Suspicious transaction message generation method, device and server

A transaction message, suspicious technology, applied in the computer field, can solve the problems of easy to miss writing, time-consuming and labor-intensive, and achieve the effect of avoiding message connection and reducing complexity.

Active Publication Date: 2021-06-01
ADVANCED NEW TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the suspicious behavior description code information needs to be manually written by the reviewers. The whole process is time-consuming and labor-intensive and prone to omissions and mistakes. It is necessary to automatically generate a transactionable message and report it to the National Financial Intelligence Center

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Suspicious transaction message generation method, device and server
  • Suspicious transaction message generation method, device and server
  • Suspicious transaction message generation method, device and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In order to better understand the above technical solutions, the technical solutions of the embodiments of this specification will be described in detail below through the drawings and specific examples. It should be understood that the embodiments of this specification and the specific features in the embodiments are the technical solutions of the embodiments of this specification. It is a detailed description, rather than a limitation to the technical solutions of this specification. In the case of no conflict, the embodiments of this specification and the technical features in the embodiments can be combined with each other.

[0017] See figure 1 , is a schematic diagram of a scenario of a method for generating a suspicious transaction message in an embodiment of this specification. Online trading platform 100. For example, third-party payment platforms and online shopping platforms. The suspicious transaction message generation system 101 is configured to generate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of this specification provides a method, device and server for generating a suspicious transaction message, including: encoding the customer features of each dimension in the feature details to form a feature encoding sequence corresponding to the feature details; inputting the feature encoding sequence into a suspicious transaction message to generate Model, based on the suspicious transaction message generation model, an encoded form message containing a feature encoding sequence is produced; by backfilling the characteristic value of the feature details into the corresponding encoding position in the encoded form message, a suspicious transaction message for the target customer is generated, In this way, the maintenance of a large number of rules in message concatenation, message sequence, and message screening caused by message splicing is avoided, and the complexity of generating suspicious transaction messages is reduced, which is more time-saving and efficient.

Description

technical field [0001] The embodiment of this description relates to the field of computer technology, and in particular to a method, device and server for generating suspicious transaction messages. Background technique [0002] When reviewing a suspicious transaction task, the anti-money laundering examiner will make a comprehensive judgment based on the various characteristics of the customer corresponding to the task. If it is confirmed that there are some reasonable reasons, it is necessary to write a message describing the suspicious behavior characteristics of the customer. , and finally report this message to the National Financial Intelligence Center. At present, the suspicious behavior description code information needs to be manually written by the reviewers. The whole process is time-consuming and labor-intensive and prone to omissions and mistakes. It is necessary to automatically generate a transactionable message and report it to the National Financial Intelli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06Q40/04
CPCG06Q40/04H04L69/06
Inventor 潘健民
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products