Method and device for generating risk file

A risk and file technology, applied in data processing applications, instruments, finance, etc., can solve the problems of cumbersome operation steps and not conducive to improving the efficiency of handling abnormal data cases, and achieve the effect of reducing human labor and improving trial efficiency

Active Publication Date: 2020-04-03
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004]In the existing information retention technology, operators need to manually take screenshots of relevant interfaces and associate them with relevant users to generate case attachments. The operation steps are too cumbersome, which is not conducive to Improve the efficiency of handling data anomaly cases

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating risk file
  • Method and device for generating risk file
  • Method and device for generating risk file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] In order to make the above objects, features and advantages of the present invention more comprehensible, specific implementations of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0077] In the following description, many specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways than those described here, so the present invention is not limited by the specific embodiments disclosed below.

[0078] figure 1 is an illustration of a system for data processing risky transactions according to aspects of the present disclosure.

[0079] The risky transaction may be a transaction that generates abnormal data, for example, a money laundering transaction and the like.

[0080] Such as figure 1 As shown, the system 100 for data processing risk transactions may include a plurality of terminals 101 . A network transaction application...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a device for generating a risk file, and specifically provides a method for reporting a risk file to a supervision institution. The method comprises the steps: detecting a risk transaction; obtaining user IDs of a plurality of users of the detected risk transaction from a risk analysis system, and obtaining the risk type and the risk feature set of each user in the risk transaction; acquiring identity information of each user from a third-party authority by using the user ID of the user, and performing screenshot to generate an identity information retention picture; automatically combining the user IDs of the multiple users of the risk transaction, the identity information retention picture, the risk types and the risk feature sets to generate a riskfile about the risk transaction; and automatically reporting the risk file to the supervision institution.

Description

technical field [0001] The present disclosure relates to fast storage for abnormal data transactions, and in particular to a method and device for fast storage of trial information in anti-money laundering cases. Background technique [0002] With the vigorous development of Internet technology, more and more daily businesses can be realized on the Internet. Although the Internet business enables people to quickly handle various businesses without leaving home, it also leads to the generation of a large amount of abnormal data for performing false business. For example, money laundering often involves abnormal transactions and / or transfers, which will generate a large amount of abnormal data. [0003] In the process of dealing with businesses that generate abnormal data, it is necessary to collect user identity information, suspicious transaction information, etc. in the form of screenshots (also known as "retention" or "retention") for subsequent audit work. [0004] In t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/10G06Q10/06G06Q40/04G06Q50/26
CPCG06Q10/10G06Q10/0635G06Q40/04G06Q50/26
Inventor 彭轮胡研
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products