Skip to content

Screen 1: Mobile / Email Registration

The client has just opened the application for the first time. They do not have a trading account yet, and they may be unfamiliar with the regulatory machinery that stands between them and their first trade. The very first screen asks for one thing: their mobile number. Mobile verification is required for OTP-based Aadhaar authentication and KRA communication throughout the onboarding process.

1 Mobile / Email Registration

Purpose: Establish the identity anchor and OTP (One-Time Password) communication channel before any KYC data is captured.

Every subsequent step — PAN (Permanent Account Number) verification, KRA (KYC Registration Agency) lookup, DigiLocker (Government of India’s digital document platform) authentication, eSign (electronic signature via Aadhaar OTP) — relies on the ability to send the customer an OTP. Without a verified mobile number, the entire pipeline has no communication channel.

The customer types a single field.

FieldValidationNotes
Mobile Number (10 digits)10 digits starting with 6-9OTP sent via SMS for verification

Fallback: Email registration if mobile OTP fails 3 times.

On registration, device risk assessment fires asynchronously — risk signals including emulator detection, root detection, and synthetic identity checks.

While the customer is looking at the OTP input field, the system initiates a background device risk assessment to detect potentially fraudulent devices.

ServiceWhat It Does
Device Risk AssessmentDetects emulators, rooted devices, synthetic identities, and coordinated fraud patterns. Results feed into AML/fraud evaluation at the Blocking Gate.

This device intelligence layer runs silently in the background. No user interaction required. Results feed into the AML/fraud evaluation at the Blocking Gate (Screen 8).

At this point, the system has everything it needs to move forward. The customer has proven they control this mobile number, and the device has been assessed for fraud risk.

After this screen, the system has:

  • Verified mobile number (OTP-confirmed)
  • Device risk assessment results
  • Session identifier for all subsequent API calls

For vendor implementation options, see Vendor Integrations.