Page 21 - FIGI: e-KYC use cases in digital financial services
P. 21

Figure 5: ID proofed Auth server: No User ID



































            secret information i.e., mother's name and place of   (Name, Father's name, address), if requested by
            birth against CNIC of the general public and fraud-   the CMO.
            sters made effective use of it for identity theft in an   d)  Received data is used to update the system and
            organized manner. Hence, need  was felt to evolve     subsequently the result is forwarded to sale
            a secure SIM issuance system which could provide      channel's device.
            "proof of life".                                   e)  In case of successful verification, SIM is handed
                                                                  over to the customer whereas in case of failure,
            3�2  BVS Data Flow                                    further guidance is provided based upon the
            In BVS, data flows from the sale channel to NADRA     error code generated by NADRA.
            database  through CMOs  Customer  Relationship
            Management (CRMs) systems in following steps:
                                                               3�3  Salient Features of BVS
            a)  When a potential subscriber visits a sale channel   BVS is a fully automated process with minimal human
                for a SIM related transaction, the sale agent asks   intervention with the following salient features:
                his/her CNIC number, punch-in mobile number,
                scans thumb/finger and sends the data (CNIC    3.3.1   BVS process
                number and biometric information template) to   The inputs include Computerized Identity Card
                the mobile operator.                           (CNIC) number, finger index (Right Thumb, Right
            b)  The systems at mobile operators' end checks    Index, Left Thumb, Left Index) and finger impression.
                eligibility of the sale channel (through its unique   In output, we get the verification result (i.e., Success/
                ID), eligibility of the subscriber (i.e., count of SIMs   Failure) and subscribers' data (Name, Father's Name,
                is less than five) and if eligible, forwards the infor-  Address), if required.
                mation to NADRA.
            c)  NADRA checks validity of CNIC and matches the   3.3.2   BVS devices
                received information in its database. Success or   There are three types of devices used in the process:
                failure is returned to the mobile operator based
                upon the verification result along with data   a)  Microsoft Windows based personal computer
                                                                  with a finger/thumb scanner which is connected



                                                                          e-KYC use cases in digital financial services  19
   16   17   18   19   20   21   22   23   24   25   26