当前位置:网站首页>First batch selected! Tencent security tianyufeng control has obtained the business security capability certification of the ICT Institute
First batch selected! Tencent security tianyufeng control has obtained the business security capability certification of the ICT Institute
2022-07-06 21:18:00 【Tencent security】
In recent days, , Sponsored by China information and Communication Research Institute “2022 The first business and application security development forum ” Held in Beijing . At the meeting , The Chinese Academy of communications and communications announced 2022 Trusted security assessment results , Tencent security privacy protection decision system “ Credit version ” and “ Transaction anti fraud version ” Both were selected , Become the first batch to pass the China Academy of communications “ Business security capability requirements ” Certified products .
Receive visitors + Integration of risk control
Escort the steady development of credit business
For a long time , The financial industry is based on serving the real economy , It is the key force to promote the development of digital economy . With the deepening of the digital transformation of the financial industry , Big retail + Digitalization has become a significant feature of the deepening development of financial institutions in the future . Financial institutions are using artificial intelligence 、 While big data and other new generation information technologies promote the process of digital transformation , It will also face some security problems in the process of boundary expansion .
Especially in the financial industry, the credit business is expanding , In the face of the rapid changes in the external market and the rigid requirements of the bank's internal stable operation , The decision-making mechanisms of emerging Internet digital services and traditional credit services need to be deeply integrated .
In this context , Tencent security encapsulates customer acquisition and risk control capabilities , Made a set of “ Receive visitors + Risk control ” Integrated retail credit solutions , Focus on the credit business scenario , For pre loan 、 In credit 、 Requirements for risk assessment in the post loan scenario , Combining face recognition 、 Identity Authentication 、 Fraud identification and other technologies and schemes , Risk control of retail credit , It mainly covers feature management 、 Policy configuration 、 List management 、 Release management 、 Test management 、 Real time decision making 、 Decision result output and other functions . meanwhile , Tencent security also has a large number of industry experts , It can help financial institutions plan top-level businesses , Provide financial level business security support .
Take a city commercial bank as an example , Due to the single customer channel , Lack of digital platform , Tencent security helped the bank build a digital platform for retail credit 、 Big data risk control system and advanced channel customer acquisition system , And combined with Tencent's internal experts to jointly operate , The bank has accumulated users since its launch 170 ten thousand , The number of transactions 40 ten thousand , And already 150 Billion balance .
at present , This scheme has been applied in the Bank of China 、 China Everbright Bank 、 China Minsheng Bank 、 Huaxia bank 、 Jilin Rural Credit 、 Jining bank 、 Bank of Qingdao and other banks have successfully landed , It has served hundreds of millions of users , Escort hundreds of billions of credit funds .
Focus on transaction risk control
Help improve the quality and efficiency of enterprise fraud management
In the era of digital economy , Industrial digitalization and digital industrialization are constantly deepening and evolving , The types and scenarios of business security risks are becoming more and more complex , The anti fraud work in the financial market is also more difficult .
meanwhile ,《 Data security law 》 and 《 Personal information protection law 》 The promulgation of also put forward higher requirements for the anti fraud work of financial institutions . Financial science and technology development plan 2.0 It is highlighted in , We should promote the orderly sharing and comprehensive application of data on the premise of ensuring security and privacy , Fully activate the potential of data elements , Effectively improve the quality and efficiency of financial services .
So , Tencent security is based on long-term accumulated experience in service output of financial service infrastructure , Integrated a set of transaction anti fraud solutions , By sorting out the key information in the transaction process , Provide perception from risk 、 distinguish 、 The risk control capability of the full trading link released by the decision , Combine the global device fingerprint 、 Terminal risk control engine 、 User digital identity 、 Technology such as risk intelligence core , Build a complete closed loop of risk prevention and control , It can provide customers with millisecond level real-time risk control decision-making ability , Meet the corresponding requirements of financial institutions for transaction anti fraud , Provide more perfect business management and business analysis services for retail financial business .
