SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 23
Application on Know Your Customer Authentication
Vaishali Surjuse, Leena Sawarbandhe, Akanksha Pawar, Prianshu Bhagat, Samiksha Ambekar
and Purva Deshmukh
Department of Computer Science & Engineering
(KDK college of Engineering, Nagpur )
(KDK college road, opposite telephone exchange, Nandanvan,Nagpur-440009)
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - A significant yet minor issue in the
financial business right currently is the way drawn-
out and expensive the conventional Know-Your-
Customer (KYC) process is. The interaction is likewise
tedious for clients as need might arise to go through
similar cycle for each bank or monetary foundation
with which they plan to work. Individual encounters
of individuals direct the bulky idea of the cycle, in this
manner requesting a solid other option. Through this
paper, we mean to do precisely that. We propose
another arrangement in view of Circulated Record
Innovation or Blockchain innovation, which will
lessen the customary KYC confirmation process cost
for Establishments and cut off the general course of
events of the culmination of the cycle while making it
smoother for the clients. Significant improvement in
our answer over the traditional strategies is that the
entire check process is led just a single time for every
client, regardless of number of foundations the person
wishes to be connected to. Likewise, since we are
utilizing the Databases, check results can be safely
imparted to the clients in this manner expanding
straightforwardness. Following this methodology, we
fostered a Proof of Idea (POC) with the Ethereum
Programming interface, sites as endpoints and an
android application as front office; understanding the
plausibility and viability of this methodology. With
everything taken into account, this approach further
develops client experience, decreases cost overheads,
and increments straightforwardness during the time
spent onboarding a client
I.INTRODUCTION:
The interaction to confirm the character and different
qualifications of a monetary administrations client. The
Know Your Client (KYC) or Know Your Client (KYC) is an
interaction to check the personality and different
certifications of a monetary administrations client. The
Know your Client (KYC) process helps against tax evasion
and forestalls the supporting of psychological oppressor
exercises. Banks were encouraged to follow specific client
recognizable proof system for opening of records and
checking exchanges of a dubious sort to report it to fitting
power. Computerized character check is quickly
developing as an immediate consequence of advanced
change drives and has seen expanding development
because of the Coronavirus pandemic. Account opening is
moving on the web, and specialist organizations request a
solid and safe strategy to confirm character and for e-KYC.
The principal goals of this report is to attempt an
investigation of the mechanical advancements for e-KYC
and look at the changed methodologies nations have taken
on to carry out e KYC and give data about specialized
guidelines that could be carried out to accomplish
interoperability at the level of the computerized
personality check process. These 'Know Your Client' rules
have been returned to with regards to the Suggestions
made by the Monetary Activity Team (FATF) on Enemy of
Tax evasion (AML) principles and on Fighting Funding of
Psychological warfare (CFT). The goal of KYC/AML/CFT
rules is to keep banks from being utilized, purposefully or
unexpectedly, by criminal components for tax evasion or
psychological militant funding exercises. KYC systems
additionally empower banks to be aware/comprehend
their clients and their monetary dealings better which
thus assist them with dealing with their dangers
judiciously.
· To give client upgraded security.
· It will probably utilize web to achieve paperless
personality check. · Its administration is completely
robotized and accessible on the web. It can send
information progressively.
· Any misappropriation, unlawful way of behaving can be
followed back to the individual or gatherings engaged with
such exchange or administration utilization
II. Background:
Know your client (KYC) is a term that alludes to the cycle
of overseeing clients and confirming their personalities.
The client presents this record to an association to lay out
trust between the two gatherings. Since there was no
system to check clients characters at that point, KYC was
presented in the US in 1990. The objective of KYC at that
point was to forestall fear based oppressor supporting and
cash washing through banks. The bank is the essential
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 24
financial backer in KYC. Clients are approached to finish
up a KYC record with the goal that their personalities
might be checked. To forestall illegal tax avoidance, fear
based oppressor supporting, and monetary
misrepresentation, the bank twofold checks the data given
by clients. Thus, banks do not at the present time
empower any record holder to open a record without KYC
verification. The KYC administrative work contains the
accompanying data: client data, ID verification, address
confirmation, and photo. In this present circumstance, the
possibilities of the paper getting lost were higher.
Therefore, a computerized KYC framework known as e
KYC was proposed. The client finishes up the KYC report
through the association's web application in this
technique. The data given was kept up with in
