CN102270334A - Safety management method and system for financial service - Google Patents

Safety management method and system for financial service Download PDF

Info

Publication number
CN102270334A
CN102270334A CN2011102646293A CN201110264629A CN102270334A CN 102270334 A CN102270334 A CN 102270334A CN 2011102646293 A CN2011102646293 A CN 2011102646293A CN 201110264629 A CN201110264629 A CN 201110264629A CN 102270334 A CN102270334 A CN 102270334A
Authority
CN
China
Prior art keywords
carried out
data
financial
early warning
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011102646293A
Other languages
Chinese (zh)
Inventor
张学峰
张红龙
胡斌
王志红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU XUNYE TECHNOLOGY Co Ltd
Original Assignee
CHENGDU XUNYE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU XUNYE TECHNOLOGY Co Ltd filed Critical CHENGDU XUNYE TECHNOLOGY Co Ltd
Priority to CN2011102646293A priority Critical patent/CN102270334A/en
Publication of CN102270334A publication Critical patent/CN102270334A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a safety management method and a safety management system for financial service. The method comprises the following steps of: receiving data of financial service transaction; allowing to select data; and detecting whether suspicious transaction conditions exist in the selected data to determine whether to perform early warning on the suspicious transaction conditions. By applying the selected data, the effective management on the financial service is realized. The method has the advantages that: an external value chain (client) and an internal value chain (a process factor, human resource and other elements) which are owned by a financial institution are integrated so as to form an efficient modular structure, and the defects of low running efficiency, poor service function and the like in the service and management processes of the financial institution in the conventional mode are overcome. Therefore, the aim of efficient and safe management of financial service is realized.

