πŸ›‘οΈ KYC Verification + AML Monitoring Flow

This flow illustrates the full lifecycle of a user's identity verification process on the Zyphe Platform β€” from vault creation and document validation to verifiable credential (VC) issuance and Anti-Money Laundering (AML) checks.


πŸ–ΌοΈ Diagram


🧭 Overview

The process follows a two-pronged track:

  • User-side Flow (Left): User document verification, credential generation, and vault storage.

  • Business-side Flow (Right): Business rules validation, VC sharing, AML checks, and monitoring.


🧩 Flow Steps Breakdown

1. User Document Validation

  • βœ… Already owns a vault?

    • No β†’ Create a personal vault.

  • βœ… Vault contains the required document?

    • Yes β†’ Check if it's still valid.

  • βœ… Is document still valid?

    • Yes β†’ Share relevant data with the business.

    • No / Missing β†’ Start document verification:

      • Collect document pictures.

      • Run verification in the background.

      • Perform authenticity checks.

  • ❌ If invalid β†’ Failure.

  • βœ… If valid β†’ Create Verifiable Credential (VC) and store in encrypted vault.


2. Business Rules & Requirements

  • βœ… Assess if the document fits business-specific requirements.

    • Example: User may be underage or from a restricted region.

  • ❌ If not β†’ Failure.

  • βœ… If yes β†’ Proceed to data sharing.


3. VC Sharing & Document Update Logic

  • Share relevant data with the business.

  • βœ… If it's a replacement document (of same type):

    • Update previous KYC results for businesses using that type.

    • πŸ’‘ New revenue stream: Charge businesses for automatic updates.


4. AML Check Integration

  • βœ… Ongoing monitoring enabled?

    • Yes β†’ Share minimal VC info with Zypher AML monitoring module.

    • No β†’ Perform one-time AML check (background job).

  • βœ… Perform AML check

    • Match against PEPs, sanctions, etc.

  • βœ… Is the user already in the list for AML checks?

    • Yes β†’ Update result without re-enrolling.

    • No β†’ Enroll user in the ongoing module.

  • πŸ“Ž Attach AML result to the verification outcome.


πŸ’‘ Notes

  • Flexibility in business rules: VCs may pass authenticity checks but still fail business-specific KYC/AML criteria.

  • Proxy-friendly AML checks: Your system shares only necessary information with external AML providers β€” ensuring user data minimization.

  • Smart update mechanism: Businesses get real-time updates when a document is replaced β€” reducing redundant verifications.

Last updated