CN102270334A - Safety management method and system for financial service - Google Patents
Safety management method and system for financial service Download PDFInfo
- Publication number
- CN102270334A CN102270334A CN2011102646293A CN201110264629A CN102270334A CN 102270334 A CN102270334 A CN 102270334A CN 2011102646293 A CN2011102646293 A CN 2011102646293A CN 201110264629 A CN201110264629 A CN 201110264629A CN 102270334 A CN102270334 A CN 102270334A
- Authority
- CN
- China
- Prior art keywords
- carried out
- data
- financial
- early warning
- business
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention provides a safety management method and a safety management system for financial service. The method comprises the following steps of: receiving data of financial service transaction; allowing to select data; and detecting whether suspicious transaction conditions exist in the selected data to determine whether to perform early warning on the suspicious transaction conditions. By applying the selected data, the effective management on the financial service is realized. The method has the advantages that: an external value chain (client) and an internal value chain (a process factor, human resource and other elements) which are owned by a financial institution are integrated so as to form an efficient modular structure, and the defects of low running efficiency, poor service function and the like in the service and management processes of the financial institution in the conventional mode are overcome. Therefore, the aim of efficient and safe management of financial service is realized.
Description
Technical field
The invention belongs to the financial field, relate to a kind of method for managing security and system of financial business.
Background technology
Along with the development of financial reform, opening and innovation, financial product and business transaction also become increasingly complex, and service management is as link indispensable in financial institution's work flow, and its importance is self-evident.
Under the traditional mode, the operation flow of financial institution and management process have many drawbacks at aspects such as business operation and risk managements: be example with the bank, on the one hand, present many banks still use manual mode to implement in concrete business flow processing process, not only time-consuming, effort, inefficiency, and can't reach desirable effect; In addition on the one hand, existing management mode can cause realizing the target of financial business security management owing to the business procedure link is too much, information is transmitted reasons such as excessive cycle and functional juxtaposition.
Summary of the invention
At above-mentioned deficiency, technical matters to be solved by this invention is, a kind of method for managing security and system is provided, and it can overcome the drawback and the defective of current schema, further promotes the operational efficiency of financial institution comprehensively, strengthens risk management and internal control ability.
A kind of method that realizes financial business is carried out safety management, described method comprises: receive the data from financial business transaction aspect; Permission is selected described data; Detect selected data and whether have suspicious transaction situation, whether described suspicious transaction situation is carried out early warning with decision.
The step of described selection comprises, gathers the customer's identity card information data by the Certification of Second Generation reader, and described customer's identity card information data is selected.
The step of described detection comprises: set up the blacklist database that has blacklist information; Whether detect selected data according to described blacklist information conforms to described blacklist information; If conform to, then early warning is carried out in decision; And/or client identity authentication card information is checked: if client identity authentication card information is unusual, then early warning is carried out in decision; And/or, the transaction situation is carried out the anti money washing analysis; Reach suspicious grade if determine transaction, then early warning is carried out in decision.
After the step of described detection, selected data are used in financial business.
Described applying step comprises, selected data is applied in the place of business of financial institution, to realize that the validity management is carried out in financial business; And/or, selected data are applied in the sales counter of financial institution, to realize that the validity management is carried out in financial business; And/or, selected data are applied in the operator of financial institution, to realize that the validity management is carried out in financial business.
Described system comprises: receiving element is used to receive the data from financial business transaction aspect; Selected cell is used for allowing described data are selected; Detecting unit is used to detect selected data and whether has suspicious transaction situation, whether described suspicious transaction situation is carried out early warning with decision.
Described selected cell comprises and is used for electronics archive module that the customer's identity card information data is selected at least.
Described detecting unit comprises: database is set up module, is used to set up the blacklist database that has blacklist information; The early warning module is used for carrying out early warning when detecting selected data according to described blacklist information and conform to described blacklist information; Whether and/or I.D. is checked module, is used for client identity authentication card information is checked, unusual to determine client identity authentication card information; The early warning module is used for detecting when unusual when client identity authentication card information, carries out early warning; And/or the anti money washing analysis module is used for the transaction situation is carried out the anti money washing analysis, to determine whether transaction reaches suspicious grade; The early warning module when being used for determining that transaction reaches suspicious grade, is carried out early warning.
