Font Size: a A A

Design And Implementation Of Bank Acquirement Risk Monitoring System

Posted on:2017-05-12Degree:MasterType:Thesis
Country:ChinaCandidate:S YangFull Text:PDF
GTID:2359330533469013Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Mobile Intelligence terminals terminal technology is accompanied by the rapid development and popularization,the bank will focus on the acquisition of business,its popularity on the special merchants can also bring a lot of convenience and profit.There are many potential risks,such as the application of false and untrue information for the qualification of special merchant;the re-recording of the equipment on the POS machine,the theft of cardholder information;breach of confidentiality agreement Disclosure of accounts and transaction information;cash,wash and so on.Based on the project of Kunlun Bank's Receipt Transaction Risk Monitoring System,this paper describes how to detect and analyze the data of the merchant through the acquisition risk monitoring system and make early warning of the risk result and assist the business personnel in decision-making operation.And ultimately to monitor the purpose of the acquisition risk.Based on the point of view of banking business processes and management requirements,the system is analyzed in depth,taking into account the actual application and management of the scene,the technical implementation of the system will consider Web application service architecture in J2 EE platform,In accordance with the different levels of presentation layer,service layer,persistence layer,will use AJAX and JavaScript and other mainstream methods to achieve the front application,while using Hibernate to achieve stable data access.For the analysis and processing of data,in the Linux system environment,using the Unix programming language to interact with t he main control service,batch or quasi-real-time detection of data through the Shell language file script and start the process control script and other auxiliary role.For the storage of data is used in the DB2 database.Contents are focus the four modules of case management module.Risk rule management module,wind control service processing module and monitoring workflow module will be discussed and discussed.Case management module,the results of the analysis of the page displayed on the alarm,according to the business case,you can view the details,check the merchant's account type and the business of the alarm results analysis,and can delay the accounting business processing;risk management module,The system needs to provide a rule-making interface,which pro vides the necessary interface for the rule-making,including the creation and testing of the rules,the setting of the rules and the setting of the alarm,and the deletion of the rule.The system administrator can perform the functions of the users and roles of the system.Monitoring and management of workflow management system,the detection system should provide alarm reminder,fraud confirmation,verification processing(that is,to send a fax,send a fax to the user to identify the role of the user,Support,efficiency evaluation and other aspects of the support function,and so on,and so on,and so on.Through the study of this subject,we have achieved the design and functional requirements acquiring risk management systems.Currently,the system completes the function,performance and other tests,in line with the requirements of the line.The system has been put into operation at present.
Keywords/Search Tags:Risk Monitoring, Warning, Quasi-real-time and batch detection, Case Management
PDF Full Text Request
Related items