Tagged articles
10 articles
Page 1 of 1
Chen Tian Universe
Chen Tian Universe
Aug 25, 2025 · Information Security

Master Payment Security: Proven 20-Year Methods to Stop Leaks, Tampering & Fraud

Payment security encompasses protecting sensitive data, preventing transaction tampering, fraud, and service attacks; this comprehensive guide details the main threats, core safeguards such as encrypted storage and transmission, digital signatures, PCI compliance, key management, and practical encryption algorithms like AES and RSA for robust, real‑world implementations.

PCI compliancedigital signaturesencryption
0 likes · 50 min read
Master Payment Security: Proven 20-Year Methods to Stop Leaks, Tampering & Fraud
DataFunSummit
DataFunSummit
Sep 28, 2023 · Big Data

Real‑time Risk Control Practices at NetEase Games Using Apache Flink

The article details NetEase Games' challenges in payment‑environment risk control and explains how they transformed a T+1 batch workflow into a fully real‑time risk‑control system with Apache Flink, describing the platform architecture, data modeling, session windows, joins, and future development plans.

Big DataFlinkReal-time Risk Control
0 likes · 19 min read
Real‑time Risk Control Practices at NetEase Games Using Apache Flink
Laravel Tech Community
Laravel Tech Community
Sep 26, 2022 · Information Security

Why Mobile Payment Passwords Are Limited to Six Digits: Security, Brute‑Force, and Human Memory Limits

The article explains why popular mobile payment platforms like WeChat and Alipay use six‑digit numeric passwords, discussing brute‑force attack complexity, the rapid growth of computing power, human short‑term memory limits, and additional authentication layers that together make six‑digit passwords a practical balance of security and usability.

brute forcecognitive psychologypassword length
0 likes · 5 min read
Why Mobile Payment Passwords Are Limited to Six Digits: Security, Brute‑Force, and Human Memory Limits
Programmer DD
Programmer DD
Oct 13, 2020 · Information Security

How Payment Platforms Secure Data: From DES to TLS and RSA

This article explains the security architecture of payment platforms, covering terminal data protection, symmetric and asymmetric encryption methods such as DES, 3DES, AES, and RSA, code implementations for Android, TLS transmission security, anti‑tampering signatures, and practical key‑management strategies.

AndroidDESRSA
0 likes · 20 min read
How Payment Platforms Secure Data: From DES to TLS and RSA
Programmer DD
Programmer DD
May 18, 2020 · Operations

Understanding Bank Card Payments: Online Banking vs Quick Pay Explained

This article explains the principles and workflows of bank card payments, comparing online banking (netbank) and quick pay methods, detailing their processes, security measures, common integration pitfalls, and best practices for reliable payment system implementation.

Integrationbank paymentonline banking
0 likes · 13 min read
Understanding Bank Card Payments: Online Banking vs Quick Pay Explained
Alibaba Cloud Developer
Alibaba Cloud Developer
Nov 21, 2018 · Artificial Intelligence

How Unsupervised Autoencoders Boost International Credit Card Fraud Detection

International credit card fraud, a growing threat, can be more effectively identified by applying unsupervised autoencoder models, which outperform traditional rule‑based systems by tripling recall and increasing accuracy by 40%, while reducing maintenance costs and adapting to new fraud patterns.

AutoencoderUnsupervised Learninganomaly detection
0 likes · 9 min read
How Unsupervised Autoencoders Boost International Credit Card Fraud Detection
21CTO
21CTO
May 16, 2016 · Information Security

Building a Scalable Payment Risk Control System: Architecture & CEP

This article outlines the design of a payment risk control system, detailing functional and non‑functional requirements, core components such as real‑time, near‑real‑time, and batch engines, rule and penalty centers, and explains the role of CEP and Drools in achieving flexible, high‑performance fraud detection.

CEPDroolsReal-time Processing
0 likes · 12 min read
Building a Scalable Payment Risk Control System: Architecture & CEP
Architecture Digest
Architecture Digest
May 15, 2016 · Information Security

Design and Architecture of a Payment Risk Control System

The article explains the functional and non‑functional requirements, common pitfalls, and detailed architecture—including real‑time, near‑real‑time, and batch engines, rule and penalty centers, and CEP technology—of a payment risk control system aimed at detecting and mitigating fraud while maintaining performance and flexibility.

CEPReal-time ProcessingSystem Architecture
0 likes · 12 min read
Design and Architecture of a Payment Risk Control System