Suspicious transaction message generation method and device and server

A transaction message, suspicious technology, applied in the computer field, can solve problems such as prone to missing writing, time-consuming and labor-intensive, and achieve the effect of avoiding message connection and reducing complexity

Active Publication Date: 2019-09-06
ADVANCED NEW TECH CO LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the suspicious behavior description code information needs to be manually written by the reviewers. The whole process is time-consuming and labor-intensive and prone to omissions and mistakes. It is necessary to automatically generate a transactionable message and report it to the National Financial Intelligence Center

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Suspicious transaction message generation method and device and server
  • Suspicious transaction message generation method and device and server
  • Suspicious transaction message generation method and device and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In order to better understand the above technical solutions, the technical solutions of the embodiments of this specification will be described in detail below through the drawings and specific examples. It should be understood that the embodiments of this specification and the specific features in the embodiments are the technical solutions of the embodiments of this specification. It is a detailed description, rather than a limitation to the technical solutions of this specification. In the case of no conflict, the embodiments of this specification and the technical features in the embodiments can be combined with each other.

[0017] See figure 1 , is a schematic diagram of a scenario of a method for generating a suspicious transaction message in an embodiment of this specification. Online trading platform 100. For example, third-party payment platforms and online shopping platforms. The suspicious transaction message generation system 101 is configured to generate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a suspicious transaction message generation method and device and a server, and the method comprises the steps: carrying out the coding of the features of clients in a feature detail, and forming a feature code sequence corresponding to the feature detail; inputting the feature code sequence into a suspicious transaction message generation model, and generating a code form message containing the feature code sequence based on the suspicious transaction message generation model; backfilling the characteristic values of the characteristic details to the corresponding coding positions in the coding form message to generate the suspicious transaction message for the target client, so that message connection, message sequence and maintenance of a large number of rules in message screening caused by message splicing are avoided, the complexity of generating the suspicious transaction message is reduced, and more time is saved, and the efficiency is improved.

Description

technical field [0001] The embodiment of this description relates to the field of computer technology, and in particular to a method, device and server for generating suspicious transaction messages. Background technique [0002] When reviewing a suspicious transaction task, the anti-money laundering examiner will make a comprehensive judgment based on the various characteristics of the customer corresponding to the task. If it is confirmed that there are some reasonable reasons, it is necessary to write a message describing the suspicious behavior characteristics of the customer. , and finally report this message to the National Financial Intelligence Center. At present, the suspicious behavior description code information needs to be manually written by the reviewers. The whole process is time-consuming and labor-intensive and prone to omissions and mistakes. It is necessary to automatically generate a transactionable message and report it to the National Financial Intelli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q40/04
CPCG06Q40/04H04L69/06
Inventor 潘健民
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products