KYC - AML

Compliance

Identity verification for KYC and AML is too complex.

KYC (Know Your Customer) and AML (Anti Money Laundering) regulations require businesses to establish and perform many additional identity checks when a business goes through the process of onboarding a new customer. Aside from the fact that these mandatory checks are predominantly manual, they increase onboarding time and cost.

Simplify the process and comply with regulations.

KYC utility is a due diligence and customer onboarding tool for businesses and organizations.

We create and run trusted digital identity networks or consortia. Network members are provided with a secure and encrypted way of requesting identity checks with customers' consent.

The initial validation of digital identities is performed only the first time by a member of the consortia. It can be done either on premise or remotely via video onboarding, by providing official ID and enrolling biometric data. Each next KYC procedure required by another member service is performed remotely by customers providing data access consent using smooth biometric verification.

Blinking KYC can be installed as an Online Cloud, Private Cloud or and On-Premise solution.

Define the KYC procedure and verify customers' ID.

Using the KYC tool, consortia members issue their customers a digital ID within the Blinking platform which is then verified using biometric authentication.

Additionally, AML, FATCA or other layers of checks are defined and performed by the business.

Each service can decide on the level of risk that needs to be covered and the level of required regulatory compliance. This is why each registration and the level of security is configurable depending on the business needs.

Request verified ID checks.

Once a customer is onboarded and verified within the network using Blinking's advanced biometric algorithms for liveness detection and face recognition, he becomes the owner of his own data.

Because these mechanisms and checks are used, companies relying on Blinking are granted sure knowledge of precisely who their customers are without the risk of being wrong about their identities.

When a customer decides to use some new service from a consortium member that requires additional checks, that service provider issues a request to access the user's identity and private data.

Using the consent mechanism, customers decide to allow or deny data access.