All You Need To Know About UPI

20 Jan 2021

Back to all Articles

With the booming Digital Payment Ecosystem, India’s Financial Sector is soaring new heights. The newer payment models, sophistication in the acceptance infrastructure multiplied with customer’s need of convenience coupled with reliability has given an unrivalled thrust to the economy. In this digital age where mobile applications & payment systems are ruling over the masses, Unified Payments Interface (UPI) is placed in the top-drawer of all payment models.

Not only the ease but also the robustness of UPI has enticed users from all strata and demographics of the society to use this remarkable application.

What is UPI?

Unified Payments Interface is a real-time payment system that channels multiple bank accounts into a single application mobile application. This concept was developed by National Payment Corporation of India (NPCI) for facilitating instant fund transfer, merchant payments and collection of funds. The unique feature of this application is the “Peer to Peer” collect request which can be scheduled as per desire and convenience. The application offers a two factor authentication (2FA) which enhances the security and protects the interest of the customers. Customer will create Login PIN as well as UPI PIN in UPI. Customer has to use Debit Card credentials like Last 6 digits of the card and card expiry and create the UPI PIN by authenticating the same with OTP received on the registered Mobile Number.

Digital on-boarding process in BHIM Baroda Pay UPI APP

  • Please go to Google Play Store (Android Users) or iOS AppStore (iOS Users) for downloading - BHIM Baroda Pay UPI application.
  • Post complete download, the application will install on the device.
  • Click on the installed application to register and accept all app permissions to start the registration process.
  • Enter your registered mobile number and select the SIM Slot in which your registered mobile number is placed.
  • A silent SMS will be sent from your registered mobile number. Make sure sufficient mobile balance is available for sending silent SMS.
  • After mobile number verification, application prompts to enter name and proceed.
  • Select the Bank where your Bank account exists under the same registered mobile number.
  • Post selection of account, application will display the list of all eligible accounts for UPI.
  • Select any one / all the accounts and create a VPA (UPI ID).
  • Create login PIN, select security question and create answer.
  • Accept the Terms and Conditions and proceed, which completes the registration in BHIM Baroda Pay UPI.
  • Post registration, generate UPI PIN to be used for transaction.
  • In the home screen under added accounts, UPI PIN status will be displayed (Set / Not Set)
  • Click on the three dots icon under desired account.
  • Select the option -> Set UPI PIN. On the next screen-> Enter last 6 digits of debit card issued in the same account.
  • Enter the card expiry and proceed.
  • An OTP will be received on registered mobile number. The same will be auto read by the application. In case of devices where auto read facility is by default disabled, manually key in the OTP.
  • Now create UPI PIN and reconfirm the same.
  • UPI PIN is successfully set. Now you are ready to do UPI transactions…….

UPI for Collection Purpose

Merchants can use UPI channel for receiving / collection of payment from their customers. Customer can pay to the merchant either by sending money to merchant’s UPI ID or by scanning the QR code displayed at merchant location/ website.

Bank’s UPI platform is having capability to provide customized UPI based payment solution to merchants. Bank’s UPI platform supports low integration and transaction cost to merchant to enable UPI as a payment mode for transaction in addition to debitcard, credit card, wallet and net banking to accept the payment from the customer in convenient, easy and hassle free manner.

Risks, Vigilance & Prevention

The emerging digital payment channel comes with its own fair share of risks. Recent events give insights to the lack of awareness and negligence on the part of the customer which has resulted in huge loss of money to the customers. From Vishing to suspicious app download to spoofing, the socially engineered techniques to dupe customers has evolved drastically. Major Modus Operandi are as under

  • UPI SMS Spoofing Fraud
  • UPI Collect Request Fraud
  • UPI AnyDesk Fraud

Branches and staff are required to educate customers regarding the risks associated with the application used. More the clarity about the product, less will the unauthorized transactions in the accounts. As it is rightly said, “With more power comes more responsibility” and this is true in case of a payment channel so convenient and easy to use, UPI.

Significance & Future

UPI as a collection medium is growing drastically. The recent pandemic has helped to propel the transaction and usage of the application as it promotes contactless payments and with Government bringing in key initiatives driven by Digital mode, this product is said to shatter all known barriers and emerge as the most used payment mode in the ecosystem.

The interoperability is vital to facilitate transactions in a financial world of different account types. This has been made possible by the most advanced form of digital payment i.e. Unique Payment Interface (UPI) which justifies its name - “UNIQUE”.

UPI is a game-changer for Bank as an organization and which is laid out insightfully can consolidate Bank’s brand and enhance acceptance & penetration among masses and classes.

