i-RiskGate

i-RiskGate

Identify, manage and block suspicious and potentially costly fraudulent transactions with our i-RiskGate.
Customize its rule-based filters and tools to your business requirements. We take care of the complexities of risk
management so you can focus on what you do best.
Identify, manage and block suspicious and potentially costly fraudulent transactions with our i-RiskGate. Customize its rule-based filters and tools to your business requirements. We take care of the complexities of risk management so you can focus on what you do best.

HongLan智能风控系统

Flexible and Well-Developed Risk Rules Configuration

Flexible and Well-developed Risk Rules Configuration

Combine multiple rules and different settings to screen transactions arising across the globe. Fraud methods and trends vary greatly across
markets,channels and payment methods. Thus a configurable risk rules engine is essential. Well-developed rules taking into consideration
different elements such as geography, issuer, transaction amount, transaction history, transaction velocity and more. Bespoke customer risk profile configuration adapted for
different behavioral models.
Combine multiple rules and different settings to screen transactions arising across the globe. Fraud methods and trends vary greatly across markets,channels and payment methods. Thus a configurable risk rules engine is essential. Well-developed rules taking into consideration different elements such as geography, issuer, transaction amount, transaction history, transaction velocity and more. Bespoke customer risk profile configuration adapted for different behavioral models.

i-RiskGate智能风控

Correlated Transactions Detection

Correlated Transactions Detection

Detect correlated transactions using different elements such as IP address, card number, e-mail address, telephone number and more and mark the related suspicious transactions. Confirmed related transactions will be added to the blacklist of high risk information while suspected related transactions will be sent for review. Detect correlated transactions using different elements such as IP address, card number, e-mail address, telephone number and more and mark the related suspicious transactions. Confirmed related transactions will be added to the blacklist of high risk information while suspected related transactions will be sent for review.

关联账户监测
灵活的3DS验证

Agile 3DS Authentication

Agile 3DS Authentication

Determine the necessity of 3DS authentication taking into consideration different parameters, such as country, transaction amount, history data, velocity, user assessment score and more. Automatically adjust risk rules in accordance with result of 3DS authentication for future transactions. Determine the necessity of 3DS authentication taking into consideration different parameters, such as country, transaction amount, history data, velocity, user assessment score and more. Automatically adjust risk rules in accordance with result of 3DS authentication for future transactions.

信用评分体系

User Assessment Scoring

User Assessment Scoring

Establish user assessment scoring system by utilizing results from behavioral analytics, particularly real-time assessment for new users. Leverage machine learning algorithm to constantly update user assessment scores on the basis of new behavior analysis from which risk management rules are automatically adjusted. Establish user assessment scoring system by utilizing results from behavioral analytics, particularly real-time assessment for new users. Leverage machine learning algorithm to constantly update user assessment scores on the basis of new behavior analysis from which risk management rules are automatically adjusted.

高效的人工审核机制

Manual Review for Added Security

Manual Review for Added Security

Through our risk management, unusual activities will instantly trigger manual review. Different aspects and multiple dimensions will be considered. Combine risk scoring, user assessment scoring, rule-based risk algorithm and more. Attach detailed results of analysis for your decision making, hence resulting in higher approval rates and lower chargebacks. Through our risk management, unusual activities will instantly trigger manual review. Different aspects and multiple dimensions will be considered. Combine risk scoring, user assessment scoring, rule-based risk algorithm and more. Attach detailed results of analysis for your decision making, hence resulting in higher approval rates and lower chargebacks.

Bioidentification Technology

Bioidentification Technology

Enable bioidentification to ensure that provided information is associated with the real person before delivering
services or attempting to collect payments. Identity authentication questions may be deployed for true identity verification.
Enable bioidentification to ensure that provided information is associated with the real person before delivering services or attempting to collect payments. Identity authentication questions may be deployed for true identity verification.

  • 真实身份验证

    Voice

    Voice

  • 支付持续优化服务

    SMS

    SMS

  • 降低退单率

    E-mail

    E-mail

  • 高效的支付优化

    Social Media

    Social Media

Voice

voice

SMS

SMS

E-mail

E-mail

机器自学习算法
高效的行为分析系统

Robust and Extensive Behavior Analytics System

Robust and Extensive Behavior Analytics System

Define "normal" behaviors in different scenarios to compare with spot transaction behaviors, with analysis considering transaction time, location, amount, velocity, acceptance rate and other elements. Using machine learning to continually profile and update behaviors. Define "normal" behaviors in different scenarios to compare with spot transaction behaviors, with analysis considering transaction time, location, amount, velocity, acceptance rate and other elements. Using machine learning to continually profile and update behaviors.

