Abstract: The present disclosure provides a method for performing video KYC based authentication of a user (102) for one or more financial operations in real-time. The method includes a first step of receiving a first set of data associated with the user (102) in real-time. In addition, the method includes another step of initiating a video conference between the user (102) and an administrator (106) associated with a video KYC based authentication system (110) in real-time. Further, the method includes yet another step of providing at least one question of a set of questions to the user (102) in real-time. Furthermore, the method includes yet another step of authenticating the user (102) with facilitation of one or more artificial intelligence based checks. Moreover, the method includes yet another step of performing a set of actions after performing authentication of the user (102). To be Published with figure 1.
Claims:We Claim
1. A computer system comprising:
one or more processors; and
a memory coupled to the one or more processors, the memory for storing instructions which, when executed by the one or more processors, cause the one or more processors to perform a method for performing video KYC based authentication of a user (102) for one or more financial operations in real-time, the method comprising:
receiving, at a video KYC based authentication system (110), a first set of data associated with the user (102) in real-time, wherein the first set of data is received through a communication device (104) of the user (102), wherein the first set of data is associated with one or more identification documents of the user (102), wherein the first set of data is received in one or more input formats;
initiating, at the video KYC based authentication system (110), a video conference between the user (102) and an administrator (106) associated with the video KYC based authentication system (110) in real-time, wherein the video conference is initiated by triggering camera of the communication device (104) of the user (102), wherein the video conference is initiated after authentication of the first set of data of the user (102), wherein the video conference is initiated in vernacular language of the user (102), wherein the video conference is initiated for allowing the user (102) to present a set of documents of the one or more identification documents to the administrator (106) through the video conference in real-time, wherein the video conference is initiated to perform real-time authentication of the set of documents of the one or more identification documents of the user (102);
providing, at the video KYC based authentication system (110), at least one question of a set of questions to the user (102) in real-time, wherein the at least one question of the set of questions is provided to the user (102) for analyzing liveliness of the user (102), wherein the at least one question of the set of questions is provided to the user (102) based on one or more parameters, wherein the at least one question of the set of questions is at least one of pre-defined question or automated question;
authenticating, at the video KYC based authentication system (110), the user (102) with facilitation of one or more artificial intelligence based checks, wherein the authentication of the user (102) is performed after successful verification of answers to the set of questions provided by the user (102), wherein the authentication of the user (102) is performed using one or more artificial intelligence based algorithms; and
performing a set of actions, at the video KYC based authentication system (110), after performing authentication of the user (102), wherein the set of actions are performed by the video KYC based authentication system (110) in real-time, wherein the set of actions comprising at least one of acceptance or rejection of application of the user (102) for performing the one or more financial operations.
2. The computer system as recited in claim 1, wherein the one or more identification documents of the user (102) comprising one or more government identification documents of the user (102), one or more address verification documents of the user (102) and valid GST certificate of a business owned by the user (102), wherein the one or more government identification documents of the user (102) comprising Aadhaar card of the user (102), pan card of the user (102), passport of the user (102), birth certificate of the user (102), driving license of the user (102), social security card of the user (102), society welfare card of the user (102), income tax card of the user (102), ration card of the user (102), domicile card of the user (102) and voter ID card of the user (102), wherein the address verification documents of the user (102) comprising electricity bill of the user (102), water consumption bill of the user (102), gas consumption bill of the user (102), rent agreement of the user (102) and telephone bill of the user (102).
3. The computer system as recited in claim 1, wherein the one or more input formats comprising one or more multimedia formats of the first set of data associated with the user (102), wherein the one or more multimedia formats comprising image, video, audio, text and animation.
4. The computer system as recited in claim 1, further comprising queueing, at the video KYC based authentication system (110), the user (102) in a queue, wherein the queueing is performed before initiation of the video conference between the user (102) and the administrator (106) associated with the video KYC based authentication system (110) in real-time, wherein the queueing is performed based on availability of either the user (102) or the administrator (106) associated with the video KYC based authentication system (110).
5. The computer system as recited in claim 1, wherein the one or more parameters comprising sentiment analysis of the user (102), behavior analysis of the user (102), and information received from the one or more identification documents of the user (102).
6. The computer system as recited in claim 1, wherein the one or more artificial intelligence based checks comprising geo location checks, artificial intelligence based face match, cross matching details of the user (102), and forgery check, wherein the geo location checks is performed by fetching location data from the communication device (104) of the user (102).
7. The computer system as recited in claim 1, further comprising performing verification, at the video KYC based authentication system (110), of one or more financial accounts associated with the user (102), wherein the verification of the one or more financial accounts of the user (102) is performed with facilitation of information received from the one or more identification documents of the user (102).