Popular Articles

Related Articles

Leave a Comment

Thanks for submitting your details.


  • sayankarmakar
    05 December, 2021

    Upi id

  • Rahul
    04 December, 2021

    Mera you pin

  • Pankaj
    03 December, 2021


  • Pankaj
    03 December, 2021


  • Pankaj
    03 December, 2021


  • Pankaj
    03 December, 2021


  • Madhosahu
    29 November, 2021

    9165956470 es UPI anblok

  • hiren
    26 November, 2021

    how we can start UPI ID without having debit card for current account. please make available for current user that upi id without having debit card.

    26 November, 2021


  • Anmol Kumar upadhyay
    23 November, 2021

    ATM pin bnana hai kaisai bnai

  • Shivnarayan
    10 November, 2021

    Upi nhi ban rha hai mera number link tab par bhi kah rha hai link your mobile number

  • Keshav verlekar
    08 November, 2021

    U Pi not working

  • Nagaraj asamatti
    03 November, 2021


  • Hazrat ali
    24 October, 2021

    My name is MUZAFAr

  • Ayub so sadik
    23 October, 2021

    I need debit card but the bank not give us

  • Thakor Shail vinodbhai
    18 October, 2021

    M pin number

  • Anmol
    17 October, 2021


  • gopinath tidke
    10 October, 2021

    please email me UPI scan code form.

  • Mohd Azmal
    07 October, 2021

    How registered mobile number

    28 September, 2021

    Complain for not receiving OTP on registered mobile number

  • Afvansiddikbhaikhandu
    26 September, 2021


  • Neha Roy
    25 September, 2021

    How can i change the mobile registration

  • Sandeep
    11 September, 2021

    Addar card 2264351016

  • Sudipta Roy
    10 September, 2021


  • Rathva sevanbhai
    09 September, 2021

    Mara UPI nambar joyia ca

  • Carlo killl
    07 September, 2021

    Carlo kill

All You Need To Know About Different Types of Cyber Threats

Our lives are increasingly going digital. We can shop, pay bills and even complete banking transactions online. While the Internet has made our life so much better, we must use it responsibly to ensure we are safe and secure. While banks take every precaution to ensure our safety, we should also be aware of the various cyber security threats. Let’s look at the most common types of cyber security threats.
Computer Viruses
Also known as malware, a computer virus is the most common type of cyber threat. It is essentially a program that is written to alter how your computer operates, without your knowledge or permission. Once it infects your computer, the virus can cause significant damage. You can, however, prevent the virus from infecting your machines by installing good anti-virus software, using non-pirated and secure software and downloading and sharing files from authenticated websites only. Also remember to keep your operating systems and programs updated.
Spyware threat
Spyware is among the most serious type of attacks in cyber security. A spyware is a program which monitors your online activities without your consent. It also installs programs that capture your personal information which can be misused. Again, a good anti-virus and anti-spyware program will help. Also, avoid clicking on advertisements of sites that you don’t recognise and log out of your accounts after every transaction.
Online phishing
Being one of the growing types of cyber threats, online phishing is a massive scam. It had become such a menace that the government released advertisements to help people recognise its own sites. A phishing scam is conducted by people masquerading as trustworthy individuals who attempt to steal your sensitive personal or financial information via fraudulent emails and SMSs. But remember, no bank ever calls to ask you for your bank account number, ATM PIN, or card numbers. So, if you get a call, email or SMS asking for your bank details; it is most likely a phishing attack. Other types of phising attacks include sending you links that resemble your bank’s website and then asking you for personal data as input.
You cannot list the types of cyber-attacks without the mention of hackers. Like in the case of phishing, hacking is a security threat that involves people, not computers. Hackers illegally gain access to other people’s computers – once they gain access, they could change, steal and even destroy information. Hackers could gain access to your bank details, lock you out of your system and even steal your identity. It is important to remember, however, that not all hackers are criminals. Many organizations use ethical hackers to test system vulnerabilities.
Vishing (voice or VoIP phishing) is an electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized entities. A vishing attack can be conducted by voice email, VoIP (voice over IP), landline or cellular telephone. It is the telephone related scam equivalent of phishing.
Pharming is a fraudulent practice where a fraudster installs malicious code on a personal computer or server. This code then redirects any clicks user makes on a website to another fraudulent Website without your consent or knowledge.  Pharming has become major concern to businesses hosting e-commerce and online banking websites. The criminal can either compromise your computer by installing malicious software in it, or redirect the traffic by infecting the server connected to your computer. Once confidential information has been entered at a fraudulent website, criminals have the information and identity theft can be the end result.
Trojan horse
A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software.
In the Greek Mythological story of the Trojan War, the Greeks, unable to break through the walls of Troy to conquer the city, hid inside a giant wooden horse which they left outside the city gates; the Trojans, thinking it was an offering to the gods, brought it inside, and the Greek soldiers, led by Odysseus, emerged at night to destroy the city and kill its inhabitants. Like Odysseus, cyber-attackers hope that you'll be fooled by a tempting piece of bait to let malicious code inside your network.
Baiting is one of the simplest social engineering techniques used by cyber criminals.
In this attack, the attacker takes advantage of human’s curiosity or greed by luring the person to do something of what attacker can take benefit to gain confidential information. Attacker may leave malware-infected flash drives or similar devices in a place easily accessible, hoping that this hardware will be inserted into network-connected computers as the means to spread malicious code.
Final note:
As it is apparent, the above-mentioned cyber-attack types are indeed serious. However, with a few preventive measures, you can save yourself from becoming victims of these thefts. Remember to follow the necessary online and offline best practices to keep your systems protected. For instance, avoid saving crucial bank and social media passwords anywhere which is easily accessible to others. Also, refrain from using public Wi-Fi networks, especially while conducting financial transactions like buying things online. Investing in original software and anti-virus can go a long way in protecting your computer systems.

