A hardened, vendor-neutral microservice that sits inside your bank's network. Raw PII goes in, anonymized signals go out — to any fraud vendor, ML platform, or regulatory system you choose.
The Edge Gateway is the single privacy boundary between your internal systems and every external consumer of transaction intelligence.
The same anonymized signal format works across all downstream consumers. Connect once, share everywhere.
Stream anonymized transaction signals to your fraud vendor's real-time scoring engine. They detect patterns across your portfolio without accessing customer PII. Supports NICE Actimize, Featurespace, FICO, or any vendor with a REST/Kafka ingest.
Export anonymized historical signals to your ML platform for fraud model training. Identity mosaics are deterministic — the same customer always produces the same hash, enabling behavioral modeling without PII exposure.
Contribute anonymized signals to a shared intelligence network. Detect multi-bank structuring, mule routes, and credential stuffing that no single institution can see. The Hub correlates mosaics across banks — you keep your PII.
Generate privacy-safe aggregate signals for Central Bank reporting and FIU submissions. Amount tiers and near-threshold flags support AML structuring detection. Compliance officers use /resolve-pii locally for SAR re-identification.
Feed anonymized fraud signals into your SIEM for correlation with other security events. Device hashes, IP hashes, and branch IDs enrich your threat model without creating a PII liability in your security toolchain.
Share transaction patterns with external auditors and forensic investigators without exposing raw customer data. Auditors work with mosaics and tiers; only authorized compliance officers can resolve identities locally.
Built around one principle: PII never crosses your network boundary. Every feature serves that promise.
Four deterministic steps between your internal systems and any external consumer.
POST /process receives raw transaction JSON from any internal source. Validates fields, enforces 1MB body limit.
Creates Identity Mosaic, maps amount to tier, converts location to geohash, hashes device & IP fingerprints.
Computes HMAC-SHA256 over the payload. Downstream systems verify integrity via X-Intel-Signature header.
Sends the anonymized signal to the configured endpoint over TLS with automatic retry on transient failures.
One Docker image. Environment variables for credentials. A single REST endpoint. If your system can POST JSON, you're ready.
Set HUB_API_URL to your fraud vendor's ingest endpoint, your ML platform's API, or any system that consumes signals.
Run the Docker image inside your private network. Set your BANK_SALT, API credentials, and HMAC_SECRET for payload signing.
Point your CBS, ATM switch, or mobile backend to POST transactions to /process. Anonymized signals flow automatically.
edge-gateway: image: edgegw:latest environment: - INSTITUTION_ID=BNK_001 - API_KEY=<your API key> - HMAC_SECRET=<shared signing secret> - HUB_API_URL=https://vendor.example.com/api/signals - BANK_SALT=<min-32-char-local-secret> - REGIONAL_PEPPER=<network-shared-pepper> ports: - "8080:8080"
{
"institution_id": "BNK_001",
"signal_type": "transaction",
"identity_mosaic": "a3f8c1...e7b2d4",
"metadata": {
"amount_tier": "TIER_3",
"location_zone": "s1499",
"is_near_threshold": true,
"device_id_hash": "7d2f1a...c9e0b3",
"branch_id": "LAG-01"
}
}
// No names. No accounts. No exact amounts.
// Just the signal any system needs.PII stays in your jurisdiction. Meets GDPR, NDPA, and data residency requirements by architecture, not policy.
Every transformation is deterministic. Compliance officers can locally re-derive any mosaic for SAR filing via /resolve-pii.
Works with any downstream system that accepts JSON over HTTP. Switch fraud vendors without changing your internal integration.
Audit every line. No black boxes, no vendor lock-in. Your security team signs off before anything hits production.
Single REST endpoint, no SDK, no agent. If your CBS can POST HTTP, deploy in a day.
Graceful shutdown, TLS, rate limiting, retry, Prometheus metrics. Battle-tested defaults out of the box.
Deploy the gateway, connect to any external system, and keep PII where it belongs — inside your network.