Six Measures for Comprehensive Customer Safety



Regulatory Compliance


System Security


Security Certification


Funds Safety


Anti-Fraud


Privacy Protection

Regulatory Compliance

We have always adhered to compliance first, and actively embraced financial regulatory policies in many parts of the world.

Security Certification

Possess various security qualifications, comprehensively protect your information security, keep up with industry information security development trends, and authoritative certification to ensure effective security measures.

Funds Safety

Every penny of yours, we keep it safe under legal and compliant supervision, to protect customer funds safety.

System Security


Online 24/7, never downtime, secure and reliable software and hardware environment.
24/7 continuous protection, let you rest assured.


Data Center Security

High standard data centers make infrastructure more stable.

Network Security

Use HTTPS encrypted transmission channels and digital signature verification technology.

Security Expert Team

Professional security operation team on duty with certificate.

Anti-Fraud


Intelligent risk control engine, escorts every transaction.
Independently developed anti-money laundering and anti-fraud dual-engine system, fund loss prevention rate ranks first in the industry.


Three-in-one

Risk identification, risk decision and risk management, three integrated modules.

Comprehensive rules

Hundreds of risk scenarios, thousands of rule models comprehensively identify anti-fraud risks.

High performance

Millisecond rapid response, most risk events can be predicted in advance.

Privacy Protection


Protect customer information with powerful encryption measures, and strictly control information circulation through systems and processes.
Without your permission, we will never disclose customer information to any third party company.

User Authorization

All actions of collecting and processing customer information are agreed by the information subject.

Privacy Policy

Make commitments to customer information related behaviors to ensure customer privacy security.

Encrypted Storage

Customer information is encrypted and then stored.

Security Monitoring

Monitor the entire life cycle of customer information within the enterprise to ensure safe and compliant use.

Approval Authorization

Ensure all actions on customer information are reasonably reviewed and authorized.

Information Anonymization

Customer sensitive information is anonymized for storage and display.