Description

The method for managing security of financial business and system
Technical field
The invention belongs to the financial field, relate to a kind of method for managing security and system of financial business.
Background technology
Along with the development of financial reform, opening and innovation, financial product and business transaction also become increasingly complex, and service management is as link indispensable in financial institution's work flow, and its importance is self-evident.
Under the traditional mode, the operation flow of financial institution and management process have many drawbacks at aspects such as business operation and risk managements: be example with the bank, on the one hand, present many banks still use manual mode to implement in concrete business flow processing process, not only time-consuming, effort, inefficiency, and can't reach desirable effect; In addition on the one hand, existing management mode can cause realizing the target of financial business security management owing to the business procedure link is too much, information is transmitted reasons such as excessive cycle and functional juxtaposition.
Summary of the invention
At above-mentioned deficiency, technical matters to be solved by this invention is, a kind of method for managing security and system is provided, and it can overcome the drawback and the defective of current schema, further promotes the operational efficiency of financial institution comprehensively, strengthens risk management and internal control ability.
A kind of method that realizes financial business is carried out safety management, described method comprises: receive the data from financial business transaction aspect; Permission is selected described data; Detect selected data and whether have suspicious transaction situation, whether described suspicious transaction situation is carried out early warning with decision.
The step of described selection comprises, gathers the customer's identity card information data by the Certification of Second Generation reader, and described customer's identity card information data is selected.
The step of described detection comprises: set up the blacklist database that has blacklist information; Whether detect selected data according to described blacklist information conforms to described blacklist information; If conform to, then early warning is carried out in decision; And/or client identity authentication card information is checked: if client identity authentication card information is unusual, then early warning is carried out in decision; And/or, the transaction situation is carried out the anti money washing analysis; Reach suspicious grade if determine transaction, then early warning is carried out in decision.
After the step of described detection, selected data are used in financial business.
Described applying step comprises, selected data is applied in the place of business of financial institution, to realize that the validity management is carried out in financial business; And/or, selected data are applied in the sales counter of financial institution, to realize that the validity management is carried out in financial business; And/or, selected data are applied in the operator of financial institution, to realize that the validity management is carried out in financial business.
Described system comprises: receiving element is used to receive the data from financial business transaction aspect; Selected cell is used for allowing described data are selected; Detecting unit is used to detect selected data and whether has suspicious transaction situation, whether described suspicious transaction situation is carried out early warning with decision.
Described selected cell comprises and is used for electronics archive module that the customer's identity card information data is selected at least.
Described detecting unit comprises: database is set up module, is used to set up the blacklist database that has blacklist information; The early warning module is used for carrying out early warning when detecting selected data according to described blacklist information and conform to described blacklist information; Whether and/or I.D. is checked module, is used for client identity authentication card information is checked, unusual to determine client identity authentication card information; The early warning module is used for detecting when unusual when client identity authentication card information, carries out early warning; And/or the anti money washing analysis module is used for the transaction situation is carried out the anti money washing analysis, to determine whether transaction reaches suspicious grade; The early warning module when being used for determining that transaction reaches suspicious grade, is carried out early warning.
The output terminal of described detecting unit also is connected with the applying unit that selected data are used in financial business.
Described applying unit comprises: the place of business administration module is used for selected data are applied in the place of business of financial institution, to realize that the validity management is carried out in financial business; And/or the sales counter administration module is used for selected data are applied in the sales counter of financial institution, to realize that the validity management is carried out in financial business; And/or operator's administration module is used for selected data are applied in the operator of financial institution, to realize that the validity management is carried out in financial business.
The present invention has following beneficial effect:
The first, value outside chain (client) and internal value chain (key elements such as flow process factor and human resources) that financial institution had are integrated, form high efficiency modular construction.Drawbacks such as the low and service function difference of the operational efficiency that financial institution occurs under the traditional mode have been overcome aspect operation flow and management process.
The second, efficient administration.With the operation flow is the center, realizes the pyramid management mode that is made of the operator of financial institution, financial institution's sales counter and financial institution place of business.According to different business characteristics, selected business datum is applied in different aspects, on the one hand, improved work efficiency, adapted to the diversified needs of operation flow; In addition on the one hand, can be according to the demand of different customers, release has the differentiated business flow process.
The 3rd, management security.Adopted the blacklist detection, identity information is checked detection, and three kinds of early warning mechanisms of anti money washing analyzing and testing.Can be according to client's income level, design respectively at booming income client, medium income client, low income client traffic flow process, credit level according to the client, design respectively operation flow at excessive risk client, medium risk client and low-risk client, the unusual condition that produces transaction is carried out early warning, thereby help professional supervisor in time to find the risk that exists, and take measures areput, with the procedure of realizing the financial risks management and control and the purpose of hitting financial crime.
