Page 25 - FIGI: e-KYC use cases in digital financial services
P. 25
Figure 8: Summary architecture
trative tools integrated into its existing identity regis- b) They enter their national ID number and provide
tration and management processes. These ID creden- their fingerprint.
tials are held in guardianship under a data protection c) A disclosure notification informs them of the
agreement with the NCRA, which enables citizens data they will share with the FSP.
to access and manage their data securely through d) Upon consent, the data are shared from their
a fingerprint bio matcher service. Verifiers (FSPs) wallet to the FSP.
are then able to request customers (or prospective e) The FSP uses these data to verify customer iden-
customers) share their official identity credentials for tity, fulfil KYC compliance requirements, and
e-KYC or CDD. open the account.
The NDIP is made available to FSPs through sim-
ple verifier integration APIs and whitelabel applica-
tions that FSPs can integrate directly into their exist- 5�2 Open Standards
ing onboarding and compliance processes. Kiva Protocol adheres to the Principles on Identifi-
The summary architecture is presented Figure 8. cation for Sustainable Development which call for
All of this translates into seamless experience for open standards and vendor neutrality in the design
individuals attempting to open a new account with of digital identity systems to encourage innovation
an FSP: and ensure financial and operational efficiency and
sustainability. Much of the foundational code used in
a) A customer visits their local FSP office. Kiva Protocol is hosted at the Linux Foundation with-
e-KYC use cases in digital financial services 23