Innovations in Know Your Customer(KYC )as on April 2026
Key Innovations in KYC as on April 2026 is summarised in the following:
Globally the following
changes are happening in the field of Know your customer (KYC) under AML/CFT
across nations and regions
AI and Machine Learning (ML): AI automates data analysis, document
verification via Optical Character Recognition (OCR), and risk assessment,
significantly reducing human error and speeding up onboarding times to minutes
or seconds.
Biometrics & Liveness Detection: Advanced facial
recognition, iris scanning, and voice biometrics are used to confirm physical
presence and authenticity, with active and passive liveness checks countering
deepfakes and 3D spoofing attempts.
Perpetual KYC (p-KYC): Moving away from periodic reviews, p-KYC provides
continuous, near real-time monitoring of customer risk profiles, allowing for
instant updates when changes occur (e.g., in beneficial ownership).
Blockchain & Decentralized Identity (DID): Blockchain
technology creates an immutable, decentralized ledger for securely sharing
verified identity data. This allows customers to manage their own identity
(Self-Sovereign Identity) and share verified credentials with authorized
institutions, reducing repeated KYC checks.
Video KYC 2.0: Enhances traditional video calls with AI-powered face
matching, geo-tagging for location compliance, and background noise detection
for higher security during remote onboarding.
RegTech and No-Code Workflows: Regulatory Technology (RegTech)
solutions help organizations automatically adapt to evolving AML and KYC
standards. No-code platforms allow organizations to build and modify KYC
workflows without IT support.
Generative AI (GenAI) in Compliance: GenAI is being used
to create natural-language-based chat interfaces that assist compliance teams
with interactive investigations, summarizing cases, and performing adverse
media searches, acting as a "copilot" for due diligence.
NFC Technology: Near Field Communication (NFC) is used to read encrypted
data directly from chip-enabled IDs or passports, ensuring 100% accuracy in
data extraction and enhancing document verification
Impact on Financial Services:
Financial Inclusion: In emerging markets, AI-powered KYC and tiered, simplified due diligence are enabling access for unbanked populations by allowing alternative data verification.
Reduced Friction & Faster Onboarding: Modern
solutions like AU10TIX or Signzy allow for instant (4-8 seconds) or very fast
(minutes) onboarding, replacing manual processes that took days.
Enhanced Fraud Detection: Advanced tools, including AI-native stacks and behavioral analytics, flag synthetic identities and unusual patterns in real-time, reducing false positives.
Cost Savings & Efficiency: Automation
reduces the high cost of manual reviews and remediation, saving billions in
potential non-compliance fines
Innovations in Know Your Customer (KYC) processes –FATF
The FATF, the global standard setting body, has come out with detailed guidances in July 2021 on the use of new technologies for AML/CFT. Major points to recall include:
1. Digital Identity (Digital ID) and
Verification
2. AI, Machine Learning, and Big Data
Analytics
3. Perpetual KYC (p-KYC)
4. Collaborative and Decentralized
Technology
5. FATF Focus Areas for Innovation
(2024-2026)
These innovations are aimed at creating
a "Risk-Based Approach (RBA)" that allows firms to focus resources on
higher-risk clients while simplifying onboarding for lower-risk ones
1. Digital Identity (Digital ID) and Verification
FATF encourages the use of digital ID systems for remote onboarding and verification, which can enhance security and improve user experience
- Biometric Authentication: Use
of facial recognition, liveness detection, and iris scanning to verify
customer identities during onboarding and high-risk transactions.
- eKYC and Document
Verification: Automated digital verification of government-issued
IDs, leveraging APIs to check against government databases (e.g., GOV.UK
Verify).
- Acceptance of Digital
Credentials: Allowing financial institutions to use digital
documents, or in some cases recently expired IDs, to facilitate
onboarding, particularly in remote settings
2. AI, Machine Learning, and Big Data Analytics
Advanced analytics are increasingly used
to move beyond basic name-screening toward behavioral understanding
- Automated Customer Due Diligence
(CDD): AI systems screen for sanctions, politically exposed persons
(PEPs), and adverse media automatically.
- Behavioral
Profiling: Algorithms analyze customer behavior to detect deviations
from established patterns, enhancing risk assessment.
- Generative AI in Compliance: Used for generating automated investigative reports and improving natural language processing (NLP) to parse complex, multi-lingual data
3. Perpetual KYC (p-KYC)
A significant shift from static, periodic reviews to continuous
monitoring
a. Real-time Risk Updates: Automated systems constantly update risk
profiles when new information emerges (e.g., change in ownership, negative
media coverage).
b. Ongoing Monitoring: Replacing manual, scheduled re-KYC with ongoing
monitoring that keeps customer information up to date, reducing the
administrative burden on both institutions and customers.
