You are on page 1of 59

A proposal

for

investment
in

patented solution for


stolen mobile recovery

September 2014
Table of Contents:
Page
Sl.no. Particulars no.
1 Objective: 3
2 Caveats: 3
3 Disclaimer: 4
4 Executive Summary: 5
5 Valuation Summary: 6
6 Company Profile: 8
Industry Overview - Outlook on Synergy Multitech Products &
7 Services: 10
8 Present Proposal: 15
9 Valuation Methods and Philosophy: 40
10 Financial Projections and Valuations: 44
10.1 Sources of Information and Data Limitations: 44
10.2 Annexure I: Capex Cost of Projects: 45
10.3 Annexure II: Projected Balance Sheets: 47
10.4 Annexure III: Projected Profit and Loss Account: 49
10.5 Annexure IV: Weighted Average Cost of Capital – Year wise: 50
10.6 Annexure V: Valuation by Free Discounted Cash Flow
Valuation: 51
10.7 Annexure VI: Price Earning Capacity Value/Net Profit
Multiple Method: 53
10.8 Annexure VII: Valuation by Sales Multiple Method: 54
10.9 Annexure IX: Fair Value of Share: 55
10.10 Annexure IX: Financial Assumptions Considered for
Valuation: 56
10.11Annexure X: Revenue Estimates: 58
10.12 Annexure XI: Manpower Estimates: 59

Confidential Synergy Multitech Ltd. Page 2


1.0 Objective:

The objective of the Business Valuation Exercise of Synergy Multitech is to assist the
Company in fixing up of enterprise value for dissemination to potential new investor(s).

2.0 Caveats:

As part of the evaluation, a fair value of enterprise is determined for the business of
Synergy Multitech under various methods of Business Valuation.

 The report has been prepared based on the information provided by Synergy
Multitech and various discussions, which we had with the management of the
company. We have placed reliance on information like sales, operating margins
etc given by company.
 No separate due diligence exercise is carried out.
 This report and its contents are confidential and have been prepared for the sole
use of Synergy Multitech management.
 The delivery of this report at any time does not imply that the information in it is
correct as of any time after the date set out in the title of this report hereof, or that
there has been no change in the operations, financial condition, prospects, credit
worthiness, status of affairs of the Synergy Multitech, since that date.
 The sole purpose of this report is to provide detailed information to assist the
recipient in obtaining an understanding of the business of the Synergy Multitech
and the Business Valuation arrived under alternative methods normally adopted
and also recommended by the industry.
 No part of this report shall be reproduced without explicit and written permission of
Synergy Multitech Management.
 The valuation has been carried out as of September 2014 based on the
discussions with and information provided by Synergy Multitech Management.
 Hence the financial projections have been finalized in consultation with the
officials and management of Synergy Multitech. All the projections and forecasts
in this report are based on assumptions considered reasonable but the actual
outcome may be materially affected by the changes in economic and other
circumstances, which cannot be foreseen.
 The advisors role is limited to the extent of arriving at Business Valuations by
applying prudent and normally adopted valuation methods and techniques to the
data made available/ finalized in consultation with Synergy Multitech and
presenting the same before potential investor/s. The decision of fixing the reserve
price for the purpose of acquisition solely vests with Synergy Multitech.

Confidential Synergy Multitech Ltd. Page 3


 The advisors don't make any representation or warranty express or implied, as to
the accuracy, authenticity, timelines and/or completeness of the information
contained in the valuations, projections and other assumptions made for the
purposes of valuation.
 Under no circumstances this may be construed as recommendation of the reserve
price. It is only to facilitate Synergy Multitech in finalizing the price.

3.0 Disclaimer:

 The methodology adopted for valuation is confined to a review of the documents


referred and a business valuation based on financial workings and no physical
verification has been conducted by us.
 No technical assessment has been conducted on the physical state of
organization, and its technological relevance to current / future requirement.
 No due diligence has been conducted with respect to the number and nature of
work of clients of Synergy Multitech.
 No detailed market study to assess the future market conditions has been carried
out. The future market conditions are taken based on management's business
knowledge and experience.
 No due diligence has been conducted with respect to the title documents in
relation to the assets and liabilities.
 While making projections it is assumed that there will not be any limitations in
terms of availability of market for end products. Part of data requested by us for
carrying out the study hasn't been provided Synergy Multitech. Hence for
completing the assignment, we have made some assumptions on basis of
discussions with, which were felt appropriate. The details of the assumptions
made by us are detailed in the report.
 No major capital investments for capacity expansion/ modernization have been
assumed.

Confidential Synergy Multitech Ltd. Page 4


4.0 Executive Summary:

Synergy Multitech Ltd. was established in 1998 with an intention of making it a house of
research and development in the field of electronics and other allied engineering segments.
Scientists from the disciplines of Electronics, Physics, Telecommunications and Information
Technology synergize their talent to skim the best for the industry thus making Synergy a
reputed private R&D organization. Synergy provides a platform to any scientist or scientific
community to undertake research & development activities of common interest. The toiled
efforts of Synergy had led to prestigious patents [total R&D] registration as well as design rights
as the case may be.

Synergy, working in the area of high technology, to develop and maintain sophisticated
systems. The company’s main objectives are to invent, develop and manufacture Specialized
equipment, measurement and control electronic products along with technology and embedded
devices to give ultra designed gadgets, which will not only incorporate the latest technology
features but also at affordable prices. We have the domain expertise that has been acquired
from implementation of various projects in its long and strong technological track. We offer a
wide range of services to address a variety of industry segments and information technology
applications that includes, Design and development of Solar driers, Solar devices, Green
Houses and green house automation, Real-time data acquisition with data loggers, large field
experiments and design of software related to data collection and analysis. An Artificial
Intelligence based decision-making software for engineering and manufacturing units.

Mr. N.V. Satyanarayana, promoter, is a serial innovator and hold 2 Indian patents. He carries
with him, over a decade of experience in wide range of technologies in the areas of embedded
systems and solutions development.

He specializes in architecting & development of complex systems and has extensive knowledge
on Mobile Security Applications, Oil & Natural gas Exploration Solution and Portable Energy
generating devices, and has been awarded National innovation Foundation energy
category award in 2002 by President of India, Dr A.P.J Abdul Kalam. His vision for the
organization is to develop a world class product range with open system architecture for Low
cost solutions for High end Technologies.

The valuation has been carried out under various methods, which are normally used for
business valuation:

 Free Discounted cash flow method


 Profit Earning Capacity valuation
 Sales Multiple method
 Net Asset Value Method

Confidential Synergy Multitech Ltd. Page 5


The cut-off date for valuation has been assumed as September 2014 and the forecast
period for the business valuation has been assumed for 5 years i.e., FY2016-2020. This
valuation exercise has been carried out on an as-is-where-is basis and does not
consider the premium that a strategic investor would be willing to consider.

Synergy Multitech would negotiate and bring in a new investor with appropriate
experience for the intended purpose and the above valuation as the basis for infusion of
funds.

5.0 Valuation Summary:

 Free Discounted Cash Flow (DCF) Method

Free cash flows for the forecast period have been discounted at weighted
average cost of capital i.e. 10% for arriving at the present value calculation of
the terminal value 6% growth rate has been assumed. Value of surplus assets
has been added to the value under DCF method. For calculation of WACC the
risk free return is assumed at 10% which is the yield to maturity of 10 year,
Central Government Bonds and expected return is 16%. The enterprise value
under DCF method is Rs. 169383.36 cr.

The calculations are given in Annexure.

 Sales Multiple Method

Maintainable Net sales for the forecast period have been arrived by taking
average of present value of future sales discounted at WACC. The value of
enterprise under this method is Rs. 9749.93 cr.

The detailed calculations are given in Annexure.

 Price Earning Capacity Value (PECV) multiple method

Maintainable Net Profit (PAT) for the forecast period has been arrived by taking
average of present value of future PAT discounted at WACC. A PAT multiple of
8 is considered conservatively as the average PAT multiple of industry. The
value of enterprise under this method is Rs. 16209.19 cr.

. The detailed calculations are given in Annexure.

Confidential Synergy Multitech Ltd. Page 6


 Net Asset Value Method

The Net Asset Value Method is not considered as it is not appropriate for the
company and the nature of its business.

Fair Value of the Enterprise:

However, considering the merits and limitations of valuations under the each of
the above methods we have arrived at a composite valuation giving appropriate
weights to the value arrived under the each of the above methods.

The fair value of the enterprise is Rs. 23404.74 cr.

Considering possible variations in assumptions underlying projections a Beta of


2.00 is considered.

Detailed calculation is given in Annexure.

Confidential Synergy Multitech Ltd. Page 7


6.0 Company Profile:

Introduction
Synergy Multitech Ltd. was established in 1998 with an intention of making it a house of
research and development in the field of electronics and other allied engineering segments.
Scientists from the disciplines of Electronics, Physics, Telecommunications and Information
Technology synergize their talent to skim the best for the industry thus making Synergy a
reputed private R&D organization. Synergy provides a platform to any scientist or scientific
community to undertake research & development activities of common interest. The toiled
efforts of Synergy had led to prestigious patents [total R&D] registration as well as design rights
as the case may be.

Synergy, working in the area of high technology, to develop and maintain sophisticated
systems. The company’s main objectives are to invent, develop and manufacture Specialized
equipment, measurement and control electronic products along with technology and embedded
devices to give ultra designed gadgets, which will not only incorporate the latest technology
features but also at affordable prices. We have the domain expertise that has been acquired
from implementation of various projects in its long and strong technological track. We offer a
wide range of services to address a variety of industry segments and information technology
applications that includes, Design and development of Solar driers, Solar devices, Green
Houses and green house automation, Real-time data acquisition with data loggers, large field
experiments and design of software related to data collection and analysis. An Artificial
Intelligence based decision-making software for engineering and manufacturing units.

Synergy, with its rigorous quality controls, is proud to assure cost-effective quality on timelines,
that too, with a complementary of smile and right attitude. The vibrant nature of Synergy
percolates down the line may be a customer or a consumer, with a mass of opportunities and
strengths that gives tangible benefit. Our process includes a flexible horizontal hierarchy that
enables a speedy project delivery. Above all that, the company is primarily based on morals,
ethics, and transparency to our partners as well as our indirect business partners, namely
employees [known as Synergizers].

We ensure our clients to achieve a competitive advantage and thereby leadership in the
competitive markets they serve which we ensure by adhering to quality practices in both out
sourcing as well as manufacturing of our products. Synergy is in the process of joining hands
with various organizations and Governmental Institutions to fill in the gaps in the development of
mechanization, electronic instrumentation for control and automation, Green house technology,
Non conventional energy projects in comparison to other developed countries.

