In general, there are three different approaches to recognizing an individual for security purposes, known as authentication. Presented in order of least secure and convenient to most secure and convenient, the first approach uses something you have, such as a token, card, or key. The second approach uses something you know, such as a password or PIN. The third uses something you are, a biometric.
eKYC – Online Customer Onboarding and Identity Verification