concentrated data sets. Client data can be gotten to by the
business whenever by utilizing the client id. Nonetheless,
since information is kept up with in a brought together
data set, incorporated framework defects like weak link,
information overt repetitiveness, outsider check still
remain. Moreover, information housed on a concentrated
server can be compromised /went after by programmers,
expanding the gamble of client individual information
being spilled.
III. Methodology:
The EKYC Portable Application, which utilizes Optical
Person Acknowledgment, was proposed by Yash Kumar,
Komal Sakpal, Gaurav Sharma, and Prof. A. Umbare. The
objective of this venture is to utilize AI and optical person
acknowledgment to develop an Android versatile
application (OCR). This versatile application is set up so
that clients might refresh and verify their accreditations
for banking reasons easily. Clients can refresh their KYC by
means of portable applications by snapping pictures of
their Aadhar and Skillet certifications. The Program will
utilize OCR (Optical Person Acknowledgment) to diminish
composing blunders and, thus, finish up the structure
accurately, saving time. KYC Improvement utilizing
Circulated Record Innovation is an original idea proposed
by Jose Parra Moyano and Omri Ross. The creators
propose another arrangement in light of circulated record
innovation (DLT) that brings down the expense of
monetary foundations' fundamental KYC confirmation
methodology while likewise further developing client
experience. The fundamental KYC confirmation process is
performed once for every client in the proposed
framework. Despite the number of monetary
organizations, the client that desires to work with. This
framework makes it conceivable to be productive. Gains,
cost investment funds, further developed client
experience, and expanded straightforwardness are all
essential for the onboarding system for another customer.
This paper was made by the creators to be considered. In
this work the creator proposed a conservative, quick,
secure and straightforward stage for KYC archive
confirmation for the financial framework through
Interplanetary Document Framework (IPFS) and
blockchain innovation. The proposed framework permits
the client to open am account at one bank, complete the
KYC interaction there, and create hash esteem utilizing the
IPFS organization and offer it utilizing database method.
The proposed framework can save time, cash and dull
work during the KYC cycle when somebody attempts to
open a record at different banks. The essayists are certain
that the arrangement's construction will empower them to
make a working model in a brief timeframe. It is very hard
to productively execute KYC rules across all bank offices in
India, one of the world's most populated nations. An
individual having an unnecessary number of
distinguishing proof cards might cause an issue. A plenty
of conceivable outcomes have made making one's
character in India to some degree puzzling. Is the Aadhaar
card, Skillet card, driver's permit, or visa streaked? This
paper utilizes Large Information to attempt to tackle these
issues. Jitendra Kumar and Kiran Kumar Pattanaik
recommended that ongoing KYC confirmation depends on
provided reports and can't actually look at character from
the wellspring of personality, similarly as with current
KYC check in banking. The proposed confirmation cycle
will be satisfactory to enlist the requester and fabricate a
more trustworthy and genuine business relationship. The
proposed structure and check cycle for personality
confirmation utilizing Enormous Information will make
substantial wellsprings of character confirmation more
available to monetary organizations.
A)Database Design :-
We will utilize SQLite which is an in-process library that
executes an independent, serverless, zero-setup, value-
based SQL data set motor. It is a data set, which is zero-
designed, and that implies like different data sets you
don't have to design it in your framework.
SQLite motor isn't an independent interaction like
different information bases, you can connect it statically or
powerfully according to your prerequisite with your
application. SQLite gets to its capacity documents
straightforwardly.
B)Architecture Design
The phase of the design of computer architecture and
software architecture is denoted as a high-level design.
The model in selecting the architecture should understand
all typical lists of modules, brief functionalities of each
module, their interface relations, dependencies, database
table, architecture diagram, and technology details, etc.
The assimilation testing design is carried out in a
particular phase. After the necessities of the system are
determined, the essential specifications for the hardware,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 25
software, data resources, and the information products
that will satisfy the functional requirement of the
proposed system can be the bankers. Although the
customer have, the authorized access to add/edit/delete a
document from computerized archive. The system will
authenticate the users identity.
C)Interface Design
User Interface (UI) Design emphasizes expecting what
users want to do and confirming that the interface has
features that are easy to access, understand, and uses to
smooth those actions. This interface collects the concept
from visual design, interaction design, and information
architecture
D)Module layout
Module design stage is stated as low-level design. The
intended device is fragmented into smaller gadgets or
