Back to Home
Anti-Fraud & AML

Compliance Program

GhostPay Mesh is designed with regulatory compliance at its core. Our multi-layered approach to anti-fraud and AML ensures secure, transparent, and auditable transactions.

01

Real-time protection at every layer.

Our fraud prevention system monitors, analyzes, and responds to threats across the entire transaction lifecycle.

Real-Time Monitoring

Every transaction is analyzed in real-time against behavioral models, geographic patterns, and historical data to detect anomalies before settlement.

Device Fingerprinting

Unique device identifiers combined with velocity limits prevent unauthorized replication and mass-creation of payment promises.

Risk Flag System

Transactions are classified into risk tiers with automated responses ranging from standard processing to full blocking.

LOW MEDIUM HIGH CRITICAL

Automated Blocking

Suspicious patterns trigger automatic blocking — including rapid-fire transactions, amount anomalies, and coordinated device networks.

Manual Review

Flagged transactions undergo human review by trained compliance analysts with access to full transaction context and audit trails.

Transaction Risk Assessment Flow

Transaction Created
Risk Analysis
Score Assignment
Action / Settlement
02

Layered controls against illicit activity.

Our AML framework combines identity verification, transaction limits, and time constraints to prevent misuse of the protocol.

KYC Verification

Enterprise accounts undergo full Know Your Customer verification including document validation, beneficial ownership checks, and PEP screening.

Transaction Limits

Enforced limits across multiple dimensions to prevent accumulation and layering of illicit funds through the protocol.

Short TTL Enforcement

Payment promises expire within 24 hours by default (7 days max), preventing long-term value storage outside the regulated settlement system.

Complete Audit Trail

Every transaction generates immutable audit records with correlation IDs, enabling full reconstruction of any transaction chain.

Limit Value Scope
Daily Device Limit R$ 5,000 Per device / 24h
Single PLC Amount R$ 1,000 Per payment promise
Default TTL 24 hours Per promise
Maximum TTL 7 days Enterprise only
03

Built on regulatory standards.

Our compliance framework aligns with international standards and Brazilian regulatory requirements.

LGPD Compliance

Full compliance with Brazil's General Data Protection Law, including data minimization, consent management, and the right to deletion.

PCI-DSS Roadmap

Active roadmap toward PCI-DSS Level 1 certification for card data handling, with current tokenization-first architecture.

SOC 2 Type II

Preparing for SOC 2 Type II audit covering security, availability, processing integrity, confidentiality, and privacy controls.

Privacy by Design

Privacy considerations are embedded into every protocol decision — from minimal data collection to on-device key generation.

Security Assessments

Regular penetration testing, vulnerability assessments, and third-party security audits ensure continuous protection.

04

Intelligent threat detection.

Multi-dimensional analysis identifies fraudulent patterns across transactions, devices, and networks.

Pattern-Based Detection

Machine learning models trained on transaction patterns identify fraud signatures including structuring, layering, and smurfing attempts.

Geographic Anomaly

Detects impossible travel patterns, unusual geographic concentrations, and cross-border transaction anomalies.

Velocity Checks

Rate limiting and velocity analysis detect rapid-fire transaction attempts, bulk promise creation, and automated abuse.

Amount Anomaly

Statistical models identify unusual transaction amounts, structured deposits just below reporting thresholds, and sudden behavioral changes.

Network Analysis

Graph-based analysis identifies coordinated fraud rings, device sharing patterns, and collusion between seemingly unrelated accounts.

05

Complete traceability, always.

Every action in the protocol generates structured, immutable records designed for regulatory review and forensic analysis.

Structured Audit Logs

Every event is logged with correlation IDs, timestamps, actor identifiers, and contextual metadata for full chain reconstruction.

Double-Entry Ledger

Cryptographic double-entry bookkeeping ensures every debit has a corresponding credit, providing mathematical proof of balance integrity.

Compliance Dashboard

Real-time dashboard for compliance teams with alert management, case tracking, and regulatory reporting tools.

Incident Response

Documented incident response procedures with defined escalation paths, communication templates, and post-mortem processes.

Regulatory Reporting

Automated generation of Suspicious Activity Reports (SARs), Currency Transaction Reports (CTRs), and regulatory filings.