4. Collaborative and Decentralized Technology
a. Blockchain and Distributed Ledger Technology (DLT): Explored for creating a secure, immutable shared registry of customer identities to streamline verification across multiple institutions while adhering to data privacy standards.
b. Collaborative CDD: Programs that allow banks to share KYC data to manage risks efficiently
5. FATF Focus Areas for Innovation (2024-2026)
a. FATF’s guidance for the coming years focuses on effectiveness rather than just technical compliance.
b. Beneficial Ownership Verification: Increased emphasis on using technology to uncover the true beneficiaries of complex corporate structures.
c. Travel Rule Compliance: Innovations in tracking and verifying transactions involving virtual assets (crypto) to ensure compliance with the "Travel Rule," which requires sharing customer info.
d. Privacy-Enhancing Technologies (PETs): Developing ways to share data for ML/TF detection without violating data protection laws (e.g., GDPR)
In the July 2021 report, FATF defined New Technologies for AML/CFT.
New technologies for AML/CFT refer to:
· Innovative skills, methods, and processes that are used to achieve
goals relating to the effective implementation of AMLCFT requirements or
· Innovative ways to use established technology-based processes to comply with AML/CFT obligation
The lead role of Govt to be on forefront of AML/CFT was upheld in this guidance.
The Challenges Driving the Need for Innovation
The global challenges that are driving the need for innovation include:
1. Rising Compliance Costs and Resource
Demands
2. Prolonged Onboarding Times
3. Inconsistent Documentation
Requirements
4. Impact on Client Relationships
5. Data Security and Privacy Concerns
The following section examines each of the above.
1. Rising Compliance Costs and Resource Demands
Regulatory requirements continue to
intensify, requiring financial institutions to make significant investments in
compliance infrastructure. In parallel, the demand for specialized personnel
has grown, adding to operational costs and complexity.
2. Prolonged Onboarding Times
KYC compliance requirements have led to
significant delays in customer onboarding and account opening, which has a
significant impact on operational efficiency and business continuity for
financial institutions. In addition, onboarding times vary widely depending on
customer risk profiles and regional regulatory requirements.
3. Inconsistent Documentation Requirements
Documentation requirements for KYC are
inconsistent across financial institutions, with different banks — and
sometimes even branches of the same bank — requiring similar information in
different formats. The lack of standardization increases frustration for both
institutions and customers.
4. Impact on Client Relationships
KYC-related burdens have led many
companies to limit or avoid certain banking relationships due to the high
compliance requirements. Excessive documentation requirements and lengthy
onboarding procedures associated with KYC compliance deter many corporate
customers from establishing new banking relationships.
5. Data Security and Privacy Concerns
As financial institutions are
responsible for protecting sensitive customer information while complying with
increasingly stringent regulatory requirements, customers may be reluctant to
provide extensive documentation unless they receive robust assurances about
data protection measures.
Rethinking KYC: Practical Solutions for the Future
There are three promising approaches to
offer a solution to some of these challenges: Solutions based on the updated
eIDAS regulation, the usage of centralized registries from industry initiatives
and the implementation of a decentralized KYC solutions e.g. by using
blockchain technology.
There are three promising approaches to
offer a solution to some of these challenges: Solutions based on the updated
eIDAS regulation, the usage of centralized registries from industry initiatives
and the implementation of a decentralized KYC solutions e.g. by using
blockchain technology.
The Future of KYC: Innovating for Efficiency and Security:
Evidence from EU
1. Digital Identity Through eIDAS 2.0
2. Centralized KYC Data Registries
3. Decentralized KYC Using Blockchain
1. Digital Identity Through eIDAS 2.0
The revised eIDAS regulation (EU
Regulation No 910/2014) aims to enhance digital identity management across
the EU. By introducing wallet-based digital identities, customers can
securely store and share their credentials across relationships, possibly also
improving KYC processes.
Key Attributes:
Enables fully digital identity
verification with real-time authentication.
Establishes a harmonized identity
management framework across borders.
Enhances customer control over personal
data, improving security and efficiency.
Supports electronic identification (eID)
and digital trust services, enabling businesses to verify customer identities
entirely online without the need for in-person verification
2. Centralized KYC Data
Registries
Key Attributes:
Reduces redundant KYC verifications
across institutions.
Strengthens industry-wide collaboration
and trust.
Simplifies cross-border banking
relationships and accelerates onboarding.
