{"id":4706,"date":"2020-10-23T04:52:14","date_gmt":"2020-10-23T04:52:14","guid":{"rendered":"https:\/\/signdesk.com\/in\/?p=4706"},"modified":"2025-10-28T01:34:57","modified_gmt":"2025-10-28T07:04:57","slug":"why-document-verification-is-the-future-of-kyc","status":"publish","type":"post","link":"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc","title":{"rendered":"Why Document Verification Is The Future Of KYC"},"content":{"rendered":"<h2><span style=\"color: #008000;\"><strong>Data-centric <a style=\"color: #008000;\" href=\"https:\/\/melento.ai\/en-in\/blog\/aadhaar-based-ekyc\">KYC<\/a><\/strong><\/span><\/h2>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Most of us are familiar with data-centric verification methods, although we probably haven\u2019t heard that term used to describe these methods.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">For the longest time the only way to verify customers involved verifying information reported by them on an application form. Earlier, these forms used to be paper-based, i.e customers would fill out a form and present them to verifying officials.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">A perfunctory amount of digitization then led to these forms being \u201c<strong>digitized<\/strong>\u201d. Customers would then provide identifying data on a device, usually through a form using a browser or an application, which would be verified using a standard database.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Both these methods of verification are data-centric. This means that the data provided by customers is at the centre of the process and the veracity of <strong><a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/video-kyc\">KYC<\/a> <\/strong>performed in this way is tethered to this self-reported data.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">This data-centric approach to verification is, of course, advantageous in a few ways &#8211;\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"><span style=\"font-weight: 400; color: #333300;\">it doesn\u2019t cost businesses much to verify data<\/span><\/li>\n<li style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"><span style=\"font-weight: 400; color: #333300;\">it\u2019s relatively frictionless, i.e verification can take place in the back while the customer fills up the application\u00a0<\/span><\/li>\n<li style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"><span style=\"font-weight: 400; color: #333300;\">It\u2019s a legacy technology, which means that it\u2019s been in use for a long time and hence businesses are comfortable with this way of doing things\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">However, data-centric <a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/video-kyc\">KYC<\/a> is riddled with serious problems.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4730 aligncenter\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/10\/Why-Document-Verification-Is-The-Future-Of-KYC-1-1.jpg\" alt=\"Why-Document-Verification-Is-The-Future-Of-KYC \" width=\"1000\" height=\"454\" \/><\/p>\n<h2><span style=\"font-family: 'open sans';\"><span style=\"color: #008000;\"><strong>What are the problems with data-centric verification?<\/strong><\/span>\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Businesses have undergone a period of rapid digitization over the last few years, particularly in the previous months owing to the <strong>COVID-19<\/strong> pandemic. Industrial sectors are employing automated means to verify customers, conduct <strong><a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/10-things-you-need-to-know-about-rbis-vcip-video-kyc\">KYC<\/a><\/strong> and ensure compliance.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">These efforts have been further buoyed by the regulatory sector\u2019s implementation of video-based verification for financial institutions, securities intermediaries, and most recently the insurance industry.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">This rapid pace of digitization has additionally exposed lacunae in certain methods of verification, one of these being the data-centric approach to <strong><a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/video-kyc-solves-id-theft-online-bank-fraud\">KYC<\/a>.<\/strong>\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Security has always been a major cause for concern with data-centric verification. This issue is exacerbated by recent increases in cyber-attacks where hackers have acquired access to large swathes of customer data.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">The issue is this &#8211; <b>In any method of verification involving just data, there is no test to determine whether the person possessing the data is, in fact, the person to whom that data originally belongs to.\u00a0<\/b><\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Therefore, any hacker with access to someone\u2019s data can pass themselves off as that person and wreak havoc by taking loans in their name, obtaining insurance or even investing in securities using that person\u2019s identity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">This sole problem has been responsible for countless cases of identity theft, fraudulent documentation and <a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/banking-fraud-in-india-and-how-banks-can-combat-it\">online fraud<\/a>.\u00a0<\/span><\/p>\n<p><span style=\"color: #333300;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\">Deloitte\u2019s <\/span><strong><a style=\"color: #333300;\" href=\"https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/in\/Documents\/finance\/in-finance-DeloitteIndiaBankingFraudSurveyIII-noexp.pdf\">2018 Indian Banking Fraud Survey<\/a><\/strong><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"> reports that fraudulent documentation makes up 15% of all <strong><a style=\"color: #333300; font-size: 16px; font-family: 'open sans';\" href=\"https:\/\/melento.ai\/en-in\/blog\/banking-fraud-in-india-and-how-banks-can-combat-it\">fraud in the banking sector<\/a><\/strong>. <\/span><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\">\u00a0<\/span><span style=\"font-weight: 400;\">RBI <\/span><strong><a style=\"color: #333300;\" href=\"https:\/\/www.moneycontrol.com\/news\/trends\/current-affairs-trends\/indian-banks-lost-rs-109-75-crore-to-theft-and-online-fraud-in-fy18-2881431.html\">reports<\/a><\/strong><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"> that Indian banks lost Rs. 109 crore to online fraud and theft in FY 2018, and Experian <\/span><strong>reports<\/strong><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"> that among South-Asian countries, Indian banks have seen the highest increase in online fraud losses at 65%, with identity theft making up 28% of these cases.