Confidential Synergy Multitech Ltd. Page 8


PROMOTER AND SERIAL INVENTOR

N.V. Satyanarayana is the quintessential inventor with a fore thought and passion for inventing
products and systems for implanting and enabling various in day to day life. His inventions have
a very practical and economical value. Like a true inventor, his mission is to commercialize his
inventions and make them available public.

Mr. N.V. Satyanarayana is a Post Graduate in Applied geology from Andhra University, serial
innovator and holds 2 Indian patents. He carries with him, over a decade of experience in wide
range of technologies in the areas of embedded systems and solutions development. His
association includes Indian Navy, National Ship Design Centre Visakhapatnam, Innsoft
Solutions Ltd, Ministry of Science and technology and National Innovation Foundation. Mr. N.V.
Satyanarayana has worked for major projects involving an exhaustive study of embedded
technology in Missile development & Russian warship equipment indigenization and process
control, enabling considerable performance enhancement and implementation. He specializes
in architecting & development of complex systems and has extensive knowledge on Mobile
Security Applications, Oil & Natural gas Exploration Solution and Portable Energy generating
devices, and has been awarded National innovation Foundation energy category award in 2002
by President of India, Dr A.P.J Abdul Kalam. His vision for the organization is to develop a world
class product range with open system architecture for Low cost solutions for High end
Technologies.

Confidential Synergy Multitech Ltd. Page 9


Mr. N.V. Satyanarayana receiving the acclaimed
National award for his invention from the president of India
Dr. A.P.J. Abdul Kalam

Confidential Synergy Multitech Ltd. Page 10


7.0 Outlook on Synergy Multitech Products & Services:

History and Business


Synergy R&D and Product Development :

Synergy Multitech Ltd

Embedded Systems GIS Mapping Software Application


Development

Embedded Engineering GIS Mapping Capabilities: Software Application


Group: Our services cover the Synergy Multitech is capable Development: We offer a total
whole software and hardware of processing remote sensing solution in the Mobile Phone
life cycle from product design data collected through IRS P5, and PDA Applications, GIS
to embedding the software into IRS P6, CARTO II. And also and .NET arena
the target platform. We provide can perform full resolution encompassing software
software development (C, C++ browsing on 64Bit servers, development, web designing
and Assembly) for various Level I product from browsed and consulting. Our skill sets
target RTOS / themes, Radio metrically and are in programming languages
Microprocessors; Electronic geometrically corrected raw like ASP and .NET
Design; Board Support products, Generating Geo Technologies, C++, Symbian,
Packages; device drivers; referenced maps using GCP’s J2ME, back-end tools like SQL
protocol development, and topographic sheets, Server, My SQL and Oracle
working with multilayered and front end design tools like
GSM Modem, VTS, Hand help annotated value added Photoshop, Dream weaver,
GPS Systems. product comparable or better Flash MX, JavaScript and
than “Google earth” product, VBScript.
Working with 16 CPU, 64 bit
servers using ERDAS which is
equivalent to NRSC’s VAP

Products Developed In House:

1. Mobile Tracking Software Ver1.0:

Mobile Tracking Software is an efficient solution of stolen mobile finder system, in the era of
smart phones. MTS’s proficient technology perfectly integrates key facilities like SIM change
alert and phone book retrieval from the lost
. Printing phone.A 0 Laser
capabilities
2 tone multi color, B&W,Image
with 2.5Mtr.Resolution.

2. Campus Management Software:

Confidential Synergy Multitech Ltd. Page 11


Camus Management software provides a digital platform for day to day activities with robust
web 2.0 technology features integrated in one system. It is a customizable, interactive web
solution for Students, Teachers, Management, Parents of an educational institution and has
improved-access to real-time data, up-to-the-minute statistics and information, accessible from
any computer, anytime, anywhere within school network and from internet web.

3. Vehicle Tracking System:

Vehicle Tracking System is a high performance, cost effective wireless communication device
with inventory tracking technology, vehicle monitoring and remote data collection. The VTS can
be configured to monitor and transmit real time data. With its rugged construction, the Synergy
VTS can be installed in obscure places to prevent tampering.

4. Gas Iron Box:

LPG based Cloth’s Iron box is implemented to provide a user-friendly tool to the washer men in
their routine work. It will reduce the daily maintenance cost up to 50% on the conventional
method. The device comes with a small cylinder that can store up to 0.2Kg of LPG.

5. Stolen mobile finder:

Stolen mobile finder is an efficient stolen mobile finder system of full version, in the era of smart
phones. Proficient technology perfectly integrates key facilities like phone book retrieval, SIM
change alert and handset location. The software would indicate a change made on the mobile
device from the instance it is reported stolen/lost. This software ensures a one-stop solution for
high-level security.

6. Pairing device (baggage alarm)

A pairing device comes with a transmitter and a receiver that provides physical intimation/alert
whenever the distance between these devices is greater than 2 Mtrs. The pairing device is a set
of 2” X 2” X 0.3” (thickness) Boxes that can be fixed on to a commodity to ensure continuous
surveillance.

7. Helmet with audio amplifier:

Synergy Multitech Ltd. hand free audio system helmets are a quick solution to the never-ending
hassle of call handling while we are traveling. This device provides the facility of an in-built

Confidential Synergy Multitech Ltd. Page 12


speaker and microphone in the helmet. This unique facility has been developed on the current
technology and defines the successfully integrates comfort at cost efficiency.

8. Dual Temperature Helmet:

Dual Temperature Helmet helps us experience the comfort of air conditioning within the closed
environment of the helmet. Our technology blends the benefits of the Peltier technology into a
helmet to optimize the temperature in the protective device

9. Two wheeler vehicle tracking system:

Two wheeler vehicle tracking system provides remote accessibility that allows us to monitor and
control a particular two-wheeler. This device attempts to control and locate the direction, speed,
latitude and longitude of the two-wheeler by relying on the operational information about the
device itself, including signal strength and location of the cellular towers.

10. Street light Management:

The street Light Management system is a micro controller based system, developed with the
above need in focus and works by making use of the twilight timings (Sunrise & Sunset) of a
particular place.

11. i -AMR:

Intelligent Automatic Meter Reading System with multiple features like power on & off, Load
increase and decrease, status of reading..etc

12. Home Automation:

Home Automation based on building automation technology is an efficient way to provide


specific automotive requirement to private homes for the purpose of comfort and security. We
provide home automation techniques to tasks such as scheduling electric devices from the point
of scaling, optimizing the intensity of fans to lights. Remote device management is done through
remote, keypad and PC.

13. Micro Windmill for Electronic Industry:

Confidential Synergy Multitech Ltd. Page 13


This Micro windmill is used to generate the required power for the palm devices like Mobile,
Radio, Walkman, Laptop.. etc during journey time. It will save the expenditure of the cells and
as well as saves the energy.

14. Micro Windmill for Automobile Industry:

This Micro windmill is used to generate the required power for the vehicle during motion and
reduce the dynamo load on the engine to reduce the oil consumption. These windmills can be
connected in series and placed in panels at front portion of the vehicle

15. Coal water fuels (CWF):

Coal water fuel is research project developed to establish a feasible solution of fuel
consumption. The coal water fuel energy is processed using Coal Beneficiation Plants.

16. Petro scope:

PETROSCOPE addresses and eliminates the uncertainty involved in oil drilling. Application of
PETROSCOPE starts after completion of exploration and before start of drilling. A Relational
Intelligence (RI) based Prediction Engine (PE) for Oil and Natural Gas Exploration, this
technology builds a multidimensional space from the vibratory seismic data.

17. Missile predictive Tracking:

The Ultimate Solution for Predictive Tracking based on Relational Intelligence (RI) and uses
Quantum Measurement System (QMS).

Confidential Synergy Multitech Ltd. Page 14


8.0 Present Proposal:

1. Development of Antitheft Mobile Application

2. Legal expenses of filing anti infringement suits for Antitheft Mobile application.

3. Licensing and selling the application to different companies.

4. Redemption of old liabilities

Confidential Synergy Multitech Ltd. Page 15


1. Development of antitheft mobile application;

Field of invention:

The existing Patent issued in respect of Communication Device Finder System is a broad based
one. It includes Antitheft Mobile application and also applications for location of any application
system.

As the patent has already been obtained and there is a huge market in respect of mobile
phones, it is planned to develop and commercialize Antitheft Mobile Application.

The present invention relates to a communication device finder system to recover a lost /
misplaced / stolen device used for communication.

The proposed system of recovering a lost / misplaced /stolen device used for communication
can be implemented on all kinds of wireless telephone networks that support communicating
device networks that employ GSM or CDMA or TDMA or WLL or any similar technology.

PRIOR ART:

There are a number of prior publications which teach invention relating to finding a lost mobile.
Some of the prior publications in the field of the present invention is as follows:

US 7,103,367 entitled as: 'Network-based services for misplaced cellular mobile stations'
teaches about feature for a mobile station, wireless network, and method of operating a wireless
network for locating a misplaced mobile station and preventing its unauthorized use. The
wireless network and a base station, transmit a misplaced mobile station signal to a mobile
station, causing a misplaced mobile station to ring at high volume, display a text message, emit
an audio message, and deactivate normal mobile station function

US 7,113,803 entitled as: 'System and method for enabling instant messaging on a mobile
device' teaches about a method and system for enabling instant messaging on mobile devices
is provided. A customized SMS message is created that awakens the mobile device so that
instant messaging may be initiated. Once the mobile device is awakened by the customized
SMS message, the mobile device responds to the customized SMS message and initiates
processing. Based on information obtained, the mobile device creates a reply customized SMS
message. The reply customized SMS message is translated into a reply instant message, which
is transmitted over a persistent Internet connection to the sender responsible for awakening the
mobile device. Alternatively, the mobile device may respond by creating an Internet connection
and establishing a chat session over the Internet connection. The chat session allows the
exchange of instant messages between the mobile device and the sender responsible for
awakening the mobile device.

US 7,050,797 entitled as: 'Remote control system in mobile communication terminal and
method thereof teaches that disclosed is a remote control system in a mobile communication

Confidential Synergy Multitech Ltd. Page 16


terminal and method thereof enabling a user to use the mobile communication terminal not only
passively but also actively. The present invention includes a first step of receiving a remote
control command from a subscriber, a second step of recording the remote control command in
a reserved field of the page message, a third step of transmitting the page message to the
mobile communication terminal, and a fourth step of having the mobile communication terminal
operate in accordance with the remote control command included in the page message. The
fourth step includes the steps of verifying a species of the received page message by parsing
the received page message, extracting the remote control command by analyzing the reserved
field of the page message if the received page message is for controlling the mobile
communication terminal remotely, and controlling an operating state of the mobile
communication terminal in accordance with the extracted remote control command.

