tencent cloud

eKYC

Release Notes and Announcements
Release Notes
Product Announcements
Product Introduction
Overview
Strengths
Use Cases
Purchase Guide
Billing Overview
Purchase Method
Payment Overdue
Refund
Integration Guide
Getting Started
Selfie Verification (Pure API)
Selfie Verification (Mobile HTML5)
Selfie Verification (App SDK)
Identity Verification (Mobile HTML5)
Identity Verification (App SDK)
Other Guide
API Documentation
History
Introduction
API Category
Making API Requests
Selfie Verification (Pure API) APIs
Selfie Verification (App SDK) APIs
Identity Verification (App SDK) APIs
Identity Verification(Mobile HTML5) APIs
AI Face Shield (Pure API) APIs
Other APIs
Data Types
Error Codes
FAQs
Contact Us
Glossary
eKYC Policy
Privacy Policy
Data Processing And Security Agreement
Service Level Agreement

Use Cases

PDF
Focus Mode
Font Size
Last updated: 2026-02-26 15:52:15

Finance

Typical scenarios: Bank account opening and insurance verification
ID card recognition can be used widely in industries such as banking and securities where customer identity must be verified for remote account opening and money transfer. It helps banks reduce labor costs and improve customer experiences. Commercial insurance companies and social security institutions may face the situation where the identity of the insured cannot be verified as he or she cannot be present due to illness, age, etc. eKYC provides remote face verification services to effectively prevent insurance frauds and other risks.

Social Live Streaming

Typical Scenarios: User registration, streamer certification
In identity verification scenarios requiring real-name authentication for social apps, online live streaming platforms, etc., online identity verification can effectively verify user identities and reduce the costs of user registration and review.

Telecommunications

Typical scenarios: SIM card registration, activation, etc. with carriers
Carriers require real-name registration for telephone users (including landline telephones, mobile phones, wireless internet cards, and broadband services) when activating cards or services, to prevent fraud rings from hoarding cards in bulk and to trace illegal communications.

Help and Support

Was this page helpful?

Help us improve! Rate your documentation experience in 5 mins.

Feedback