- • Identity verification , Face detection, Face alignment,Liveness detection
- • Anti-spoofing measures
- • Multi-factor authentication
- • Client eKYC – Consent based input
- • Document authentication
- • Risk assessment
- • Watchlist screening
- • Enhanced due diligence (EDD)
- • Ongoing monitoring