8. The computer system as recited in claim 1, further comprising performing detecting, at the video KYC based authentication system (110), usage of VPN by the user (102), wherein the detection of VPN is performed through checking of IP address coming through the communication device (104) of the user (102), wherein the detection is performed before initiation of the video conference between the user (102) and the administrator (106) associated with the video KYC based authentication system (110) in real-time.
9. The computer system as recited in claim 1, further comprising storing, at the video KYC based authentication system (110), information of the user (102) along with timestamp information, wherein the information of the user (102) is stored at a database (116) associated with the video KYC based authentication system (110), wherein the storing is performed in real-time.
10. The computer system as recited in claim 1, further comprising assigning, at the video KYC based authentication system (110), a confidence score to the user (102), wherein the confidence score increases after each successful check of the one or more artificial intelligence based checks, wherein the confidence score facilitates in performing the set of actions by the video KYC based authentication system (110).
, Description:METHOD FOR PERFORMING VIDEO KYC BASED AUTHENTICATION OF USERS FOR FINANCIAL OPERATIONS
TECHNICAL FIELD
[0001] The present disclosure relates to the field of authentication. More particularly, the present disclosure relates to a method for performing video KYC based authentication of users.
BACKGROUND
[0002] Financial institutions such as banks are companies engaged in business of monetary transactions. In addition, financial institutions lend money to common people and charge interest on their money. Further, financial institutions lend the money to the people in case of an emergency situation or based on the need of the people. Furthermore, the people repay the complete principal amount along with the interest charged by the financial institution. Moreover, financial institutions lend money to the people after performing verification that the people will be able to repay the money back to the financial institution. Also, financial institutions select methods such as in person verification to perform the verification of people. However, in person verification is a manual and very time consuming verification process. In addition, in person verification is paper based process with high onboarding turnaround time. Further, in person verification has a high onboarding cost. Furthermore, in person verification is prone to error with a lot of process inconsistencies.
OBJECT OF THE DISCLOSURE
[0003] A primary object of the present disclosure is to provide a method for performing video KYC based authentication of users in real-time.
[0004] Another object of the present disclosure is to perform the video KYC based authentication of the users by checking geo location of the users.
[0005] Yet another object of the present disclosure is to perform the video KYC based authentication of the users upon detection of valid IP address of the users.
[0006] Yet another object of the present disclosure is to perform real-time liveliness check of the user to perform the video KYC based authentication.
[0007] Yet another object of the present disclosure is to perform encryption and video compression to perform the video KYC based authentication of the users.
[0008] Yet another object of the present disclosure is to perform verification of the one or more users in real-time.
SUMMARY
[0009] In an aspect, the present disclosure provides a computer system. The computer system includes one or more processors. The computer system includes a memory. The memory is coupled to the one or more processors. The memory stores instructions. The instructions are executed by the one or more processors. The execution of instructions causes the one or more processors to perform a method for performing video KYC based authentication of a user for one or more financial operations in real-time. The method includes a first step of receiving a first set of data associated with the user in real-time. In addition, the method includes another step of initiating a video conference between the user and an administrator associated with the video KYC based authentication system in real-time. Further, the method includes another step of providing at least one question of a set of questions to the user in real-time. Furthermore, the method includes another step of authenticating the user with facilitation of one or more artificial intelligence based checks. Moreover, the method includes another step of performing a set of actions after performing authentication of the user. The first set of data is received through a communication device of the user. The first set of data is associated with one or more identification documents of the user. The first set of data is received in one or more input formats. The video conference is initiated by triggering camera of the communication device of the user. The video conference is initiated after authentication of the first set of data of the user. The video conference is initiated in vernacular language of the user. The video conference is initiated for allowing the user to present a set of documents of the one or more identification documents to the administrator through the video conference in real-time. The video conference is initiated to perform real-time authentication of the set of documents of the one or more identification documents of the user. The at least one question of the set of questions is provided to the user for analyzing liveliness of the user. The at least one question of the set of questions is provided to the user based on one or more parameters. The at least one question of the set of questions is at least one of pre-defined question or automated question. The authentication of the user is performed after successful verification of answers to the set of questions provided by the user. The authentication of the user is performed using one or more artificial intelligence based algorithms. The set of actions are performed by the video KYC based authentication system in real-time. The set of actions include at least one of acceptance or rejection of application of the user for performing the one or more financial operations.
