How do Internet financial platforms fight fraud?

Updated on technology 2024-07-08
10 answers
  1. Anonymous users2024-02-12

    We all know thatRisk control is at the core of all financial businesses。The big data risk control of Internet finance is not a subversion of traditional risk control, but a rich traditional risk control. Risk control solves anti-fraud and other phenomena to a large extent.

    As far as I know, there are the following common ways to control the risk of big data in Internet finance:

    Authentication。This is a necessary risk control tool everywhere, and more and more organizations are using user authentication, identity verification, address, work address authentication, and household worker information verification to check the authenticity of applicant data.

    Negative Information Records。Personal credit history is a very important factor to consider when applying for a loan, with negative information and bad credit history to consider. These negative records can directly reflect the credit status of the borrower, and are also one of the necessary data for large-scale data risk control.

    Repayment ability assessment。Big data risk control can not only determine the identity of the borrower, but also evaluate the borrower's repayment ability. Traditional finance is primarily income-based, but some clients' income does not include income, such as investment income and consulting income.

    Other clients may receive additional financial support from parents, partners, and friends.

    Information Sharing。Establish information interconnection and joint prevention and control mechanisms mainly through free or low-cost information sharing platforms. Through the integration of this information, the information-sharing platform can propose a large network of associations and explore high-risk content such as group fraud.

    Social attribute analysis。By analyzing the data, it is possible to judge whether the borrower will default by his social attributes and behavior.

    The financial risk control of Internet big data on users' social behavior and social attribute data has increased the shortcomings of traditional risk control data dimensions to a certain extentCustomers can be more fully aware of fraud and assess customer-level risk.

  2. Anonymous users2024-02-11

    With the development of society, online payment is becoming more and more common, resulting in more and more Internet fraud, and more and more tricks, then.

    1.As the name suggests, it is a frequency of long loans on different platformsrate, still screened by the above latitudes, mainly focused on the device of the application or in a short period of time an IP, usually understood as an intermediary, on the condition of the name of the identity is reproducible application of high-risk groups, will also be placed in a suspected fraud.

    2.There are many checking rulesMost of them are verified through comparison and comparison, fill in your income, work, residence and other purposes, and can capture the data of the platform, with hard comparisons, such as education, gender, age, etc. There are also fuzzy comparisons, such as income level, residential address, unit address (by latitude and longitude, etc.), usually in order to prevent false applicants from filling in, data errors and manslaughter caused by special circumstances (noise), check the rules of this block to take the risk of scoring, scoring calculation and accumulation after processing over the threshold, reaching a certain threshold of artificial interference, to achieve a higher threshold of automatic rejection.

    Usually these scores also have multiple heads.

    3.Social relationships are the main processes that are recorded through you, situationsAre there other dishonest employees, blacklisted personnel, ** and other data collection companies are large enough, even if Tencent can associate more, for example, you are directly in contact with a blacklist to a friend of a level 1 association, you contact, you are a level 2 association.

    4.There is a word in the rules of logic called "exception".。For example, you fill in yourself as a civil servant, but collect data from your collection operator showing that your time is concentrated between 1 a.m. and 4 a.m. on weekdays.

    It also offers a certain amount of fraud. For example, you fill a group of middle management jobs, but the education is junior college and the age is only 24 years old. This is clearly illogical.

    In general, there are of course a lot of other technologies and ideas that are implemented in concrete terms, but basically based on logic and a lot of loan performance data to test the information that customers can fill in and collect. Check if the fraud list you fill out or the fields you fill in belong to a high-risk area or high-risk group, or if your personal portrait is clearly out of line with logic.

  3. Anonymous users2024-02-10

    The meaning of internet financial fraud is as follows:

    1. Financial fraud refers to the use of fictitious facts or methods to conceal the truth of facts for the purpose of illegal possession, to defraud public or private property or the credit of financial institutions, and to undermine the order of financial management. There are five crimes that can be constituted by the unit, including fundraising fraud, bill fraud, financial voucher fraud, letter of credit fraud, and insurance fraud;

    2. The crime of financial fraud is separated from the crime of ordinary fraud, but the crime of financial fraud is not a crime of fraud in the traditional sense. The criminal law separates it from the ordinary crime of fraud, in addition to breaking down the crime of fraud, which is a pocket crime, and the main reason is to maintain the order of financial management. In the major Internet financial platforms that provide loans, a kind of loan fraud is also prevalent.

