Rigorous compliance
System protection
Security certification
Fund protection
Fight fraud
Privacy protection
Integrated module
Risk identification, risk decision-making,
risk management all-in-one module
Comprehensive rules
100+ risk scenarios and 1000+ rule-based models
to uncover risks at every nook and cranny
Efficient performance
Respond in 80ms and preview
90% of risk events
Server room security
Server room built in line with international standards
to ensure more stable operation of infrastructure
Cybersecurity
Https encryption for secure data transmission
channel and signature verification technique
Security experts
Certified security O&M team
User permission
Before processing your information,
we ask for your permission first
Privacy policies
We are responsible for our behavior
so you don't need to worry about privacy
Encrypted storage
All your information will
be encrypted before storage
Security monitoring
Monitor your information throughout
its lifetcycle for safe and compliant use
User approval
Any move on your information
must be approved first
Data masking
Data masking will be performed to all your
sensitive information before storage or display