Provides a structured approach for
integrating different KYC standards across jurisdictions, reducing friction in
correspondent banking relationships.
Facilitates a global trusted repository
for identity documents, ownership details, and risk assessments, ensuring
seamless data exchange among financial institutions.
3. Decentralized KYC Using Blockchain
Blockchain technology offers
a secure, decentralized KYC solution, allowing customers to maintain
control of their identity data while ensuring compliance.
Key Attributes:
Customers use encrypted, tokenized
credentials to manage data access.
Institutions verify identities without
direct access to sensitive data, reducing security risks.
An immutable audit trail ensures
compliance and transparency without duplication.
Allows financial institutions to verify
KYC information without requiring repeated submission of sensitive documents.
Enhances privacy-preserving KYC by
enabling token-based permission management, ensuring customers decide who can
access their identity data.
Possibly allows financial institutions
to monetize KYC data to party recapture costs associated with KYC and develop
or enhance data-based business models — a first draft for a potential solution
is outlined below:
Source: Deloitte.techpulse
Innovations in KYC - India
From 15 days to 3 days was
a journey from 2004 to 2025 for KYC in India which has suddenly changing into a
3 minutes process by 2026. At this stage we are looking at various innovations
taking place in use of technology to bring more accurate, safe and real-time
KYC across financial market players.
In April 2025, the Central KYC Records Registry
(CKYCRR) introduced a crucial upgrade to the CKYC framework: mandatory
OTP-based consent for downloading individual KYC records. Under this mechanism,
every time a financial institution (Reporting Entity, or RE) attempts to
retrieve a customer’s CKYC data, an OTP is sent to the customer’s registered
mobile number. The record is released only upon successful OTP validation.
Issued under Circular No. CKYC/2025/02, this move enhances transparency and
user consent in KYC operations across the BFSI landscape.
India’s banking and
financial services sector is set for a major digital upgrade as the government
moves to integrate the Know Your Customer (KYC) process with DigiLocker. The
rollout of CKYC 2.0, expected later February 2026, aims to eliminate repetitive
verification requirements and usher in a seamless, paperless banking
ecosystem.
The initiative is being
seen as a transformative step toward modernizing customer onboarding and strengthening
digital infrastructure across banks, insurance companies, and mutual fund
institutions.
CKYCRR 2.0 (Central KYC Records Registry) is a major 2026
upgrade in India, transforming KYC from static document storage into a
real-time, API-driven, and AI-validated system. It streamlines onboarding for financial institutions
(banks, NBFCs) by integrating DigiLocker, PAN, and Aadhaar to create live,
highly secure profiles
· Real-Time API & Verification: Shifts from batch processing to instant, API-based identity verification, reducing onboarding time.
· AI-Driven Deduplication: Utilizes artificial intelligence and facial matching to prevent duplicate records and identity fraud.
· Deep India Stack Integration: Integrates with DigiLocker for direct document fetching and the Income Tax database for verification.
· Enhanced Data Hygiene: Implements stricter field-level validations and structured data formats, reducing rejected entries.
· Customer Control: Provides improved visibility for individuals over their own KYC data
This upgrade handles the growing volume of digital financial services, with over 620 million records managed by CERSAI. The system enables continuous monitoring rather than just point-in-time checks, strengthening Anti-Money Laundering (AML) compliance
Central Know Your Customer Records Rules (CKYCRR)
represents one of India's most significant regulatory frameworks for financial
institutions, yet the recent transition to CKYCRR 2.0 has created an
infrastructure crisis that many business leaders underestimated. What
regulators positioned as a system upgrade is actually a complete platform
replacement that renders existing KYC workflows obsolete.
Over 7,166 reporting entities regulated by RBI, SEBI,
IRDAI, and PFRDA must now comply with a system that validates data in real time
and demands technical capabilities that legacy Core Banking Systems simply
cannot provide.
CKYCRR, or Central Know Your Customer Records Rules, is the
regulatory framework itself. It's the set of rules and guidelines laid down by
the Reserve Bank of India that governs how the centralized KYC system should
operate. Think of it as the rulebook that defines what information needs to be
collected, how it should be stored, who can access it, and what standards must
be followed.
CKYC, on the other hand, stands for Central Know Your
Customer. This refers to the actual records or the centralized repository where
your verified identity information is stored. When you complete your KYC at any
financial institution, your details get uploaded to the CKYC registry. It's the
practical implementation of what CKYCRR mandates.
- It
eliminates the need for customers to submit KYC documents repeatedly at
different financial institutions, saving time and reducing paperwork.
