Close-up of a scientist holding a tray of petri dishes with purple cultures, wearing gloves and safety gear.

Privacy Preserving Anti-Fraud Consortium

Collaborate with industry peers to proactively detect and prevent fraud, without moving data outside your environment.

Consortium improves fraud screening while ensuring data protection across industries

Features Image

AML

Screen customers during onboarding by assessing risk indicators derived from activity across consortium members

Features Image

Payment aggregators

Assess merchants against members’ negative lists to determine prior fraudulent activity across the consortium

Features Image

Gig platforms

Safeguard your proprietary datasets and detection models while empowering institutions to fight fraud confidently

Internal fraud risks for gig platforms scaling with a 12M+ workforce

~5,000

delivery partners deplatformed per month for fraud

₹5,000

spent per incident in direct costs, replacement & handling

4%

gig worker identity discrepancy rate

Account renting / ban evasion

AI fake image claims

Platform-hopping

+more

Leading to

Direct revenue leakage

Pilferage costs

Consumer trust erosion

Operational loss

+more

Right vision,

Right vision,

rethinking execution

rethinking execution

rethinking execution

The consortium model has been validated as a feasible approach by multiple leading organisations.

The consortium model has been validated as a feasible approach by multiple leading organisations.

The consortium model has been validated as a feasible approach by multiple leading organisations.

Eliminating trust gaps during collaboration vs current centralised models can accelerate industry wide adoption.

Eliminating trust gaps during collaboration vs current centralised models can accelerate industry wide adoption.

Eliminating trust gaps during collaboration vs current centralised models can accelerate industry wide adoption.

Features Image

Fraud detection

Unlock richer datasets to proactively identify fraudulent activities and understand customer financial behavior to detect anomalies.

Features Image

Operational efficiency

Reduce false positives, manual delays, costs, and redundant checks to improve operational efficiency.

Features Image

Privacy and compliance

Comply with privacy & fraud/AML regulations while ensuring zero exposure of customer information to maintain competitive edge.

Features Image

Privacy enabled network effects

Eliminate trust gaps to encourage active participation and make the system more effective.

CASE STUDY

CASE STUDY

CASE STUDY

Streamlining cross border transaction compliance

Streamlining cross border transaction compliance

Streamlining cross border transaction compliance

BIS' Project Mandala aims to improve efficiency & automate cross-border compliance. It utilizes MPC for privacy preserving sanction screening & capital flow management.

BIS' Project Mandala aims to improve efficiency & automate cross-border compliance. It utilizes MPC for privacy preserving sanction screening & capital flow management.

Features

Multiple identifiers

Screen customers using single / combination identifiers, such as name, national IDs etc.

Multiple identifiers

Screen customers using single / combination identifiers, such as name, national IDs etc.

Fuzzy matching

Fuzzy algorithms for matching similar names, addresses and other fields

Fuzzy matching

Fuzzy algorithms for matching similar names, addresses and other fields

Conditional logic

Define custom criteria/logic to shortlist customers for screening

Conditional logic

Define custom criteria/logic to shortlist customers for screening

Query Spectrum

Secure matching, proofs, statistical operations, network graphs, ML & others

Query Spectrum

Secure matching, proofs, statistical operations, network graphs, ML & others

Multi-query Handling

Screen multiple customers across multiple participants at the same time

Multi-query Handling

Screen multiple customers across multiple participants at the same time

How it works

The consortium leverages PETs such as MPC and PSI to enable secure data collaboration on encrypted data.

Provision a cloud server

Deploy on your preferred cloud platform to connect your data sources.

Access the platform

Use the interface to register or upload dataset information.

Configure analysis

Select the relevant use case (e.g., screening, monitoring, scoring) and define the parameters for collaboration.

View results

Receive only the processed outcomes and insights, without exposing or sharing raw data.

How it works

The consortium leverages PETs such as MPC and PSI to enable secure data collaboration on encrypted data.

Provision a cloud server

Deploy on your preferred cloud platform to connect your data sources.

Access the platform

Use the interface to register or upload dataset information.

Configure analysis

Select the relevant use case (e.g., screening, monitoring, scoring) and define the parameters for collaboration.

View results

Receive only the processed outcomes and insights, without exposing or sharing raw data.

Economics and governance

Provides incentives for larger players to join the network

Makes scraping attacks uneconomical

Ensures players update / maintain quality of data

Governance council can adjust value of credits to align incentives

Feature Image

Resources