Financial network doubtable money tracking and identifying method

A network, suspicious technology, applied in the field of data mining, can solve the problems of low data accuracy, high cost, large workload, etc., to achieve accurate analysis results, reduce analysis costs, and reduce workload.

Inactive Publication Date: 2015-08-26
咸宁市公安局
View PDF2 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] Aiming at the above defects or improvement needs of the prior art, the present invention provides a method for tracking and identifying suspicious funds in a financial network, which uses data mining and dat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Financial network doubtable money tracking and identifying method
  • Financial network doubtable money tracking and identifying method
  • Financial network doubtable money tracking and identifying method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0038] Such as figure 1 As shown, the method for tracking and identifying suspicious funds in a financial network of the present invention includes the following steps:

[0039] (1) Construct a financial transaction network topology map:

[0040] The financial transaction network topology map is a graph that visualizes the original financial transaction flow after processing. This graph includ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a financial network doubtable money tracking and identifying method, which comprises the following steps of: (1) building a financial transaction network topology graph: the financial transaction network topology graph is a graph visually displayed by the original financial transaction flow after the processing, and the graph includes all transaction relationships and money flow directions in the original financial transaction flow; (2) building a money flow direction analysis flow process: after the building of the transaction network topology graph is completed, the money flow direction analysis is performed on the graph, and the money flow direction analysis aims at tracking the specific flow direction of one or a plurality of sums of money; and (3) building a transaction relationship analysis flow process: after the building of the transaction network topology graph is completed, the money flow direction analysis is performed on the graph, and the transaction relationship analysis aims at mining the money flow relationship of suspected gangs to obtain great-number high-suspicion money paths.

Description

technical field [0001] The invention belongs to the technical field of data mining, and more specifically relates to a method for tracking and identifying suspicious funds in a financial network. Background technique [0002] Continuously improving the ability and level of public security organs to fight crime is the basis for creating a harmonious and stable social environment, a fair and just rule of law environment, and a high-quality and efficient service environment. Most criminal cases (such as: gambling, pyramid schemes and drug dealing, etc.) are closely related to financial transactions. [0003] The financial transaction relationships in criminal cases can basically be divided into two categories: 1) The persons involved in the case have multi-level relationships, such as pyramid schemes, which leads to the financial relationship of the entire case naturally becoming a multi-level network relationship. 2) In order to escape the crackdown, criminal suspects need to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q40/04G06F17/30
Inventor 刘红洲肖传家聂胜章志钢李剑锋张汉林路松峰容征刘康明
Owner 咸宁市公安局
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products