EP1139116 teaches that a method is provided for searching for a lost asset equipped with a
short-range wireless transceiver. A finder service sends out a search request including a lost-
asset identifier, this request being sent over a mobile radio infrastructure to a plurality of mobile
devices. These devices transmit on the request in their immediate vicinity using short-range
wireless transceivers. Upon a mobile device receiving back a response from the lost asset it
returns a found message over the mobile radio infrastructure to the finder service, this message
either including location data concerning the whereabouts of the lost asset or enabling such
data to be obtained by the finder service.

EP1630757teaches that method for locating lost or stolen items has the following steps prior to
loss of the object: marking o the object using an RFID (radio frequency identity) tag containing a
unique identifier and central storage of the tag details together with owner unique identification
derived from the owner's mobile phone SIM card. If the item is lost, a third party who finds it
scans in the RFID tag and the owner notified of the object's retrieval. The invention also relates
to a system for implementing the inventive method.

EP1684535 teaches a system and method of locating a lost wireless communication device. A
remote server is contacted to indicate that the wireless communication device is lost. A lost
device policy setting is then activated in a database coupled to the remote server, the lost
device policy setting indicating that the wireless communication device is lost. In response to
activation of the lost device policy setting, a remote location command is then transmitted from
the remote server to the wireless communication device via a wireless network. The remote
location command is subsequently received at the lost wireless communication device, which
processes the remote location command such that a user of the wireless communication device
can locate the device.

EP 1545141 teaches that the present invention generally relates to a system and a method for
PIN blocking on a terminal for mobile finance to block a smart chip not to use a mobile finance
service with a mobile communication terminal by transmitting an SMS(Short Message Service)
message to the mobile communication terminal, when a user lost the mobile communication
terminal in which the smart chip for using the mobile finance service such as mobile banking,
stock exchange and/or insurance is contained. A system and a method for PIN blocking on a
terminal for mobile finance in accordance with the present invention can remotely block a smart

Confidential Synergy Multitech Ltd. Page 17


chip within a mobile communication terminal when a customer lost the terminal for using a
mobile financial service, thereby preventing a finder or a third party from obtaining information
stored in the smart chip or accessing the mobile financial service by disguising as the owner of
the terminal. As a result, it can remarkably increase security for customer information and
financial transactions. However, the above citations are not teaching how to locate a mobile
phone which has been stolen because the thief may change SIM to that of different mobile
network service provider. A clever thief may try to disable the security activation element by
deleting its software or deleting or changing message center number. The present invention
over comes any steps a smart thief may take to escape detection and enable location of device
in all circumstances.

Object of invention:

Primary object of the present invention is to propose a communication device finder system
having a non erasable security features installed in the device, which enables location of lost
communication device independent of a specific mobile network service provider.

Another object of the present invention is to allow these security features to be disabled /
activated only by the original owner of the device or by an authorized service center, remotely,
by means of sending an SMS to the lost/stolen device.

Another object of the present invention is to use one or more methods of communicating to a
central server/ another device i.e. either by messaging or generating voice

Further object of the present invention is to provide the device with a security activation element
for activating and bringing into auto answer mode said communication device finder though a
telecommunication service provider network on being triggered by any other designated
communication device or through internet from a predetermined and designated internet
protocol (IP) address or on entering incorrect personal identification number (PIN) or pass word
with or without changing said SIM. Further object of the present invention is to provide the
device with a security activation element is designed for enabling the device to send
prerecorded short messaging service (SMS) and /or multimedia messaging service (MMS) or e-
mails etc. after said activation, further object of the present invention is to provide the device
with a security

activation element which is programmed for generating and playing voice messages and visual
messages in the device.

Further object of the present invention is to provide the device with a security activation element
for auto re installing the data when attempt is made to delete it or a non erasable read only
memory (ROM).

Further object of the present invention is to provide the device with a security activation element
to find out the present location of the device.

Confidential Synergy Multitech Ltd. Page 18


Description of Invention:

There are various steps of the communication device finder system to recover the
communication device. The recovery technique makes use of different types of programmed
communications according to the stages of recovery.

The programmed communications include :

a) Simple voice appeals to the person having the lost/misplaced/stolen communication device:
Voice messages, requesting the person holding the device to return it to its owner, are
automatically generated from within the device, by the software that has been installed in it.
Details of the owner will be mentioned in pre-defined messages. There are very few chances
that the stolen device is recovered with this minimum effort.

b) By creating an environment where in the perpetrator gives in: Mortifying ring tones are pre-
defined in the software and they get activated as soon as the device switches over to the
security mode. On receiving a call in public, this would cause embarrassment and humiliation.
Also the caller/receiver on the other end will be intimated without the user's knowledge about
the devices authentication. These features would affect the culprit psychologically and thus alert
the public around.

c) Also there is a provision that will cause disturbance to the user by working abnormally. Say
switches ON the device, when it is switched OFF, alarming at wrong times, and making
unnecessary calls to numbers in his address book, etc.

d) Accumulating adequate evidence to facilitate investigation regarding the missing device.


The security activation device comprises software modules installed on the flash memory in the
device by the authorized owner. The security element is made non-erasable by installing the
auto-re-install feature set. Yet another way to achieve this is to provide the security activation
element comprising a ROM by the manufacturer at the time of manufacturing the device. This
element is dormant during the normal working of the device, but will get activated once a
codified SMS message is received by the communicating device. This codified SMS will be sent
by the authorized owner of the communicating device from any other device or server to the
device in question, once he/she realizes that his/her device has been lost/misplaced/stolen.

There is another way to enable the security mode of the device. When the user tries to switch
off and switch on the device while changing the SIM card, the software prompts for a password.
Any password entered by the user is accepted so that he continues using it. Implicitly a check is
done whether the password encountered is the actual password. If they match, the security
mode is not activated. Else it does. This happens every time the user tries to change the SIM
card.

The modules and methods within this software will work over and above the inbuilt security
features provided by the manufacturer. Services that are offered in this application are:

(a) Sending/receiving SMSes or MMSes or e-mails or snaps/videos taken from the


lost/stolen device

Confidential Synergy Multitech Ltd. Page 19


(b) Making voice calls

(c) Providing information about the location of the lost device

(d) Generating and playing voice messages in the device

(e) Displaying required visual messages on the device

(f) Automating calls to emergency numbers that have been provided

(g) Automatic conversation recording of both incoming and outgoing calls

(h) It captures the screen content whenever desired and sends it across through the
MMS facility.

For all forms of communication, only the existing connection is made use of. And for all these
communication, the current user of the device is billed (be it pre-paid or post-paid). If one of the
emergency numbers is an international number, then the billing would be even higher. What is
visible to him/her is his/her balance getting diminished in case of prepaid service and long bills
in case of post paid service. Thus, causing financial loss to the user.

The "auto answer mode" is set ON along with the "silent mode" so that all incoming calls to the
device are answered at the first ring without the user's knowledge. This would allow the caller
(investigator or owner) to hear the conversation (with outsiders) of the person having the stolen
device.

To trace the exact location of the lost device, the software informs the authorized owner about
the location of the transmitting tower under whose range the lost device is and the strength of
the signal received by the device from the transmitting tower (which gives an approximation of
how far in radial the device is located from the transmitting tower). Also a central server and
another emergency number will be intimidated in the form of an SMS message.

The received details from the stolen device are plotted on the related map of the available
network towers and/or GPS information. The Mapping system automatically detects these
towers, service provider to the lost/stolen device and also the kind of connection (pre-paid/post-
paid) being used. With this data the location of the device can be calculated precisely. If the
person holding the stolen/lost device is moving, the rate at which he is moving, direction in
which he is moving, etc. can also be seen on the map.

The device passes on information about all the available networks that are present in the vicinity
of the device. Also the strength of the signal received by each network is also shown. This helps
in calculating the distance of the lost/stolen device from each of the towers in the area. This
information will be directly fed into the server for our retrieval. Also the time spent in a certain
location can also be calculated. This information can be viewed at the server end, and the
movements of the person holding the device can be traced.

Confidential Synergy Multitech Ltd. Page 20


If the person holding the stolen device tries to bar the outgoing services by either deleting the
"message center number" in the message settings, then the software is intelligent enough to
have a copy of the same in its backup. Thus the service can never be disabled. Similarly if the
"Fixed dialing mode" is set ON, then it is a must pre-requisite that all the emergency numbers
must be assigned to the keys.

If the intelligent device realizes that the sending of SMS'es is failing every time (due to nil
balance or removal of message center number), it will automatically communicate with the
emergency numbers, which may be toll free ones also( for example: 100, 911, 112) in the form
of either messages or voice calls. The owner has an option to give one toll free number which
connects to the device manufacturer directly. These numbers have to be predefined by the
authorized when he is customizing this application.

The security activation is carried out by a security activation element comprising an embedded
in a Read Only (ROM) or a flash memory of the device; with the auto re-install option, so that all
attempts to delete the software component will go in vain.

Once the security mode has been enabled / activated, the security activation element keeps
track of all the outgoing and incoming services of the lost device and communicates the details.
These details can then be provided to the investigating agency if need arises to trace the lost
device, the security activation element performs the following functions.

(a) It reads the IMEI (International Mobile Equipment Identification Number),IMSI (International
Mobile Switching Identification) number and SIM (Subscribers Identity Module) card identity
number (if available).

(b) It indicates the current location of the missing device by giving details like the device number
(changed or existing one), name of the device (given by the authorized owner), the
manufacturer, modem revision details, modem model number, modem co-design and
network service provider's tower in whose range the lost hand-set currently is.

(c) It reads the strength of the signal that is being received by the lost device. This would help
us in calculating the distance of the lost device from the service provider's tower. It also
gives
the MCC (Mobile Country Code) and MNC (Mobile Network Code) which tells us when the
roaming facility is availed.

(d) If the device is GPS compatible, along with above mentioned details, the latitudinal and
longitudinal details are also communicated. Also the speed (in km/h) at which the person
holding the device is moving is sent.

(e) It also tells us the status of the battery and whether it is in the process of getting charged
currently.

(f) Also the noise level (in dB) of his surroundings is captured and is sent.

Confidential Synergy Multitech Ltd. Page 21


(g) It keeps a record of the outgoing calls, incoming calls, outgoing SMS'es and incoming
SMS'es while the person who has found the lost device continues using it.

(h) The software tries to prompt the owner when the current user of the stolen device tries to
switch it off.