- It
creates a uniform standard for identity verification across banks,
insurance companies, mutual funds, and other financial entities, ensuring
consistency in compliance.
- It
reduces operational costs for financial institutions by allowing them to
access verified records instead of conducting fresh verification processes
for each customer.
- It
enhances security and accuracy by maintaining a single, centralized record
that reduces the chances of discrepancies or fraudulent documentation.
- It
speeds up the account opening and onboarding process, making financial
services more accessible and convenient for customers.
- It
helps regulatory authorities monitor and ensure compliance more
effectively by centralizing records in one accessible location.
The existing CKYC protocols set up
in 2016, while instrumental in streamlining KYC processes, face limitations
that necessitated the revamp:
The Rise of Fintech and Neobanks: The rapid growth of fintech and neobanks has exposed limitations in the current CKYC’s scope. These institutions often cater to diverse customer segments, including gig workers and freelancers, whose KYC data may not be readily available in the existing system. CKYCRR 2.0’s expanded scope, encompassing corporates and other legal entities, can address this gap and facilitate smoother onboarding for these new entrants in the financial landscape.
Limited Accessibility: Currently, only FIs registered with
CERSAI can access KYC data. CKYCRR 2.0 seeks to broaden accessibility by
potentially allowing individuals to access and manage their KYC information
within the repository, subject to robust security measures and compliance with
data privacy regulations.
Evolving Regulatory Landscape: Regulatory bodies are emphasizing the
need for a “single-source-of-truth”, risk-based KYC approach. The current CKYC
system adopts a “one-size-fits-all” approach, which can be inefficient and
cumbersome for low-risk individuals. CKYCRR 2.0’s flexible
framework and risk-based KYC capabilities can address this concern, tailoring
verification requirements based on individual/entity risk profiles.
Lack of Flexibility: The existing system’s structure
restricts the inclusion of additional data points beyond mandatory KYC details.
CKYCRR 2.0 envisions a flexible framework that can accommodate future data
requirements, such as non-traditional financial data with customer consent, to
create a more robust risk assessment framework.
The emergence of hacks & scams: Over the last few years there have been
numerous instances of CKYC data being manipulated, resulting in identity fraud
and monetary losses for individuals and organizations.
Timeline for
CKYC Registry 2.0
The timeline for CKYCR 2.0 has begun from February 2026 and the apprx schedule looks likes as given below:
Phase 1 (12-18 months): This initial phase focuses on upgrading the core infrastructure of the repository and implementing enhanced security protocols. Additionally, it involves developing the framework for incorporating data from corporates and other legal entities.
Phase 2 (18-24
months): The second phase pilots risk-based KYC and explores the
potential for integrating non-traditional financial data with user consent.
Additionally, pilot programs are initiated to test individual access and
management functionalities within the repository.
Phase
3 (24-36 months): The final phase focuses on the nationwide rollout of
CKYCRR 2.0, ensuring seamless integration with existing FI systems and
establishing robust grievance redressal mechanisms. This phase also involves
raising public awareness about the new system and its benefits.
DigiLocker
DigiLocker now holds government-backed
credentials for 57 crore Indians . That’s half the adult population walking around with
verified Aadhaar and PAN in their pockets, ready to share on demand.
Banks can now authenticate documents
in real-time, match faces against official records, and approve accounts while
customers are still on the line—all because RBI’s KYC Directions treat VCIP as
a valid alternate to face-to-face KYC.
Access to Aadhaar and PAN instantly
via DigiLocker has reduced weeks-long KYC wait times to minutes.
DigiLocker is a cloud-based platform
launched by India’s Ministry of Electronics and IT that lets citizens store and
share their verified documents digitally. It’s like a government-backed digital
wallet for all your official documents.
DigiLocker documents are recognized as
“equivalent e-documents,” holding the same legal validity as original physical
documents under the Information Technology Act, 2000.
According to RBI’s 2025 KYC Direction guidelines, regulated entities (RE) are legally authorized to
accept DigiLocker OVDs as part of the customer identification process.
DigiLocker works as a bridge between
three critical identity systems:
- Aadhaar: Users link their Aadhaar
with DigiLocker, enabling instant verification using OTP and optionally
biometrics for enhanced security
- PAN: PAN cards issued by NSDL or the
Income Tax Department are fetched and verified as OVDs through DigiLocker
- C-KYC Registry:
DigiLocker supports integration with the Central KYC Records Registry,
letting REs reuse KYC records and reduce document redundancy
Authorizing
DigiLocker-issued OVDs in video KYC
RBI
approved the use of Video-based Customer Identification Process (V-CIP) for
Legal Entity customers (including authorized signatories and beneficial owners)
through a notification amending the Master Direction on KYC on May 10, 2021
The guidelines were
later refined and expanded in May 2021 and subsequently in 2023 and 2025 to
include features like DigiLocker integration and enhanced security.