\u00a0<\/span><\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">How then can this problem be fixed?<\/span><\/p>\n<h2><span style=\"color: #008000;\"><strong>Document-centric verification<\/strong><\/span><\/h2>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">A feasible identity verification system will always involve the \u201c<strong>reduction<\/strong>\u201d of a person into certain verifiable quantities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">In the case of data-centric verification, the customer is reduced to their data, which is in turn verified. We have seen that this data can no longer be considered an exclusive and unique identifier of the customer. Therefore we must now turn to something that is not as vulnerable as a customer\u2019s data.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">We must also be reticent of the fact that any new method of verification must also be feasibly implementable, and not too much of a far throw from the present systems of verification.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\"><b>While data, as an abstraction, is no longer an accurate means for verification, the documents which are a record of this data, certainly are much more secure.<\/b> Data can often be stolen, <a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/go-paperless-aadhaar-based-esign\">physical document<\/a>s are much less likely to be.<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\"><a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/why-you-should-be-onboarding-customers-with-video-kyc\">Document verification<\/a>, however, has (or used to have) its own set of problems. These issues have traditionally held back document-centric methods and tacitly been responsible for the advent of data-centric methods, but recent advances in technology have smoothed over the folds. Here\u2019s how &#8211;\u00a0<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"><span style=\"color: #333300;\"><b>Forged documents<\/b><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\">: The gripe with using documents for verification has usually been that physical documents can be manipulated and forged, rendering them obsolete as identifiers. Advances in machine learning have given us a way around this problem. <\/span><strong><a style=\"color: #333300;\" href=\"https:\/\/signdesk.com\/\">Melento (Formerly SignDesk)<\/a><\/strong><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"> uses trained ML systems to detect forged and fraudulent documents, thus ensuring the veracity of document-centric verification.\u00a0<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"color: #333300;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"><b>Too much friction:<\/b> Data-centric methods, as we\u2019ve seen, are quite frictionless. Document-centric methods, in contrast, involve the capturing of document images and selfies, making the verification process fragmentary. However, these problems have since been allayed using AI-powered workflows and smart application design. Our <\/span><strong><a style=\"color: #333300;\" href=\"https:\/\/signdesk.com\/digital-kyc\"><span style=\"font-size: 16px; font-family: 'open sans';\">video KYC and digital verification solution<\/span><\/a><\/strong><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"> is particularly seamless, using smart dashboards and intuitive workflows to ensure that the verification process is completed with minimal drop-offs.\u00a0<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"color: #333300;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"><b>Cost-effectiveness:<\/b> The cost-benefit balance has often tilted against document-centric methods. After all, document verification makes use of cutting edge ML &amp; AI, which have traditionally been out of reach for most businesses. However, with the rising cost of fraud-related costs and compliance fines that businesses have had to shell out, this pendulum has now shifted. Document verification is more secure and faster, thus resulting in a significant lowering of <a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/rbi-permits-use-of-video-kyc-authentication\">KYC<\/a> costs\u00a0 <strong><a style=\"color: #333300;\" href=\"https:\/\/signdesk.com\/\">Melento (Formerly SignDesk)<\/a><\/strong>\u2019s <\/span><strong><a style=\"color: #333300;\" href=\"https:\/\/signdesk.com\/digital-kyc\"><span style=\"font-size: 16px; font-family: 'open sans';\">video-based verification solution<\/span><\/a><\/strong><span style=\"font-weight: 400;\"> has provided banks with a<\/span><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"> 90% reduction in <a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/rbi-permits-use-of-video-kyc-authentication\">KYC<\/a> costs and lowered the turnaround time for onboarding by 99%<\/span><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\">. Our solution is <\/span><a style=\"color: #333300;\" href=\"https:\/\/signdesk.com\/documentation-workflow-usecases-sectorwise\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\">aimed at businesses across the board<\/span><\/a><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"> and is therefore an extremely cost-effective alternative to data-centric verification.\u00a0<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Now that we\u2019ve seen how document verification solves the problems that data-centric verification is plagued by, let\u2019s see how it stacks up.