STATEMENT OF THE DISCLOSURE
[0010] The present disclosure provides a computer system. The computer system includes one or more processors. The computer system includes a memory. The memory is coupled to the one or more processors. The memory stores instructions. The instructions are executed by the one or more processors. The execution of instructions causes the one or more processors to perform a method for performing video KYC based authentication of a user for one or more financial operations in real-time. The method includes a first step of receiving a first set of data associated with the user in real-time. In addition, the method includes another step of initiating a video conference between the user and an administrator associated with the video KYC based authentication system in real-time. Further, the method includes another step of providing at least one question of a set of questions to the user in real-time. Furthermore, the method includes another step of authenticating the user with facilitation of one or more artificial intelligence based checks. Moreover, the method includes another step of performing a set of actions after performing authentication of the user. The first set of data is received through a communication device of the user. The first set of data is associated with one or more identification documents of the user. The first set of data is received in one or more input formats. The video conference is initiated by triggering camera of the communication device of the user. The video conference is initiated after authentication of the first set of data of the user. The video conference is initiated in vernacular language of the user. The video conference is initiated for allowing the user to present a set of documents of the one or more identification documents to the administrator through the video conference in real-time. The video conference is initiated to perform real-time authentication of the set of documents of the one or more identification documents of the user. The at least one question of the set of questions is provided to the user for analyzing liveliness of the user. The at least one question of the set of questions is provided to the user based on one or more parameters. The at least one question of the set of questions is at least one of pre-defined question or automated question. The authentication of the user is performed after successful verification of answers to the set of questions provided by the user. The authentication of the user is performed using one or more artificial intelligence based algorithms. The set of actions are performed by the video KYC based authentication system in real-time. The set of actions include at least one of acceptance or rejection of application of the user for performing the one or more financial operations.
BRIEF DESCRIPTION OF FIGURES
[0011] Having thus described the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
[0012] FIG. 1 illustrates a general overview of an interactive computing environment for performing video KYC based authentication of a user in real-time, in accordance with various embodiments of the present disclosure;
[0013] FIG. 2 illustrates a block diagram of a method for performing the video KYC based authentication of the user in real-time, in accordance with various embodiments of the present disclosure; and
[0014] FIG. 3 illustrates a block diagram of a communication device, in accordance with various embodiments of the present disclosure.
[0015] It should be noted that the accompanying figures are intended to present illustrations of exemplary embodiments of the present disclosure. These figures are not intended to limit the scope of the present disclosure. It should also be noted that accompanying figures are not necessarily drawn to scale.
DETAILED DESCRIPTION
[0016] FIG. 1 illustrates a general overview of an interactive computing environment 100 for performing video KYC based authentication of a user 102 in real-time, in accordance with various embodiments of the present disclosure. FIG. 2 illustrates a block diagram 200 of a method for performing the video KYC based authentication of the user 102 in real-time, in accordance with various embodiments of the present disclosure. The interactive computing environment 100 includes the user 102, a communication device 104, an administrator 106, a computing device 108, and a communication network 112. In addition, the interactive computing environment 100 includes a video KYC based authentication system 110, a server 114 and a database 116.
[0017] The term video KYC based authentication refers to performing Know your customer authentication of the user 102 based on video of the user 102. In general, KYC is a process by which financial institutions (such as banks) obtain information about identity and address of customers. In addition, KYC process helps to ensure that services of the financial institutions are not misused. Also, KYC process is to be completed by the financial institutions while opening accounts and periodically update the same.
[0018] The interactive computing environment 100 includes the user 102. The user 102 is any person that wants to access one or more financial services offered by a financial institution. In an embodiment of the present disclosure, the user 102 is any person staying in any indoor or outdoor location. In another embodiment of the present disclosure, the user 102 is any person that wants to connect with the financial institution. In an example, the one or more financial services include opening of savings account, opening of current account, issue of debit cards, issue of credit cards, application of business loans and the like.
[0019] The interactive computing environment 100 includes the communication device 104. The communication device 104 is associated with the user 102. The communication device 104 is in switch on state. The user 102 utilizes the communication device 104 to connect with the video KYC based authentication system 110. In an embodiment of the present disclosure, the user 102 utilizes the communication device 104 to provide application for the one or more financial services to the video KYC based authentication system 110. In an embodiment of the present disclosure, the communication device 104 is any smart device that mainly includes a display, camera and network connectivity. In an embodiment of the present disclosure, the communication device 104 is a portable communication device. In an example, the portable communication device includes laptop, smart phone, smart watch, tablet, PDA and the like. In another embodiment of the present disclosure, the communication device 104 is a fixed communication device. In an example, the fixed communication device includes a desktop, a workstation PC and the like.
[0020] The communication device 104 performs computing operations based on a suitable operating system installed inside the communication device 104. In general, operating system is system software that manages computer hardware and software resources and provides common services for computer programs. In addition, the operating system acts as an interface for software installed inside the communication device 104 to interact with hardware components of the communication device 104. In an embodiment of the present disclosure, the operating system installed inside the communication device 104 is a mobile operating system. In an embodiment of the present disclosure, the communication device 104 performs computing operations based on any suitable operating system designed for portable communication device. In an example, the mobile operating system includes but may not be limited to Windows operating system from Microsoft, Android operating system from Google, iOS operating system from Apple, Symbian operating system from Nokia, Bada operating system from Samsung Electronics and BlackBerry operating system from BlackBerry. However, the operating system is not limited to above mentioned operating systems. In an embodiment of the present disclosure, the communication device 104 operates on any version of particular operating system of above mentioned operating systems.
