π‘οΈ KYC Verification + AML Monitoring Flow
This flow illustrates the full lifecycle of a user's identity verification process on the Zyphe Platform β from vault creation and document validation to verifiable credential (VC) issuance and Anti-Money Laundering (AML) checks.
πΌοΈ Diagram

π§ Overview
The process follows a two-pronged track:
User-side Flow (Left): User document verification, credential generation, and vault storage.
Business-side Flow (Right): Business rules validation, VC sharing, AML checks, and monitoring.
π§© Flow Steps Breakdown
1. User Document Validation
β Already owns a vault?
No β Create a personal vault.
β Vault contains the required document?
Yes β Check if it's still valid.
β Is document still valid?
Yes β Share relevant data with the business.
No / Missing β Start document verification:
Collect document pictures.
Run verification in the background.
Perform authenticity checks.
β If invalid β Failure.
β If valid β Create Verifiable Credential (VC) and store in encrypted vault.
2. Business Rules & Requirements
β Assess if the document fits business-specific requirements.
Example: User may be underage or from a restricted region.
β If not β Failure.
β If yes β Proceed to data sharing.
3. VC Sharing & Document Update Logic
Share relevant data with the business.
β If it's a replacement document (of same type):
Update previous KYC results for businesses using that type.
π‘ New revenue stream: Charge businesses for automatic updates.
4. AML Check Integration
β Ongoing monitoring enabled?
Yes β Share minimal VC info with Zypher AML monitoring module.
No β Perform one-time AML check (background job).
β Perform AML check
Match against PEPs, sanctions, etc.
β Is the user already in the list for AML checks?
Yes β Update result without re-enrolling.
No β Enroll user in the ongoing module.
π Attach AML result to the verification outcome.
π‘ Notes
Flexibility in business rules: VCs may pass authenticity checks but still fail business-specific KYC/AML criteria.
Proxy-friendly AML checks: Your system shares only necessary information with external AML providers β ensuring user data minimization.
Smart update mechanism: Businesses get real-time updates when a document is replaced β reducing redundant verifications.
Last updated