The received information is processed and helps in tracing the exact location of the lost device.
The details are sent to the emergency numbers provided continuously so that the movements of
the person holding the device can be traced and followed.

This security activation element works only on the device in which it has been installed. For this
the element makes use of the Model number of the device on which it is installed, the IMEI
number and IMSI number.

Along with the above mentioned security element, a supplementary module is installed in the
device. This supplement periodically checks for the removal or attempts to destroy the main
software module from memory. If it is detected that the software part of the security activation
element has been removed, it will immediately re-install the main security software module from
a duplicate copy that has been stored in the device at the time of installation.

Similarly the security activation element software module will periodically check if the
supplementary software module has been removed from memory. If yes, it will re-install the
missing software module from the duplicate copy.

There is a provision in this security activation element that no one will be able to detect the
presence of it in the device. It is only the authorized owner of the mobile who knows that the
software has been installed in his / her device.

In case the current user of the device attempts to switch it off or does so, this security element
has provision to switch it on from a remote source. Unless the battery has been removed, this
method will not fail.

All services related to the emergency software activation and working will be automatically
erased from the devices' history. Thus the current user will not be aware of the transactions
taking place without his knowledge. Also this security software module is named in a cryptic
manner for hiding its real identity in the device.

According to one of the embodiment of the invention a communication device finder system
comprises:

- A transmitter-receiver for transmitting and receiving data in electronic connection with a


microprocessor to process the data received or to be transmitted and to a memory element
to store the data;

- A keyboard or touch screen and optionally a mouse, connected to a dialer element, for
entering the number to be dialed or an alphanumeric short message (SMS) or a multimedia
message (MMS);

Confidential Synergy Multitech Ltd. Page 22


- A display panel connected to the microprocessor for displaying alphanumeric characters,
graphics and optionally video and/or streaming video; a read-write element for reading and
writing data from/to said memory element;

- An embedded or discrete subscriber identity module (SIM) for enabling wireless connection
with a predetermined telecommunication service provider network;

- Optionally, elements for providing visual cues on said display panel and/or generating voice
cues when said devices is activated; wherein

- Said device is provided with a security activation element for activating and bringing into auto-
answer mode said communication device finder though a telecommunication service provider
network on being triggered by any other designated communication device or through
internet from a predetermined and designated internet protocol (IP) address or on entering
incorrect personal identification number (PIN) or password with or without changing said SIM,
such that no visual or voice cues accompany such activation, said security activation element
comprising flash memory with auto reinstall option set for auto reinstalling the data including
the message center number when attempt is made to delete it and/or a non erasable read
only memory (ROM) containing said data.

Brief description of drawings:

Fig. 1 shows the diagram of working.

Fig. 2 shows hardware devices used and the flow of signals DESCRIPTION OF INVENTION
WITH DRAWINGS In accordance with a preferred embodiment of the invention a
communication device finder system includes a transmitter-receiver(1) for transmitting and
receiving data in electronic connection with a microprocessor (2) to process the data received or
to be transmitted and to a memory element to store the data. A keyboard (3) and/or a touch
screen (3) and optionally a mouse are connected to a dialer element for entering the number to
be dialed or an alphanumeric short message (SMS) or a multimedia message (MMS). A display
panel (4) is also connected to the microprocessor (2) for displaying alphanumeric characters,
graphics and optionally video and/or streaming video. The system also comprises a read-write
element. The read write element is provided for reading and writing data from/to said memory
element.

The system has a embedded or discrete subscriber identity module (SIM) for enabling wireless
connection with a predetermined telecommunication service provider network.

There are some optional elements in the system such as for providing visual cues on said
display panel and/or generating voice cues when said device is activated. The said device is
provided with a security activation element (7) for activating and bringing into auto-answer mode
said communication device finder though a telecommunication service provider network on
being triggered by any other designated communication device or through internet from a
predetermined and designated internet protocol (IP) address or on entering incorrect personal

Confidential Synergy Multitech Ltd. Page 23


identification number (PIN) or password or any other known way with or without changing said
SIM, such that no visual or voice cues accompany such activation appears on the screen of the
device.

The said security activation element (7) comprises flash memory with auto reinstall option set
for auto reinstalling the data including the message center number when attempt is made to
delete it and/or a non erasable read only memory (ROM) containing said data in an embodiment
of the system, on activation, said security activation element is programmed for sending a
message to said designated communication device or designated IP address about location of
nearest at least three base station (BS) transmitting towers including mobile country code
(MCC) and mobile network code (MNC) and the strength of signal received by the device from
each transmitting tower.

In another embodiment, on activation of the security activation element of a communication


device finder system, the activation element enables the device to send pre-recorded short
messaging service (SMS) and/or multimedia messaging service (MMS) and/or e-mails and
optionally images and/or video captured by built in camera after said activation.
According to yet another embodiment of the communication device finder system, the said
security activation element, on activation, is programmed for generating and playing voice
messages and visual messages in the device which gives the warning to the possessor of the
device.

The security activation element, of a preferred embodiment of the communication device finder
system, on activation, is configured for copying, deleting and sending a copy of the phone book
stored in memory of said system to said designated device or IP address.

A communication device finder system which has the security activation element may in an
embodiment automatically dial the conventional emergency numbers and such numbers are
stored in the phone book of the device.

In an embodiment of the communication device finder system, the security activation element
may also be triggered by a codified SMS received by said system from said designated device
or IP address.

On activation said security activation element of the system may communicate details of all
incoming and outgoing services of said system to the designated communication device or IP
address.

In a yet another preferred embodiment of the system, on activation said security activation
element communicates latitudinal and longitudinal details of location of the system to said
designated communication device or IP address, if said system is GPS compatible.
In one of the embodiments of the system, said security activation element on activation, reads
one or more of details comprising international mobile equipment identification numbers (IPEI),
international mobile switching identification number (IMSI), subscriber identity module (SIM)
card identity number, device electronic serial number (ESN), name of the device, the name of

Confidential Synergy Multitech Ltd. Page 24


manufacturer, modem revision details and modem model number and sends to the designated
communication device or IP address.

Such communication device finder system, may be any one of the devices such as mobile
phone, laptop, palm top, i-pod and a PDA.

The communication device finder system is compatible with or based on WLL or GSM or CDMA
or TDMA type of telecommunication service provider networks.

We claim:

1. A communication device finder system comprising:

A Transmitter-receiver (1) for transmitting and receiving data in electronic connection with a
microprocessor (2) to process the data received or to be transmitted and to a memory element
to store the data; a keyboard or touch screen (3) and optionally a mouse connected to a dialer
element for entering the number to be dialed or an alphanumeric short message (SMS) or a
multimedia message (MMS);a display panel (4) connected to the microprocessor (2) for
displaying alphanumeric characters, graphics and optionally video and/or streaming video; a
read-write element for reading and writing data from/to said memory element;
an embedded or discrete subscriber identity module (SIM) for enabling wireless connection with
a predetermined telecommunication service provider network; optionally, elements for providing
visual cues on said display panel and/or generating voice cues when said device is activated;
characterized in that said device is provided with a security activation element (7) comprising a
flash memory with auto reinstall option set for auto re-installing data including message center
number when attempt is made to delete it and/or a non erasable read only memory (ROM)
containing said data, wherein the said security activation element (7) is adapted for activating
and bringing into auto-answer mode said communication device finder through a
telecommunication service provider network on being triggered by any other designated
communication device or through internet from a predetermined and designated internet
protocol (IP) address or on entering incorrect personal identification number (PIN) or password
with or without changing SIM, such that no visual or voice cues accompany such activation.

2. A communication device finder system as claimed in claim 1, wherein on activation said


security activation element (7) is programmed for sending a message to said designated
communication device or designated IP address about location of nearest three base station
(BS) transmitting towers including mobile country code (MCC) and mobile network code (MNC)
and the strength of signal received by the device from each transmitting tower.

3. A communication device finder system as claimed in claim 1, wherein on activation said


security activation element (7) is designed for enabling the device to send pre-recorded short
messaging service (SMS) and/or multimedia messaging service (MMS) and/or emails and
optionally images and/or video captured by built-in Camera after said activation.

4. A communication device finder system as claimed in claim 1, wherein said security activation

Confidential Synergy Multitech Ltd. Page 25


element (7) on activation is programmed for generating and playing voice messages and visual
messages in the device.

5. A communication device finder system as claimed in claim 1, wherein said security activation
element (7) on activation is configured for copying, deleting and sending a copy of the phone
book stored in memory of said system to said designated device or IP address.

6. A communication device finder system as claimed in claim 1, wherein said security activation
element (7) on activation is designed to automatically dial the conventional emergency numbers
and such other numbers stored in the phone book.

7. A communication device finder system as claimed in claim 1, wherein said security activation
element (7) is designed for getting triggered by a codified SMS received by said system from
said designated device or IP address.

8. A communication device finder system as claimed in claim 1, wherein on activation said


security activation element (7) is programmed for communicating details of all incoming and
outgoing services of said system to the designated communication device or IP address.

9. A communication device finder system as claimed in claim 1, wherein on activation said


security activation element (7) is programmed to communicate latitudinal and longitudinal details
to said designated communication device or IP address, if said system is GPS compatible.

10. A communication device finder system as claimed in claim 1, wherein on activation said
security activation element (7) is programmed for reading one or more of details and sending
the details to the designated communication device or IP address, the details comprising
international mobile equipment identification number(IPEI), international mobile switching
identification number (IMSI), subscriber identity module (SIM) card identity number, device
electronic serial number (ESN), name of the device, name of the manufacturer, modem revision
details and modem model number.

11. A communication device finder system as claimed in claim 1, wherein said device is
selected from mobile phone, laptop, palmtop, i-pod or a PDA.

12. A communication device finder system as claimed in claim 1, wherein the


telecommunication service provider is based on WLL, GSM, CDMA or TDMA.

13. A communication device finder system such as herein described and illustrated with
reference to the accompanying drawings.

Fig. 1

Confidential Synergy Multitech Ltd. Page 26


GPS Satellite

Enabling the Working in


security security Phone call/SMS sent to
the mobile being used
Phone call/SMS from
any communication mode mode by mobile owner &
other predefined
device emergency numbers

Physical
network

Lost device
with CDF
Change of SIM card software Physical
network

Mapping
Internet Server

User
access

SMS from predefined


IP address

Fig. 2

Confidential Synergy Multitech Ltd. Page 27


START Y = YES
N = NO

Is there a need Is there a temporary


N N Y Y
Change in SIM card to enable the security device that can be used for
detected? mode in the stolen communicating with stolen
device? device?

Y
N

Send a codified message from the


server to the Lost/stolen hand set. Send a codified SMS to the s
Enter password

Is the
Y N Is it the case that
entered Y
Security code not enabled. the user has forgotten The device decrypts the co
password
the password?
correct?