Description of drawings
Fig. 1 is that method of the present invention is at the process flow diagram of realizing managing aspect financial business validity;
Fig. 2 is the embodiment synoptic diagram that the data of method shown in Figure 1 are selected step;
Fig. 3 is the embodiment synoptic diagram of the data applying step of method shown in Figure 1;
Fig. 4 is the first embodiment process flow diagram of method shown in Figure 1;
Fig. 5 is the second embodiment process flow diagram of method shown in Figure 1;
Fig. 6 is the 3rd an embodiment process flow diagram of method shown in Figure 1;
Fig. 7 is the 4th an embodiment process flow diagram of method shown in Figure 1;
Fig. 8 is that method of the present invention is at the process flow diagram of realizing managing aspect the financial business security;
Fig. 9 is the embodiment synoptic diagram that the data of method shown in Figure 8 are selected step;
Figure 10 is the first embodiment process flow diagram of the Data Detection step of method shown in Figure 8;
Figure 11 is the second embodiment process flow diagram of the Data Detection step of method shown in Figure 8;
Figure 12 is the 3rd an embodiment process flow diagram of the Data Detection step of method shown in Figure 8;
Figure 13 is the first embodiment process flow diagram of method shown in Figure 8;
Figure 14 is the second embodiment process flow diagram of method shown in Figure 8;
Figure 15 is the 3rd an embodiment process flow diagram of method shown in Figure 8;
Figure 16 is that system of the present invention is at the structural drawing of realizing managing aspect financial business validity;
Figure 17 is the example structure figure of the selected cell of system shown in Figure 16;
Figure 18 is the example structure figure of the applying unit of system shown in Figure 16;
Figure 19 is that system of the present invention is at the structural drawing of realizing managing aspect the financial business security;
Figure 20 is the example structure figure of the selected cell of system shown in Figure 19;
Figure 21 is the first example structure figure of the detecting unit of system shown in Figure 19;
Figure 22 is the second example structure figure of the detecting unit of system shown in Figure 19;
Figure 23 is the 3rd example structure figure of the detecting unit of system shown in Figure 19.
Embodiment
For the ease of to further understanding of the present invention, the specific embodiment of the present invention is illustrated below in conjunction with accompanying drawing:
Fig. 1 has illustrated method of the present invention at the process flow diagram of realizing managing aspect financial business validity, and as shown in the figure, this method comprises: step S100 receives the data from financial business transaction aspect; Step S200 allows described data are selected; Step S300 uses selected data, to realize that the validity management is carried out in financial business.
As shown in Figure 2, the step S200 of method shown in Figure 1 comprises: step S210, and at least to the selection of customer's identity card information data.
As shown in Figure 3, the step S300 of method shown in Figure 1 comprises: step S310 is applied in the place of business of financial institution with selected data, to realize that the validity management is carried out in financial business; Step S320 is applied in the sales counter of financial institution with selected data, to realize that the validity management is carried out in financial business; Step S330 is applied in the operator of financial institution with selected data, to realize that the validity management is carried out in financial business.
Fig. 4 has illustrated first embodiment of method shown in Figure 1, and as shown in the figure, at first, execution in step S100 receives the data from financial business transaction aspect; Then, execution in step S210 selects the customer's identity card information data; At last, execution in step S310 demonstrate,proves the place of business that information data is applied to financial institution with client identity authentication and manages.
Fig. 5 has illustrated second embodiment of method shown in Figure 1, and as shown in the figure, at first, execution in step S100 receives the data from financial business transaction aspect; Then, execution in step S210 selects the customer's identity card information data; At last, execution in step S320 demonstrate,proves the sales counter that information data is applied to financial institution with client identity authentication and manages.
Fig. 6 has illustrated the 3rd embodiment of method shown in Figure 1, and as shown in the figure, at first, execution in step S100 receives the data from financial business transaction aspect; Then, execution in step S210 selects the customer's identity card information data; At last, execution in step S330 demonstrate,proves the operator that information data is applied to financial institution with client identity authentication and manages.
Fig. 7 has illustrated the 4th embodiment of method shown in Figure 1, and as shown in the figure, at first, execution in step S100 receives the data from financial business transaction aspect; Then, execution in step S210 selects the customer's identity card information data; At last, difference execution in step S310, client identity authentication is demonstrate,proved information data be applied to managing of financial institution, step S320, client identity authentication is demonstrate,proved the sales counter that information data is applied to financial institution to be managed, step S330 demonstrate,proves the operator that information data is applied to financial institution with client identity authentication and manages.
Fig. 8 has illustrated method of the present invention at the process flow diagram of realizing managing aspect the financial business security, and as shown in the figure, this method comprises: step S100 receives the data from financial business transaction aspect; Step S200 allows described data are selected; Step S400 detects selected data and whether has suspicious transaction situation, whether described suspicious transaction situation is carried out early warning with decision.
As shown in Figure 9, the step S200 of method shown in Figure 8 comprises: step S210, and at least to the selection of customer's identity card information data.
As shown in figure 10, the step S400 of method shown in Figure 8 comprises: step S411, set up the blacklist database that has blacklist information; Whether step S412 detects selected data according to described blacklist information and conforms to described blacklist information; If conform to, then early warning is carried out in decision.
As shown in figure 11, the step S400 of method shown in Figure 8 comprises: step S421, check client identity authentication card information; Step S422, if client identity authentication card information is unusual, then early warning is carried out in decision.
As shown in figure 12, the step S400 of method shown in Figure 8 comprises: step S431, carry out the anti money washing analysis to the transaction situation; Step S432 reaches suspicious grade if determine transaction, and then early warning is carried out in decision.