The authorized official performing
V-CIP can now fetch verified documents through DigiLocker APIs in real-time,
streamlining both onboarding and KYC updates.
RE can capture identity information of
sole proprietors and beneficial owners from Digilocker through documents
like:
- Aadhaar Card
(including offline verification or e-KYC authentication)
- PAN Card (or
equivalent e-document)
- Passport
- Voter ID Card
- Driving
License
- Job Card
issued under NREGA
V-CIP can also be used to convert Simple
Due Diligence (SDD) accounts to full CDD accounts and for periodic KYC
updation.
RBI mandated robust V-CIP infrastructure, Process and Record Keeping requirements, outlining key infrastructure and regulatory enhancements requirements. This includes:
- The video
recordings should contain the live GPS coordinates (geo-tagging) of the
customer undertaking the V-CIP and a date-time stamp
- The
application shall have components with face liveness/spoof detection as
well as face matching technology with a high degree of accuracy. An AI
technology can be used to detect liveness
- The V-CIP
infrastructure shall undergo necessary tests such as Vulnerability
Assessment, Penetration testing, and a Security Audit to ensure its
robustness and end-to-end encryption capabilities
- The V-CIP
infrastructure/application should be capable of preventing connections
from IP addresses outside India or from spoofed IP addresses
- The RE shall
ensure end-to-end encryption of data between the customer device and the
hosting point of the V-CIP application, as per appropriate encryption
standards
o January 2020: Legal acceptance of Video KYC (V-CIP)
and authorization of DigiLocker OVDs
o April 28, 2023: Mandated secure data handling,
geo-tagging, and introduced single-session rules
o May 4, 2023: Reduced BO threshold (10%), extended Aadhaar XML validity
to three working days, and excluded third-party video platforms
o June 12, 2025: Authorized Business Correspondents for
KYC updation, emphasized AI-powered liveness detection, multilingual support,
and low-bandwidth optimization
o August 14, 2025: Expanded V-CIP scope, reinforced Indian
server storage
- C-KYC acts as
India’s centralized identity vault. Once the customer completes KYC with
any financial institution, their verified data gets stored in the Central
KYC records. Regulated entities can fetch and reuse these financial
details without requiring customers to repeatedly produce their KYC
details.
- DigiLocker
serves as the customer’s government-backed digital document wallet. Their
Aadhaar, PAN, and other official documents live here in authenticated
form. During Video KYC , banks can
pull these documents directly with customer consent.
- Video KYC
brings real-time human verification into the mix. An authorized official
verifies the customer’s identity through a live video call, checking both
their face and documents.
RBI has mandated the integration of
Video KYC data with the Central KYC Registry. According to the 2025 MasterDirection and recent amendments, regulated entities must upload and update
customer KYC data obtained through the V-CIP to the CKYCR in real-time.
This creates a feedback loop where
every new verification strengthens the system.
When a bank completes your video KYC,
that verified data gets uploaded to C-KYC. The next bank you approach can
download this record using your KIN. They still need to verify you’re the same
person (through video KYC), but the heavy lifting is done.
Regulated entities must obtain
customer consent to download KYC records for Customer Due Diligence.
How the Verification Process Will Work
Customer consent and Digilocker authentication
The process starts with the user
verifying their Aadhaar via DigiLocker. Once the Aadhar is verified, they are
added to the queue or offered an option to schedule a live video call.
Video call verification
Authorized officials of the RE conduct
a live video call and record the entire session. During the call, the official
performs identity authentication and liveness verification by:
- Requesting
the customer to display their PAN card and capturing a clear image for
verification
- Asking the
customer to verbally confirm details such as name, address, and other
information from their PAN and Aadhaar
- Conducting
liveness checks through randomized prompts (blinking, nodding, or head
movements) to confirm physical presence
- Matching the
customer’s live facial image with photographs on Aadhaar and PAN documents
- Obtaining the
customer’s live signature for record-keeping purposes
Central KYC (C-KYC) check & unique KYC identifier creation
After video KYC, user details are
cross-verified with the CKYC Registry to ensure no duplicate or inconsistent
KYC exists.
Final approval and onboarding
Once the above steps are validated and
completed, the financial institution grants customer onboarding approval.
Thus it can be concluded that India is at the forefront of AML/CFT and Govt is committed to continue its fight.

Comments
Post a Comment