{"id":21717,"date":"2023-04-14T05:06:58","date_gmt":"2023-04-14T05:06:58","guid":{"rendered":"https:\/\/authbridge.com\/?post_type=post&#038;p=21717"},"modified":"2023-08-09T17:51:53","modified_gmt":"2023-08-09T17:51:53","slug":"everything-you-need-to-know-about-e-kyc","status":"publish","type":"post","link":"https:\/\/authbridge.com\/staging\/resources\/blogs\/everything-you-need-to-know-about-e-kyc\/","title":{"rendered":"Everything you need to know about e-KYC"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Gone are the days when customer identification and verification used to happen through physical documentation, such as a passport or driving license. The offline process not only used to be time-consuming but also prone to errors.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">As soon as FinTech innovation gained global traction, the expectations of seamless digital experiences skyrocketed and the shift got reflected in financial services and beyond. eKYC solutions emerged as a way to streamline and automate the customer verification process for financial institutions and other regulated entities, using technologies such as biometric authentication, facial recognition, and AI-based algorithms.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">What is eKYC?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">e-KYC, also known as Electronic <\/span><a href=\"https:\/\/authbridge.com\/staging\/solutions\/bfsi\/know-your-customer\/\"><span style=\"font-weight: 400;\">Know Your Customer<\/span><\/a><span style=\"font-weight: 400;\">, is a digital process of verifying the identity of an individual or an organization remotely. It is a paperless process that eliminates the need for physical documents and face-to-face interaction between the customer and the service provider.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">eKYC has become increasingly popular due to its speed, efficiency, and accuracy. It has also enabled financial institutions to onboard new customers faster and more cost-effectively, while still maintaining compliance with regulatory requirements.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The e-KYC process involves the use of electronic documents and digital signatures to verify the identity of the customer. The customer is required to provide their details such as name, address, date of birth, and other relevant information to the service provider. The service provider then verifies the customer&#8217;s details using various electronic databases and verification tools.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">The e-KYC process typically involves the following steps:<\/span><\/h2>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The customer provides their details and other relevant information through a digital platform or mobile application.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The identity of the customer is verified by comparing the provided information with various electronic databases and verification tools.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Once the identity is approved, a digital identity certificate or other relevant documents is issued to the customer.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">e-KYC process is fast, efficient, and commonly used in various industries such as banking, telecommunications, and insurance, to comply with regulatory requirements and ensure the security of customer data.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Importance of e-KYC<\/span><\/h2>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Time and cost-saving:<\/b><span style=\"font-weight: 400;\"> e-KYC eliminates the need for physical documents, which means it saves time and reduces the cost associated with paper-based KYC processes. There is no need for physical visits to customer service centers, which is a significant advantage for customers who are located in remote areas.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Enhanced customer experience:<\/b><span style=\"font-weight: 400;\"> With e-KYC, customers can complete the verification process from the comfort of their homes or offices. Also, the process is quicker and more convenient, leading to enhanced customer experience and increased customer satisfaction.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Increased security:<\/b><span style=\"font-weight: 400;\"> e-KYC uses advanced technology such as biometrics and digital signatures to verify the identity of individuals or businesses, which makes the process more secure than traditional paper-based KYC processes, also reducing the risk of identity theft and fraud.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Regulatory compliance:<\/b><span style=\"font-weight: 400;\"> e-KYC helps businesses comply with regulations related to customer due diligence, anti-money laundering (AML), and counter-terrorism financing (CTF). It also helps businesses to monitor and manage risks associated with their customers and their transactions.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Different Types of e-KYC<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">There are multiple methods to avail of e-KYC. These are as follows:<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><a href=\"https:\/\/authbridge.com\/staging\/blog\/power-aadhaar-based-ekyc\/\">Online Aadhaar e-KYC Using OTP<\/a><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">For OTP-based eKYC, customers are required to first register their mobile number. This e-KYC process is initiated online using the one-time password (OTP) sent to the mobile number linked to the Aadhaar card of the customer. Customers are required to click on the \u2018Generate OTP\u2019 option and enter the OTP to authenticate their identity and complete the e-KYC process.