An auxiliary screening method and system for suspicious transaction cases

A transaction and case technology, applied in data processing applications, finance, instruments, etc., can solve problems such as high input costs of manpower and material resources, reduce input costs, and the influence of subjective factors of staff, and achieve strong objectivity, reduce input costs, The effect of high accuracy

Active Publication Date: 2019-02-22
信华信技术股份有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problems existing in the existing screening methods of suspicious transactions, which are easily affected by the subjective factors of the staff, and the input cost of manpower and material resources is too high, the present invention provides an innovative method and system for auxiliary screening of suspicious transaction cases, based on the objective and comprehensive The screening process of the suspicious transaction is intelligentized, electronicized and streamlined in the present invention, which not only significantly reduces the input cost, but also the screening process is not affected by the subjective factors of the staff. Therefore, the present invention has strong objectivity in the screening process. , high accuracy and high efficiency and other outstanding advantages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An auxiliary screening method and system for suspicious transaction cases
  • An auxiliary screening method and system for suspicious transaction cases
  • An auxiliary screening method and system for suspicious transaction cases

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] Such as figure 1 As shown, this embodiment discloses an auxiliary screening method for suspicious transaction cases, which objectively screens the suspicious degree of transaction cases, and provides corresponding suggestions based on the screening results. The auxiliary screening method includes the following steps.

[0073] Step S1, information extraction of suspicious transaction cases: extract clue data from transaction cases to be processed, so as to obtain clue data extraction results for describing the basic characteristics and risk characteristics of transaction cases to be processed, and save the clue data extraction results; this embodiment Among them, the clue data extraction results include basic index data, transaction risk model, first risk characteristic data, transaction flow data and user information data, among which, transaction risk model and first risk characteristic data are used to describe the risk characteristics of pending transaction cases, Ba...

Embodiment 2

[0108] This embodiment is based on the same inventive concept as Embodiment 1, and proposes an auxiliary screening system for a suspicious transaction case that implements the auxiliary screening method in Embodiment 1, such as Figure 6 As shown, the auxiliary screening system includes a data mart construction module, a basic index mining module, a risk feature generation module, a transaction network construction module and a transaction case generation module, a clue data extraction module, a transaction case analysis module, a risk nature determination module, and a cumulative A balance calculation module and a suspicious degree determination module.

[0109] The data mart building module is used to standardize the acquired transaction-related data, so as to convert the transaction-related data into multi-category subject data, and to construct a data mart through multi-category subject data.

[0110] The basic index mining module is used to process multiple types of subje...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an auxiliary screening method and system for suspicious transaction cases. The method comprises the following steps of extracting the clue data of the transaction case to be processed, analyzing the overall situation of the transaction case to be processed, analyzing the fund flow direction, analyzing the user risk and the transaction risk, and obtaining the doubtful data;determining the risk nature score of the transaction cases to be processed; calculating the cumulative amount of the transaction cases to be processed; based on the risk matrix method, evaluating therisk level of suspicious transaction cases according to the above indexes. The system includes a clue data extraction module, a transaction case analysis module, a risk nature determination module, acumulative amount calculation module and a suspicious degree determination module. The method and the system of the invention realize the intelligent and automatic screening of suspicious transactioncases, are not influenced by the subjective factors of the staff, greatly reduce the input of manpower and material resources, and have the outstanding advantages of high accuracy, strong objectivity,high efficiency, intelligence, comprehensiveness, tracing and the like.

Description

technical field [0001] The present invention relates to the technical field of suspicious transaction screening, more specifically, the present invention is an auxiliary screening method and system for suspicious transaction cases. Background technique [0002] At present, with the promulgation of new anti-money laundering regulations by the People's Bank of China, the self-monitoring model has become the basis of the anti-money laundering work of various financial institutions, but the traditional self-monitoring method will inevitably bring a lot of screening work for suspicious transactions. The following problems: (1) The screening effect is greatly affected by the subjective factors of the staff, and the screening effect is uneven, so it is difficult to objectively determine the suspicious degree of suspicious transaction cases; (2) The number of suspicious transactions to be screened is huge, requiring a large amount of The cost of manpower and material resources is to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/00G06Q10/06
CPCG06Q10/0635G06Q40/00
Inventor 胡佰庆闫庆高建新丁珂黄良洪
Owner 信华信技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products