<\/span><\/p>\n<h2><span style=\"color: #008000;\"><strong>Document-centric vs Data-centric<\/strong><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Data-centric verification<\/span><\/td>\n<td><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Document-centric verification<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Immune to data breaches<\/span><\/td>\n<td><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u2714\ufe0f<\/span><\/td>\n<td><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\"> \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u274c<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Seamless verification<\/span><\/td>\n<td><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u2714\ufe0f<\/span><\/td>\n<td><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\"> \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u2714\ufe0f<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Lower fraud &amp; compliance costs<\/span><\/td>\n<td><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u2714\ufe0f<\/span><\/td>\n<td><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\"> \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u274c<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Widespread usage<\/span><\/td>\n<td><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u274c<\/span><\/td>\n<td><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\"> \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u2714\ufe0f<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">The only important point of contention here is the current ubiquity of data-centric methods.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Since data-based verification is a legacy method, businesses are more comfortable with its usage. However, new trends are quickly replacing this way of functioning.\u00a0<\/span><\/p>\n<p><span style=\"color: #333300;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"> <b>Gartner estimates that by 2022, 80% of organizations will be using document-centric verification.<\/b>Regulatory bodies are also shaping this trend towards document verification: <\/span><strong><a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/what-are-the-steps-in-rbis-new-vcip\"><span style=\"font-size: 16px; font-family: 'open sans';\">RBI\u2019s VCIP<\/span><\/a><span style=\"font-size: 16px; font-family: 'open sans';\">, <\/span><a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/sebi-notification-now-allows-paperless-investor-onboarding\"><span style=\"font-size: 16px; font-family: 'open sans';\">SEBI\u2019s VIPV<\/span><\/a><\/strong><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"> &amp; <\/span><strong><a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/irdai-officially-announces-vbip\"><span style=\"font-size: 16px; font-family: 'open sans';\">IRDAI\u2019s VBIP<\/span><\/a><\/strong><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"> all place a strong emphasis on verifying either the Aadhaar documents or other officially valid documents (OVDs) of customers via capturing an image of these documents and then verifying them.\u00a0<\/span><\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Therefore, document verification looks to be the next frontier of <a href=\"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification\">KYC<\/a> and businesses will have to quickly get onboard with this new &amp; secure trend of verification.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">But what provider of document verification should businesses trust with this task?<\/span><\/p>\n<h2><span style=\"color: #008000;\"><strong>Safe &amp; secure <a style=\"color: #008000;\" href=\"https:\/\/melento.ai\/en-in\/blog\/video-kyc\">video KYC<\/a>\u00a0<\/strong><\/span><\/h2>\n<p><span style=\"color: #333300;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"><a style=\"color: #333300;\" href=\"https:\/\/signdesk.com\/\">Melento (Formerly SignDesk)<\/a>\u2019s <\/span><a style=\"color: #333300;\" href=\"https:\/\/signdesk.com\/digital-kyc\"><span style=\"font-size: 16px; font-family: 'open sans';\"><strong>document verification &amp; onboarding solution<\/strong><\/span><\/a><\/span><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans';\"> is trusted by several major banks and has been <\/span><strong><a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/awards\"><span style=\"font-size: 16px; font-family: 'open sans';\">awarded<\/span><\/a><\/strong><span style=\"font-weight: 400;\"> the Global Banking &amp; Finance Review\u2019s <strong>Best Digital Onboarding Solution of 2020<\/strong> in India.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Our <strong><a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/why-you-should-be-onboarding-customers-with-video-kyc\">video-based verification<\/a><\/strong> product uses ML-powered filters to fortify the document verification process and smart AI to make the entire process seamless.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Our solution is cost-effective, uses industry-grade security protocols for data security, and is compliant with <a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/rbi-permits-use-of-video-kyc-authentication\">RBI<\/a>, <a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/irdai-officially-announces-vbip\">IRDAI<\/a> &amp; <a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/sebi-notification-now-allows-paperless-investor-onboarding\">SEBI<\/a> regulations.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333300;\">Are you ready to lower your KYC costs &amp; give your customers a smooth &amp; secure onboarding experience? Book a demo with us now to verify your customers\u2019 documents digitally!<\/span><\/p>\n<div align=\"center\"><a href=\"#name\"><button class=\"wpcf7-form-control wpcf7-submit envor-btn envor-btn-primary envor-btn-normal\" type=\"button\"><strong>Book a Free Demo<\/strong><\/button><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Data-centric KYC Most of us are familiar with data-centric verification methods, although we probably haven\u2019t heard that term used to describe these methods.\u00a0 For the longest time the only way to verify customers involved verifying information reported by them on an application form. Earlier, these forms used to be paper-based, i.e customers would fill out [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":6011,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page_templates\/blog-new-3.php","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[22],"tags":[209,241,568,572,642,696,796,848,1479,1488,1756,1947,2308,2369,2373],"class_list":["post-4706","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-video-kyc","tag-automated-kyc","tag-bank-video-kyc","tag-digital-id-on-boarding","tag-digital-kyc","tag-digitalkyc","tag-document-verification-kyc","tag-e-kyc","tag-electronic-signature","tag-kyc-verification","tag-kyc-verification-solution","tag-online-kyc-verification","tag-rbi-kyc","tag-v-cip","tag-video-based-kyc","tag-video-kyc"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Document Verification Is The Future Of KYC | Video KYC<\/title>\n<meta name=\"description\" content=\"Data-based KYC is fading out. Learn how document verification is safer &amp; key to future KYC with Melento (formerly SignDesk).