<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li aria-level=\"1\">\n<h3>Online e-KYC Aadhaar Biometric Authentication<\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Another way to conduct eKYC is via Aadhaar biometric verification which is done electronically using customer biometrics. In this authentication, a picture of the customer&#8217;s fingerprints and retina is taken through a scanner and sent to UIDAI to match the biometric readings kept with the customer&#8217;s Aadhaar number. Once the information is validated, UIDAI sends the customer\u2019s identifying information to the verification service provider safely for further verification.<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li aria-level=\"1\">\n<h3>Offline Aadhaar Paperless e-KYC via XML or QR Code<\/h3>\n<\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400;\">The offline Aadhaar e-KYC process involves the sharing of identity data via XML or QR code.\u00a0<\/span><\/h4>\n<p>&nbsp;<\/p>\n<ul>\n<li aria-level=\"1\">Aadhar XML<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Customers can share the Aadhaar offline XML document with the financial institution by downloading it from the UIDAI website. For this, customers must first complete the offline eKYC form and save the XML file from UIDAI.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The report is encrypted and does not disclose sensitive information that is not pertinent to the KYC verification agency<\/span><\/p>\n<ul>\n<li aria-level=\"1\">QR Code<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Alternatively, customers can also share the QR code available on their Aadhaar card that can be scanned to assess the required information.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3>Eligibility Criteria for e-KYC<\/h3>\n<p><span style=\"font-weight: 400;\">These are general eligibility criteria and specific requirements that may vary depending on the country, regulatory norms, and the business conducting the e-KYC process. However, some common eligibility criteria for e-KYC include:<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The customer should have a valid mobile number linked to their Aadhaar or other government-issued identification document.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The customer&#8217;s identification document should be in a machine-readable format, such as a QR code or barcode, to enable the scanning of the document through the e-KYC application.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The customer&#8217;s identification document should be issued by a government agency and should be valid and not expired.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The customer should be physically present in the country where the e-KYC process is being conducted.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The customer should consent to the collection, storage, and use of their personal information for the e-KYC process.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Also Read: <a href=\"https:\/\/authbridge.com\/staging\/blog\/types-of-kyc-process-documents-and-apis\/\">Types of KYC | Process, Documents, and APIs<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Documents Required for e-KYC<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">e-KYC refers to the digital verification of data that is already accessible in the Aadhaar database. Therefore, customers are not required to provide additional documents along with their application form. However, in the case of online e-KYC biometric verification, you may have to submit your passport-sized photographs while authenticating your biometrics.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">KYC Solutions with AuthBridge<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">AuthBridge, being an authorized Authentication User Agency (AUA) with UIDAI, offers reliable KYC solutions through advanced APIs. With the help of our tech-enabled platforms and authentic data, we enable the industry&#8217;s fastest onboarding and verification in real time. We provide both conventional and cutting-edge KYC solutions i.e.<\/span><a href=\"https:\/\/authbridge.com\/staging\/products\/identity-management\/digital-kyc\/\"><span style=\"font-weight: 400;\"> Digital KYC<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/authbridge.com\/staging\/products\/identity-management\/video-kyc\/\"><span style=\"font-weight: 400;\">Video KYC<\/span><\/a><span style=\"font-weight: 400;\">, assisting businesses in rapidly and easily onboarding consumers while reducing risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h3>Key benefits of using APIs and KYC solutions<\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Background Verification without human intervention<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Real-time results<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Saves money, time, and effort<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">No risks of errors that stem from manual entries which also helps avoid legal<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Complications<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Complaint and secure<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><b><i>Also read: <\/i><\/b><a href=\"https:\/\/authbridge.com\/staging\/blog\/smart-kyc-solutions-need-hour-employers\/\"><b><i>Smart and Intelligent KYC Solutions: The Need of the Hour for Employers<\/i><\/b><\/a><b><i>\u00a0<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information, contact us at <\/span><a href=\"mailto:sales@authbridge.com\"><span style=\"font-weight: 400;\">sales@authbridge.com<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gone are the days when customer identification and verification used to happen through physical documentation, such as a passport or driving license. The offline process not only used to be time-consuming but also prone to errors. &nbsp; As soon as FinTech innovation gained global traction, the expectations of seamless digital [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":43617,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-21717","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Everything you need to know about e-KYC - AuthBridge<\/title>\n<meta name=\"description\" content=\"Explore the different types of eKYC available, its benefits and usage, including Aadhaar-based verification using biometric authentication and others.