The output terminal of described detecting unit also is connected with the applying unit that selected data are used in financial business.
Described applying unit comprises: the place of business administration module is used for selected data are applied in the place of business of financial institution, to realize that the validity management is carried out in financial business; And/or the sales counter administration module is used for selected data are applied in the sales counter of financial institution, to realize that the validity management is carried out in financial business; And/or operator's administration module is used for selected data are applied in the operator of financial institution, to realize that the validity management is carried out in financial business.
The present invention has following beneficial effect:
The first, value outside chain (client) and internal value chain (key elements such as flow process factor and human resources) that financial institution had are integrated, form high efficiency modular construction.Drawbacks such as the low and service function difference of the operational efficiency that financial institution occurs under the traditional mode have been overcome aspect operation flow and management process.
The second, efficient administration.With the operation flow is the center, realizes the pyramid management mode that is made of the operator of financial institution, financial institution's sales counter and financial institution place of business.According to different business characteristics, selected business datum is applied in different aspects, on the one hand, improved work efficiency, adapted to the diversified needs of operation flow; In addition on the one hand, can be according to the demand of different customers, release has the differentiated business flow process.
The 3rd, management security.Adopted the blacklist detection, identity information is checked detection, and three kinds of early warning mechanisms of anti money washing analyzing and testing.Can be according to client's income level, design respectively at booming income client, medium income client, low income client traffic flow process, credit level according to the client, design respectively operation flow at excessive risk client, medium risk client and low-risk client, the unusual condition that produces transaction is carried out early warning, thereby help professional supervisor in time to find the risk that exists, and take measures areput, with the procedure of realizing the financial risks management and control and the purpose of hitting financial crime.
Description of drawings
Fig. 1 is that method of the present invention is at the process flow diagram of realizing managing aspect financial business validity;
Fig. 2 is the embodiment synoptic diagram that the data of method shown in Figure 1 are selected step;
Fig. 3 is the embodiment synoptic diagram of the data applying step of method shown in Figure 1;
Fig. 4 is the first embodiment process flow diagram of method shown in Figure 1;
Fig. 5 is the second embodiment process flow diagram of method shown in Figure 1;
Fig. 6 is the 3rd an embodiment process flow diagram of method shown in Figure 1;
Fig. 7 is the 4th an embodiment process flow diagram of method shown in Figure 1;
Fig. 8 is that method of the present invention is at the process flow diagram of realizing managing aspect the financial business security;
Fig. 9 is the embodiment synoptic diagram that the data of method shown in Figure 8 are selected step;
Figure 10 is the first embodiment process flow diagram of the Data Detection step of method shown in Figure 8;
Figure 11 is the second embodiment process flow diagram of the Data Detection step of method shown in Figure 8;
Figure 12 is the 3rd an embodiment process flow diagram of the Data Detection step of method shown in Figure 8;
Figure 13 is the first embodiment process flow diagram of method shown in Figure 8;
Figure 14 is the second embodiment process flow diagram of method shown in Figure 8;
Figure 15 is the 3rd an embodiment process flow diagram of method shown in Figure 8;
Figure 16 is that system of the present invention is at the structural drawing of realizing managing aspect financial business validity;
Figure 17 is the example structure figure of the selected cell of system shown in Figure 16;
Figure 18 is the example structure figure of the applying unit of system shown in Figure 16;
Figure 19 is that system of the present invention is at the structural drawing of realizing managing aspect the financial business security;
Figure 20 is the example structure figure of the selected cell of system shown in Figure 19;
Figure 21 is the first example structure figure of the detecting unit of system shown in Figure 19;
Figure 22 is the second example structure figure of the detecting unit of system shown in Figure 19;
Figure 23 is the 3rd example structure figure of the detecting unit of system shown in Figure 19.
Embodiment
For the ease of to further understanding of the present invention, the specific embodiment of the present invention is illustrated below in conjunction with accompanying drawing:
Fig. 1 has illustrated method of the present invention at the process flow diagram of realizing managing aspect financial business validity, and as shown in the figure, this method comprises: step S100 receives the data from financial business transaction aspect; Step S200 allows described data are selected; Step S300 uses selected data, to realize that the validity management is carried out in financial business.