[0021] In another embodiment of the present disclosure, the communication device 104 performs computing operations based on any suitable operating system designed for fixed communication device. In an example, the operating system installed inside the communication device 104 is Windows from Microsoft. In another example, the operating system installed inside the communication device 104 is macOS from Apple. In yet another example, the operating system installed inside the communication device 104 is Linux based operating system. In yet another example, the operating system installed inside the communication device 104 may be one of UNIX, Kali Linux, and the like. However, the operating system is not limited to above mentioned operating systems.
[0022] In an embodiment of the present disclosure, the communication device 104 operates on any version of Windows operating system. In another embodiment of the present disclosure, the communication device 104 operates on any version of Mac operating system. In yet another embodiment of the present disclosure, the communication device 104 operates on any version of Linux operating system. In yet another embodiment of the present disclosure, the communication device 104 operates on any version of particular operating system of the above mentioned operating systems.
[0023] The interactive computing environment 100 includes the administrator 106. The administrator 106 is any person that is associated with the video KYC based authentication system 110. In an embodiment of the present disclosure, the administrator 106 is a person that wants to perform the video KYC based authentication of the user 102 in real-time. In another embodiment of the present disclosure, the administrator 106 is any person that wants to perform the video KYC based authentication of the user 102 from remote location. In yet another embodiment of the present disclosure, the administrator 106 is a person that operates the video KYC based authentication system 110. In yet another embodiment of the present disclosure, the administrator 106 is any person responsible for upkeep and maintenance of the video KYC based authentication system 110. In yet another embodiment of the present disclosure, the administrator 106 is any person capable to troubleshoot the video KYC based authentication system 110 in case of any error or bugs.
[0024] The interactive computing environment 100 includes the computing device 108. The computing device 108 is associated with the administrator 106. The computing device 108 is in switch on state. The administrator 106 utilizes the computing device 108 to connect to the video KYC based authentication system 110. In an embodiment of the present disclosure, the computing device 108 is any smart device that mainly includes a display, camera and network connectivity. In an embodiment of the present disclosure, the computing device 108 is a portable computing device. In an example, the portable computing device includes laptop, smart phone, smart watch, tablet, PDA and the like. In another embodiment of the present disclosure, the computing device 108 is a fixed computing device. In an example, the fixed computing device includes a desktop, a workstation PC and the like.
[0025] The computing device 108 performs computing operations based on a suitable operating system installed inside the computing device 108. In general, operating system is system software that manages computer hardware and software resources and provides common services for computer programs. In addition, the operating system acts as an interface for software installed inside the computing device 108 to interact with hardware components of the computing device 108. In an embodiment of the present disclosure, the operating system installed inside the computing device 108 is a mobile operating system. In an embodiment of the present disclosure, the computing device 108 performs computing operations based on any suitable operating system designed for portable computing device. In an example, the mobile operating system includes but may not be limited to Windows operating system from Microsoft, Android operating system from Google, iOS operating system from Apple, Symbian operating system from Nokia, Bada operating system from Samsung Electronics and BlackBerry operating system from BlackBerry. However, the operating system is not limited to above mentioned operating systems. In an embodiment of the present disclosure, the computing device 108 operates on any version of particular operating system of above mentioned operating systems.
[0026] In another embodiment of the present disclosure, the computing device 108 performs computing operations based on any suitable operating system designed for fixed computing device. In an example, the operating system installed inside the computing device 108 is Windows from Microsoft. In another example, the operating system installed inside the computing device 108 is macOS from Apple. In yet another example, the operating system installed inside the computing device 108 is Linux based operating system. In yet another example, the operating system installed inside the computing device 108 may be one of UNIX, Kali Linux, and the like. However, the operating system is not limited to above mentioned operating systems.
[0027] In an embodiment of the present disclosure, the computing device 108 operates on any version of Windows operating system. In another embodiment of the present disclosure, the computing device 108 operates on any version of Mac operating system. In yet another embodiment of the present disclosure, the computing device 108 operates on any version of Linux operating system. In yet another embodiment of the present disclosure, the computing device 108 operates on any version of particular operating system of the above mentioned operating systems.
[0028] The communication device 104 is connected to the communication network 112. In addition, the computing device 108 is connected to the communication network 112. The communication network 112 provides medium to the communication device 104 and the computing device 108 to connect to the video KYC based authentication system 110. Also, the communication network 112 provides network connectivity to the communication device 104 and the computing device 108. In an example, the communication network 112 uses protocol to connect the communication device 104 and the computing device 108 to the video KYC based authentication system 110. The communication network 112 connects the communication device 104 and the computing device 108 to the video KYC based authentication system 110 using a plurality of methods. The plurality of methods used to provide network connectivity to the communication device 104 and the computing device 108 includes 2G, 3G, 4G, 5G, Wifi and the like.
