Page 21 - FIGI: e-KYC use cases in digital financial services
P. 21
Figure 5: ID proofed Auth server: No User ID
secret information i.e., mother's name and place of (Name, Father's name, address), if requested by
birth against CNIC of the general public and fraud- the CMO.
sters made effective use of it for identity theft in an d) Received data is used to update the system and
organized manner. Hence, need was felt to evolve subsequently the result is forwarded to sale
a secure SIM issuance system which could provide channel's device.
"proof of life". e) In case of successful verification, SIM is handed
over to the customer whereas in case of failure,
3�2 BVS Data Flow further guidance is provided based upon the
In BVS, data flows from the sale channel to NADRA error code generated by NADRA.
database through CMOs Customer Relationship
Management (CRMs) systems in following steps:
3�3 Salient Features of BVS
a) When a potential subscriber visits a sale channel BVS is a fully automated process with minimal human
for a SIM related transaction, the sale agent asks intervention with the following salient features:
his/her CNIC number, punch-in mobile number,
scans thumb/finger and sends the data (CNIC 3.3.1 BVS process
number and biometric information template) to The inputs include Computerized Identity Card
the mobile operator. (CNIC) number, finger index (Right Thumb, Right
b) The systems at mobile operators' end checks Index, Left Thumb, Left Index) and finger impression.
eligibility of the sale channel (through its unique In output, we get the verification result (i.e., Success/
ID), eligibility of the subscriber (i.e., count of SIMs Failure) and subscribers' data (Name, Father's Name,
is less than five) and if eligible, forwards the infor- Address), if required.
mation to NADRA.
c) NADRA checks validity of CNIC and matches the 3.3.2 BVS devices
received information in its database. Success or There are three types of devices used in the process:
failure is returned to the mobile operator based
upon the verification result along with data a) Microsoft Windows based personal computer
with a finger/thumb scanner which is connected
e-KYC use cases in digital financial services 19