As shown in Figure 2, the step S200 of method shown in Figure 1 comprises: step S210, and at least to the selection of customer's identity card information data.
As shown in Figure 3, the step S300 of method shown in Figure 1 comprises: step S310 is applied in the place of business of financial institution with selected data, to realize that the validity management is carried out in financial business; Step S320 is applied in the sales counter of financial institution with selected data, to realize that the validity management is carried out in financial business; Step S330 is applied in the operator of financial institution with selected data, to realize that the validity management is carried out in financial business.
Fig. 4 has illustrated first embodiment of method shown in Figure 1, and as shown in the figure, at first, execution in step S100 receives the data from financial business transaction aspect; Then, execution in step S210 selects the customer's identity card information data; At last, execution in step S310 demonstrate,proves the place of business that information data is applied to financial institution with client identity authentication and manages.
Fig. 5 has illustrated second embodiment of method shown in Figure 1, and as shown in the figure, at first, execution in step S100 receives the data from financial business transaction aspect; Then, execution in step S210 selects the customer's identity card information data; At last, execution in step S320 demonstrate,proves the sales counter that information data is applied to financial institution with client identity authentication and manages.
Fig. 6 has illustrated the 3rd embodiment of method shown in Figure 1, and as shown in the figure, at first, execution in step S100 receives the data from financial business transaction aspect; Then, execution in step S210 selects the customer's identity card information data; At last, execution in step S330 demonstrate,proves the operator that information data is applied to financial institution with client identity authentication and manages.
Fig. 7 has illustrated the 4th embodiment of method shown in Figure 1, and as shown in the figure, at first, execution in step S100 receives the data from financial business transaction aspect; Then, execution in step S210 selects the customer's identity card information data; At last, difference execution in step S310, client identity authentication is demonstrate,proved information data be applied to managing of financial institution, step S320, client identity authentication is demonstrate,proved the sales counter that information data is applied to financial institution to be managed, step S330 demonstrate,proves the operator that information data is applied to financial institution with client identity authentication and manages.
Fig. 8 has illustrated method of the present invention at the process flow diagram of realizing managing aspect the financial business security, and as shown in the figure, this method comprises: step S100 receives the data from financial business transaction aspect; Step S200 allows described data are selected; Step S400 detects selected data and whether has suspicious transaction situation, whether described suspicious transaction situation is carried out early warning with decision.
As shown in Figure 9, the step S200 of method shown in Figure 8 comprises: step S210, and at least to the selection of customer's identity card information data.
As shown in figure 10, the step S400 of method shown in Figure 8 comprises: step S411, set up the blacklist database that has blacklist information; Whether step S412 detects selected data according to described blacklist information and conforms to described blacklist information; If conform to, then early warning is carried out in decision.
As shown in figure 11, the step S400 of method shown in Figure 8 comprises: step S421, check client identity authentication card information; Step S422, if client identity authentication card information is unusual, then early warning is carried out in decision.
As shown in figure 12, the step S400 of method shown in Figure 8 comprises: step S431, carry out the anti money washing analysis to the transaction situation; Step S432 reaches suspicious grade if determine transaction, and then early warning is carried out in decision.
Figure 13 has illustrated first embodiment of method shown in Figure 8, and as shown in the figure, at first, execution in step S100 receives the data from financial business transaction aspect; Then, execution in step S210 selects the customer's identity card information data; Then, execution in step S411 sets up the blacklist database that has blacklist information; At last, whether execution in step S412 detects selected data according to described blacklist information and conforms to described blacklist information; If conform to, then early warning is carried out in decision.
Figure 14 has illustrated second embodiment of method shown in Figure 8, and as shown in the figure, at first, execution in step S100 receives the data from financial business transaction aspect; Then, execution in step S210 selects the customer's identity card information data; Then, execution in step S421 checks client identity authentication card information; At last, execution in step S422, if client identity authentication card information is unusual, then early warning is carried out in decision.