segments and each of them is defined, this shows that the
programmer can start coding. Fig. explained the flowchart
of the complete machine, which is the low-degree design
application specs which have a complete practical good
judgment of the module in pseudo-code.
IV. FLOWCHART
V. EXPERIMENTAL RESULTS
Embracing the computerized change of the KYC cycle
permits monetary organizations to diminish functional
expenses, be more receptive to clients' requirements and
fortify their cycles. The eventual fate of KYC is as a distinct
difference with the present work serious and tedious
cycles.
· With negligible contribution from clients, imaginative
monetary organizations will use different sources to
approve the information given by the clients and create
quicker, more precise choices. The reception of monetary
information network is as of now on the ascent across the
globe. The advantages are broad, with prompt and future
upgrades to consistence activities, risk the board, client
experience, and in any event, promoting.
· The information from your clients' records can be
checked by a program to mechanize routine undertakings,
like significant level gamble evaluation, prompting speedy
endorsement of generally safe clients.
VI. CONCLUSION
We have introduced the security protecting e-KYC
approach . Our proposed conspire conveys secure and
decentralized validation and confirmation of the e-KYC
process with the client's assent authorization highlight. In
our plan, the protection of the two clients' personality
archives put away in the database is ensured key
encryption Our plan additionally permits the KYC
information to be refreshed by the information proprietor
or the client. What's more, we contrived an entrance
strategy update calculation to empower dynamic access
approval. For the assessment, we performed similar
examination between our plan and related works as far as
the calculation cost, the correspondence cost, and
execution. The exploratory outcomes showed that our
plan beats existing plans as far as execution, far reaching
KYC consistence highlights, and the adaptable access
control component. For future works, we will test a bigger
example of information in the genuine database climate
and measure the throughput of the framework in obliging
large number of e-KYC enrolment and confirmation
demands. Likewise, we will research the method to
empower bunch check of e-KYC exchanges put away in the
database with the accessible encryption highlight.
ACKNOWLEDGMENT
It has been an extraordinary chance to acquire bunches of
experience progressively project, trailed by the
information on the most proficient method to really plan
and investigate genuine project. I might want to offer my
thanks and appreciation to every one of the individuals
who gave me the chance to finish this task.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 26
VIII. Reference:
[1] Real Time KYC using Face Recognition for Banking
System , IJIRT Volume 8 Issue 9 February 2022
https://ijirt.org/master/publishedpaper/IJIRT153783
_PAPER.pdf .
[2] Somchart Fugkeaw, "Enabling Trust and privacy-
preserving e-KYC system using blockchain",IEEE
Access,vol.10,pp2169-3536,May2022.
https://ieeexplore.ieee.org/document/9770032 .
[3] A. A. Mamun, A. Al Mamun, S. R. Hasan, S. R. Hasan, M.
S. Bhuiyan, M. S. Bhuiyan, et al., "Secure and transparent
KYC for banking system using IPFS and blockchain
technology", Proc. IEEE Region Symp. (TENSYMP), pp.
348-351, Jun. 2020.
[4 ]M. Pic, G. Mahfoudi and A. Trabelsi, "Remote KYC:
Attacks and counter-measures", Proc. Eur. Intell. Secure
Information. Conf. (EISIC), pp. 126129, Nov. 2019.
[5 ] Abdulla Mamu, Mohammad Yuosuf, Shamim Kaiser,
Sheikh Riad Hasan, Md Salahuddin Bhuiyan,—Secure &
Transparant Kyc for Banking System using IPFS &
Blockchain Technology,‖ 2020 IEEE Region 10Symposium
(TENSYMP) At: Dhaka, Bangladesh
[6] Yash Kumar, Gaurav Sharma, Komal Sakpal, Prof. A.
Umbare ,—EKYC Mobile Application Using Optical
Character Recognition,‖ ijert.org, vol. 9, Issue 2, February
2020
[7] Nikolaos Kapsoulis, Alexandros Psychas, Georgios
Palaiokrassas, Achilleas Marinakis, Antonios Litke,
Theodora Varvarigou,—KYC Implementation with Smart
Contracts on a Privacy-Oriented Decentralized
Architecture, ‖ mdpi.com, February 2020
[8] M. Mohamed Rafik, Dr. T. Ananth Kumar, — Blockchain
technology For KYC Document Verification, ‖ ijics.com,
Vol. 6, Issue 3, March 2019
[9]Betty P, Mohana Geetha D,—Design and
Experimentation of Face liveliness Detection using
Temperature Gradient and Image Quality
Assessment,‖ ijrte.org, Vol. 8, Issue 3, September 2019
[10]Prince Sinha, Ayush Kaul,— Decentralized KYC
System, ‖ irjet.net, Vol. 05, Aug 2018
[11] Jose Parra-Moyano, Omri Ross,—KYC Optimization
using Distributed Ledger Technology, ‖ doi.org, December
2017
[12] Prakash c. mondal, Rupam Deb, M. N. Huda, "Know
your customer (KYC) based authentication method for
financial services through the internet", IEEE,Dec 2016.
https://ieeexplore.ieee.org/document/7860255
[13]Prakash Chandra Mondal, Rupam Deb, Mohammad
Nurul Huda,—Transaction authorization from Know Your
Customer (KYC) Information in Online Banking,‖ The 9th
International Conference on Electrical and Computer
Engineering, December 2016
[14] Anurag Soni, Reena Duggal, —Reducing Risk in KYC
for Large Indian Banks Using Big Data Analytics, ‖
International Journal of Computer Applications, Vol. 97,
July 2014
[15] Jitendra Kumar, K. K. Pattanaik, Arvind Pandey — Big
Data: A Source of KYC In Reference of Indian Banking, ‖
Skoch Development Foundation, March 2013

