Method for monitoring suspicious fund transaction based on fund network

A network monitoring and transaction technology, applied in finance, structured data retrieval, instruments, etc., can solve the problems of inability to monitor the fund network, high false alarm rate, and single monitoring dimension, so as to enrich materials and means and improve accuracy Effect

Active Publication Date: 2017-03-29
BEIJING YINFENG XINRONG TECH DEV
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Unable to adapt to the rapid and changeable money laundering methods, the false alarm rate is high, and most of the transactions that trigger standard alarms are actually normal business operations, which waste the time and energy of investigators in vain; from the practice of some typical commercial banks, the system early warning Suspicious transactions, the ratio of manual exclusion is 70%, or even more than 90%
[0006] 2. The simplification of monitoring rules, from the point of view of actual money laundering cases, includes a variety of transaction situations, including scattered inflows, centralized outflows, and the nature of transitional households
[0007] 3. Simplification of monitoring dimensions, mainly focused on single-dimensional monitoring at the transaction level; lack of monitoring points at the customer and account levels
[0008] 4. Lack of correlation with suspicious criminal behavior, the monitoring results cannot intuitively distinguish which suspicious criminal behavior is involved, and it is not convenient for suspicious analysis
[0009] 5. Only individuals can be monitored, groups cannot be monitored, and financial networks cannot be monitored
[0012] 8. The flow path of funds withdrawn by the rules is relatively short

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for monitoring suspicious fund transaction based on fund network
  • Method for monitoring suspicious fund transaction based on fund network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Attached below figure 1 , figure 2 And embodiment the present invention is described in further detail.

[0027] A method for monitoring suspicious capital transactions based on a capital network, comprising the following steps:

[0028] (1). Establish a rule database and a multi-subject model database. The rule database includes suspicious money laundering rules stipulated in anti-money laundering laws and regulations. The multi-subject model database includes the roles of multiple associated transaction subjects in specific money laundering cases, and each transaction The behavioral characteristics of the subjects and suspected money laundering rules violated by each transaction subject.

[0029] Based on the People's Bank of China's 2006 Order No. 2 "Administrative Measures for Financial Institutions' Large-value and Suspicious Transaction Reports", for 4 large-value and 18 suspicious rules, a rule database can be built by digitizing, based on years of financial i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for monitoring suspicious fund transaction based on a fund network. The method comprises the steps of monitoring other fund transaction related to the suspicious fund transaction within a future given period by taking a client agent and a transaction object agent in the suspicious fund transaction as a starting point and taking daily transaction flowing as a basis; constructing the fund network by taking a related agent as a point and taking the fund transaction as a side; and then monitoring the suspicious fund transaction by matching the fund network with a multi-agent model database. According to the method, convenience is provided for monitoring the suspicious fund transaction; an accuracy rate for monitoring the suspicious fund transaction is increased; the original mutually independent fund transaction abnormity links can be integrated in one environment; and materials and means for developing suspicious fund transaction identification work are greatly enriched.

Description

technical field [0001] The invention relates to the field of suspicious capital transaction monitoring, in particular to a method for monitoring suspicious capital transactions based on a capital network. Background technique [0002] Foreign anti-money laundering supervision and practice started earlier, and the methods and means of suspicious screening are relatively rich and mature. The main method is based on the quantification of rules based on behavioral characteristics. and other advanced exploratory methods, but cannot fully adapt to the characteristics of Chinese supervision. [0003] For the screening of suspicious transactions in China, the current main business idea is based on rules, that is, based on the People’s Bank of China’s 2006 Order No. 2 “Administrative Measures for Financial Institutions’ Large-value Transactions and Suspicious Transaction Reports”, for the four large-value transactions, 18 suspicious rules are used to monitor a single rule; in recent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06Q40/04
CPCG06F16/22G06F16/245G06Q40/04
Inventor 梁凯鹏贾皓立陈庆国宋萍
Owner BEIJING YINFENG XINRONG TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products