Figure 15 has illustrated the 3rd embodiment of method shown in Figure 8, and as shown in the figure, at first, execution in step S100 receives the data from financial business transaction aspect; Then, execution in step S210 selects the customer's identity card information data; Then, execution in step S431 carries out the anti money washing analysis to the transaction situation; At last, execution in step S432 reaches suspicious grade if determine transaction, and then early warning is carried out in decision.
Figure 16 has illustrated the system architecture that realization of the present invention manages financial business validity aspect, and described system comprises: receiving element 100 is used to receive the data from financial business transaction aspect; Selected cell 200 is used for allowing described data are selected; Detecting unit 300 is used to detect selected data and whether has suspicious transaction situation, whether described suspicious transaction situation is carried out early warning with decision.
As shown in figure 17, described selected cell 200 comprises and is used for electronics archive module 210 that the customer's identity card information data is selected at least.
As shown in figure 18, described applying unit 300 comprises: place of business administration module 310 is used for selected data are applied in the place of business of financial institution, to realize that the validity management is carried out in financial business; Sales counter administration module 320 is used for selected data are applied in the sales counter of financial institution, to realize that the validity management is carried out in financial business; Operator's administration module 330 is used for selected data are applied in the operator of financial institution, to realize that the validity management is carried out in financial business.
Figure 19 has illustrated the system architecture that realization of the present invention manages financial business security aspect,
Described system comprises: receiving element 100 is used to receive the data from financial business transaction aspect; Selected cell 200 is used for allowing described data are selected; Detecting unit 400 is used to detect selected data and whether has suspicious transaction situation, whether described suspicious transaction situation is carried out early warning with decision.
As shown in figure 20, described selected cell 200 comprises and is used for electronics archive module 201 that the customer's identity card information data is selected at least.
As shown in figure 21, described detecting unit 400 comprises: database is set up module 411, is used to set up the blacklist database that has blacklist information.Early warning module 412 is used for carrying out early warning when detecting selected data according to described blacklist information and conform to described blacklist information.
Whether as shown in figure 22, described detecting unit 400 comprises: I.D. is checked module 421, is used for client identity authentication card information is checked, unusual to determine client identity authentication card information.Early warning module 422 is used for detecting when unusual when client identity authentication card information, carries out early warning.
As shown in figure 23, described detecting unit 400 comprises: anti money washing analysis module 431 is used for the transaction situation is carried out the anti money washing analysis, to determine whether transaction reaches suspicious grade.Early warning module 432 when being used for determining that transaction reaches suspicious grade, is carried out early warning.
Be example below with the bank, the method and system that realization of the present invention is carried out the management of security and validity to financial business are made and being explained.
Bank is in carrying out the business transaction process, bank counter 1 receives client identity authentication card information by the Certification of Second Generation reader, adapter realization Certification of Second Generation reader is connected with character terminal, by the terminal selector switch, adaptive multiple terminal models, adopt the RS485 interface, realize transparent transmission with IP network.
When realizing banking transaction, has bank counter 2, bank counter 3 ... bank counter n is carrying out reception of the present invention from the data aspect the banking transaction, carries out the step of selecting to read client identity authentication card information at least then.
Hub converges bank counter 1, bank counter 2, bank counter 3 ... the adapter of each sales counter of bank counter n, and port encoded, by the RS485 Hublink, data transparency is transferred to the PC server.
The PC data in server combines with banking system, the operator's of the place of business of realization bank, the sales counter of bank and bank professional validity is managed, and checks that by blacklist comparison alarm operation, I.D. networking operation and anti money washing analysis operation carry out the service security management.
The electronic spreadsheet data structure here is as follows:
Sequence number | Table name claims | Explanation | Remarks |
1 | blacklist | Blacklist | ? |
2 | desk | Sales counter information | ? |
3 | operator | Operator message | ? |
4 | role | Operator's Role Information | ? |
5 | station | Business office's information | ? |
6 | traninfo | ID (identity number) card information | ? |
Wherein, the bank counter structure of data table is:
The structure of the operator of bank role data table is:
The banking office structure of data table is:
Bank's blacklist structure of data table is:
The operator of bank structure of data table is:
The ID (identity number) card information structure of data table is:
Certainly; the present invention also can have other various embodiments; under the situation that does not deviate from spirit of the present invention and essence thereof; even the execution sequence to each step changes; simple adjustment to each ingredient of system; as long as realize, all belong to protection scope of the present invention according to technological thought described in the invention.Those of ordinary skill in the art can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection domain of the appended claim of the present invention.