More Related Content

Similar to Application on Know Your Customer Authentication

IRJET - Digital KYC with Auto Form Filling
IRJET - 	  Digital KYC with Auto Form FillingIRJET - 	  Digital KYC with Auto Form Filling
IRJET - Digital KYC with Auto Form FillingIRJET Journal
 
Digital Onboarding Made Easy with the Inception of AI-Based Algorithms
Digital Onboarding Made Easy with the Inception of AI-Based AlgorithmsDigital Onboarding Made Easy with the Inception of AI-Based Algorithms
Digital Onboarding Made Easy with the Inception of AI-Based AlgorithmsSignzy
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
 
Final Year Project - Automated web based form filling using OCR.pptx
Final Year Project - Automated web based form filling using OCR.pptxFinal Year Project - Automated web based form filling using OCR.pptx
Final Year Project - Automated web based form filling using OCR.pptxswarajkakade83
 
User Documentation Verification Portal
User Documentation Verification PortalUser Documentation Verification Portal
User Documentation Verification PortalIRJET Journal
 
Seamless Customer Onboarding using Digital KYC
Seamless Customer Onboarding using Digital KYCSeamless Customer Onboarding using Digital KYC
Seamless Customer Onboarding using Digital KYCPiChainAdministrator
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity ForgeRock
 
Continuous KYC from Accenture + Quantexa
Continuous KYC from Accenture + QuantexaContinuous KYC from Accenture + Quantexa
Continuous KYC from Accenture + Quantexaaccenture
 
Boosting Your Business with KYC Analysis Software | ScoreMe Solutions
Boosting Your Business with KYC Analysis Software | ScoreMe SolutionsBoosting Your Business with KYC Analysis Software | ScoreMe Solutions
Boosting Your Business with KYC Analysis Software | ScoreMe SolutionsScoreme Solutions
 
Role of blockchain in enterprise kyc
Role of blockchain in enterprise kycRole of blockchain in enterprise kyc
Role of blockchain in enterprise kycadityakumar2080
 
IRJET- Digital Tranquillity in Cheque Transaction System
IRJET-  	  Digital Tranquillity in Cheque Transaction SystemIRJET-  	  Digital Tranquillity in Cheque Transaction System
IRJET- Digital Tranquillity in Cheque Transaction SystemIRJET Journal
 
The Series On Financial Inclusion Aml&Cft
The Series On Financial Inclusion   Aml&CftThe Series On Financial Inclusion   Aml&Cft
The Series On Financial Inclusion Aml&CftSanjay Bhargava
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfIDMERIT IDMERIT
 
Credit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmCredit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmIRJET Journal
 