Figure 13 has illustrated first embodiment of method shown in Figure 8, and as shown in the figure, at first, execution in step S100 receives the data from financial business transaction aspect; Then, execution in step S210 selects the customer's identity card information data; Then, execution in step S411 sets up the blacklist database that has blacklist information; At last, whether execution in step S412 detects selected data according to described blacklist information and conforms to described blacklist information; If conform to, then early warning is carried out in decision.
Figure 14 has illustrated second embodiment of method shown in Figure 8, and as shown in the figure, at first, execution in step S100 receives the data from financial business transaction aspect; Then, execution in step S210 selects the customer's identity card information data; Then, execution in step S421 checks client identity authentication card information; At last, execution in step S422, if client identity authentication card information is unusual, then early warning is carried out in decision.
Figure 15 has illustrated the 3rd embodiment of method shown in Figure 8, and as shown in the figure, at first, execution in step S100 receives the data from financial business transaction aspect; Then, execution in step S210 selects the customer's identity card information data; Then, execution in step S431 carries out the anti money washing analysis to the transaction situation; At last, execution in step S432 reaches suspicious grade if determine transaction, and then early warning is carried out in decision.
Figure 16 has illustrated the system architecture that realization of the present invention manages financial business validity aspect, and described system comprises: receiving element 100 is used to receive the data from financial business transaction aspect; Selected cell 200 is used for allowing described data are selected; Detecting unit 300 is used to detect selected data and whether has suspicious transaction situation, whether described suspicious transaction situation is carried out early warning with decision.
As shown in figure 17, described selected cell 200 comprises and is used for electronics archive module 210 that the customer's identity card information data is selected at least.
As shown in figure 18, described applying unit 300 comprises: place of business administration module 310 is used for selected data are applied in the place of business of financial institution, to realize that the validity management is carried out in financial business; Sales counter administration module 320 is used for selected data are applied in the sales counter of financial institution, to realize that the validity management is carried out in financial business; Operator's administration module 330 is used for selected data are applied in the operator of financial institution, to realize that the validity management is carried out in financial business.
Figure 19 has illustrated the system architecture that realization of the present invention manages financial business security aspect,
Described system comprises: receiving element 100 is used to receive the data from financial business transaction aspect; Selected cell 200 is used for allowing described data are selected; Detecting unit 400 is used to detect selected data and whether has suspicious transaction situation, whether described suspicious transaction situation is carried out early warning with decision.
As shown in figure 20, described selected cell 200 comprises and is used for electronics archive module 201 that the customer's identity card information data is selected at least.
As shown in figure 21, described detecting unit 400 comprises: database is set up module 411, is used to set up the blacklist database that has blacklist information.Early warning module 412 is used for carrying out early warning when detecting selected data according to described blacklist information and conform to described blacklist information.
Whether as shown in figure 22, described detecting unit 400 comprises: I.D. is checked module 421, is used for client identity authentication card information is checked, unusual to determine client identity authentication card information.Early warning module 422 is used for detecting when unusual when client identity authentication card information, carries out early warning.
As shown in figure 23, described detecting unit 400 comprises: anti money washing analysis module 431 is used for the transaction situation is carried out the anti money washing analysis, to determine whether transaction reaches suspicious grade.Early warning module 432 when being used for determining that transaction reaches suspicious grade, is carried out early warning.
Be example below with the bank, the method and system that realization of the present invention is carried out the management of security and validity to financial business are made and being explained.
Bank is in carrying out the business transaction process, bank counter 1 receives client identity authentication card information by the Certification of Second Generation reader, adapter realization Certification of Second Generation reader is connected with character terminal, by the terminal selector switch, adaptive multiple terminal models, adopt the RS485 interface, realize transparent transmission with IP network.
When realizing banking transaction, has bank counter 2, bank counter 3 ... bank counter n is carrying out reception of the present invention from the data aspect the banking transaction, carries out the step of selecting to read client identity authentication card information at least then.
Hub converges bank counter 1, bank counter 2, bank counter 3 ... the adapter of each sales counter of bank counter n, and port encoded, by the RS485 Hublink, data transparency is transferred to the PC server.
The PC data in server combines with banking system, the operator's of the place of business of realization bank, the sales counter of bank and bank professional validity is managed, and checks that by blacklist comparison alarm operation, I.D. networking operation and anti money washing analysis operation carry out the service security management.
The electronic spreadsheet data structure here is as follows:
Sequence number Table name claims Explanation Remarks
1 blacklist Blacklist ?
2 desk Sales counter information ?
3 operator Operator message ?
4 role Operator's Role Information ?
5 station Business office's information ?
6 traninfo ID (identity number) card information ?
Wherein, the bank counter structure of data table is:
Figure 984814DEST_PATH_IMAGE001
The structure of the operator of bank role data table is:
Figure 26588DEST_PATH_IMAGE002
The banking office structure of data table is:
Figure 432424DEST_PATH_IMAGE003
Bank's blacklist structure of data table is:
Figure 952267DEST_PATH_IMAGE004
The operator of bank structure of data table is:
Figure 392738DEST_PATH_IMAGE005
The ID (identity number) card information structure of data table is:
Figure 277517DEST_PATH_IMAGE006
Certainly; the present invention also can have other various embodiments; under the situation that does not deviate from spirit of the present invention and essence thereof; even the execution sequence to each step changes; simple adjustment to each ingredient of system; as long as realize, all belong to protection scope of the present invention according to technological thought described in the invention.Those of ordinary skill in the art can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection domain of the appended claim of the present invention.