Claims (10)
1. the method that realization is carried out safety management to financial business is characterized in that, described method comprises:
Reception is from the data of financial business transaction aspect;
Permission is selected described data;
Detect selected data and whether have suspicious transaction situation, whether described suspicious transaction situation is carried out early warning with decision.
2. the method for claim 1 is characterized in that: the step of described selection comprises, gathers the customer's identity card information data by the Certification of Second Generation reader, and described customer's identity card information data is selected.
3. method as claimed in claim 2 is characterized in that, the step of described detection comprises:
Foundation has the blacklist database of blacklist information;
Whether detect selected data according to described blacklist information conforms to described blacklist information; If conform to, then early warning is carried out in decision;
And/or,
Client identity authentication card information is checked: if client identity authentication card information is unusual, then early warning is carried out in decision;
And/or,
The transaction situation is carried out the anti money washing analysis;
Reach suspicious grade if determine transaction, then early warning is carried out in decision.
4. as each described method of claim 1-3, it is characterized in that, after the step of described detection,
Selected data are used in financial business.
5. method as claimed in claim 4 is characterized in that, described applying step comprises,
Selected data are applied in the place of business of financial institution, to realize that the validity management is carried out in financial business;
And/or,
Selected data are applied in the sales counter of financial institution, to realize that the validity management is carried out in financial business;
And/or,
Selected data are applied in the operator of financial institution, to realize that the validity management is carried out in financial business.
6. the system that realization is carried out safety management to financial business is characterized in that, described system comprises:
Receiving element is used to receive the data from financial business transaction aspect;
Selected cell is used for allowing described data are selected;
Detecting unit is used to detect selected data and whether has suspicious transaction situation, whether described suspicious transaction situation is carried out early warning with decision.
7. system as claimed in claim 6 is characterized in that, described selected cell comprises and is used for electronics archive module that the customer's identity card information data is selected at least.
8. system as claimed in claim 7 is characterized in that, described detecting unit comprises:
Database is set up module, is used to set up the blacklist database that has blacklist information;
The early warning module is used for carrying out early warning when detecting selected data according to described blacklist information and conform to described blacklist information;
And/or,
Whether I.D. is checked module, is used for client identity authentication card information is checked, unusual to determine client identity authentication card information;
The early warning module is used for detecting when unusual when client identity authentication card information, carries out early warning;
And/or,
The anti money washing analysis module is used for the transaction situation is carried out the anti money washing analysis, to determine whether transaction reaches suspicious grade;
The early warning module when being used for determining that transaction reaches suspicious grade, is carried out early warning.
9. as each described system of claim 6-8, it is characterized in that the output terminal of described detecting unit also is connected with the applying unit that selected data are used in financial business.