AI in Banking - What it can do & its benefits | Virtue Analytics
AI in Banking - What it can do & its benefits | Virtue AnalyticsAI in Banking - What it can do & its benefits | Virtue Analytics
AI in Banking - What it can do & its benefits | Virtue AnalyticsVirtue Analytics
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET Journal
 
e-Book Transforming the external value chain and back office with Digital Ec...
e-Book Transforming the external value chain and back  office with Digital Ec...e-Book Transforming the external value chain and back  office with Digital Ec...
e-Book Transforming the external value chain and back office with Digital Ec...Pablo Junco
 
IRJET- Bank Management System
IRJET- Bank Management SystemIRJET- Bank Management System
IRJET- Bank Management SystemIRJET Journal
 

Similar to Application on Know Your Customer Authentication (20)

IRJET - Digital KYC with Auto Form Filling
IRJET - 	  Digital KYC with Auto Form FillingIRJET - 	  Digital KYC with Auto Form Filling
IRJET - Digital KYC with Auto Form Filling
 
Digital Onboarding Made Easy with the Inception of AI-Based Algorithms
Digital Onboarding Made Easy with the Inception of AI-Based AlgorithmsDigital Onboarding Made Easy with the Inception of AI-Based Algorithms
Digital Onboarding Made Easy with the Inception of AI-Based Algorithms
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
Final Year Project - Automated web based form filling using OCR.pptx
Final Year Project - Automated web based form filling using OCR.pptxFinal Year Project - Automated web based form filling using OCR.pptx
Final Year Project - Automated web based form filling using OCR.pptx
 
User Documentation Verification Portal
User Documentation Verification PortalUser Documentation Verification Portal
User Documentation Verification Portal
 
Seamless Customer Onboarding using Digital KYC
Seamless Customer Onboarding using Digital KYCSeamless Customer Onboarding using Digital KYC
Seamless Customer Onboarding using Digital KYC
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
 
Continuous KYC from Accenture + Quantexa
Continuous KYC from Accenture + QuantexaContinuous KYC from Accenture + Quantexa
Continuous KYC from Accenture + Quantexa
 
ECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) SolutionECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) Solution
 
Boosting Your Business with KYC Analysis Software | ScoreMe Solutions
Boosting Your Business with KYC Analysis Software | ScoreMe SolutionsBoosting Your Business with KYC Analysis Software | ScoreMe Solutions
Boosting Your Business with KYC Analysis Software | ScoreMe Solutions
 
Role of blockchain in enterprise kyc
Role of blockchain in enterprise kycRole of blockchain in enterprise kyc
Role of blockchain in enterprise kyc
 
IRJET- Digital Tranquillity in Cheque Transaction System
IRJET-  	  Digital Tranquillity in Cheque Transaction SystemIRJET-  	  Digital Tranquillity in Cheque Transaction System
IRJET- Digital Tranquillity in Cheque Transaction System
 
The Series On Financial Inclusion Aml&Cft
The Series On Financial Inclusion   Aml&CftThe Series On Financial Inclusion   Aml&Cft
The Series On Financial Inclusion Aml&Cft
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
Credit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmCredit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning Algorithm
 
AI in Banking - What it can do & its benefits | Virtue Analytics
AI in Banking - What it can do & its benefits | Virtue AnalyticsAI in Banking - What it can do & its benefits | Virtue Analytics
AI in Banking - What it can do & its benefits | Virtue Analytics
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
e-Book Transforming the external value chain and back office with Digital Ec...
e-Book Transforming the external value chain and back  office with Digital Ec...e-Book Transforming the external value chain and back  office with Digital Ec...
e-Book Transforming the external value chain and back office with Digital Ec...
 
IRJET- Bank Management System
IRJET- Bank Management SystemIRJET- Bank Management System
IRJET- Bank Management System
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