Intimate the authorized user ( to the predefined Retrieve password from the web server
number provided) regarding the change in SIM

Security mode enabled in the stolen device

SMS’es will be sent every


minute from the stolen device to
•emergency numbers,
•current mobile being used by the user
•the server.

Y Is there N
Y Is the billing
Deduct balance any balance Charges accrued In the monthly bill
prepaid?
in the card?

Send SMS to predefined toll free numbers

Process the data received from the device

Able to
trace Y
the lost
device?

Affect the current user psychologically & financially

Confidential Synergy Multitech Ltd. Page 28


Able to
Y
recover the
device?
2. Filing of patent infringement suits:
The patent registration on hand enables the company to enforce its rights of technical
exclusivity and commercial entitlements as to royalty from similar applications. These
applications have been developed subsequent to the date of patent entitlement. Hence, these
would offer a huge opportunity for revenues.

Nevertheless, An the entities of infringement are MNCs with global presence and big corporate
companies of India, the filing and enforcing of infringement suits, a highly competent and
qualified attorneys in patent laws, more particularly, those acquainted with patent infringement
suits. This requires a good amount of investment.

Since, this is already an established scope of revenue platform and huge revenue potential
involved, the task is justified and worth pursuing.

Apart from the below mentioned companies nationally and internationally, there are so many
other companies also providing Anti-theft software for mobiles/Tablets/notebooks/Laptops in
INDIA. As per our patent claims, they have infringed our patent :

Examples of violations by various companies:


1. SAMSUNG :

http://www.samsung.com/in/article/protect-your-phone-and-yourself

http://www.samsungdive.com/aboutN/forwardGuideTracker.do

http://www.knowyourmobile.in/samsung/samsung-wave/1236/how-activate-mobile-tracker-your-
samsung-wave-525

http://clip.dj/anti-theft-mobile-phone-samsung-mobile-tracker-cheil-india-download-mp3-mp4-
9XkFfw6wduY

http://www.huffingtonpost.com/2013/06/13/samsung-smartphone-antitheft_n_3436873.html

http://indiatoday.intoday.in/story/samsung-adding-anti-theft-solutions-to-
smartphones/1/353343.html

http://www.knowyourmobile.in/samsung/2013-samsung-portfolio/8073/samsung-launch-anti-
theft-feature-its-devices

https://in.news.yahoo.com/samsung-adding-anti-theft-solutions-205814442.html?.tsrc=lgwn

2. Nokia:

Confidential Synergy Multitech Ltd. Page 29


http://store.ovi.com/content/19089

http://www.indiabroadband.net/nokia/15964-wavesecure-anti-theft-software-nokia-mobile-
phones.html

3. Apple :

https://itunes.apple.com/us/app/prey-anti-theft-free-security/id456755037?mt=8

https://itunes.apple.com/en/app/find-my-iphone/id376101648?mt=8

http://www.apple.com/icloud/find-my-iphone.html

http://www.apple.com/support/icloud/find-my-device/

http://www.zdnet.com/apple-google-samsung-agree-to-support-smartphone-kill-switches-
7000028503/

http://www.makeuseof.com/tag/kill-switch-secure-android-device/

http://www.makeuseof.com/tag/so-your-iphone-was-lost-or-stolen-heres-what-to-do/

4. Sony:

http://talk.sonymobile.com/t5/Xperia-U/Best-phone-locator-anti-theft/td-p/238250 - other sites

http://www.sonymobile.com/in/products/business/xperia-z1-series/it-resources/

http://www-support-
downloads.sonymobile.com/support/XperiaInBusinessZ1/Xperia_in_Business-Security-Z1-
Z1_Compact-Z_Ultra-January_2014_IN.pdf

5. LG:

http://www.lg.com/in/mobile-phones/lg-GB106-basic-phone

http://www.lg.com/in/mobile-phones/lg-KP107B-basic-phone

http://compareindia.in.com/specification/mobile-phones/lg-c375/254962

http://blogs.wsj.com/digits/2013/08/26/samsung-lg-plan-anti-theft-tool-for-phones-tablets/

http://www.slashgear.com/samsung-and-lg-considering-an-anti-theft-kill-switch-on-future-
devices-28295226/

http://www.youtube.com/watch?v=xMQfFVzny4o

http://newsroom.mcafee.com/press-release/lg-partners-mcafee-bring-anti-theft-feature-lg-g3

http://thenextweb.com/mobile/2014/06/12/lg-teams-mcafee-bring-anti-theft-feature-new-flagship-
g3-smartphone/

Confidential Synergy Multitech Ltd. Page 30


http://gadgets.ndtv.com/mobiles/news/lg-g3-features-mcafee-mobile-security-and-anti-theft-
tools-pre-installed-540262

http://www.fonearena.com/blog/105788/lg-brings-mcafee-anti-theft-feature-to-lg-g3.html

6. Google play:

https://play.google.com/store/apps/details?id=mmapps.mobile.anti.theft.alarm

https://play.google.com/store/apps/details?id=br.com.maceda.android.antifurtosms

https://play.google.com/store/apps/details?id=com.avast.android.at_play

https://play.google.com/store/apps/details?id=com.mobiloucos2.pegaladrao

https://play.google.com/store/search?q=mobile+antitheft&c=apps

https://play.google.com/store/apps/details?id=ducy.android.bestandroidantitheft&hl=en

http://www.makeuseof.com/tag/how-to-trace-a-mobile-phone-location-with-google-latitude/

http://www.google.co.in/mobile/maps/

http://googlemobile.blogspot.in/2009/02/locate-your-friends-in-real-time-with.html

https://support.google.com/gmm/answer/3245654?hl=en

https://play.google.com/store/apps/details?id=com.mango.findmyphone

https://play.google.com/store/apps/details?id=com.fsp.android.phonetracker

https://play.google.com/store/apps/details?id=com.alienmanfc6.wheresmyandroid

https://play.google.com/store/apps/details?id=com.androidlost

https://play.google.com/store/apps/details?id=com.locatemy

https://play.google.com/store/apps/details?id=com.nextin.gpfindmydevice

https://play.google.com/store/apps/details?id=com.myboyfriendisageek.gotya

http://www.cnet.com/news/google-to-release-apple-like-find-my-phone-app-at-long-last/

http://www.techradar.com/news/phone-and-communications/mobile-phones/absent-minded-
android-owners-to-get-find-my-android-app-from-google-1170723

https://play.google.com/store/apps/details?id=com.prey

https://play.google.com/store/apps/details?id=com.lookout

https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity

Confidential Synergy Multitech Ltd. Page 31


https://play.google.com/store/apps/details?id=com.avast.android.antitheft_setup

https://play.google.com/store/apps/details?id=com.kms.free

https://play.google.com/store/apps/details?id=com.ralok.antitheftalarm

https://play.google.com/store/apps/details?id=com.amalgame.totalprotection

https://play.google.com/store/apps/details?id=com.ralok.antitheftalarmpro

https://play.google.com/store/apps/details?id=us.trackview

https://play.google.com/store/apps/details?id=com.cleanmaster.security

https://play.google.com/store/apps/details?id=com.fmphone.findmyphone

https://play.google.com/store/apps/details?id=com.findmyphone

7. Microsoft:

http://www.windows8downloads.com/win8-anti-theft.html

http://www.windows8downloads.com/win8-zapeze-dsnoozeb/

http://www.windows8downloads.com/win8-norton-anti-theft-jkoxywrm/

http://www.windows8downloads.com/win8-notebak-anti-theft-nzejjtgr/

http://www.windows8downloads.com/win8-mitracker-pc-anti-theft-mjvyfrrm/

http://www.wpxbox.com/microsoft-kill-switch-windows-phone/

http://www.wpxbox.com/how-to-find-your-lost-or-stolen-windows-phone-8/

8. Tata Docomo

https://www.google.co.in/search?q=Tata+docomo+anti+theft+software&oq=Tata+docomo+anti+
theft+software&aqs=chrome..69i57.20427j0j8&sourceid=chrome&espv=210&es_sm=93&ie=UT
F-8

9. SatNav Technologies:

http://www.satguide.in/mailcampaign/how_am_I_drving.html

10. Micromax:

http://www.micromaxinfo.com/resourceContent/Press-Release-Canvas-4.pdf

http://www.mobyware.net/micromax-a110-canvas-2-device-3092/system-utilities-
tag/mobileback-antitheft-get-free-85894.html

Confidential Synergy Multitech Ltd. Page 32


http://articles.economictimes.indiatimes.com/2013-07-08/news/40443623_1_canvas-hd-
micromax-canvas-4

http://blog.gsmarena.com/micromax-canvas-tab-gets-announced-in-india-for-rs-16500/

http://gadgets.ndtv.com/mobiles/reviews/micromax-canvas-4-first-impressions-389739

http://skyneel.blogspot.com/2013/07/Canvas-4-Mi-Security-app-for-any-Android-phone-and-
Micromax-A110.html

11. Celkon:

http://gallery.mobile9.com/topic/?tp=anti-theft&ty=sw&ii=7292

http://gallery.mobile9.com/topic/?tp=anti-theft&ty=apps&ii=7292

12. Karbonn:

http://gallery.mobile9.com/topic/?tp=anti-theft&ty=sw&ii=4342

http://latestprice.in/tag/karbonn-mobiles/

http://gallery.mobile9.com/topic/?tp=antitheft&ty=497&ii=5748

13. I-Ball :

http://drippler.com/iball/andi_5c#!735632

http://drippler.com/iball/andi_5c#!1151030

14. Micro technologies:

http://www.microtechnologies.net/outerfiles/Productsms.aspx#a

http://www.microtechnologies.net/pdf/print-
media/2013/16.pdfhttp://www.microtechnologies.net/outerfiles/prints_media.aspx

http://www.thehindubusinessline.com/industry-and-economy/banking/micro-tech-ties-up-with-
insurance-broker-for-car-antitheft-devices/article4505414.ece

http://articles.economictimes.indiatimes.com/2004-11-18/news/27379955_1_car-owners-micro-
tech-car-thefts

http://www.motortrend.in/autonews/1502200802/micro-technologies-india-launches-anti-theft-
security-device.htm

http://profit.ndtv.com/stock/micro-technologies-_microtech/reports

http://www.merinews.com/article/anti-theft-security-device-from-micro-
technologies/134100.shtml

