Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Suspicious transaction monitoring method, suspicious transaction monitoring device, suspicious transaction monitoring apparatus and storage medium

A transaction and suspicious technology, applied in the fields of equipment and storage media, devices, and suspicious transaction monitoring methods, can solve the problems of waste of human and material resources, low utilization rate, and ineffective utilization, and achieve the effect of saving manpower

Inactive Publication Date: 2018-06-29
PING AN TECH (SHENZHEN) CO LTD
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In fact, different models often have the same or similar rules or indicators; the existing way of writing new programs based on new models leads to a low utilization rate of these same or similar rules or indicators, which cannot be effectively used. Various rules or indicators, resulting in a waste of human and material resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Suspicious transaction monitoring method, suspicious transaction monitoring device, suspicious transaction monitoring apparatus and storage medium
  • Suspicious transaction monitoring method, suspicious transaction monitoring device, suspicious transaction monitoring apparatus and storage medium
  • Suspicious transaction monitoring method, suspicious transaction monitoring device, suspicious transaction monitoring apparatus and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0051] refer to figure 1 , figure 1 It is a schematic structural diagram of a suspicious transaction monitoring device in the hardware operating environment involved in the solution of the embodiment of the present invention.

[0052] Such as figure 1As shown, the suspicious transaction monitoring device may include: a processor 1001 , such as a CPU, a communication bus 1002 , a user interface 1003 , a network interface 1004 , a memory 1005 , and a vehicle bus interface 1006 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display), an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface. Optionally, the n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a suspicious transaction monitoring method, a suspicious transaction monitoring device, a suspicious transaction monitoring apparatus and a storage medium. The method comprises: obtaining the transaction information of a client, and extracting a preset type of transaction data from the transaction information; obtaining a suspicious transaction index table corresponding toeach suspicious transaction monitoring module; detecting whether the transaction data falls into the data range of the suspicious transaction index tables or not; and when the transaction data fall into the data range of the suspicious transaction index tables, determining that the transaction behavior of the client belongs to a suspicious transaction behavior. Since the transaction data of the client are matched according to the index table corresponding to each suspicious transaction monitoring module, the suspicious transaction indexes corresponding to the various suspicious transaction monitoring modules can be effectively utilized, and while suspicious transaction monitoring is realized, manpower and material resources are saved to the max.

Description

technical field [0001] The invention relates to the field of fund transaction monitoring, in particular to a suspicious transaction monitoring method, device, equipment and storage medium. Background technique [0002] Money laundering refers to money laundering activities that cover up and conceal the source and nature of the proceeds of crimes such as drug crimes, organized crimes of the underworld nature, terrorist activities, smuggling, corruption and bribery, and crimes that disrupt financial management order by various means. Common ways of money laundering widely involve banking, insurance, securities, real estate and other fields. [0003] Anti-money laundering is a systematic project in which the government uses legislation and judicial power to mobilize relevant organizations and commercial institutions to identify possible money laundering activities, deal with relevant funds, and punish relevant institutions and individuals, so as to prevent criminal activities. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/04
CPCG06Q40/04
Inventor 谢翠萍冯跃东刘晓兰邱海燕谭志荣魏尧东
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products