[0029] In an embodiment of the present disclosure, the communication network 112 is any type of network that provides internet connectivity to the communication device 104 and the computing device 108. In an embodiment of the present disclosure, the communication network 112 is a wireless mobile network. In another embodiment of the present disclosure, the communication network 112 is a wired network with finite bandwidth. In yet another embodiment of the present disclosure, the communication network 112 is a combination of the wireless and the wired network for optimum throughput of data transmission. In yet another embodiment of the present disclosure, the communication network 112 is an optical fiber high bandwidth network that enables high data rate with negligible connection drops.
[0030] In an example, the communication network 112 includes but may not be limited to local area network, metropolitan area network, wide area network, and virtual private network. In an embodiment of the present disclosure, the communication device 104 and the computing device 108 are connected to the video KYC based authentication system 110 using Local Area Network (LAN). In another embodiment of the present disclosure, the communication device 104 and the computing device 108 are connected to the video KYC based authentication system 110 using Metropolitan Area Network (MAN). In yet another embodiment of the present disclosure, the communication device 104 and the computing device 108 are connected with the video KYC based authentication system 110 using Wide Area Network (WAN).
[0031] The communication network 112 allows the user 102 to use the communication device 104 to connect to the video KYC based authentication system 110. In addition, the communication network 112 allows the administrator 106 to use the computing device 108 to connect to the video KYC based authentication system 110. The video KYC based authentication system 110 performs the video KYC based authentication of the user 102 to perform one or more financial operations in real time. In an embodiment of the present disclosure, the one or more financial operations include but may not be limited to opening of savings account, opening of current account, issue of debit cards, issue of credit cards, and application of business loans.
[0032] In an embodiment of the present disclosure, the video KYC based authentication system 110 is installed in the computing device 108. In another embodiment of the present disclosure, the video KYC based authentication system 110 is accessed as web application in the computing device 108 of the administrator 106. In yet another embodiment of the present disclosure, the video KYC based authentication system 110 is installed at the server 114. In yet another embodiment of the present disclosure, the video KYC based authentication system 110 is accessed as mobile application in the computing device 108 of the administrator 106.
[0033] In an embodiment of the present disclosure, the video KYC based authentication system 110 is installed in the communication device 104. In an embodiment of the present disclosure, the video KYC based authentication system 110 is installed as mobile application in the communication device 104 of the user 102. In another embodiment of the present disclosure, the video KYC based authentication system 110 is installed as web based application in the communication device 104 of the user 102. In yet another embodiment of the present disclosure, the video based KYC authentication system 110 is installed as desktop application in the communication device 104 of the user 102.
[0034] The video KYC based authentication system 110 receives a first set of data associated with the user 102 in real-time. The video KYC based authentication system 110 receives the first set of data through the communication device 104 of the user 102. The first set of data is associated with one or more identification documents of the user 102. The first set of data is received in one or more input formats. The one or more identification documents of the user 102 includes at least one of one or more government identification documents of the user 102, one or more address verification documents of the user 102 or valid GST certificate of a business owned by the user 102.
[0035] The one or more government identification documents of the user 102 includes Aadhaar card of the user 102, pan card of the user 102, passport of the user 102, birth certificate of the user 102, and driving license of the user 102. In addition, one or more government identification documents of the user 102 includes the social security card of the user 102, society welfare card of the user 102, income tax card of the user 102, ration card of the user 102, domicile card of the user 102, voter ID card of the user 102, and the like. The address verification documents of the user 102 includes electricity bill of the user 102, water consumption bill of the user 102, gas consumption bill of the user 102, rent agreement of the user 102, telephone bill of the user 102 and the like.
[0036] The one or more input formats incudes one or more multimedia formats of the first set of data associated with the user 102. The one or more multimedia formats include image, video, audio, text and animation. In an example, the user 102 enters the Aadhar card number of the user 102 in the video KYC based authentication system 110 using the communication device 104. In another example, the user 102 scans driving license of the user 102 using the communication device 104. In yet another example, the user 102 clicks a picture of passport of the user 102 and uploads the picture to the video KYC based authentication system 110 using the communication device 104.
[0037] In an embodiment of the present disclosure, the video KYC based authentication system 110 receives the first set of data to perform eKYC of the user 102. In general, eKYC stands for electronic KYC. In addition, eKYC is a paperless Know Your Customer (KYC) authentication process in which identity and address of a subscriber are verified electronically through Aadhaar authentication. In an embodiment of the present disclosure, the video KYC based authentication system 110 performs eKYC of the user 102 in real-time.