Confidential Synergy Multitech Ltd. Page 33


http://www.indiamart.com/company/2631803/

http://www.indiamart.com/rad-communication/

http://www.indiamart.com/company/9219466/

http://www.indiamart.com/leointegrated-technologies/

http://www.indiamart.com/manassvienterprises/

15. LOT Mobiles:

http://www.lotmobiles.com/media/insurance/Insurance-claim.pdf

http://www.faasteducation.com/2013/11/how-to-claim-mobile-phone-insurance-if.html

16. Guardian:

http://www.guardian-mobile.com/configuration.pdf

http://www.guardian-mobile.com/default.aspx

17. F-Secure :

http://www.newtechnology.co.in/mobile-anti-theft-software-price/

http://www.f-secure.com/en/web/home_us/anti-theft

18. Blackberry:

http://telecomtalk.info/rim-introduces-anti-theft-software-called-blackberry-protect/33518/

http://www.makeuseof.com/tag/using-lookout-to-find-or-remotely-wipe-your-windows-mobile-
android-or-blackberry/

19. AVG

http://www.avgindia.in/AndroidAntivirusPro.htm

20. Norton :

https://antitheft.norton.com/about

http://www.winsite.com/Utilities/Antivirus/Norton-Anti-Theft/

http://www.appsapk.com/norton-anti-theft/

https://play.google.com/store/apps/details?id=com.symantec.anti.theft

21. Lava Mobiles:

http://gallery.mobile9.com/topic/?tp=anti-theft&ty=sw&ii=6465

Confidential Synergy Multitech Ltd. Page 34


http://gallery.mobile9.com/topic/?tp=anti-theft&ty=497&ii=6182

22. Xolo Mobiles:

http://www.gizbot.com/mobile/xolo-a500s-launch-rs-6999-india-price-competition-news-
013241.html

23. Airtel:

http://www.airtel.in/forme/whats-new/mcafee-mobile-security

http://www.zyxaw.com/2008/03/anti-theft-lost-mobile-tracking-airtel.html

24. McAfee :

http://www.airtel.in/forme/whats-new/mcafee-mobile-security

http://service.mcafee.com/FAQDocument.aspx?lc=1033&id=TS101597

25. Kaspersky:

http://usa.kaspersky.com/products-services/home-computer-security/security-for-android/

http://support.kaspersky.com/9235

http://blog.kaspersky.com/beware-of-vulnerable-anti-theft-applications/

http://blog.kaspersky.com/our-walk-through-how-to-locate-a-lost-mobile-device/

http://blog.kaspersky.com/saving-private-mobile/

http://blog.kaspersky.com/step-by-step-how-to-find-the-new-number-of-a-sim-card-in-a-lost-
device/

http://blog.kaspersky.com/how-to-wipe-data-from-a-lost-device/

26. Avast :

http://webcache.googleusercontent.com/search?q=cache:http://www.avast.com/en-in/free-
mobile-security

https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity

https://blog.avast.com/2013/05/15/loosing-your-mobile-device-does-not-mean-its-lost-install-
avast-anti-theft-to-become-protected/

http://www.avast.com/anti-theft

http://www.pcmag.com/article2/0,2817,2421107,00.asp

Confidential Synergy Multitech Ltd. Page 35


27. Cerberus:

https://play.google.com/store/apps/details?id=com.lsdroid.cerberus&hl=en

28. Deltagain:

http://www.deltagain.co.uk/

29. DCS Global Solutions:

http://www.softexinc.com/pressrelease/2013/01112013/softex_launches_secureDisable_anti_th
eft_service_in_india

http://dcsglobalsolutions.com/contactus.html

30. Winsite.com:

http://www.winsite.com/anti/anti+theft+for+mobiles/

http://www.winsite.com/Business/Miscellaneous/Anti-Theft-for-Symbian-Mobiles/

http://www.winsite.com/Utilities/Security/Anti-theft/

http://www.winsite.com/Utilities/Security/Notebak-Anti-Theft/

http://www.winsite.com/Utilities/Antivirus/Kaspersky-Anti-Virus-for-Workstations/

http://www.winsite.com/Utilities/Miscellaneous/MiTracker-PC-Anti-Theft/

http://www.winsite.com/Utilities/Antivirus/Norton-Anti-Theft/

31. Free APP.in:

http://www.freeappz.in/app/alarm-anti-theft-screen-lock/302582/

32. Mobiles24.com

http://www.mobiles24.com/downloads/tag/Anti-Theft/samsung-galaxy-s-apps

33. Bitfinder:

http://www.bitdefender.com/solutions/anti-theft.html

http://www.pcmag.com/article2/0,2817,2423828,00.asp

34. Softonic:

http://features.en.softonic.com/use-android-device-manager-to-locate-your-device

35. Genie:

http://www.stealthgenie.com/guides/how-stealthgenie-works.html

Confidential Synergy Multitech Ltd. Page 36


http://sales.stealthgenie.com/android-packages/

http://sales.stealthgenie.com/iphone-packages/

http://sales.stealthgenie.com/blackberry-packages/

36. LookOut.com

https://www.lookout.com/features/missing-device

37. Sourceforgenet:

http://dsmp.sourceforge.net/

http://remotetracker.sourceforge.net/

38. Quick heal:

http://www.groupon.co.in/deals/shopping/quick-heal-mobile-security-for-
android/53693?subscribed=true&__fsk=978594634

39. Advantal:

http://advantal.net/totalcare/features/siliconapp-premium-design

Anti-Theft software for laptops and notebooks:

40. Intel :

http://www.intel.com/content/www/us/en/architecture-and-technology/anti-theft/anti-theft-service-
providers.html

41. Acer :

http://businesstoday.intoday.in/story/mcafee-anti-theft-software-can-lock-stolen-
ultrabooks/1/193382.html

42. Sony:

https://us.en.kb.sony.com/app/answers/detail/a_id/36339

43. Norton:

http://www.winsite.com/Utilities/Antivirus/Norton-Anti-Theft/

44. Apple:

http://www.apple.com/support/icloud/find-my-device/

45. Miscellaneous

Confidential Synergy Multitech Ltd. Page 37


http://www.knowyourmobile.in/products/7165/update-top-10-ways-track-your-stolen-phone-
through-its-imei-number-and-apps

http://dottech.org/22962/best-free-anti-theft-app/

http://www.techshortly.com/2012/07/5-best-free-anti-theft-apps-for-android.html

http://www.howlog.in/2012/11/android-anti-theft-apps.html

http://www.redmondpie.com/best-anti-theft-app-for-android-cerberus-reaches-100k-downloads-
free-paid-licenses-for-all-limited-time-only/

http://www.antidroidtheft.com/

http://imei-number.com/anti-theft-mobile-tracking-software/

http://forum.xda-developers.com/showthread.php?t=464336

https://www.mobiledefense.com/device-shield

http://gmonk.appspot.com./

http://ilocalis.com/page7/page7.php

http://www.mobilespytool.com/spy_features.html

http://www.mobilespytool.com/

http://www.umuglobal.com/products/23

http://www.protectmobile.com/ -

http://timesofindia.indiatimes.com/city/hyderabad/Mobile-snatchings-on-the-rise-as-cops-turn-a-
blind-eye/articleshow/37601696.cms

http://www.pcmag.com/article2/0,2817,2418934,00.asp

http://www.pcmag.com/article2/0,2817,2427366,00.asp

Anti-theft Insurance :

1. Big C :

http://www.bigcmobiles.in/pages/Big-C-Mobiles-Insurance-Claim-Procedure/pgid-315973.aspx

2. General Insurance companies:

http://articles.economictimes.indiatimes.com/2012-10-23/news/34680358_1_anti-theft-devices-
motor-insurance-insurance-claims

Confidential Synergy Multitech Ltd. Page 38


http://www.bajajallianz.com/Corp/motor-insurance/motor-policy-faq-insurance-premium-
factors.jsp

3. Sangeetha Mobiles :

http://articles.timesofindia.indiatimes.com/2012-07-11/software-
services/32631921_1_smartphone-users-qr-free-trial

http://www.sangeethamobiles.com/pages/Swift-Claim-Form-/pgid-37796.aspx

4. Univercell Mobiles:

http://www.financialexpress.com/news/univercell-launches-mobile-theft-insurance-plan/368235

http://www.topnews.in/univercell-launches-mobile-theft-damage-insurance-plan-272564

http://economictimes.indiatimes.com/univercell-launches-mobile-theft-insurance-
plan/articleshow/3549220.cms

http://www.indiaprwire.com/pressrelease/retail/2008101514279.htm

3. Licensing and selling the application to different companies:


The patented application shall be licenced and sold to different mobile handst selling companies
and others. The same shall be preinstalled on all mobile handsets sold.it shall be an added
selling feature of mobile handsets.

The loss of expensive mobile handsets and more particularly data which is of personal and
business nature is a cause of great concern, A lot of countries are facing huge complaints of
loss of handsets and highly confidential data.

The handsets have becom an integral part of everyday life of individuals owning handsets.the
mobile handsets have become extensions of life styles. Loss of the same makes the lives of
people disorganized and thrown out of gear.added to this, there is a huge threat of misuse of
information.

Rs.50crore is estimated as required for development of anti -theft software which is


already patented. Anti-theft (Kill Switch) software is being m ade a compulsory app.
for all mobiles in certain Asian countries and US (recently passed a bill) to be a
compulsorily preinstalled application in all Mobile Handsets from July 2015. This is
expected to be implemented in India soon. The patented mobile appl ication once
commercialized, has got huge revenue potential domestically and internationally. It
is sure going to be a winner by a long distance as compared to competitors
because of patent, superior, advanced and unique features.

4. Redemtion of old liabilities:

Confidential Synergy Multitech Ltd. Page 39


9.0 Valuation Methods and Philosophy:

Valuation requires an examination of several aspects of a company's activities, such as


analyzing its historical performance, analyzing its competitive positioning in the industry,
analyzing inherent strengths / weaknesses of the business and the opportunities / threats
presented by the environment, forecasting operating performance, estimating the cost of
capital, estimating the continuing value, calculating and interpreting results, analyzing the
impact of prevailing regulatory frame work, the global industry outlook, impact of
technology and several other environmental factors. Keeping with the best market
practices the following five methodologies are being used for valuation of companies:

 Free Discounted Cash Flow (DCF) Method


 Profit earning Capacity Valuation (PECV)
 Sales Multiple Method
 Net Asset Value Method

Free Discounted Cash Flow (DCF) Method

While a number of alternative DCF frameworks are conceivable, we have adopted


the Returns to company Method. The Free Cash Flows to Firm (FCFF) has been
computed as the estimated cash profits for the next 5 financial years of the
business plus non-cash charges less incremental investments in working capital
and other assets. The estimation of cash profits is made on the basis of the past
performance of the company, the sustainability of such performance in the future
as indicated in its outlook for the company and the industry. The FCFF so derived
reflects the cash flow generated by the business that is available to the providers
of equity capital of the business.