Application on Know Your Customer Authentication

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 23 Application on Know Your Customer Authentication Vaishali Surjuse, Leena Sawarbandhe, Akanksha Pawar, Prianshu Bhagat, Samiksha Ambekar and Purva Deshmukh Department of Computer Science & Engineering (KDK college of Engineering, Nagpur ) (KDK college road, opposite telephone exchange, Nandanvan,Nagpur-440009) ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - A significant yet minor issue in the financial business right currently is the way drawn- out and expensive the conventional Know-Your- Customer (KYC) process is. The interaction is likewise tedious for clients as need might arise to go through similar cycle for each bank or monetary foundation with which they plan to work. Individual encounters of individuals direct the bulky idea of the cycle, in this manner requesting a solid other option. Through this paper, we mean to do precisely that. We propose another arrangement in view of Circulated Record Innovation or Blockchain innovation, which will lessen the customary KYC confirmation process cost for Establishments and cut off the general course of events of the culmination of the cycle while making it smoother for the clients. Significant improvement in our answer over the traditional strategies is that the entire check process is led just a single time for every client, regardless of number of foundations the person wishes to be connected to. Likewise, since we are utilizing the Databases, check results can be safely imparted to the clients in this manner expanding straightforwardness. Following this methodology, we fostered a Proof of Idea (POC) with the Ethereum Programming interface, sites as endpoints and an android application as front office; understanding the plausibility and viability of this methodology. With everything taken into account, this approach further develops client experience, decreases cost overheads, and increments straightforwardness during the time spent onboarding a client I.INTRODUCTION: The interaction to confirm the character and different qualifications of a monetary administrations client. The Know Your Client (KYC) or Know Your Client (KYC) is an interaction to check the personality and different certifications of a monetary administrations client. The Know your Client (KYC) process helps against tax evasion and forestalls the supporting of psychological oppressor exercises. Banks were encouraged to follow specific client recognizable proof system for opening of records and checking exchanges of a dubious sort to report it to fitting power. Computerized character check is quickly developing as an immediate consequence of advanced change drives and has seen expanding development because of the Coronavirus pandemic. Account opening is moving on the web, and specialist organizations request a solid and safe strategy to confirm character and for e-KYC. The principal goals of this report is to attempt an investigation of the mechanical advancements for e-KYC and look at the changed methodologies nations have taken on to carry out e KYC and give data about specialized guidelines that could be carried out to accomplish interoperability at the level of the computerized personality check process. These 'Know Your Client' rules have been returned to with regards to the Suggestions made by the Monetary Activity Team (FATF) on Enemy of Tax evasion (AML) principles and on Fighting Funding of Psychological warfare (CFT). The goal of KYC/AML/CFT rules is to keep banks from being utilized, purposefully or unexpectedly, by criminal components for tax evasion or psychological militant funding exercises. KYC systems additionally empower banks to be aware/comprehend their clients and their monetary dealings better which thus assist them with dealing with their dangers judiciously. · To give client upgraded security. · It will probably utilize web to achieve paperless personality check. · Its administration is completely robotized and accessible on the web. It can send information progressively. · Any misappropriation, unlawful way of behaving can be followed back to the individual or gatherings engaged with such exchange or administration utilization II. Background: Know your client (KYC) is a term that alludes to the cycle of overseeing clients and confirming their personalities. The client presents this record to an association to lay out trust between the two gatherings. Since there was no system to check clients characters at that point, KYC was presented in the US in 1990. The objective of KYC at that point was to forestall fear based oppressor supporting and cash washing through banks. The bank is the essential
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 24 financial backer in KYC. Clients are approached to finish up a KYC record with the goal that their personalities might be checked. To forestall illegal tax avoidance, fear based oppressor supporting, and monetary misrepresentation, the bank twofold checks the data given by clients. Thus, banks do not at the present time empower any record holder to open a record without KYC verification. The KYC administrative work contains the accompanying data: client data, ID verification, address confirmation, and photo. In this present circumstance, the possibilities of the paper getting lost were higher. Therefore, a computerized KYC framework known as e KYC was proposed. The client finishes up the KYC report through the association's web application in this technique. The data given was kept up