FAQs - KYC & Onboarding

FAQs on KYC Hyperstreams


šŸ§‘šŸ» General FAQs on KYC Hyperstreams

Recommended for Everyone

Q1: What are Hyperstreams?

A1: Hyperstreams are a part of the Decentro stack offering that allows developers to seamlessly integrate APIs and SDKs, enabling the creation of custom financial products and services. They automate complex processes, scale with demand, reduce development time, and offer input parameter customisation, among other benefits.

Q2: How can I get started with Hyperstreams?

A2: You can get started by selecting a Hyperstream from Decentroā€™s pre-configured library. Once selected, hit the hyperstream-executor API. Your users will then enter the minimum set of parameters, such as their name and phone number.

Q3: How long does a Hyperstream take to process?

A3: Even the most complex Hyperstreams take only about 8-10 seconds to process. However, the control is entirely in your hands. Hyperstreams are available in both synchronous and asynchronous forms, allowing you to continue with the user flow as desired.

Q4: How can Hyperstreams be used to better suit user flows?

A4: Hyperstreams can be consumed as APIs or SDKs. They are provided in synchronous and asynchronous forms to better suit your user flows. Asynchronous Hyperstreams have features like checkpoint_results and progress_report which give visibility and control over the process.

Q5: What are checkpoint_results and progress_report in asynchronous Hyperstreams?

A5: checkpoint_results is a boolean field that returns all the intermediate responses of the individual modules in your hyperstream. progress_report is another boolean field that displays the ratio of the total number of checkpoints completed to the total number of checkpoints in your hyperstream.

Q6: Can Hyperstreams handle encryption and decryption of payloads?

A6: Yes, Hyperstreams have an optional toggle to enable encryption and decryption of the payloads for added security. This ensures that sensitive data is adequately protected during transmission.

Q7: What is the Hyperstreams Library?

A7: The Hyperstreams Library is a collection of pre-configured Hyperstreams that you can select from. Each Hyperstream has a specific use case, for example, "Advanced CKYC Download" for validating CKYC documents from the source for banking and payments platforms.

Q8: What is the 'Advanced CKYC Download' Hyperstream used for?

A8: The 'Advanced CKYC Download' Hyperstream is used for KYC in banking and payment platforms where CKYC documents need to be validated from the source. It is designed to simplify and expedite this process, minimizing the need for manual intervention.

Q9: Can Hyperstreams help me launch my product faster?

A9: Yes, Hyperstreams significantly reduce development time by automating intricate processes and providing pre-configured solutions. This can lead to a quicker go-to-market timeline and give you a competitive advantage.

Q10: How do Hyperstreams improve the user experience?

A10: Hyperstreams require minimal customer intervention, resulting in smoother user experiences and reduced drop-off rates. They also offer customisation options, allowing tailored experiences to meet specific user requirements.


šŸ‘©šŸ»ā€šŸ’» Technical FAQs on KYC Hyperstreams

Recommended for Engineers

Q1: Can Hyperstreams be integrated with existing APIs and SDKs?

A1: Yes, Hyperstreams are designed to seamlessly integrate with existing APIs and SDKs, simplifying the process of building custom financial products and services.

Q2: What parameters are required for a user to run a Hyperstream?

A2: The parameters required depend on the specific Hyperstream. However, most of them require only a minimum set of parameters, such as the user's name and phone number.

Q3: How are errors handled in Hyperstreams?

A3: Hyperstreams handle errors and exceptions gracefully, reducing the risk of downtime. They provide full visibility on the progress and checkpoint results, allowing developers to easily track and manage the process.

Q4: How can Hyperstreams handle encryption and decryption of payloads?

A4: Hyperstreams offer an optional toggle for enabling encryption and decryption of payloads, ensuring secure transmission of sensitive data. They use both symmetric and asymmetric encryption.

Q5: What is the hyperstream-executor API?

A5: The hyperstream-executor API is the endpoint you interact with to execute a Hyperstream once you have selected it from the pre-configured library.

Q6: How does the asynchronous option in Hyperstreams work?

A6: Asynchronous Hyperstreams allow you to continue with the user flow even before you receive a response from the API. It has features like checkpoint_results and progress_report which return intermediate responses and display the progress ratio respectively.


šŸ‘©šŸ»ā€šŸ’¼ Business FAQs on KYC Hyperstreams

Recommended for Founders and Business Leaders

Q1: How can Hyperstreams benefit my startup?

A1: Hyperstreams can help your startup by automating complex processes, reducing development time, and minimizing user drop-offs. This leads to improved user experience, faster go-to-market, and an overall competitive advantage.