For the purpose of determining the value of the business, based on the
discounted cash flow

 Returns to Firm method, the key factor to be considered is the discount


rate, i.e. the cost of capital, which is estimated on the basis of the
weighted average of the cost of equity and debt as at the end of the
financial year, i.e., 31st December 2015. Value is arrived at by discounting
the FCFF at the cost of capital and thereby present value of the business
for the discrete period (Years FY2015 to FY2019) has been arrived at.
 The continuity value of any business takes into account that, in future, the
revenues would be from the existing and new products. Given the plans
of the companies under present study to continue the present product
portfolio and to expand their market reach over the next few years, we
have determined the Continuity Value for the purpose of this valuation.
The Continuity Value has been calculated by assuming appropriate

Confidential Synergy Multitech Ltd. Page 40


growth rates of the free cash flows projected for the financial year 2018-
19, which is the last financial year of the explicit forecast period.
 Thus the value of the shares represents the sum of the value of the
discrete period and the continuity value.
 The Discounted Cash Flow (DCF) methodology expresses the present
value of a business as a function of its future cash earnings capacity.
This methodology works on the premise that the value of a business is
measured in terms of future cash flow streams, discounted to the present
time at an appropriate discount rate.
 The discount rate applied to estimate the present value of explicit
forecast period free cash flows as also continuing value, is taken at the
"Weighted Average Cost of Capital" (WACC). One of the advantages of
the DCF approach is that it permits the various elements that make up
the discount factor to he considered separately, and thus, the effect of the
variations in the assumptions can be modeled more easily.
 The principal elements of WACC are cost of equity (which is the desired
rate of return for an equity investor given the risk profile of the company
and associated cash flows), the post-tax cost of debt and the target
capital structure of the company (a function of debt to equity ratio). In
turn, cost of equity is derived, on the basis of capital asset pricing model
(CAPM), as a function of risk-free rate, Beta (an estimate of risk profile of
the company relative to equity market) and equity risk premium assigned
to the subject equity market.

PECV Method

The "future maintainable profits" for the companies under study have been
determined on the basis of the profits for the last financial year 2014 after
considering the adjustments for extraordinary items, net of tax appreciation /
depreciation in value of investments, deferred tax assets / liabilities and major
audit qualifications, if any.

We have considered an appropriate tax rate for the company under the study. The
difference between book depreciation and tax depreciation is ignored, as it would
even out over the years. The value so obtained is discounted by the cost of capital
to arrive at the PECV value.

Sales Multiple Method

Maintainable Sales for the forecast period has been arrived by taking average of
present value of future Sales discounted at WACC. Sales multiple of 1 is
considered to arrive at enterprise value. The multiple is based on the multiples of
comparable companies.

Confidential Synergy Multitech Ltd. Page 41


Net Asset Value Method

The total value of the assets of a company less its liabilities total value is the net
asset value. For the purpose of valuation, the usual thing to do is to divide the net
assets by number of shares to get the net assets per share. This is the asset
value which belongs to each share in the same way the price-earning ratio
measures the profit per share.

Net asset value is useful for shares valuation in sectors where the company value
come from the held assets rather than the stream of profit that was generated by
the company business. The examples are property companies and investment
trusts. Both are convenient ways wherein the investors can buy diversified
bundles of the assets they hold.

Confidential Synergy Multitech Ltd. Page 42


10.0 Financial Projections and Valuations:

 The projections for the forecast period have been made in consultation with the
management of Synergy Multitech.

 The projections are based on the assumption that organization will be operated
efficiently and that it has no intention to discontinue its services in foreseeable
future.

 Cutoff date for the valuation is September 2014.

 The forecast period is assumed as FY2016 to FY2020.

 The estimated profit for the forecast period is arrived after considering the cost
efficiencies and synergies that Synergy Multitech will continue to implement as
an ongoing exercise have after acquiring.

Confidential Synergy Multitech Ltd. Page 43


10.1 Sources of Information and Data Limitations:

Sources of Information:

 Information through discussions with Synergy Multitech management team.


 Financial Projections through discussions with Synergy Multitech management
team.
 Selection of Methods of valuation through Prevailing Market Practices.
 Industry Information through discussions with industry Experts, Synergy
Multitech Management and Internet.

Limitations:

 Synergy Multitech is an unlisted company registered and Operating in India.


Hence for arriving of business valuations, the Beta and other multiples prevailing
in Indian industry have been considered.
 The actual revenues and expenses incurred for business segment were not
available separately. Information given by Synergy Multitech was taken as the
basis for valuation, and no due diligence is carried for the same.
 The multiples and Beta as of particular date has been considered for valuation.
However, fluctuations in the same with the changes in the market price have not
been factored.
 The assumptions for the projections are made basing on the available
information from primary as well as secondary sources. The assumptions are
not made by valuer.
 The detailed financial assumptions underlying projections have been mentioned
separately.

Confidential Synergy Multitech Ltd. Page 44


10.2 Annexure I: Capex

Capex cost of Projects Rs. Crores


Startup
sl.no. Details time Month/Year of

for commencement
production of production II year III year IV year V year VI year
Months FY2016 FY2017 FY2018 FY2019 FY2020

1
Hardware 6 8.43 15.00 25.00 25.00 25.00 25.00

2 Software 6 44.77 10.00 25.00 25.00 25.00 25.00

Antitheft software App. Development - mobile


3 phone and licensing & selling 6 5.00 0.00

4 Legal expenses of filing anti infringement suits 18 20.00

5 Redemption of old liabilities 6 25.00

103.20 25.00 50.00 50.00 50.00 50.00

Means of Finance
1 Private Equity-Share capital 103.20

Share Premium

2 Internal accruals 25 50.00 50.00 50.00 50.00

103.20 25.00 50.00 50.00 50.00 50.00

Confidential Synergy Multitech Ltd. Page 45


10.3 Annexure II: Projected Balance Sheets:
Projected (Rs.crores)
Particulars FY 2016 FY 2017 FY 2018 FY 2019 FY2020
ASSETS
Current Assets
Cash & Bank Equivalents 8.35 957.51 226.94 52.97 -1066.38
Trade Receivables 80.43 380.99 1365.65 2661.69 3640.70
Inventories 31.75 213.49 227.61 443.61 606.78
Short term loans & advances 31.75 106.74 113.80 221.81 303.39
Other current assets 10 200.00 300.00 400.00 500.00
Total Current Assets 162.28 1858.73 2234.00 3780.08 3984.49
Investments 0.00 0.00 1000.00 3000.00 8000.00
Property and Equipment, net
NET Tangible Assets 58.20 90.74 63.52 44.46 31.12
capital wip
other noncurrent assets 10.00 150.00 200.00 250.00 300.00
Redemption of old debt 25.00
Legal expenses of filing anti infringement suits 20.00
Total Assets 275.47 2099.47 3497.52 7074.54 12315.62
LIABILITIES & SH.HOLDERS' EQUITY
Current Liabilities:
Trade payables 16.10 54.11 57.69 112.44 153.80
Other Current liabilities 20.00 30.00 50.00 50.00 50.00
short term provisions 19.31 150.00 150.00 150.00 150.00
Total Current Liabilities 55.41 234.11 257.69 312.44 353.80
Long Term borrowings 0.00 0.00 0.00 0.00 0.00
Other Long term liabilities 0.00 0.00 0.00 0.00 0.00

Confidential Synergy Multitech Ltd. Page 46


Total Long Term Liability 0.00 0.00 0.00 0.00 0.00
Shareholders Equity:
Equity shares 103.20 103.20 103.20 103.20 103.20
Reserves & Surplus 116.87 1762.16 3136.63 6658.90 11858.62
Total Shareholders Equity 220.06 1865.36 3239.82 6762.09 11961.81
Total Liabilities 275.47 2099.47 3497.52 7074.54 12315.62

Confidential Synergy Multitech Ltd. Page 47


Confidential Synergy Multitech Ltd. Page 48
10.4 Annexure III: Projected Profit and Loss Account:
Projected (Rs.crores)
Particulars FY 2016 FY 2017 FY 2018 FY 2019 FY 2020
Income
1) Revenue from operations 1,545.12 5,194.81 5,538.47 10,794.62 14,765.05
2) Other Income 5.00 5.25 6.30 7.56 9.07
Total Revenue (1+2+3) 1,550.12 5,200.06 5,544.77 10,802.18 14,774.12
Expenditure
Manpower cost 36.17 54.25 81.38 122.07 183.10
Cost of consumables and
maintenance cost etc. 386.28 1298.70 1384.62 2698.65 3691.26
SAD expenses 231.77 231.77 830.77 1619.19 2214.76
Total 618.05 1530.47 2215.39 4317.85 5906.02
EBIDTA 932.07 3669.59 3329.38 6484.33 8868.10
% 60.13 70.57 60.05 60.03 60.02
Finance costs 893.90 1149.50 1227.80 1134.22 980.40
EBDTA 38.17 2520.09 2101.58 5350.11 7887.70
% 2.46 48.46 37.90 49.53 53.39
Depreciation and amortization 17.46 27.22 19.05 13.34 9.34
Profit /(Loss) before tax 20.72 2492.87 2082.53 5336.77 7878.37
Provision for Taxation 7.04 847.58 708.06 1814.50 2678.64
Deferred Income tax Liability 0.00 0.00 0.00 0.00 0.00
Profit /(Loss) After tax 13.67 1645.29 1374.47 3522.27 5199.72
Dividend+ Tax thereon 0.00 12.07 120.74 241.48 362.21
Balance Brought From Previous
Year 0.00 13.67 1658.97 3033.43 6555.70
Balance Carried To Balance
sheet 13.67 1658.97 3033.43 6555.70 11755.42

