Also read:Latest Aadhaar updation and other services charges 2023
Using an online electronic KYC service, UIDAI offers a method to confirm the identity of Aadhaar number holders. The cost of paper-based verification and KYC is greatly reduced by the e-KYC service, which offers certified rapid identity verification. Nevertheless, not all agencies are able to use this online e-KYC approach.
How does offline eKYC works
The resident no longer needs to produce a photocopy of their Aadhaar letter thanks to Aadhaar Paperless Offline e-KYC; instead, they may download the KYC XML and give it to the organisations who need it. The procedure for how the agency can confirm the resident’s KYC information is described in the parts below. The KYC information is provided in XML that is machine readable and digitally certified by UIDAI, enabling the agency to confirm its legitimacy and identify any manipulation. The agency may also utilise its own OTP/Face authentication procedures to verify the user’s identity.
How to obtain Aadhaar Paperless Offline e-KYC Data
Aadhaar number holders can obtain Aadhaar Paperless Offline e-KYC data through the following channels:
- Download Aadhaar Paperless Offline e-KYC from resident portal (https://resident.uidai.gov.in)
- In future, obtain Aadhaar Paperless Offline e-KYC will also be available via:
- mAadhaarmobile application on a registered phone number
- Inbound SMS using registered phone number
- Aadhaar Kendra using Biometric Authentication
What data is covered in e-KYC
The resident has the option to choose the fields within the XML when downloading/obtaining Aadhaar Paperless Offline e-KYC data. Depending on the format, the following fields may be included.
- Fields that are always available
- Resident Name
- Download Reference Number
- Optional fields:
- Mobile Number (in hashed form)
- Email (in hashed form)
For downloading Aadhaar Paperless Offline e-KYC data, the owner of the Aadhaar number must provide a “Share Phrase” that must be shared with the appropriate agencies in order for them to decrypt the data.