10. system as claimed in claim 9 is characterized in that, described applying unit comprises:
The place of business administration module is used for selected data are applied in the place of business of financial institution, to realize that the validity management is carried out in financial business;
And/or,
The sales counter administration module is used for selected data are applied in the sales counter of financial institution, to realize that the validity management is carried out in financial business;
And/or,
Operator's administration module is used for selected data are applied in the operator of financial institution, to realize that the validity management is carried out in financial business.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011102646293A CN102270334A (en) | 2011-09-08 | 2011-09-08 | Safety management method and system for financial service |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011102646293A CN102270334A (en) | 2011-09-08 | 2011-09-08 | Safety management method and system for financial service |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102270334A true CN102270334A (en) | 2011-12-07 |
Family
ID=45052632
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011102646293A Pending CN102270334A (en) | 2011-09-08 | 2011-09-08 | Safety management method and system for financial service |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102270334A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109887134A (en) * | 2019-01-31 | 2019-06-14 | 南京亿数信息科技有限公司 | A kind of cell legal power safety control system |
CN110555762A (en) * | 2019-08-27 | 2019-12-10 | 上海易点时空网络有限公司 | Blacklist data processing method and device and big data loan platform optimization method |
WO2020010714A1 (en) * | 2018-07-13 | 2020-01-16 | 平安科技(深圳)有限公司 | Client identification apparatus and method, and computer-readable storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101308564A (en) * | 2008-07-03 | 2008-11-19 | 中国工商银行股份有限公司 | Mortgage loan information monitoring method and system |
CN101627574A (en) * | 2006-11-14 | 2010-01-13 | Sgl网络公司 | The system and method that is used for the transaction vetting service |
CN101706930A (en) * | 2009-10-22 | 2010-05-12 | 杭州信雅达科技有限公司 | Ontology-based anti-money laundering early-warning method |
-
2011
- 2011-09-08 CN CN2011102646293A patent/CN102270334A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101627574A (en) * | 2006-11-14 | 2010-01-13 | Sgl网络公司 | The system and method that is used for the transaction vetting service |
CN101308564A (en) * | 2008-07-03 | 2008-11-19 | 中国工商银行股份有限公司 | Mortgage loan information monitoring method and system |
CN101706930A (en) * | 2009-10-22 | 2010-05-12 | 杭州信雅达科技有限公司 | Ontology-based anti-money laundering early-warning method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020010714A1 (en) * | 2018-07-13 | 2020-01-16 | 平安科技(深圳)有限公司 | Client identification apparatus and method, and computer-readable storage medium |
CN109887134A (en) * | 2019-01-31 | 2019-06-14 | 南京亿数信息科技有限公司 | A kind of cell legal power safety control system |
CN110555762A (en) * | 2019-08-27 | 2019-12-10 | 上海易点时空网络有限公司 | Blacklist data processing method and device and big data loan platform optimization method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Moreno-Sanchez et al. | Listening to whispers of ripple: Linking wallets and deanonymizing transactions in the ripple network | |
KR101364763B1 (en) | Financial fraud warning system using banking transaction pattern analysis and a method thereof | |
CN107085812A (en) | The anti money washing system and method for block chain digital asset | |
CN110363510B (en) | Encryption currency user feature mining and abnormal user detection method based on block chain | |
US20230006910A1 (en) | Apparatus, computer program and method | |
CN107833124A (en) | Financial analysis system and implementation method based on financial general ledger data | |
US10965574B2 (en) | Apparatus, computer program and method | |
CN105389728A (en) | Method and system for detecting nature of bank account | |
CN112200583A (en) | Knowledge graph-based fraud client identification method | |
CN101308564A (en) | Mortgage loan information monitoring method and system | |
CN102270334A (en) | Safety management method and system for financial service | |
US20180240119A1 (en) | Apparatus, computer program and method | |
Eboibi et al. | Electronic taxation and cybercrimes in Nigeria, Kenya and South Africa: Lessons from Europe and the United States of America | |
CN113360575B (en) | Method, device, equipment and storage medium for supervising transaction data in alliance chain | |
CN102013076A (en) | Payment transaction monitoring system and method thereof | |
KR20090063805A (en) | Method and system for managing illegal finance deal information and unitedly carrying out verification and report preparation and registration for suspicion deal | |
TW201913440A (en) | Method, system, computer program product and computer-readable recording medium of information security joint defense mechanism | |
US11544714B2 (en) | Apparatus, computer program and method of tracing events in a communications network | |
US20230376962A1 (en) | System and Method for Automated Feature Generation and Usage in Identity Decision Making | |
Rastogi et al. | Reimagining Telecom Industry Using Blockchain Technology | |
Maulana et al. | Designing a Smart Mobile Application to Detect Fraud Theft of E-Banking Access Based on SOA In Indonesia | |
Sharma et al. | Online Banking Frauds and Necessary Preventive Measures | |
CN113724072A (en) | Interface risk prevention and control method and device | |
Haslhofer et al. | Increasing the Efficiency of Cryptoasset Investigations by Connecting the Cases | |
Gong et al. | The technology risks management and supervision research of ICBC online-bank |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20111207 |