In the practice of cooperating with a state-owned bank , This solution will eventually help the bank build a pre event 、 In the matter 、 Post event multi-dimensional risk model , Cumulative monitoring of high-risk transactions 31.9 Billion pen , Block suspicious transaction amount 118.27 One hundred million yuan .
It is worth mentioning that , In addition to federal Learning Technology , Tencent security self-developed SKAnets Small sample learning method , It can help financial institutions quickly grasp the learning tasks and the characteristics of new fraud patterns in the risk iteration period , Build new model samples even if the samples are very limited , Effectively help financial institutions identify fraud , Quantify risk .
Li Chao, an expert on Tencent security financial risk control, said , Risk control is not only the ballast of financial institutions , It is also the engine of financial institutions . This time, we received the recognition of the China Academy of communications technology on the security capability requirements of Tencent's security business , It further strengthened Tencent's determination to safeguard the safety and beauty of digitalization .
future , Tencent security will rely on 20 Years of safety protection experience , Continue to build consultation covering scenes 、 Solution 、 Risk control services 、 Risk control system and other multi-dimensional product matrix , Build a leading privacy computing decision-making system , Escort the digital transformation of all walks of life .
边栏推荐
- 968 edit distance
- 3D face reconstruction: from basic knowledge to recognition / reconstruction methods!
- Opencv learning example code 3.2.3 image binarization
- Why does MySQL index fail? When do I use indexes?
- 2022菲尔兹奖揭晓!首位韩裔许埈珥上榜,四位80后得奖,乌克兰女数学家成史上唯二获奖女性
- Math symbols in lists
- What's the best way to get TFS to output each project to its own directory?
- 【力扣刷题】32. 最长有效括号
- [200 opencv routines] 220 Mosaic the image
- Laravel notes - add the function of locking accounts after 5 login failures in user-defined login (improve system security)
猜你喜欢
【Redis设计与实现】第一部分 :Redis数据结构和对象 总结
对话阿里巴巴副总裁贾扬清:追求大模型,并不是一件坏事
Reinforcement learning - learning notes 5 | alphago
2022 fields Award Announced! The first Korean Xu Long'er was on the list, and four post-80s women won the prize. Ukrainian female mathematicians became the only two women to win the prize in history
[200 opencv routines] 220 Mosaic the image
【滑动窗口】第九届蓝桥杯省赛B组:日志统计
Why does MySQL index fail? When do I use indexes?
KDD 2022 | realize unified conversational recommendation through knowledge enhanced prompt learning
跨分片方案 总结
HMS Core 机器学习服务打造同传翻译新“声”态,AI让国际交流更顺畅
随机推荐
Laravel notes - add the function of locking accounts after 5 login failures in user-defined login (improve system security)
审稿人dis整个研究方向已经不仅仅是在审我的稿子了怎么办?
R language for text mining Part4 text classification
面试官:Redis中有序集合的内部实现方式是什么?
【力扣刷题】32. 最长有效括号
'class file has wrong version 52.0, should be 50.0' - class file has wrong version 52.0, should be 50.0
Aike AI frontier promotion (7.6)
New database, multidimensional table platform inventory note, flowus, airtable, seatable, Vig table Vika, Feishu multidimensional table, heipayun, Zhixin information, YuQue
[in depth learning] pytorch 1.12 was released, officially supporting Apple M1 chip GPU acceleration and repairing many bugs
[MySQL] basic use of cursor
js通过数组内容来获取数组下标
JS操作dom元素(一)——获取DOM节点的六种方式
ICML 2022 | Flowformer: 任务通用的线性复杂度Transformer
In JS, string and array are converted to each other (II) -- the method of converting array into string
c#使用oracle存储过程获取结果集实例
互联网快讯:吉利正式收购魅族;胰岛素集采在31省全面落地
MLP (multilayer perceptron neural network) is a multilayer fully connected neural network model.
Vim 基本配置和经常使用的命令
None of the strongest kings in the monitoring industry!
Three schemes of SVM to realize multi classification