with in concentrated data sets. Client data can be gotten to by the business whenever by utilizing the client id. Nonetheless, since information is kept up with in a brought together data set, incorporated framework defects like weak link, information overt repetitiveness, outsider check still remain. Moreover, information housed on a concentrated server can be compromised /went after by programmers, expanding the gamble of client individual information being spilled. III. Methodology: The EKYC Portable Application, which utilizes Optical Person Acknowledgment, was proposed by Yash Kumar, Komal Sakpal, Gaurav Sharma, and Prof. A. Umbare. The objective of this venture is to utilize AI and optical person acknowledgment to develop an Android versatile application (OCR). This versatile application is set up so that clients might refresh and verify their accreditations for banking reasons easily. Clients can refresh their KYC by means of portable applications by snapping pictures of their Aadhar and Skillet certifications. The Program will utilize OCR (Optical Person Acknowledgment) to diminish composing blunders and, thus, finish up the structure accurately, saving time. KYC Improvement utilizing Circulated Record Innovation is an original idea proposed by Jose Parra Moyano and Omri Ross. The creators propose another arrangement in light of circulated record innovation (DLT) that brings down the expense of monetary foundations' fundamental KYC confirmation methodology while likewise further developing client experience. The fundamental KYC confirmation process is performed once for every client in the proposed framework. Despite the number of monetary organizations, the client that desires to work with. This framework makes it conceivable to be productive. Gains, cost investment funds, further developed client experience, and expanded straightforwardness are all essential for the onboarding system for another customer. This paper was made by the creators to be considered. In this work the creator proposed a conservative, quick, secure and straightforward stage for KYC archive confirmation for the financial framework through Interplanetary Document Framework (IPFS) and blockchain innovation. The proposed framework permits the client to open am account at one bank, complete the KYC interaction there, and create hash esteem utilizing the IPFS organization and offer it utilizing database method. The proposed framework can save time, cash and dull work during the KYC cycle when somebody attempts to open a record at different banks. The essayists are certain that the arrangement's construction will empower them to make a working model in a brief timeframe. It is very hard to productively execute KYC rules across all bank offices in India, one of the world's most populated nations. An individual having an unnecessary number of distinguishing proof cards might cause an issue. A plenty of conceivable outcomes have made making one's character in India to some degree puzzling. Is the Aadhaar card, Skillet card, driver's permit, or visa streaked? This paper utilizes Large Information to attempt to tackle these issues. Jitendra Kumar and Kiran Kumar Pattanaik recommended that ongoing KYC confirmation depends on provided reports and can't actually look at character from the wellspring of personality, similarly as with current KYC check in banking. The proposed confirmation cycle will be satisfactory to enlist the requester and fabricate a more trustworthy and genuine business relationship. The proposed structure and check cycle for personality confirmation utilizing Enormous Information will make substantial wellsprings of character confirmation more available to monetary organizations. A)Database Design :- We will utilize SQLite which is an in-process library that executes an independent, serverless, zero-setup, value- based SQL data set motor. It is a data set, which is zero- designed, and that implies like different data sets you don't have to design it in your framework. SQLite motor isn't an independent interaction like different information bases, you can connect it statically or powerfully according to your prerequisite with your application. SQLite gets to its capacity documents straightforwardly. B)Architecture Design The phase of the design of computer architecture and software architecture is denoted as a high-level design. The model in selecting the architecture should understand all typical lists of modules, brief functionalities of each module, their interface relations, dependencies, database table, architecture diagram, and technology details, etc. The assimilation testing design is carried out in a particular phase. After the necessities of the system are determined, the essential specifications for the hardware,
