当前位置:网站首页>First batch selected! Tencent security tianyufeng control has obtained the business security capability certification of the ICT Institute
First batch selected! Tencent security tianyufeng control has obtained the business security capability certification of the ICT Institute
2022-07-06 21:18:00 【Tencent security】
In recent days, , Sponsored by China information and Communication Research Institute “2022 The first business and application security development forum ” Held in Beijing . At the meeting , The Chinese Academy of communications and communications announced 2022 Trusted security assessment results , Tencent security privacy protection decision system “ Credit version ” and “ Transaction anti fraud version ” Both were selected , Become the first batch to pass the China Academy of communications “ Business security capability requirements ” Certified products .
Receive visitors + Integration of risk control
Escort the steady development of credit business
For a long time , The financial industry is based on serving the real economy , It is the key force to promote the development of digital economy . With the deepening of the digital transformation of the financial industry , Big retail + Digitalization has become a significant feature of the deepening development of financial institutions in the future . Financial institutions are using artificial intelligence 、 While big data and other new generation information technologies promote the process of digital transformation , It will also face some security problems in the process of boundary expansion .
Especially in the financial industry, the credit business is expanding , In the face of the rapid changes in the external market and the rigid requirements of the bank's internal stable operation , The decision-making mechanisms of emerging Internet digital services and traditional credit services need to be deeply integrated .
In this context , Tencent security encapsulates customer acquisition and risk control capabilities , Made a set of “ Receive visitors + Risk control ” Integrated retail credit solutions , Focus on the credit business scenario , For pre loan 、 In credit 、 Requirements for risk assessment in the post loan scenario , Combining face recognition 、 Identity Authentication 、 Fraud identification and other technologies and schemes , Risk control of retail credit , It mainly covers feature management 、 Policy configuration 、 List management 、 Release management 、 Test management 、 Real time decision making 、 Decision result output and other functions . meanwhile , Tencent security also has a large number of industry experts , It can help financial institutions plan top-level businesses , Provide financial level business security support .
Take a city commercial bank as an example , Due to the single customer channel , Lack of digital platform , Tencent security helped the bank build a digital platform for retail credit 、 Big data risk control system and advanced channel customer acquisition system , And combined with Tencent's internal experts to jointly operate , The bank has accumulated users since its launch 170 ten thousand , The number of transactions 40 ten thousand , And already 150 Billion balance .
at present , This scheme has been applied in the Bank of China 、 China Everbright Bank 、 China Minsheng Bank 、 Huaxia bank 、 Jilin Rural Credit 、 Jining bank 、 Bank of Qingdao and other banks have successfully landed , It has served hundreds of millions of users , Escort hundreds of billions of credit funds .
Focus on transaction risk control
Help improve the quality and efficiency of enterprise fraud management
In the era of digital economy , Industrial digitalization and digital industrialization are constantly deepening and evolving , The types and scenarios of business security risks are becoming more and more complex , The anti fraud work in the financial market is also more difficult .
meanwhile ,《 Data security law 》 and 《 Personal information protection law 》 The promulgation of also put forward higher requirements for the anti fraud work of financial institutions . Financial science and technology development plan 2.0 It is highlighted in , We should promote the orderly sharing and comprehensive application of data on the premise of ensuring security and privacy , Fully activate the potential of data elements , Effectively improve the quality and efficiency of financial services .
So , Tencent security is based on long-term accumulated experience in service output of financial service infrastructure , Integrated a set of transaction anti fraud solutions , By sorting out the key information in the transaction process , Provide perception from risk 、 distinguish 、 The risk control capability of the full trading link released by the decision , Combine the global device fingerprint 、 Terminal risk control engine 、 User digital identity 、 Technology such as risk intelligence core , Build a complete closed loop of risk prevention and control , It can provide customers with millisecond level real-time risk control decision-making ability , Meet the corresponding requirements of financial institutions for transaction anti fraud , Provide more perfect business management and business analysis services for retail financial business .
In the practice of cooperating with a state-owned bank , This solution will eventually help the bank build a pre event 、 In the matter 、 Post event multi-dimensional risk model , Cumulative monitoring of high-risk transactions 31.9 Billion pen , Block suspicious transaction amount 118.27 One hundred million yuan .
It is worth mentioning that , In addition to federal Learning Technology , Tencent security self-developed SKAnets Small sample learning method , It can help financial institutions quickly grasp the learning tasks and the characteristics of new fraud patterns in the risk iteration period , Build new model samples even if the samples are very limited , Effectively help financial institutions identify fraud , Quantify risk .
Li Chao, an expert on Tencent security financial risk control, said , Risk control is not only the ballast of financial institutions , It is also the engine of financial institutions . This time, we received the recognition of the China Academy of communications technology on the security capability requirements of Tencent's security business , It further strengthened Tencent's determination to safeguard the safety and beauty of digitalization .
future , Tencent security will rely on 20 Years of safety protection experience , Continue to build consultation covering scenes 、 Solution 、 Risk control services 、 Risk control system and other multi-dimensional product matrix , Build a leading privacy computing decision-making system , Escort the digital transformation of all walks of life .
边栏推荐
- 20220211 failure - maximum amount of data supported by mongodb
- OAI 5g nr+usrp b210 installation and construction
- 在最长的距离二叉树结点
- OneNote in-depth evaluation: using resources, plug-ins, templates
- ICML 2022 | Flowformer: 任务通用的线性复杂度Transformer
- WEB功能测试说明
- Replace Internet TV set-top box application through digital TV and broadband network
- b站视频链接快速获取
- Start the embedded room: system startup with limited resources
- What are RDB and AOF
猜你喜欢

基于深度学习的参考帧生成

MLP (multilayer perceptron neural network) is a multilayer fully connected neural network model.

互联网快讯:吉利正式收购魅族;胰岛素集采在31省全面落地

20220211 failure - maximum amount of data supported by mongodb

Laravel notes - add the function of locking accounts after 5 login failures in user-defined login (improve system security)

No Yum source to install SPuG monitoring

Common English vocabulary that every programmer must master (recommended Collection)

嵌入式开发的7大原罪

监控界的最强王者,没有之一!

Why do job hopping take more than promotion?
随机推荐
js中,字符串和数组互转(二)——数组转为字符串的方法
Why does MySQL index fail? When do I use indexes?
基于深度学习的参考帧生成
Deployment of external server area and dual machine hot standby of firewall Foundation
R language visualizes the relationship between more than two classification (category) variables, uses mosaic function in VCD package to create mosaic plots, and visualizes the relationship between tw
技术分享 | 抓包分析 TCP 协议
Seven original sins of embedded development
Set up a time server
FZU 1686 龙之谜 重复覆盖
【论文解读】用于白内障分级/分类的机器学习技术
WEB功能测试说明
Yyds dry goods count re comb this of arrow function
R language for text mining Part4 text classification
正则表达式收集
Comprehensive evaluation and recommendation of the most comprehensive knowledge base management tools in the whole network: flowus, baklib, jiandaoyun, ones wiki, pingcode, seed, mebox, Yifang cloud,
[MySQL] trigger
面试官:Redis中有序集合的内部实现方式是什么?
This year, Jianzhi Tencent
【Redis设计与实现】第一部分 :Redis数据结构和对象 总结
The most comprehensive new database in the whole network, multidimensional table platform inventory note, flowus, airtable, seatable, Vig table Vika, flying Book Multidimensional table, heipayun, Zhix