[0038] The video KYC based authentication system 110 initiates a video conference between the user 102 and the administrator 106 associated with the video KYC based authentication system 110 in real-time. In an embodiment of the present disclosure, the video KYC based authentication system 110 initiates the video conference after performing eKYC of the user 102. In another embodiment of the present disclosure, the video KYC based authentication system 110 initiates the video conference without performing eKYC of the user 102. The video KYC based authentication system 110 initiates the video conference by triggering camera of the communication device 104 of the user 102. The video KYC based authentication system 110 initiates the video conference after authentication of the first set of data of the user 102.
[0039] The video KYC based authentication system 110 initiates the video conference in vernacular language of the user 102. In an example, the video KYC based authentication system 110 initiates the video conference in English language if vernacular language of the user 102 is English. In another example, the video KYC based authentication system 110 initiates the video conference in Hindi language if vernacular language of the user 102 is Hindi. In yet another example, the video KYC based authentication system 110 initiates the video conference in Punjabi language if vernacular language of the user 102 is Punjabi.
[0040] The video KYC based authentication system 110 connects the user 102 with the administrator 106 through the communication network 112. In an embodiment of the present disclosure, the video KYC based authentication system 110 asks the user 102 to show or provide a set of documents to the administrator 106 or the communication device 104. In another embodiment of the present disclosure, the administrator 106 asks the user 102 to show or provide the set of documents of the one or more identification documents to perform real-time authentication of the user 102.
[0041] In an embodiment of the present disclosure, the video KYC based authentication system 110 decides the set of documents to be provided by the user 102 in real-time based on the financial operation. In another embodiment of the present disclosure, the administrator 106 decides the set of documents to be provided by the user 102 in real-time based on the financial operation. The video KYC based authentication system 110 initiates the video conference to allow the user 102 to present set of document of the one or more identification documents to the administrator 106 through the video conference in real-time. The video KYC based authentication system 110 initiates the video conference to perform real-time authentication of the set of documents of the one or more identification documents of the user 102. In an embodiment of the present disclosure, the video KYC based authentication system 110 initiates the video conference to capture images and video streams of the set of documents of the one or more identification documents of the user 102.
[0042] The video KYC based authentication system 110 provides at least one question of a set of questions to the user 102 in real-time. The video KYC based authentication system 110 provides the at least one question of the set of questions to the user 102 to analyze liveliness of the user 102. The video KYC based authentication system 110 provides the at least one question of the set of questions to the user 102 based on one or more parameters. In an embodiment of the present disclosure, the at least one question of the set of questions is one of pre-defined question. In another embodiment of the present disclosure, the at least one question of the set of questions is one of an automated question. In addition, the one or more parameters include but may not be limited to sentiment analysis of the user 102, behavior analysis of the user 102, and information received from the one or more identification documents of the user 102. In an example, the video KYC based authentication system 110 generates the automated question based on graduation information received from mark sheet of the user 102.
[0043] The video KYC based authentication system 110 authenticates the user 102 with facilitation of one or more artificial intelligence based checks. The video KYC based authentication system 110 performs the authentication of the user 102 after successful verification of answers to the set of questions provided by the user 102. The video KYC based authentication system 110 performs the authentication of the user 102 using one or more artificial intelligence based algorithms. The one or more artificial intelligence based checks include geo location checks, artificial intelligence based face match, cross matching details of the user 102, and forgery check. However, the one or more artificial intelligence based checks are not limited to above mentioned checks. In an embodiment of the present disclosure, the video KYC based authentication system 110 performs the geo location checks by fetching location data from the communication device 104 of the user 102.
[0044] In an embodiment of the present disclosure, the video KYC based authentication system 110 uses optical character recognition technique to receive the first set of data. In general, optical character recognition is electronic or mechanical conversion of images of typed, handwritten or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene-photo or from subtitle text superimposed on an image. In an embodiment of the present disclosure, the video KYC based authentication system 110 performs the one or more artificial intelligence based checks using image forensics. In general, image forensics aims at validating authenticity of images by recovering information about history or past (such as identification of imaging device that captured image, detection of traces of forgeries, and the like) of images.
[0045] In an embodiment of the present disclosure, the video KYC based authentication system 110 uses image of the face of the user 102 from the first set of data, image of face of the user 102 from the set of documents of the one or more identification documents, and artificial intelligence based face recognition techniques to perform real-time authentication of the user 102.