    The borrower obtains valid identity information through information sellers, and borrows or spends money on the Internet financial platform in the identity of others. On some platforms, there is no shortage of employees who collude with borrowers inside and outside to over-package borrowers' information, so that those who could not borrow can also borrow money, embezzling company assets in disguise.

    Legal basis: Article 266 of the Criminal Law of the People's Republic of China.

    where public or private property is defrauded, and the amount is relatively large, a sentence of up to three years imprisonment, short-term detention or controlled release is to be given, and/or a fine;

    where the amount is huge or there are other serious circumstances, a sentence of between 3 and 10 years imprisonment and a concurrent fine is to be given;

    where the amount is especially huge or there are other especially serious circumstances, a sentence of 10 or more years imprisonment or indefinite imprisonment is to be given, and a concurrent fine or confiscation of property.

  4. Anonymous users2024-02-09

    Legal analysis: 1. Report the case to the local public security department as soon as possible.

    1.Screenshot of payment record or bank transfer slip;

    2.Screenshot of chat history;

    3.call recording;

    4.Screenshot of SMS record;

    5.Correspondence emails.

    Legal basis: Civil Code of the People's Republic of China

    Article 148:Where one party uses fraudulent means to cause the other party to carry out a civil juristic act contrary to its true intentions, the defrauded party has the right to request that the people's court or arbitration institution revoke it.

    Article 149:Where a third party commits fraudulent conduct, causing one party to carry out a civil juristic act contrary to its true intentions, and the other party knows or should know of the fraudulent conduct, the defrauded party has the right to request that the people's court or arbitration body revoke it.

    Article 150:Where one party or a third party uses coercion to cause the other party to carry out civil juristic acts contrary to their true intentions, the coerced party has the right to request that the people's court or arbitration body revoke it.

    Criminal Law of the People's Republic of China

    Article 192:Where fraudulent methods are used to illegally raise funds for the purpose of illegal possession, and the amount is relatively large, a sentence of between three and seven years imprisonment and a concurrent fine is to be given; where the amount is huge or there are other serious circumstances, a sentence of 7 or more years imprisonment or indefinite imprisonment is to be given, and a concurrent fine or confiscation of property.

    Where a unit commits the crime in the preceding paragraph, the unit is to be fined, and the directly responsible managers and other directly responsible personnel are to be punished in accordance with the provisions of the preceding paragraph.

    Article 266:Where public or private property is defrauded and the amount is relatively large, a sentence of up to three years imprisonment, short-term detention or controlled release is to be given, and/or a fine; where the amount is huge or there are other serious circumstances, a sentence of between 3 and 10 years imprisonment and a concurrent fine is to be given; where the amount is especially huge or there are other especially serious circumstances, a sentence of 10 or more years imprisonment or indefinite imprisonment is to be given, and a concurrent fine or confiscation of property. Where this Law provides otherwise, follow those provisions.

  5. Anonymous users2024-02-08

    Legal analysis: Call 110 to report to the police, or you can report to the public security organ where you were deceived. Log in to the Ministry of Public Security Cybercrime Report**:

    2. You can report multiple clues at a time, inquire about the disposition of previous reports, and non-registered whistleblowers can report one clue at a time;

    Legal basis: Criminal Procedure Law of the People's Republic of China

    Article 110: Any unit or individual discovering the facts of a crime or a criminal suspect has the right and obligation to report or report the case to the public security organs, people's procuratorates, or people's courts.

    Public security organs, people's procuratorates, or people's courts should all accept reports, accusations, or reports in turn. Where it is not within their own jurisdiction, it shall be transferred to the competent organs for handling, and the informant, accuser, or informant shall be notified; Where emergency measures must be taken that are not within their jurisdiction, they shall first take emergency measures and then transfer them to the competent organs.

    Where the offender voluntarily surrenders to the public security organs, people's procuratorates, or people's courts, the provisions of paragraph 3 apply.

  6. Anonymous users2024-02-07

    Complaints, police reports, and lawsuits through multiple channels.

    1) Complaints through multiple channels.