Claims (10)

1. the method that realization is carried out safety management to financial business is characterized in that, described method comprises:
Reception is from the data of financial business transaction aspect;
Permission is selected described data;
Detect selected data and whether have suspicious transaction situation, whether described suspicious transaction situation is carried out early warning with decision.
2. the method for claim 1 is characterized in that: the step of described selection comprises, gathers the customer's identity card information data by the Certification of Second Generation reader, and described customer's identity card information data is selected.
3. method as claimed in claim 2 is characterized in that, the step of described detection comprises:
Foundation has the blacklist database of blacklist information;
Whether detect selected data according to described blacklist information conforms to described blacklist information; If conform to, then early warning is carried out in decision;
And/or,
Client identity authentication card information is checked: if client identity authentication card information is unusual, then early warning is carried out in decision;
And/or,
The transaction situation is carried out the anti money washing analysis;
Reach suspicious grade if determine transaction, then early warning is carried out in decision.
4. as each described method of claim 1-3, it is characterized in that, after the step of described detection,
Selected data are used in financial business.
5. method as claimed in claim 4 is characterized in that, described applying step comprises,
Selected data are applied in the place of business of financial institution, to realize that the validity management is carried out in financial business;
And/or,
Selected data are applied in the sales counter of financial institution, to realize that the validity management is carried out in financial business;
And/or,
Selected data are applied in the operator of financial institution, to realize that the validity management is carried out in financial business.
6. the system that realization is carried out safety management to financial business is characterized in that, described system comprises:
Receiving element is used to receive the data from financial business transaction aspect;
Selected cell is used for allowing described data are selected;
Detecting unit is used to detect selected data and whether has suspicious transaction situation, whether described suspicious transaction situation is carried out early warning with decision.
7. system as claimed in claim 6 is characterized in that, described selected cell comprises and is used for electronics archive module that the customer's identity card information data is selected at least.
8. system as claimed in claim 7 is characterized in that, described detecting unit comprises:
Database is set up module, is used to set up the blacklist database that has blacklist information;
The early warning module is used for carrying out early warning when detecting selected data according to described blacklist information and conform to described blacklist information;
And/or,
Whether I.D. is checked module, is used for client identity authentication card information is checked, unusual to determine client identity authentication card information;
The early warning module is used for detecting when unusual when client identity authentication card information, carries out early warning;
And/or,
The anti money washing analysis module is used for the transaction situation is carried out the anti money washing analysis, to determine whether transaction reaches suspicious grade;
The early warning module when being used for determining that transaction reaches suspicious grade, is carried out early warning.
9. as each described system of claim 6-8, it is characterized in that the output terminal of described detecting unit also is connected with the applying unit that selected data are used in financial business.
10. system as claimed in claim 9 is characterized in that, described applying unit comprises:
The place of business administration module is used for selected data are applied in the place of business of financial institution, to realize that the validity management is carried out in financial business;
And/or,
The sales counter administration module is used for selected data are applied in the sales counter of financial institution, to realize that the validity management is carried out in financial business;
And/or,
Operator's administration module is used for selected data are applied in the operator of financial institution, to realize that the validity management is carried out in financial business.
CN2011102646293A 2011-09-08 2011-09-08 Safety management method and system for financial service Pending CN102270334A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011102646293A CN102270334A (en) 2011-09-08 2011-09-08 Safety management method and system for financial service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011102646293A CN102270334A (en) 2011-09-08 2011-09-08 Safety management method and system for financial service

