Proof Of Concept Data Transfer Options


As a prospective customer, you can request a Proof of Concept (POC) with FrankieOne to validate your assumptions, and verify the suitability of our technology for your production needs. While the primary goal of a POC varies, most aim to confirm an increase in Pass Rates.

To conduct a successful POC with FrankieOne, you need to complete the following steps:

  1. Data Collection: Fill in a form with the data they want to validate.

    Download the file: .xlsx file

  2. Configuration and Agreement: Complete the required vendor forms and configure necessary checks to run on the data. Align on what success looks like for the POC and how the results should be presented and shared back to the customer.

  3. Secure Data Transfer: Agree on a secure method for transferring sensitive data, given its PII nature.

What to expect

In order to run a successful POC, you need to complete the following steps:

  1. Conducting a preparation session: Meet with your FrankieOne Sales representative to clearly define the POC. The goal of this session is to understand the main pain point you are looking to solve (for example, improve pass rates). During this session FrankieOne will dive a little deeper into the specifics on how the PoC will be run. Questions may include:

    1. What success looks like? - defining a clear goal of what success looks like is key to aligning both parties on the main objective of this POC.

    2. What checks should be run against the data? - Depending on your business use case this could vary, But by defining what checks need to be run, FrankieOne can properly configure the correct and appropriate recipes.

    3. Have you correctly filled in the batch template? - To achieve the optimum results with the POC, you must provide the data in the correct format. FrankieOne can assist with this, including:

      1. Filling in the required fields (blue highlighted columns)
      2. Ensuring all dates are in the correct format
      3. Ensuring DocumentID have the correct number of digits
      4. Ensuring Names are filled in fully & correctly
      5. Verifying consent has been collected were required.
    4. What are the vendor forms you will be required to complete? - Depending on the types of checks you wish to run you maybe required to complete certain vendor forms. This is a process in which FrankieOne can work with you asynchronously as we prepare the POC.

    5. How you would like the results presented? - Once the POC has been completed FrankieOne will present the results back to you. Additionally, we can provide the results in various formats for you to analyse further, if required. This can be done via:

      1. The FrankieOne Portal
      2. Secure File Transfer of data and results
      3. PowerPoint presentation of results (no PII will be shared)
    6. What is the overall expected time to run the POC? - The timeline will vary, depending on the amount of checks you wish to run and how you would like the results displayed. On average we turnaround POC results between 1-2 weeks.

  2. Running the POC: Once the data has been received via one of the secure methods outlined below, FrankieOne will start running the data against the defined checks.

  3. Presenting the results: FrankieOne will present back the results of the POC. FrankieOne will be able to dive into the details of the results and outline some potential improvements that can be made to the data, in order to get even better results in Production. If required, FrankieOne will also return the results to you for further analysis.

Secure file transfers for batch processing

We have three preferred methods when transferring files to FrankieOne for batches, and not via our API.

Option 1: SFTP (Recommended)

  1. Share Key: You need to provide FrankieOne with your SFTP public key. This key will be installed on our SFTP Server.
  2. Start Servers: In order for this process to work both parties need to ensure their SFTP servers are live and running. Once FrankieOne has started our SFTP server, we will share the IP address.
  3. File Upload: Start uploading the file(s). The FrankieOne team will then retrieve them.
  4. Run POC: FrankieOne team will then run the data through the pre-defined checks through our batch process
  5. Results: Once processing is complete, the FrankieOne team will present back the results and any potential optimisation that can be configured to ensure the best results

Option 2: File Encryption

  1. Install the GNU Privacy Guard (GPG): Ensure you have GPG installed on your system. You can download and install GPG from the official GnuPG website or through package managers like Homebrew (on macOS) or apt-get (on Linux).
  2. Generate a Key Pair: You need a key pair - a public key for encryption and a private key for decryption. If you don't have a key pair, generate one using the gpg --gen-key command. Follow the prompts to create the keys. Keep your private key secure and share your public key with those you wish to communicate with securely.
  3. Import Public Keys: When encrypting the file for FrankieOne, we will send you our public key. Import this public key using the gpg --import <filename> command.
  4. Encrypt the File: Use the gpg --encrypt --recipient <recipient-name> <filename> command to encrypt the file. Replace <recipient-name> with the intended recipient's name or their key ID and <filename> with the file you want to encrypt.
  5. Enter Passphrase (Optional): If you've set a passphrase for your key, GPG will prompt you to enter it to proceed with the encryption.
  6. Obtain Encrypted File: After successful encryption, GPG will create a new file with the .gpg extension containing the encrypted data.
  7. Send or Store the Encrypted File: You can now securely send the encrypted file to FrankieOne via email.
  8. Decrypting the File: To decrypt the file, FrankieOne will use our private key. We will use the gpg --decrypt <filename.gpg> command to decrypt the file. GPG will prompt for the passphrase if it's set, and the original file will be retrieved.
  9. Run POC: The FrankieOne team will run the data through the pre-defined checks through our batch process.
  10. Results: After processing, the FrankieOne team will present back the results and any potential optimisation that can be configured to ensure the best results.
    Note: If you require use to send back the results we will follow the same process as above, however this time we will require your public key to encrypt the files.

Option 3: Using the secure app ‘Keybase’

  1. Install Keybase: Install the Keybase app on both systems.
  2. Create Accounts and Keys: Create Keybase accounts and generate public/private key pairs.
  3. Connect and Share: Add each other as contacts and use Keybase to securely send encrypted files.
  4. Select and Encrypt: Choose the file then encrypt it using FrankieOne’s public key.
  5. Send and Receive: Send the encrypted file; FrankieOne will decrypt using our private key.
  6. Verify and Confirm: Verify the file's integrity and confirm the successful transfer.
  7. Run POC: FrankieOne team will run the data through the pre-defined checks through our batch process.
  8. Results: After processing, the FrankieOne team will present back the results and any potential optimisation that can be configured to ensure the best results.