Confidential Synergy Multitech Ltd. Page 49


10.5 Annexure IV: Weighted Average Cost of Capital – Year
wise:
Rs.cr.
Particulars FY 2016 FY 2017 FY 2018 FY 2019 FY2020
Capital Structure
Equity Share Capital 103.20 103.20 103.20 103.20 103.20
Reserves 116.87 1,762.16 3,136.63 6,658.90 11,858.62
Sub Total 220.06 1,865.36 3,239.82 6,762.09 11,961.81
Less: Accumulated Losses - - - - -
Misc. Expenses not w/o
Shareholders Funds 220.06 1,865.36 3,239.82 6,762.09 11,961.81
Bank Borrowings - - - - -
Loan Funds - - - - -
Total Funds Employed 220.06 1,865.36 3,239.82 6,762.09 11,961.81
% of shareholders funds to Total Funds Employed 1.00 1.00 1.00 1.00 1.00
% of loan funds to Total Funds Employed 0.00 0.00 0.00 0.00 0.00
Cost of Funds (Before Tax)
Cost of Debt considered 0.15 0.15 0.15 0.15 0.15
Cost of Funds(after tax)
Effective Tax rate 0.34 0.34 0.34 0.34 0.34
Cost of Equity 0.10 0.10 0.10 0.10 0.10
Cost of Debt(Post Tax) 0.06 0.06 0.06 0.06 0.06
Debt Equity ratio 0.00 0.00 0.00 0.00 0.00
Weighted Average Cost of Capital (post tax) 0.10 0.10 0.10 0.10 0.10
Discount period 2.00 3.00 4.00 5.00 6.00
Discount factor (@WACC) 0.83 0.75 0.68 0.62 0.56

Confidential Synergy Multitech Ltd. Page 50


10.6 Annexure V: Valuation by Free Discounted Cash Flow
Valuation:
Projected (Rs. Crores)
Particulars
FY 2016 FY 2017 FY 2018 FY 2019 2020
Income 1,550.12 5,200.06 5,544.77 10,802.18 14,774.12
Expenses 618.05 1,530.47 2,215.39 4,317.85 5,906.02
EBDITA 932.07 3,669.59 3,329.38 6,484.33 8,868.10
Depreciation 17.46 27.22 19.05 13.34 9.34
EBIT 914.62 3,642.37 3,310.33 6,470.99 8,858.77
Interest 893.90 1,149.50 1,227.80 1,134.22 980.40
PBT 20.72 2,492.87 2,082.53 5,336.77 7,878.37
Extraordinary items - - - - -
PBT with Extraordinary Items 20.72 2,492.87 2,082.53 5,336.77 7,878.37
Provision for Tax 7.04 847.58 708.06 1,814.50 2,678.64
PAT 13.67 1,645.29 1,374.47 3,522.27 5,199.72

Particulars FY 2016 FY 2017 FY 2018 FY 2019 2020


PAT 13.67 1645.29 1374.47 3522.27 5199.72
Depreciation 17.46 27.22 19.05 13.34 9.34
Cash Flow from Operations 31.13 1672.51 1393.52 3535.61 5209.06
Add Additional WC loan/ Inc In Capital 0.00 0.00 0.00 0.00 0.00
Less Increase in CA/(add) decrease in
CA 162.28 -1696.46 -375.27 -1546.08 -204.42

Add increase in CL/Less decrease in CL 55.41 178.70 23.58 54.75 41.36


Less Capital Expenditure/Investment 58.20 0.00 1000.00 3000.00 8000.00
Investment 0.00 0.00 1000.00 2000.00 5000.00
Free Cash Flow to Firm 307.01 154.76 3041.83 7044.28 18046.00
PV Factor for valuation as on date 0.83 0.75 0.68 0.62 0.56
PV of Cash Flows 253.73 116.28 2077.61 4373.95 10186.50

Confidential Synergy Multitech Ltd. Page 51


Total Present Value of Cash Flows
17008.06
PV of Terminal Value 152375.30
Enterprise Value 169383.36
Add: Investments as on 31.03.2019
NPV value of Investments 0.00
Less: PV of Debt as at the end of year 5 0.00
Value of Firm from equity point of view 169383.36
No of shares ( Equity ) 103195000
Value per share 16413.91
Terminal Value
th
Cash Flow for year 5 10186.50
Growth Rate 0.06 611.19
Inflow for Terminal Value 10797.69
WACC 0.10
Capitalized value 269942.14
DCF 0.56
NPV of Terminal Value 152375.30
Present Value Of Debt
th
Debt as at the end of year 5 0.00 0.00
PV Factor 0.62 0.62
PV of Debt 0.00 0.00
Total Present Value of Debt 0.00

Confidential Synergy Multitech Ltd. Page 52


10.7 Annexure VI: Price Earning Capacity Value/Net Profit Multiple
Method:

Projected (Rs. Crores)


Particulars 2014-15 2015-16 2016-17 2017-18 2018-19
PAT 13.67 5,199.72
1,645.29 1,374.47 3,522.27
Discount Factor 0.83 0.75 0.68 0.62 0.56
NPV of future profits 11.30 1236 939 2187 2935
Maintainable PAT 1461.67
PAT Multiple Industry 8.00
Adjusted PECV 11693.39
add: Investments 8000.00
NPV of Investments 4515.79
Value of enterprise 16209.19
No. of shares 103195000
value per share Rs. 1570.73

Confidential Synergy Multitech Ltd. Page 53


10/8 Annexure VII: Valuation by Sales Multiple Method:

Provisional (Rs. Crores)


Particulars 2014-15 2015-16 2016-17 2017-18 2018-19
Sales 1,550.12 5,544.77
5,200.06 10,802.18 14,774.12
Discount Factor 0.83 0.75 0.68 0.62 0.56
NPV of future sales 1281.09 3906.88 3787.15 6707.30 8339.61
Maintainable Sales 4804.41
Multiple Industry 2.00
Adjusted PECV 9608.81
add: Investments 250.00
NPV of Investments 141.12
Value of enterprise 9749.93
No. of shares 103195000
value per share Rs. 944.81

Confidential Synergy Multitech Ltd. Page 54


10.9 Annexure IX: Fair Value of Share:

Valuation
Methodology
Earnings Based
Value/Rs. Weightage
DCF 169383 2
PECV 16209 1
3
59162.65
Asset based 0 1
(Ignored)
Sales based
Sales Multiple 9750 1
composite Value
Earnings Based 59162.65 3 177487.95
Asset based 0.00 0 0.00
Sales based 9749.93 1 9749.93
4 187237.88
Fair Value of
Enterprise Rs.cr. 46809.47
No. of equity shares 103195000
Fair value of 1 equity
share Rs. 4536.02
Beta assumed 2.00
Fair value of share at
Beta Rs. 2268.01
Fair value at 2 Beta
Rs.cr. 23404.74

Confidential Synergy Multitech Ltd. Page 55


10.10 Annexure IX: Financial Assumptions Considered for Valuation:

S.No Assumption Parameter


As per
1 Growth rate in Revenue estimates

2 Increase in other income -yoy approx. 5.00%

3 Cost of consumables and maintenance cost as % of Revenues 25.00%

4 Manpower cost increase yoy 50.00%

6 sellng, admn. And distribution exp. As % of sales 15.00%

7 Finance costs - % of term loan and working capital 14.50%

8 Depreciation as % of net block 10.00%

9 Provision for taxation 34.00%

10 There is no Increase in Share capital from the F.Y 2014-15 on wards

11 Trade payables 8.00%

12 Trade receivables on Revenue in days 90.00

13 Inventories No. of days on cost of consumables 60.00

14 Other current liabilities as % of other expenses 8.00%

15 Short term loans and advances as % of cost of consumables 30.00

16 Short term provisions as % of other expenses 8.00%

Confidential Synergy Multitech Ltd. Page 56


17 Long term loans and advances depending on business Lump sum

18 Cost of equity is assumed at 10.00%

19 Cost of Debt is assumed at 14.50%

20 Growth Rate of the firm 6.00%


21 Depreciation as per worksheet 30% SLM
22 Increase in Fixed Assets yoy depending on business lump sum

23 Beta considering possibility of variation in projection factors 2.00

24 Short term loans and advances increase yoy 20.00%

Confidential Synergy Multitech Ltd. Page 57


10.11 Annexure X: Revenue Estimates:
DESCRIPTION FY 2016 FY 2017 FY 2018 FY 2019 FY 2020
TOTAL MOBILE
SUBSCRIBERS OF INDIA 88,80,01,878.00 1,33,20,02,817.00 1,79,82,03,802.95 2,06,79,34,373.39 3,61,88,85,153.44

MOBILE PENETRATION 67.7864029 94.14778181 117.6847273 126.4835854 208.81724

NUMBER OF MOBILE
STATIONS 85,80,01,878 1,71,60,03,756 2,05,92,04,507 1,85,32,84,056 92,66,42,028
NUMBER OF FEATURE
PHONES 77,22,01,690 1,28,70,02,817 1,13,25,62,479 55,59,85,217 9,26,64,203
SMARTPHONE
PENETRATION 9.662162877 32.20720959 51.53153534 62.73404303 200

NUMBER OF USERS FOR


SYNTRACK 266400563.4 799201690.2 1258742662 1861140936 2895108123
NUMBER OF ENTERPRISE
USERS 53280112.68 319680676.1 188811399.3 558342280.8 579021624.5
NUMBER OF NETWORK
USERS 159840338 399600845.1 1006994130 1116684562 2026575686
NUMBER OF DOMESTIC
USERS 53280112.68 79920169.02 62937133.1 186114093.6 289510812.3
CHARGE / ENTERPRISE
UNIT (रु100 1TIME FEE) 5328011268 31968067608 18881139931 55834228082 57902162455
CHARGE / NETWORK
UNIT(रु30 PER MONTH) 4795210141 11988025353 30209823890 33500536849 60797270578
CHARGE / DOMESTIC UNIT
(रु100 1 TIME FEE) 5328011268 7992016902 6293713310 18611409361 28951081227
CUMULATIVE EARNINGS
Rs. 15451232677 51948109863 55384677131 1,07,94,61,74,291.09 1,47,65,05,14,260.23

$ $28,09,31,503.22 $94,45,11,088.42 $1,00,69,94,129.65 1,96,26,57,714.38 $2,68,45,54,804.73

Confidential Synergy Multitech Ltd. Page 58


10.12 Annexure XI: Manpower Estimates:
1 Network Administrator 6 50000 150000 1800000

2 SS7 Developers 40 250000 5000000 60000000

3 Database Developers 6 100000 300000 3600000

4 Web Developers 12 40000 240000 2880000

5 Graphic Designers 6 40000 120000 1440000

6 Database Administrator 2 150000 150000 1800000

7 Team Lead 6 300000 900000 10800000

8 Project Lead 4 400000 800000 9600000

9 Project Manager 4 1000000 2000000 24000000

10 Tech Writers 4 40000 80000 960000

11 Non Tech Staff 800 20000 8000000 96000000

12 Test Engineers 12 50000 300000 3600000

13 Programmers 20 30000 300000 3600000

14 MARKETING 80 200000 8000000 96000000

15 TECH SUPPORT 200 20000 2000000 24000000

16 NOC SUPPORT 20 150000 1500000 18000000

17 LIASON AND PR 2 200000 200000 2400000

TOTAL 3140000 30140000 361680000

Confidential Synergy Multitech Ltd. Page 59

You might also like