[0046] In an embodiment of the present disclosure, the video KYC based authentication system 110 performs live video capturing and reorientation of the video. In an embodiment of the present disclosure, the video KYC based authentication system 110 initiates a bi-directional video conference between the user 102 and the administrator 106 using the communication network 112. In an embodiment of the present disclosure, the video KYC based authentication system 110 asks for consent of the user 102 before initiation of the video conference between the user 102 and the administrator 106. In an embodiment of the present disclosure, the video KYC based authentication system 110 performs blurriness correction on images or video streams captured by the video KYC based authentication system 110.
[0047] In an embodiment of the present disclosure, the video KYC based authentication system 110 enables optional chat functionality between the user 102 and the administrator 106. In addition, the video KYC based authentication system 110 enables the optional chat functionality in vernacular language of the user 102. In an embodiment of the present disclosure, the video KYC based authentication system 110 enables the optional chat functionality during ongoing video conference between the user 102 and the administrator 106.
[0048] In an embodiment of the present disclosure, the video KYC based authentication system 110 performs video compression to save disk space during storage and retrieval of data and information. In an embodiment of the present disclosure, the video KYC based authentication system 110 performs encryption and decryption to ensure security during the video conference between the user 102 and the administrator 106.
[0049] The video KYC based authentication system 110 performs a set of actions. The video KYC based authentication system 110 performs the set of actions after performing authentication of the user 102. The video KYC based authentication system 110 performs the set of actions in real-time. The set of actions include at least one of acceptance or rejection of application of the user 102 for performing the one or more financial operations. In an embodiment of the present disclosure, the set of actions include acceptance of application of the user 102 for performing the one or more financial operations upon successful authentication of the user 102 in real-time. In another embodiment of the present disclosure, the set of actions include rejection of application of the user 102 for performing the one or more operations upon unsuccessful authentication of the user 102 in real-time.
[0050] The video KYC based authentication system 110 queues the user 102 in a queue. The video KYC based authentication system 110 performs the queueing before initiation of the video conference between the user 102 and the administrator 106 associated with the video KYC based authentication system 110 in real-time. The video KYC based authentication system 110 performs the queueing based on availability of either the user 102 or the administrator 106 associated with the video KYC based authentication system 110.
[0051] In an example, the video KYC based authentication system 110 initiates the video conference if both the user 102 and the administrator 106 are available. Further, let us consider a situation that the user 102 is available but the administrator 106 is not available. Further, the video KYC based authentication system 110 asks the user 102 whether the user 102 is willing to wait or not. Moreover, the video KYC based authentication system 110 puts the user 102 in a queue if the user 102 is willing to wait for the administrator 106 to be available. Also, the video KYC based authentication system 110 searches slot for new user if the user 102 is not willing to wait for the administrator 106. Also, the video KYC based authentication system 110 searches slot for new user if the administrator 106 is available but the user 102 is not available.
[0052] The video KYC based authentication system 110 performs verification of one or more financial accounts associated with the user 102. The video KYC based authentication system 110 performs verification of the one or more financial accounts of the user 102 with facilitation of information received from the one or more identification documents of the user 102. In an embodiment of the present disclosure, the video KYC based authentication system 110 is connected with the one or more financial accounts associated with the user 102.
[0053] The video KYC based authentication system 110 performs detection of usage of VPN by the user 102. The video KYC based authentication system 110 performs detection of VPN through checking of IP address coming through the communication device 104 of the user 102. The video KYC based authentication system 110 performs the detection before initiation of the video conference between the user 102 and the administrator 106 associated with the video KYC based authentication system 110 in real-time.
[0054] The video KYC based authentication system 110 stores information of the user 102 along with timestamp information. The video KYC based authentication system 110 stores the information of the user 102 at the database 116 associated with the video KYC based authentication system 110. The video KYC based authentication system 110 performs the storing in real-time.
[0055] The video KYC based authentication system 110 assigns a confidence score to the user 102. The confidence score increases after each successful check of the one or more artificial intelligence based checks. The confidence score facilitates in performing the set of actions by the video KYC based authentication system 110. In an embodiment of the present disclosure, the video KYC based authentication system 110 performs authentication of the user 102 if and only if the confidence score of the user 102 increases above a threshold value. In an embodiment of the present disclosure, the video KYC based authentication system 110 defines the threshold value of the confidence score. In another embodiment of the present disclosure, the administrator 106 defines the threshold value of the user 102.
[0056] The interactive computing environment 100 includes the server 114. The video KYC based authentication system 110 is associated with the server 114. In general, server is a computer program that provides service to another computer programs. In addition, server may provide various functionalities or services, such as sharing data or resources among multiple clients, performing computation for a client and the like. In an embodiment of the present disclosure, the server 114 is at least one of dedicated server, cloud server, network server, virtual private server and the like. However, the server 114 is not limited to above mentioned servers.