Q2: Is it cost-effective to use Hyperstreams?

A2: Yes, Hyperstreams are designed to be scalable based on business requirements. This ensures optimal performance without any unnecessary costs. By automating complex processes, they also save on manual labor and associated costs.

Q3: Can Hyperstreams give my business a competitive edge?

A3: Absolutely. With faster development time and go-to-market, Hyperstreams can help you stay ahead of the competition. The improved user experience and reduced drop-off rates can also lead to higher customer satisfaction and retention.

Q4: Are Hyperstreams secure for handling sensitive customer data?

A4: Yes, security is a priority in Hyperstreams. They include an optional toggle to enable encryption and decryption of payloads, ensuring the secure handling of sensitive customer data.

Q5: How does Hyperstreams' scalability benefit my business?

A5: Scalability in Hyperstreams allows your business to easily adjust based on demand. Whether you're experiencing a surge in user activity or a slower period, Hyperstreams can adapt to ensure optimal performance, providing your users with a consistent experience.

Q6: Can I customize Hyperstreams to fit my specific business requirements?

A6: Yes, Hyperstreams offer input parameter customisation and matching threshold settings. This allows you to tailor the experiences to meet your specific business requirements.

This section outlines some of the most important FAQs pertaining to the KYC module. If you have any other queries, please reach out to us at [email protected].


FAQs on KYC APIs


1. Do you also provide/link to the CKYC APIs?

Yes. We provide 2 types of integrations - aggregator & native. If you are a registered entity with CKYC credentials, you can integrate through Decentro and use your credentials to access CKYC information. Alternatively, you can also choose to access CKYC data using Decentroā€™s credentials.

2. Can you fetch Aadhaar data directly from the govt. database?

Private entities donā€™t have direct access to Aadhaar databases as per the new government regulations. Hence, we request you to ask your customers to download their Aadhaar XML file offline (i.e., on their devices) and then upload it to your website/app.

You can then hit our ā€˜Validateā€™ API inside the Public Registry sub-module of the KYC module, and upload the above file in the same way to complete the verification.

Alternatively, you can hit our Aadhaar XML APIs that fetch Aadhaar data from UIDAI in the backend with a captcha and OTP.

3. Can you fetch GST filing information?

Yes, we fetch the basic information around filing details like the date of filing, the month for which GST was filed, etc., as well as consent-based filing data.

4. What is advanced GST KYC verification?

There are two levels of data that can be fetched from the GSTN. The basic level will share information about the entity type, the company's status, the company name, and the GST number.

The advanced GST KYC check will also return the following additional information: primary business contact, place of business along with nature of the business conducted there, legal name of the company, nature of the business, jurisdiction, and verification of the GST number.

5. How to download the Aadhaar XML file?

The Aadhaar file can be downloaded in the PDF as well as XML format from the below-given websites
PDF: https://eaadhaar.uidai.gov.in/#/
XML: https://myaadhaar.uidai.gov.in/

6. How does OCR API work?

OCR stands for Optical Character Recognition. Using Decentroā€™s OCR API a userā€™s ID proof can be uploaded in PDF/JPEG/PNG format. Decentro will extract the relevant details like ID number, date of birth, Fatherā€™s name, etc in the API response.

7. Can I do a face match using Decentroā€™s KYC API?

Any platform can use the JSON output and verify the validity of the ID by using the Validate API.

Yes. You can do a face match with our Face Match API which can be found in the KYC Module.

8. How does Aadhaar XML work?

Aadhaar XML integrates with UDAI in the backend to fetch a customerā€™s Aadhaar data basis the Aadhaar number. The customer needs to enter a captcha and gets an OTP on the Aadhaar registered mobile number. If the customer enters the correct OTP, the Aadhaar-related information will be received.

9. In Aadhaar XML, does the OTP go to the UIDAI registered number?

Yes. The OTP goes from UIDAI to the customer and hence, the OTP always goes to the number registered with UIDAI only and not to any mobile number.

10. How does Aadhaar XML differ from the Aadhaar OTP process?

Aadhaar XML requires 1 additional step of captcha compared to the OTP process which is available to AUAs only. However, the major benefit of Aadhaar XML is that it is available to any registered entity in India compared to the AUA flow, which is available to only entities with AUA license, which is typically only banks as of now.

11. Can email & mob number be un-hashed in response to Aadhar Validate API?

No, we cannot un-hash this. We pass the response as-is from UIDAI. Also, it's not recommended due to privacy reasons.