    At present, wealth management products are characterized by diversity and fast product updates, and if you only rely on the elimination method to solve the fraud, misleading sales or investment traps, it is not ideal, and should be solved through multiple channels. Investment and wealth management services are often the process of concluding service contracts, and rights protection through the competent authorities is a part, and relevant investors can also use the Contract Law to solve problems through litigation. Investors can also complain to the regulatory authorities, such as the China Securities Regulatory Commission, the China Banking Regulatory Commission or the Insurance Regulatory Commission, or even the People's Bank of China, and if they are involved in fraud, they can also go directly to the public security organs to report the case.

    At the same time, investors can also report to the relevant ** industry, ** shady industry, arouse social attention, and prompt enterprises to solve the problem as soon as possible.

    b) Call the police. Calling the police is a reluctant move for investors, and they will only go to the police if they have no way to recover the money themselves. Of course, in practice, some economic disputes, many parties also want to resolve them by calling the police, which is not feasible, so the Ministry of Public Security has relevant regulations, which clearly require that public security organs cannot get involved in economic disputes. Therefore, when investors go to the police to report to the police, most of the time, the public security organs do not file a case on the grounds that it is an economic dispute, unless the number of cases continues to increase, and a large number of reports have been made.

    In this case, the public security organs will file a case for investigation and investigate the legal responsibility of the relevant responsible persons.

    3) Litigation. After the case occurs, many parties do not choose to litigate, the reason is nothing more than the long time and high cost of litigation, and they may not be able to win, or even win the lawsuit and lose the money, and the investment money cannot be executed back at all. However, in some cases, when the public security organs do not care and the relevant regulatory authorities cannot handle them, litigation has become the only way to protect rights. As for how to litigate, it is necessary to design specific litigation ideas and prepare evidence according to the circumstances of the specific case.

    Different cases and different causes of action require different evidence to support them.

  7. Anonymous users2024-02-06

    Where the facts of fraud or the fraud suspect are discovered, they shall promptly call 110 or report the case to the public security organs, and the public security organs are to file a case for investigation and pursue the legal responsibility of the perpetrators.

  8. Anonymous users2024-02-05

    Report through 315**, and then pay attention to prevent next time don't be fooled, the rest is not a problem, I suggest this is the solution!

  9. Anonymous users2024-02-04

    Lodge a complaint with the Investigation Department of the Protection of the Rights and Interests of Financial Consumers in China.

    Web Link Complaint Form.

  10. Anonymous users2024-02-03

    I was also deceived by this kind of financial platform before, because I was too greedy, and then I met a team and recovered the funds, and I must not be obsessed with money in the future

Related questions
6 answers2024-07-08

Modern information technology, represented by the Internet, especially mobile payment, cloud computing, social networks and search engines, will have a fundamental impact on the existing financial model. It is possible to form a third financial operation mechanism that is different from the indirect financing of commercial banks and the direct financing of the capital market, which the industry calls the "Internet finance model". So when traditional financial services are combined with emerging Internet technologies, what kind of chemical reaction will be generated? >>>More

6 answers2024-07-08

At present, the more representative Internet financial service platforms (mainly engaged in online loan business) are as follows: Kaixin Loan, Lu Financial Services, Renren Loan, etc. On how to choose the right platform for you, here are a few tips for your reference: >>>More

14 answers2024-07-08

Encyclopedia explains that Internet finance refers to an emerging finance that relies on Internet tools such as payment, cloud computing, social networks and search engines to realize financial integration, payment and information intermediary. Internet finance is not a simple combination of the Internet and the financial industry, but a new model and new business that naturally arises to adapt to new needs after being familiar and accepted by users (especially the acceptance of e-commerce) in the realization of security, mobile and other network technologies. >>>More

12 answers2024-07-08

Web search refers to the use of search engines, such as, to search for information on the Internet. The user enters a keyword to search, and the search engine finds a web page that matches the keyword from the index database; For ease of judgment by the user, in addition to the page title and URL, a snippet from the page and other information are provided.

6 answers2024-07-08

In the past few years, I have gone from being a pure Internet practitioner to someone who helps traditional entrepreneurs try their Internet dreams. Different from general Internet training, it can take an hour to familiarize traditional entrepreneurs with the hot concepts of the Internet, or it can take a day to make entrepreneurs look forward to the Internet, but it is difficult for entrepreneurs to make a difference in a month or more. >>>More