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Everything you need to know about e-KYC\" \/>\n<meta property=\"og:description\" content=\"Explore the different types of eKYC available, its benefits and usage, including Aadhaar-based verification using biometric authentication and others.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/authbridge.com\/staging\/resources\/blogs\/everything-you-need-to-know-about-e-kyc\/\" \/>\n<meta property=\"og:site_name\" content=\"AuthBridge\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-14T05:06:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-09T17:51:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2023\/04\/Everything-you-need-to-know-about-e-KYC.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Shivangi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@authbridge\" \/>\n<meta name=\"twitter:site\" content=\"@authbridge\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shivangi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/everything-you-need-to-know-about-e-kyc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/everything-you-need-to-know-about-e-kyc\\\/\"},\"author\":{\"name\":\"Shivangi\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#\\\/schema\\\/person\\\/018b88cec7f62fb62f7ee58be89b692d\"},\"headline\":\"Everything you need to know about e-KYC\",\"datePublished\":\"2023-04-14T05:06:58+00:00\",\"dateModified\":\"2023-08-09T17:51:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/everything-you-need-to-know-about-e-kyc\\\/\"},\"wordCount\":1107,\"publisher\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/everything-you-need-to-know-about-e-kyc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Everything-you-need-to-know-about-e-KYC.png\",\"articleSection\":[\"Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/everything-you-need-to-know-about-e-kyc\\\/\",\"url\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/everything-you-need-to-know-about-e-kyc\\\/\",\"name\":\"Everything you need to know about e-KYC - AuthBridge\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/everything-you-need-to-know-about-e-kyc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/everything-you-need-to-know-about-e-kyc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Everything-you-need-to-know-about-e-KYC.png\",\"datePublished\":\"2023-04-14T05:06:58+00:00\",\"dateModified\":\"2023-08-09T17:51:53+00:00\",\"description\":\"Explore the different types of eKYC available, its benefits and usage, including Aadhaar-based verification using biometric authentication and others.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/everything-you-need-to-know-about-e-kyc\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/everything-you-need-to-know-about-e-kyc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/everything-you-need-to-know-about-e-kyc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Everything-you-need-to-know-about-e-KYC.png\",\"contentUrl\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Everything-you-need-to-know-about-e-KYC.png\",\"caption\":\"Everything you need to know about e-KYC\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/everything-you-need-to-know-about-e-kyc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wptesting.authbridge.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Everything you need to know about e-KYC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#website\",\"url\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/\",\"name\":\"AuthBridge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#organization\",\"name\":\"AuthBridge\",\"url\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/authbridge-site-icon.png\",\"contentUrl\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/authbridge-site-icon.png\",\"width\":1,\"height\":1,\"caption\":\"AuthBridge\"},\"image\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/authbridge\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#\\\/schema\\\/person\\\/018b88cec7f62fb62f7ee58be89b692d\",\"name\":\"Shivangi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/litespeed\\\/avatar\\\/698a67d25c73f23ed879c5c6bbf45d5b.jpg?ver=1778679262\",\"url\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/litespeed\\\/avatar\\\/698a67d25c73f23ed879c5c6bbf45d5b.jpg?ver=1778679262\",\"contentUrl\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/litespeed\\\/avatar\\\/698a67d25c73f23ed879c5c6bbf45d5b.jpg?ver=1778679262\",\"caption\":\"Shivangi\"},\"url\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/author\\\/shivangi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Everything you need to know about e-KYC - AuthBridge","description":"Explore the different types of eKYC available, its benefits and usage, including Aadhaar-based verification using biometric authentication and others.