• • Identity verification , Face detection, Face alignment,Liveness detection
  • • Anti-spoofing measures
  • • Multi-factor authentication
  • • Client eKYC – Consent based input
  • • Document authentication
  • • Risk assessment
  • • Watchlist screening
  • • Enhanced due diligence (EDD)
  • • Ongoing monitoring