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 25 software, data resources, and the information products that will satisfy the functional requirement of the proposed system can be the bankers. Although the customer have, the authorized access to add/edit/delete a document from computerized archive. The system will authenticate the users identity. C)Interface Design User Interface (UI) Design emphasizes expecting what users want to do and confirming that the interface has features that are easy to access, understand, and uses to smooth those actions. This interface collects the concept from visual design, interaction design, and information architecture D)Module layout Module design stage is stated as low-level design. The intended device is fragmented into smaller gadgets or segments and each of them is defined, this shows that the programmer can start coding. Fig. explained the flowchart of the complete machine, which is the low-degree design application specs which have a complete practical good judgment of the module in pseudo-code. IV. FLOWCHART V. EXPERIMENTAL RESULTS Embracing the computerized change of the KYC cycle permits monetary organizations to diminish functional expenses, be more receptive to clients' requirements and fortify their cycles. The eventual fate of KYC is as a distinct difference with the present work serious and tedious cycles. · With negligible contribution from clients, imaginative monetary organizations will use different sources to approve the information given by the clients and create quicker, more precise choices. The reception of monetary information network is as of now on the ascent across the globe. The advantages are broad, with prompt and future upgrades to consistence activities, risk the board, client experience, and in any event, promoting. · The information from your clients' records can be checked by a program to mechanize routine undertakings, like significant level gamble evaluation, prompting speedy endorsement of generally safe clients. VI. CONCLUSION We have introduced the security protecting e-KYC approach . Our proposed conspire conveys secure and decentralized validation and confirmation of the e-KYC process with the client's assent authorization highlight. In our plan, the protection of the two clients' personality archives put away in the database is ensured key encryption Our plan additionally permits the KYC information to be refreshed by the information proprietor or the client. What's more, we contrived an entrance strategy update calculation to empower dynamic access approval. For the assessment, we performed similar examination between our plan and related works as far as the calculation cost, the correspondence cost, and execution. The exploratory outcomes showed that our plan beats existing plans as far as execution, far reaching KYC consistence highlights, and the adaptable access control component. For future works, we will test a bigger example of information in the genuine database climate and measure the throughput of the framework in obliging large number of e-KYC enrolment and confirmation demands. Likewise, we will research the method to empower bunch check of e-KYC exchanges put away in the database with the accessible encryption highlight. ACKNOWLEDGMENT It has been an extraordinary chance to acquire bunches of experience progressively project, trailed by the information on the most proficient method to really plan and investigate genuine project. I might want to offer my thanks and appreciation to every one of the individuals who gave me the chance to finish this task.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 26 VIII. Reference: [1] Real Time KYC using Face Recognition for Banking System , IJIRT Volume 8 Issue 9 February 2022 https://ijirt.org/master/publishedpaper/IJIRT153783 _PAPER.pdf . [2] Somchart Fugkeaw, "Enabling Trust and privacy- preserving e-KYC system using blockchain",IEEE Access,vol.10,pp2169-3536,May2022. https://ieeexplore.ieee.org/document/9770032 . [3] A. A. Mamun, A. Al Mamun, S. R. Hasan, S. R. Hasan, M. S. Bhuiyan, M. S. Bhuiyan, et al., "Secure and transparent KYC for banking system using IPFS and blockchain technology", Proc. IEEE Region Symp. (TENSYMP), pp. 348-351, Jun. 2020. [4 ]M. Pic, G. Mahfoudi and A. Trabelsi, "Remote KYC: Attacks and counter-measures", Proc. Eur. Intell. Secure Information. Conf. (EISIC), pp. 126129, Nov. 2019. [5 ] Abdulla Mamu, Mohammad Yuosuf, Shamim Kaiser, Sheikh Riad Hasan, Md Salahuddin Bhuiyan,—Secure & Transparant Kyc for Banking System using IPFS & Blockchain Technology,‖ 2020 IEEE Region 10Symposium (TENSYMP) At: Dhaka, Bangladesh [6] Yash Kumar, Gaurav Sharma, Komal Sakpal, Prof. A. Umbare ,—EKYC Mobile Application Using Optical Character Recognition,‖ ijert.org, vol. 9, Issue 2, February 2020 [7] Nikolaos Kapsoulis, Alexandros Psychas, Georgios Palaiokrassas, Achilleas Marinakis, Antonios Litke, Theodora Varvarigou,—KYC Implementation with Smart Contracts on a Privacy-Oriented Decentralized Architecture, ‖ mdpi.com, February 2020 [8] M. Mohamed Rafik, Dr. T. Ananth Kumar, — Blockchain technology For KYC Document Verification, ‖ ijics.com, Vol. 6, Issue 3, March 2019 [9]Betty P, Mohana Geetha D,—Design and Experimentation of Face liveliness Detection using Temperature Gradient and Image Quality Assessment,‖ ijrte.org, Vol. 8, Issue 3, September 2019 [10]Prince Sinha, Ayush Kaul,— Decentralized KYC System, ‖ irjet.net, Vol. 05, Aug 2018 [11] Jose Parra-Moyano, Omri Ross,—KYC Optimization using Distributed Ledger Technology, ‖ doi.org, December 2017 [12] Prakash c. mondal, Rupam Deb, M. N. Huda, "Know your customer (KYC) based authentication method for financial services through the internet", IEEE,Dec 2016. https://ieeexplore.ieee.org/document/7860255 [13]Prakash Chandra Mondal, Rupam Deb, Mohammad Nurul Huda,—Transaction authorization from Know Your Customer (KYC) Information in Online Banking,‖ The 9th International Conference on Electrical and Computer Engineering, December 2016 [14] Anurag Soni, Reena Duggal, —Reducing Risk in KYC for Large Indian Banks Using Big Data Analytics, ‖ International Journal of Computer Applications, Vol. 97, July 2014 [15] Jitendra Kumar, K. K. Pattanaik, Arvind Pandey — Big Data: A Source of KYC In Reference of Indian Banking, ‖ Skoch Development Foundation, March 2013