/
http://www.winsite.com/Utilities/Security/Anti-theft/
http://www.winsite.com/Utilities/Security/Notebak-Anti-Theft/
http://www.winsite.com/Utilities/Antivirus/Kaspersky-Anti-Virus-for-Workstations/
http://www.winsite.com/Utilities/Miscellaneous/MiTracker-PC-Anti-Theft/
http://www.winsite.com/Utilities/Antivirus/Norton-Anti-Theft/
http://www.freeappz.in/app/alarm-anti-theft-screen-lock/302582/
32. Mobiles24.com
http://www.mobiles24.com/downloads/tag/Anti-Theft/samsung-galaxy-s-apps
33. Bitfinder:
http://www.bitdefender.com/solutions/anti-theft.html
http://www.pcmag.com/article2/0,2817,2423828,00.asp
34. Softonic:
http://features.en.softonic.com/use-android-device-manager-to-locate-your-device
35. Genie:
http://www.stealthgenie.com/guides/how-stealthgenie-works.html
http://sales.stealthgenie.com/iphone-packages/
http://sales.stealthgenie.com/blackberry-packages/
36. LookOut.com
https://www.lookout.com/features/missing-device
37. Sourceforgenet:
http://dsmp.sourceforge.net/
http://remotetracker.sourceforge.net/
http://www.groupon.co.in/deals/shopping/quick-heal-mobile-security-for-
android/53693?subscribed=true&__fsk=978594634
39. Advantal:
http://advantal.net/totalcare/features/siliconapp-premium-design
40. Intel :
http://www.intel.com/content/www/us/en/architecture-and-technology/anti-theft/anti-theft-service-
providers.html
41. Acer :
http://businesstoday.intoday.in/story/mcafee-anti-theft-software-can-lock-stolen-
ultrabooks/1/193382.html
42. Sony:
https://us.en.kb.sony.com/app/answers/detail/a_id/36339
43. Norton:
http://www.winsite.com/Utilities/Antivirus/Norton-Anti-Theft/
44. Apple:
http://www.apple.com/support/icloud/find-my-device/
45. Miscellaneous
http://dottech.org/22962/best-free-anti-theft-app/
http://www.techshortly.com/2012/07/5-best-free-anti-theft-apps-for-android.html
http://www.howlog.in/2012/11/android-anti-theft-apps.html
http://www.redmondpie.com/best-anti-theft-app-for-android-cerberus-reaches-100k-downloads-
free-paid-licenses-for-all-limited-time-only/
http://www.antidroidtheft.com/
http://imei-number.com/anti-theft-mobile-tracking-software/
http://forum.xda-developers.com/showthread.php?t=464336
https://www.mobiledefense.com/device-shield
http://gmonk.appspot.com./
http://ilocalis.com/page7/page7.php
http://www.mobilespytool.com/spy_features.html
http://www.mobilespytool.com/
http://www.umuglobal.com/products/23
http://www.protectmobile.com/ -
http://timesofindia.indiatimes.com/city/hyderabad/Mobile-snatchings-on-the-rise-as-cops-turn-a-
blind-eye/articleshow/37601696.cms
http://www.pcmag.com/article2/0,2817,2418934,00.asp
http://www.pcmag.com/article2/0,2817,2427366,00.asp
Anti-theft Insurance :
1. Big C :
http://www.bigcmobiles.in/pages/Big-C-Mobiles-Insurance-Claim-Procedure/pgid-315973.aspx
http://articles.economictimes.indiatimes.com/2012-10-23/news/34680358_1_anti-theft-devices-
motor-insurance-insurance-claims
3. Sangeetha Mobiles :
http://articles.timesofindia.indiatimes.com/2012-07-11/software-
services/32631921_1_smartphone-users-qr-free-trial
http://www.sangeethamobiles.com/pages/Swift-Claim-Form-/pgid-37796.aspx
4. Univercell Mobiles:
http://www.financialexpress.com/news/univercell-launches-mobile-theft-insurance-plan/368235
http://www.topnews.in/univercell-launches-mobile-theft-damage-insurance-plan-272564
http://economictimes.indiatimes.com/univercell-launches-mobile-theft-insurance-
plan/articleshow/3549220.cms
http://www.indiaprwire.com/pressrelease/retail/2008101514279.htm
The loss of expensive mobile handsets and more particularly data which is of personal and
business nature is a cause of great concern, A lot of countries are facing huge complaints of
loss of handsets and highly confidential data.
The handsets have becom an integral part of everyday life of individuals owning handsets.the
mobile handsets have become extensions of life styles. Loss of the same makes the lives of
people disorganized and thrown out of gear.added to this, there is a huge threat of misuse of
information.
For the purpose of determining the value of the business, based on the
discounted cash flow
PECV Method
The "future maintainable profits" for the companies under study have been
determined on the basis of the profits for the last financial year 2014 after
considering the adjustments for extraordinary items, net of tax appreciation /
depreciation in value of investments, deferred tax assets / liabilities and major
audit qualifications, if any.
We have considered an appropriate tax rate for the company under the study. The
difference between book depreciation and tax depreciation is ignored, as it would
even out over the years. The value so obtained is discounted by the cost of capital
to arrive at the PECV value.
Maintainable Sales for the forecast period has been arrived by taking average of
present value of future Sales discounted at WACC. Sales multiple of 1 is
considered to arrive at enterprise value. The multiple is based on the multiples of
comparable companies.
The total value of the assets of a company less its liabilities total value is the net
asset value. For the purpose of valuation, the usual thing to do is to divide the net
assets by number of shares to get the net assets per share. This is the asset
value which belongs to each share in the same way the price-earning ratio
measures the profit per share.
Net asset value is useful for shares valuation in sectors where the company value
come from the held assets rather than the stream of profit that was generated by
the company business. The examples are property companies and investment
trusts. Both are convenient ways wherein the investors can buy diversified
bundles of the assets they hold.
The projections for the forecast period have been made in consultation with the
management of Synergy Multitech.
The projections are based on the assumption that organization will be operated
efficiently and that it has no intention to discontinue its services in foreseeable
future.
The estimated profit for the forecast period is arrived after considering the cost
efficiencies and synergies that Synergy Multitech will continue to implement as
an ongoing exercise have after acquiring.
Sources of Information:
Limitations:
for commencement
production of production II year III year IV year V year VI year
Months FY2016 FY2017 FY2018 FY2019 FY2020
1
Hardware 6 8.43 15.00 25.00 25.00 25.00 25.00
Means of Finance
1 Private Equity-Share capital 103.20
Share Premium
Valuation
Methodology
Earnings Based
Value/Rs. Weightage
DCF 169383 2
PECV 16209 1
3
59162.65
Asset based 0 1
(Ignored)
Sales based
Sales Multiple 9750 1
composite Value
Earnings Based 59162.65 3 177487.95
Asset based 0.00 0 0.00
Sales based 9749.93 1 9749.93
4 187237.88
Fair Value of
Enterprise Rs.cr. 46809.47
No. of equity shares 103195000
Fair value of 1 equity
share Rs. 4536.02
Beta assumed 2.00
Fair value of share at
Beta Rs. 2268.01
Fair value at 2 Beta
Rs.cr. 23404.74
NUMBER OF MOBILE
STATIONS 85,80,01,878 1,71,60,03,756 2,05,92,04,507 1,85,32,84,056 92,66,42,028
NUMBER OF FEATURE
PHONES 77,22,01,690 1,28,70,02,817 1,13,25,62,479 55,59,85,217 9,26,64,203
SMARTPHONE
PENETRATION 9.662162877 32.20720959 51.53153534 62.73404303 200