Security

Onlypay provides safe and high-quality products and services, and has won many authoritative security certifications to ensure that the security system is perfect and effective

Information security system

Information security system

OnlyPay has established a sound information security management system to protect the confidentiality, integrity and availability of information assets through reasonable and effective information security technologies and management processes.

Privacy protection design

Privacy protection design

OnlyPay attaches great importance to the security of users' personal information. We have adopted security technology and other multi-level protection measures that meet the international card payment industry standards to minimize the risk of your information being leaked, unauthorized access and so on.

Regulatory Compliance Compliance

Regulatory Compliance Compliance

OnlyPay always adheres to the compliance business. We comply with laws and regulations from around the world as well as industry regulatory requirements, incorporating compliance requirements into product design.

Network security level protection

Network security level protection

Network security level protection is the basic system, basic strategy and basic method of China's network security guarantee. The network security level protection work includes five stages: classification, filing, construction and rectification, rating evaluation, supervision and inspection. The security level of the classified objects is regularly evaluated.

PCI-DSS LEVEL1

PCI-DSS LEVEL1

The highest security certification in the international card payment industry, formulated by the founding members of the PCI Security Standards Committee (Visa, Mastercard, American Express, Discover Financial Services, JCB, etc.), is the most stringent and highest level Financial data security standard in the world.

ISO27001 Information security management system

ISO27001 Information security management system

ISO27001 is a widely recognized security management system standard in the industry. It is considered to be the most authoritative and strict information security system certification standard in the world and is widely accepted worldwide. This standard is used for the construction and implementation of the organization's information security management to ensure all aspects of the organization's information security through the management system.

Anti-fraud

Independently develop intelligent wind control anti-money laundering anti-fraud dual-engine system, to protect every transaction, the industry's first echelon of capital loss prevention rate

three-in-one

three-in-one

Integrate risk identification, risk decision-making and risk management

Comprehensive rules

Comprehensive rules

Risk scenarios, thousands of rule models, comprehensive identification of anti fraud risks

High performance

High performance

80ms fast response, 90% of risk events are predicted in advance

system safety

24h online, never down, secure and reliable hardware and software environment, 24h continuous guarantee, so you have no worries

Room Safety

Room Safety

Meet the highest international standards to make infrastructure more stable

network security

network security

Encrypt transmission channels using HTTPS and sign-and-check Technology

Security Specialist Team

Security Specialist Team

Professional Safety Operations and Maintenance Team, Certified

Privacy protection

Strong encryption protects customer information and controls the flow of information through strict systems and processes. Without your permission, you will never disclose customer information to any third-party company

User Authorization

User Authorization

All acts of customer information collection and processing are agreed by the information subject

Privacy Policy

Privacy Policy

Commitment to customer information related behavior to ensure customer privacy and security

Encrypted storage

Encrypted storage

Customer information is encrypted and re-stored

safety monitoring

safety monitoring

Entire lifecycle monitoring of enterprise customer information to ensure safe and compliant use

Approval Authorization

Approval Authorization

Ensure that all actions on customer information are properly authorized for approval

Information desensitization

Information desensitization

Customer sensitive information is desensitized stored and displayed

Safety tips

Ensure the security of network payment and raise security awareness.

  • Ensure Terminal Security

    Install antivirus software for your terminal, update antivirus software and operating system patches in time. Download and install controls and software paid by banks and third parties directly from the official website.

  • Beware of unknown links and installation files

    Please be careful not to download and install unknown files when using the Internet. Please do not easily click on unknown links from others, especially when it comes to payments and transactions, beware of Trojan horse viruses and phishing software.

  • Keep sensitive information well

    Personal information such as identity card information, account information, bank card information, mobile phone number, etc. should be properly kept and not easily provided to others. Don't save your ID card or bank card photos in your mobile photo album, and don't easily reserve sensitive information on small or unknown websites.

  • Do not disclose account password

    Please do not disclose your account and password information to anyone, and do not trust any behavior that requires your account and password by e-mail, text message, telephone, etc. Do not save account or password information in the browser, periodically clean up the cache, cookies, forms and other information in the browser.

  • Use public WiFi or PC with caution

    Please try not to use unfamiliar public Wi-Fi, unknown Wi-Fi and passwordless Wi-Fi, which can easily lead to personal information disclosure. Please use public computers with caution. Computers in public environments are vulnerable to virus implantation by non-molecule and intrusion into personal accounts. If you use the Internet to pay on a public computer, quit the account in time and confirm that all information has been cleared before closing the browser.

  • Attention to Dynamic Authentication Code Security

    Dynamic verification codes, such as SMS verification codes and dynamic passwords, involve account security and financial security and cannot be provided to anyone else, including self-declared official staff or customer service personnel. Any requests for dynamic authentication codes should remain highly alert.

  • Attach importance to password security

    Setting a strong password is important for your financial and information security. Avoid using continuous, repetitive and simple combination of numbers as passwords, avoid easily guessed passwords such as birthdays, abbreviations, phone numbers, ID numbers, and use high-level passwords with upper and lower case letters, numbers and matching combinations. Change your password regularly.