Answering All the How-To Questions Surrounding FASTag

FASTAg is an electronic card or tag that you can affix to your vehicle's windscreen. It has been created using Radio Frequency Identification (RFID) technology. The card is encrypted and contains your vehicle details such as vehicle size and class, as well as your vehicle registration number. You can apply for the card online on the NETC website and buy it through issuing banks like the Bank of Baroda for just Rs. 200*. You can then recharge the card and pay your toll electronically or digitally. The unique FASTag features and benefits make passing through toll plazas breezy and convenient. Let's find out what they are.
FASTag Benefits
There are five key benefits of FASTag. They are as under:
1. No need to carry cash
While at a toll plaza, you'll have noticed that passengers ahead of you tend to take their time to pay their toll in cash. In most cases, the toll-collector asks you to provide exact change. But with FASTAG, there is no need to carry cash as the toll amount is deducted electronically.
2. It serves as a time saver
The most prominent of all FASTag benefits is that it serves as a time-saver. You can avoid toll queues and breeze through the gates without wating to tender exact change. Also, there are dedicated lanes for FASTag users, ensuring smoother flow.
3. No need to stop to pay toll
Another benefit of FASTag is that you can pay the toll tax while your vehicle can keep moving. Since you would have affixed the tag on your windscreen, the toll amount is automatically deducted without you having to stop to pay the toll. You only need to slow down so that the NETC system can read your tag. The toll gate opens instantly after your card is scanned.
4. You get SMS alerts
As mentioned above, the FASTag is a rechargeable tag. When you pay the toll electronically, you get an SMS from the NETC acknowledging the receipt of the toll tax. Your bank also sends you an SMS notifying you about the amount debited and the remaining amount in the card. This way, you can know when to recharge the card.
5. FASTag can be recharged anytime
A crucial FASTag feature is that you can recharge it anytime, from anywhere. So, if you're going on a long road trip, where you have to stop at multiple toll booths, you can park your vehicle on the side of the road and recharge the FASTag using your internet-enabled smartphone and your bank's mobile app or bank cards.
Final note: There are several benefits of FASTag. You can apply for your FASTag on the NETC website and buy and recharge it through your bank's website/ UPI/ Bank’s Mobile Banking/ BBPS Mode. Note that FASTags are currently available only for four and multi-axle vehicles. Also, if you have multiple vehicles, you need to purchase a separate tag for each vehicle.

Are you Bank of Baroda Customer?

This is to inform you that by clicking on continue, you will be leaving our website and entering the website/Microsite operated by Insurance tie up partner. This link is provided on our Bank’s website for customer convenience and Bank of Baroda does not own or control of this website, and is not responsible for its contents. The Website/Microsite is fully owned & Maintained by Insurance tie up partner.

The use of any of the Insurance’s tie up partners website is subject to the terms of use and other terms and guidelines, if any, contained within tie up partners website.

Proceed to the website

Thank you for visiting

We use cookies (and similar tools) to enhance your experience on our website. To learn more on our cookie policy, Privacy Policy and Terms & Conditions please click here. By continuing to browse this website, you consent to our use of cookies and agree to the Privacy Policy and Terms & Conditions.