[0057] In addition, the server 114 includes the database 116. In general, database is a collection of information that is organized so that it can be easily accessed, managed and updated. In an embodiment of the present disclosure, the database 116 is at least one of at least hierarchical database, network database, relational database, object-oriented database and the like. The database 116 provides storage location to the first set of data, information of the user 102 and data associated with the video KYC based authentication system 110. In an embodiment of the present disclosure, the database 116 provides storage location to all the data and information required by the video KYC based authentication system 110. In an example, the database 116 is connected to the server 114. The server 114 stores data in the database 116. The server 114 interacts with the database 116 to retrieve the stored data.
[0058] In an embodiment of the present disclosure, the video KYC based authentication system 110 stores the first set of data and information of the user 102 in the database 116. The video KYC based authentication system 110 performs storing in real-time. In an embodiment of the present disclosure, the video KYC based authentication system 110 updates the first set of data, and information of the user 102 in the database 116 associated with the video KYC based authentication system 110. The video KYC based authentication system 110 performs updating in real-time.
[0059] In an embodiment of the present disclosure, the video KYC based authentication system 110 creates a user profile of the user 102. In an embodiment of the present disclosure, the video KYC based authentication system 110 creates the user profile of the user 102 to store the information of the user 102.
[0060] FIG. 3 illustrates a block diagram of a communication device 300, in accordance with various embodiments of the present disclosure. The communication device 300 represents internal hardware components of the communication device 104. In addition, the communication device 300 represents internal hardware components of the computing device 108. The communication device 300 includes a bus 302 that directly or indirectly couples the following devices: memory 304, one or more processors 306, one or more presentation components 308, one or more input/output (I/O) ports 310, one or more input/output components 312, and an illustrative power supply 314. The bus 302 represents what may be one or more busses (such as an address bus, data bus, or combination thereof). Although the various blocks of FIG. 3 are shown with lines for the sake of clarity, in reality, delineating various components is not so clear, and metaphorically, the lines would more accurately be grey and fuzzy. For example, one may consider a presentation component such as a display device to be an I/O component. Also, processors have memory. The inventors recognize that such is the nature of the art, and reiterate that the diagram of FIG. 3 is merely illustrative of an exemplary communication device 300 that can be used in connection with one or more embodiments of the present invention. The distinction is not made between such categories as “workstation,” “server,” “laptop,” “hand-held device,” etc., as all are contemplated within the scope of FIG. 3 and reference to “communication device.”
[0061] The communication device 300 typically includes a variety of computer-readable media. The computer-readable media can be any available media that can be accessed by the communication device 300 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, the computer-readable media may comprise computer readable storage media and communication media. The computer readable storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data.
[0062] The computer-readable storage media with memory 304 includes, but is not limited to, non-transitory computer readable media that stores program code and/or data for longer periods of time such as secondary or persistent long term storage, like RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the communication device 300. The computer-readable storage media associated with the memory 304 and/or other computer-readable media described herein can be considered computer readable storage media for example, or a tangible storage device. The communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and in such a includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media. The communication device 300 includes one or more processors that read data from various entities such as the memory 304 or I/O components 312. The one or more presentation components 308 present data indications to a user or other device. Exemplary presentation components include a display device, speaker, printing component, vibrating component, etc. The one or more I/O ports 310 allow the communication device 300 to be logically coupled to other devices including the one or more I/O components 312, some of which may be built in. Illustrative components include a microphone, joystick, game pad, satellite dish, scanner, printer, wireless device, etc.
| # | Name | Date |
|---|---|---|
| 1 | 202021012976-STATEMENT OF UNDERTAKING (FORM 3) [25-03-2020(online)].pdf | 2020-03-25 |
| 2 | 202021012976-FORM FOR STARTUP [25-03-2020(online)].pdf | 2020-03-25 |
| 3 | 202021012976-FORM FOR SMALL ENTITY(FORM-28) [25-03-2020(online)].pdf | 2020-03-25 |
| 4 | 202021012976-FORM 1 [25-03-2020(online)].pdf | 2020-03-25 |
| 5 | 202021012976-FIGURE OF ABSTRACT [25-03-2020(online)].jpg | 2020-03-25 |
| 6 | 202021012976-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [25-03-2020(online)].pdf | 2020-03-25 |
| 7 | 202021012976-EVIDENCE FOR REGISTRATION UNDER SSI [25-03-2020(online)].pdf | 2020-03-25 |
| 8 | 202021012976-DRAWINGS [25-03-2020(online)].pdf | 2020-03-25 |
| 9 | 202021012976-DECLARATION OF INVENTORSHIP (FORM 5) [25-03-2020(online)].pdf | 2020-03-25 |
| 10 | 202021012976-COMPLETE SPECIFICATION [25-03-2020(online)].pdf | 2020-03-25 |
| 11 | Abstract1.jpg | 2020-06-16 |
| 12 | 202021012976-FORM 18 [21-03-2024(online)].pdf | 2024-03-21 |