Publications (1)

Publication Number Publication Date
CN102270334A true CN102270334A (en) 2011-12-07

Family

ID=45052632

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011102646293A Pending CN102270334A (en) 2011-09-08 2011-09-08 Safety management method and system for financial service

Country Status (1)

Country Link
CN (1) CN102270334A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109887134A (en) * 2019-01-31 2019-06-14 南京亿数信息科技有限公司 A kind of cell legal power safety control system
CN110555762A (en) * 2019-08-27 2019-12-10 上海易点时空网络有限公司 Blacklist data processing method and device and big data loan platform optimization method
WO2020010714A1 (en) * 2018-07-13 2020-01-16 平安科技(深圳)有限公司 Client identification apparatus and method, and computer-readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101308564A (en) * 2008-07-03 2008-11-19 中国工商银行股份有限公司 Mortgage loan information monitoring method and system
CN101627574A (en) * 2006-11-14 2010-01-13 Sgl网络公司 The system and method that is used for the transaction vetting service
CN101706930A (en) * 2009-10-22 2010-05-12 杭州信雅达科技有限公司 Ontology-based anti-money laundering early-warning method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101627574A (en) * 2006-11-14 2010-01-13 Sgl网络公司 The system and method that is used for the transaction vetting service
CN101308564A (en) * 2008-07-03 2008-11-19 中国工商银行股份有限公司 Mortgage loan information monitoring method and system
CN101706930A (en) * 2009-10-22 2010-05-12 杭州信雅达科技有限公司 Ontology-based anti-money laundering early-warning method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020010714A1 (en) * 2018-07-13 2020-01-16 平安科技(深圳)有限公司 Client identification apparatus and method, and computer-readable storage medium
CN109887134A (en) * 2019-01-31 2019-06-14 南京亿数信息科技有限公司 A kind of cell legal power safety control system
CN110555762A (en) * 2019-08-27 2019-12-10 上海易点时空网络有限公司 Blacklist data processing method and device and big data loan platform optimization method

Similar Documents

Publication Publication Date Title
Moreno-Sanchez et al. Listening to whispers of ripple: Linking wallets and deanonymizing transactions in the ripple network
KR101364763B1 (en) Financial fraud warning system using banking transaction pattern analysis and a method thereof
CN107085812A (en) The anti money washing system and method for block chain digital asset
CN110363510B (en) Encryption currency user feature mining and abnormal user detection method based on block chain
US20230006910A1 (en) Apparatus, computer program and method
CN107833124A (en) Financial analysis system and implementation method based on financial general ledger data
US10965574B2 (en) Apparatus, computer program and method
CN105389728A (en) Method and system for detecting nature of bank account
CN112200583A (en) Knowledge graph-based fraud client identification method
CN101308564A (en) Mortgage loan information monitoring method and system
CN102270334A (en) Safety management method and system for financial service
US20180240119A1 (en) Apparatus, computer program and method
Eboibi et al. Electronic taxation and cybercrimes in Nigeria, Kenya and South Africa: Lessons from Europe and the United States of America
CN113360575B (en) Method, device, equipment and storage medium for supervising transaction data in alliance chain
CN102013076A (en) Payment transaction monitoring system and method thereof
KR20090063805A (en) Method and system for managing illegal finance deal information and unitedly carrying out verification and report preparation and registration for suspicion deal
TW201913440A (en) Method, system, computer program product and computer-readable recording medium of information security joint defense mechanism
US11544714B2 (en) Apparatus, computer program and method of tracing events in a communications network
US20230376962A1 (en) System and Method for Automated Feature Generation and Usage in Identity Decision Making
Rastogi et al. Reimagining Telecom Industry Using Blockchain Technology
Maulana et al. Designing a Smart Mobile Application to Detect Fraud Theft of E-Banking Access Based on SOA In Indonesia
Sharma et al. Online Banking Frauds and Necessary Preventive Measures
CN113724072A (en) Interface risk prevention and control method and device
Haslhofer et al. Increasing the Efficiency of Cryptoasset Investigations by Connecting the Cases
Gong et al. The technology risks management and supervision research of ICBC online-bank

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20111207