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Document Verification Is The Future Of KYC | Video KYC\" \/>\n<meta property=\"og:description\" content=\"Data-based KYC is fading out. Learn how document verification is safer &amp; key to future KYC with Melento (formerly SignDesk).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc\" \/>\n<meta property=\"og:site_name\" content=\"Melento (Formerly SignDesk)\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-23T04:52:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-28T07:04:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/10\/Why-Document-Verification-Is-The-Future-Of-KYC-1-1-1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Abhijith NS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abhijith NS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc\",\"name\":\"Why Document Verification Is The Future Of KYC | Video KYC\",\"isPartOf\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc#primaryimage\"},\"image\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc#primaryimage\"},\"thumbnailUrl\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/10\/Why-Document-Verification-Is-The-Future-Of-KYC-1-1-1-1.jpg\",\"datePublished\":\"2020-10-23T04:52:14+00:00\",\"dateModified\":\"2025-10-28T07:04:57+00:00\",\"author\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23\"},\"description\":\"Data-based KYC is fading out. Learn how document verification is safer & key to future KYC with Melento (formerly SignDesk).\",\"breadcrumb\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc#primaryimage\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/10\/Why-Document-Verification-Is-The-Future-Of-KYC-1-1-1-1.jpg\",\"contentUrl\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/10\/Why-Document-Verification-Is-The-Future-Of-KYC-1-1-1-1.jpg\",\"width\":1000,\"height\":454,\"caption\":\"KYC in Document Verification\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/melento.ai\/en-in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"KYC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#website\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/\",\"name\":\"Melento\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/melento.ai\/en-in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23\",\"name\":\"Abhijith NS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g\",\"caption\":\"Abhijith NS\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Document Verification Is The Future Of KYC | Video KYC","description":"Data-based KYC is fading out. Learn how document verification is safer & key to future KYC with Melento (formerly SignDesk).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc","og_locale":"en_US","og_type":"article","og_title":"Why Document Verification Is The Future Of KYC | Video KYC","og_description":"Data-based KYC is fading out. Learn how document verification is safer & key to future KYC with Melento (formerly SignDesk).","og_url":"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc","og_site_name":"Melento (Formerly SignDesk)","article_published_time":"2020-10-23T04:52:14+00:00","article_modified_time":"2025-10-28T07:04:57+00:00","og_image":[{"width":1000,"height":454,"url":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/10\/Why-Document-Verification-Is-The-Future-Of-KYC-1-1-1-1.jpg","type":"image\/jpeg"}],"author":"Abhijith NS","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Abhijith NS","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc","url":"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc","name":"Why Document Verification Is The Future Of KYC | Video KYC","isPartOf":{"@id":"https:\/\/melento.ai\/en-in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc#primaryimage"},"image":{"@id":"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc#primaryimage"},"thumbnailUrl":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/10\/Why-Document-Verification-Is-The-Future-Of-KYC-1-1-1-1.jpg","datePublished":"2020-10-23T04:52:14+00:00","dateModified":"2025-10-28T07:04:57+00:00","author":{"@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23"},"description":"Data-based KYC is fading out. Learn how document verification is safer & key to future KYC with Melento (formerly SignDesk).","breadcrumb":{"@id":"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc#primaryimage","url":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/10\/Why-Document-Verification-Is-The-Future-Of-KYC-1-1-1-1.jpg","contentUrl":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/10\/Why-Document-Verification-Is-The-Future-Of-KYC-1-1-1-1.jpg","width":1000,"height":454,"caption":"KYC in Document Verification"},{"@type":"BreadcrumbList","@id":"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/melento.ai\/en-in\/blog\/"},{"@type":"ListItem","position":2,"name":"KYC"}]},{"@type":"WebSite","@id":"https:\/\/melento.ai\/en-in\/blog\/#website","url":"https:\/\/melento.ai\/en-in\/blog\/","name":"Melento","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/melento.ai\/en-in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23","name":"Abhijith NS","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g","caption":"Abhijith NS"}}]}},"_links":{"self":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts\/4706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/comments?post=4706"}],"version-history":[{"count":0,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts\/4706\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/media\/6011"}],"wp:attachment":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/media?parent=4706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/categories?post=4706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/tags?post=4706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}