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Everything you need to know about e-KYC","og_description":"Explore the different types of eKYC available, its benefits and usage, including Aadhaar-based verification using biometric authentication and others.","og_url":"https:\/\/authbridge.com\/staging\/resources\/blogs\/everything-you-need-to-know-about-e-kyc\/","og_site_name":"AuthBridge","article_published_time":"2023-04-14T05:06:58+00:00","article_modified_time":"2023-08-09T17:51:53+00:00","og_image":[{"url":"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2023\/04\/Everything-you-need-to-know-about-e-KYC.png","width":1,"height":1,"type":"image\/png"}],"author":"Shivangi","twitter_card":"summary_large_image","twitter_creator":"@authbridge","twitter_site":"@authbridge","twitter_misc":{"Written by":"Shivangi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/everything-you-need-to-know-about-e-kyc\/#article","isPartOf":{"@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/everything-you-need-to-know-about-e-kyc\/"},"author":{"name":"Shivangi","@id":"https:\/\/authbridge.com\/staging\/#\/schema\/person\/018b88cec7f62fb62f7ee58be89b692d"},"headline":"Everything you need to know about e-KYC","datePublished":"2023-04-14T05:06:58+00:00","dateModified":"2023-08-09T17:51:53+00:00","mainEntityOfPage":{"@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/everything-you-need-to-know-about-e-kyc\/"},"wordCount":1107,"publisher":{"@id":"https:\/\/authbridge.com\/staging\/#organization"},"image":{"@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/everything-you-need-to-know-about-e-kyc\/#primaryimage"},"thumbnailUrl":"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2023\/04\/Everything-you-need-to-know-about-e-KYC.png","articleSection":["Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/everything-you-need-to-know-about-e-kyc\/","url":"https:\/\/authbridge.com\/staging\/resources\/blogs\/everything-you-need-to-know-about-e-kyc\/","name":"Everything you need to know about e-KYC - AuthBridge","isPartOf":{"@id":"https:\/\/authbridge.com\/staging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/everything-you-need-to-know-about-e-kyc\/#primaryimage"},"image":{"@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/everything-you-need-to-know-about-e-kyc\/#primaryimage"},"thumbnailUrl":"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2023\/04\/Everything-you-need-to-know-about-e-KYC.png","datePublished":"2023-04-14T05:06:58+00:00","dateModified":"2023-08-09T17:51:53+00:00","description":"Explore the different types of eKYC available, its benefits and usage, including Aadhaar-based verification using biometric authentication and others.","breadcrumb":{"@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/everything-you-need-to-know-about-e-kyc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/authbridge.com\/staging\/resources\/blogs\/everything-you-need-to-know-about-e-kyc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/everything-you-need-to-know-about-e-kyc\/#primaryimage","url":"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2023\/04\/Everything-you-need-to-know-about-e-KYC.png","contentUrl":"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2023\/04\/Everything-you-need-to-know-about-e-KYC.png","caption":"Everything you need to know about e-KYC"},{"@type":"BreadcrumbList","@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/everything-you-need-to-know-about-e-kyc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wptesting.authbridge.com\/"},{"@type":"ListItem","position":2,"name":"Everything you need to know about e-KYC"}]},{"@type":"WebSite","@id":"https:\/\/authbridge.com\/staging\/#website","url":"https:\/\/authbridge.com\/staging\/","name":"AuthBridge","description":"","publisher":{"@id":"https:\/\/authbridge.com\/staging\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/authbridge.com\/staging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/authbridge.com\/staging\/#organization","name":"AuthBridge","url":"https:\/\/authbridge.com\/staging\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/authbridge.com\/staging\/#\/schema\/logo\/image\/","url":"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2023\/09\/authbridge-site-icon.png","contentUrl":"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2023\/09\/authbridge-site-icon.png","width":1,"height":1,"caption":"AuthBridge"},"image":{"@id":"https:\/\/authbridge.com\/staging\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/authbridge"]},{"@type":"Person","@id":"https:\/\/authbridge.com\/staging\/#\/schema\/person\/018b88cec7f62fb62f7ee58be89b692d","name":"Shivangi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/authbridge.com\/staging\/wp-content\/litespeed\/avatar\/698a67d25c73f23ed879c5c6bbf45d5b.jpg?ver=1778679262","url":"https:\/\/authbridge.com\/staging\/wp-content\/litespeed\/avatar\/698a67d25c73f23ed879c5c6bbf45d5b.jpg?ver=1778679262","contentUrl":"https:\/\/authbridge.com\/staging\/wp-content\/litespeed\/avatar\/698a67d25c73f23ed879c5c6bbf45d5b.jpg?ver=1778679262","caption":"Shivangi"},"url":"https:\/\/authbridge.com\/staging\/resources\/blogs\/author\/shivangi\/"}]}},"_links":{"self":[{"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/posts\/21717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/comments?post=21717"}],"version-history":[{"count":1,"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/posts\/21717\/revisions"}],"predecessor-version":[{"id":38510,"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/posts\/21717\/revisions\/38510"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/media\/43617"}],"wp:attachment":[{"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/media?parent=21717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/categories?post=21717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/tags?post=21717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}