设备指纹识别

Innovative Device Fingerprinting Combination

Innovative Device Fingerprinting Combination

Device fingerprinting adopts Javascript code or SDK to proactively collect related information and characteristics. Passive device fingerprinting can be used to broaden its application scenarios through extracting and validating information from across devices while allowing privacy protection. Device fingerprinting adopts Javascript code or SDK to proactively collect related information and characteristics. Passive device fingerprinting can be used to broaden its application scenarios through extracting and validating information from across devices while allowing privacy protection.

提高支付成功率

Optimization Specialist Team

Optimization Specialist Team

A committed global fraud prevention team consists of professionals who are highly knowledgeable on risk management, allowing you to enjoy a full-suite of risk management tools for your unique business needs. A committed global fraud prevention team consists of professionals who are highly knowledgeable on risk management, allowing you to enjoy a full-suite of risk management tools for your unique business needs.

风险评分

Dedicated and Efficient Customer EXcellence Team

Dedicated and Efficient Customer Relationship Team

The relationship manager, data analyst and technical support constitute our core customer relationship team, guaranteeing a 24 hour turnaround time to merchant’s queries with an answer and solution. The relationship manager, data analyst and technical support constitute our core customer relationship team, guaranteeing a 24 hour turnaround time to merchant’s queries with an answer and solution.

HongLan风控

Optimization Review

Optimization Review

Multi-dimensional analytics on transaction data on a quarterly basis in terms of fraud control, chargeback data, reject rate, 3D Secure, country, tokenization, card issuer, APM, and cardholder base.Quarterly report consisting of advice on optimization ,suggestions and implementation strategy. Multi-dimensional analytics on transaction data on a quarterly basis in terms of fraud control, chargeback data, reject rate, 3D Secure, country, tokenization, card issuer, APM, and cardholder base.Quarterly report consisting of advice on optimization ,suggestions and implementation strategy.

降低拒付率

The First 3 Months of The Journey

The First 3 Months of the Journey

Design the fraud and acquiring structure based on merchant’s business model, and provide weekly enhancements to structure based on data collected. Stabilize the payment infrastructure within the first 3 months with the optimal approval rates and fraud settings. Design the fraud and acquiring structure based on merchant’s business model, and provide weekly enhancements to structure based on data collected. Stabilize the payment infrastructure within the first 3 months with the optimal approval rates and fraud settings.

降低退单率

Connection and Optimization

Connection and Optimization

Provide advice in rich data analysis, connection settings optimization, acquiring channel optimization, fraud optimization, introduction of new payment methods, and cost optimization. Instantly implement the results of the analysis on our system with little or no involvement from merchant. Provide advice in rich data analysis, connection settings optimization, acquiring channel optimization, fraud optimization, introduction of new payment methods, and cost optimization. Instantly implement the results of the analysis on our system with little or no involvement from merchant.

行为模式分析

Intelligent Monitoring and Alarm

Intelligent Monitoring and Alarm

Use intelligent machine learning system from live events taking place on desktop and mobile device across the world to create behavior monitoring models so that different merchants, different time frames, different behaviors will be accurately monitored. Unusual transactions and behaviors that violate the behavior model will automatically raise alarms, different level of which will trigger different follow-up actions including blacklisting unusual data, telephone and e-mail notification, etc. Use intelligent machine learning system from live events taking place on desktop and mobile device across the world to create behavior monitoring models so that different merchants, different time frames, different behaviors will be accurately monitored. Unusual transactions and behaviors that violate the behavior model will automatically raise alarms, different level of which will trigger different follow-up actions including blacklisting unusual data, telephone and e-mail notification, etc.

PAYMENT FRAUD INSURANCE
欺诈付款保障机制

Payment Fraud Insurance

Payment Fraud Insurance

Pay minimal fee to simplify risk management for 100% chargeback protection of your transactions, therefore optimizing sales and maximizing growth potential while reducing fraud rates. You are relieved from complicated dispute handling and financial complexity. Pay minimal fee to simplify risk management for 100% chargeback protection of your transactions, therefore optimizing sales and maximizing growth potential while reducing fraud rates. You are relieved from complicated dispute handling and financial complexity.

More to Explore

More to Explore