eKYC Solution
Overview
The eKYC Solution provides an end-to-end framework for digital identity onboarding and verification. It enables organizations to verify an individual’s identity remotely by combining document verification, biometric verification, and liveness detection.
The solution is designed to be embedded into mobile applications, web applications, or onboarding portals. It separates client-side data capture from backend identity processing, allowing integrations to meet regulatory, security, and scalability requirements.
eKYC is typically used as the first step in establishing a trusted digital identity and can operate independently or alongside backend biometric systems such as ABIS.
System Architecture
The eKYC Solution is composed of two primary layers:
- Client-side SDKs (EkycID) for guided capture of identity documents and biometric data
- Backend APIs (EkycLens) for identity processing and verification
High-level characteristics of the architecture:
- Capture occurs on the user’s device
- Verification and decision-making occur on backend services
- Components are loosely coupled and can be integrated independently
- Supports both direct client-to-backend and client–backend–customer-backend models
This architecture enables secure capture, centralized processing, and flexible deployment across industries and regulatory environments.
Core Concepts
Identity Lifecycle
The identity lifecycle describes how an individual’s identity progresses through the system.
Typical stages include:
- Capture – Identity documents and biometric data are collected
- Verification – Data is processed and validated
- Decision – Identity is approved, rejected, or sent for review
- Maintenance – Identity may be re-verified or updated over time
eKYC Solution focuses primarily on the capture and verification stages, while downstream systems manage account creation, permissions, or long-term identity storage.
Document Verification
Document verification ensures that a submitted identity document is valid, readable, and consistent.
This process typically includes:
- Detecting supported identity documents
- Extracting text and data fields using OCR
- Validating document structure and content
- Preparing extracted data for downstream checks
Document verification is used to establish the claimed identity of the user and serves as the foundation for subsequent biometric checks.
Biometric Verification
Biometric verification confirms that the person presenting the identity document is the rightful owner of that document.
In eKYC Solution, this is commonly performed by:
- Capturing a live facial image or video
- Comparing it against the portrait photo from the identity document
- Producing a similarity or match result
This process is 1:1 verification and does not involve searching across large biometric databases.
Liveness Detection
Liveness detection ensures that biometric data is captured from a real, present human rather than from a photo, video, or other spoofing method.
The eKYC Solution uses prompt-based liveness, where the user is asked to perform specific actions such as:
- Looking left or right
- Blinking
Liveness detection acts as a safeguard against replay and presentation attacks and is evaluated before or alongside biometric verification.
Components
EkycID (Client SDKs)
EkycID provides client-side SDKs for mobile and web platforms.
Its responsibilities include:
- Guiding users through document scanning
- Capturing facial images and liveness videos
- Providing real-time feedback during capture
- Rendering customizable UI components
EkycID runs entirely on the client device and does not perform identity matching or decision-making.
EkycLens (Backend APIs)
EkycLens provides backend services that process and verify captured identity data.
Its responsibilities include:
- OCR and data extraction from identity documents
- Face comparison between document photos and live captures
- Video-based liveness analysis
- Returning structured verification results
EkycLens acts as the verification engine of the EKYC Solution and is typically integrated into backend systems.
Integration Flow
Standard Onboarding Flow
The standard onboarding flow is used for fully automated identity verification.
Typical steps:
- User captures identity document via the client SDK
- User completes biometric capture and liveness checks
- Captured data is sent to backend verification services
- Verification results are returned
- System automatically approves or rejects the identity
This flow is commonly used for low- to medium-risk onboarding scenarios.
Manual Review Flow
The manual review flow is used when automated verification alone is insufficient.
Typical triggers include:
- Low confidence scores
- Inconsistent document data
- Failed or borderline biometric checks
Flow overview:
- Automated verification is performed
- Identity is flagged for review
- Human reviewers inspect documents and verification results
- Final approval or rejection is issued
This approach balances automation with regulatory or risk-based oversight.