CN113379540A - Capital data analysis system - Google Patents
Capital data analysis system Download PDFInfo
- Publication number
- CN113379540A CN113379540A CN202011240340.3A CN202011240340A CN113379540A CN 113379540 A CN113379540 A CN 113379540A CN 202011240340 A CN202011240340 A CN 202011240340A CN 113379540 A CN113379540 A CN 113379540A
- Authority
- CN
- China
- Prior art keywords
- module
- data
- analysis
- full
- screening
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007405 data analysis Methods 0.000 title claims abstract description 16
- 238000012216 screening Methods 0.000 claims abstract description 53
- 238000004458 analytical method Methods 0.000 claims abstract description 51
- 230000002159 abnormal effect Effects 0.000 claims abstract description 24
- 238000013473 artificial intelligence Methods 0.000 claims abstract description 23
- 238000004900 laundering Methods 0.000 claims description 17
- 230000035515 penetration Effects 0.000 claims description 9
- 238000004880 explosion Methods 0.000 claims description 7
- 238000000034 method Methods 0.000 claims description 7
- 238000011161 development Methods 0.000 claims description 6
- 238000011835 investigation Methods 0.000 claims description 6
- 238000000556 factor analysis Methods 0.000 claims description 4
- 238000001914 filtration Methods 0.000 claims description 3
- 238000007726 management method Methods 0.000 claims description 3
- 230000000149 penetrating effect Effects 0.000 claims description 3
- 230000007704 transition Effects 0.000 claims description 3
- 238000011144 upstream manufacturing Methods 0.000 claims description 3
- 238000005474 detonation Methods 0.000 claims description 2
- 230000009286 beneficial effect Effects 0.000 abstract description 4
- 238000012545 processing Methods 0.000 abstract description 2
- 238000005406 washing Methods 0.000 description 7
- 230000006399 behavior Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Development Economics (AREA)
- Computer Security & Cryptography (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to the technical field of transaction data processing, in particular to a fund data analysis system, which comprises a screening system and an artificial intelligence system, wherein the screening system is electrically connected with the artificial intelligence system; the invention has the beneficial effects that: analyzing and screening all accounts through a screening system, and distinguishing common users from abnormal users; the artificial intelligence system is used for consulting the former committing skills and learning new laws and regulations, and carrying out big data intelligent analysis on abnormal users provided by the screening system; the invention greatly improves the case handling efficiency through data analysis, reduces the loss in time, and assists the public security system personnel to capture the case of a lawbreaker as soon as possible from data clues.
Description
Technical Field
The invention relates to the technical field of transaction data processing, in particular to a fund data analysis system.
Background
Underground money banks are illegal financial institutions, the underground money banks are free outside financial supervision systems, financial services such as fund storage lending and the like are illegally carried out by utilizing or partially utilizing fund settlement networks of the financial institutions, and the quantity and the fund throughput of the underground money banks in China are difficult to accurately count.
In general, the process of hiding, disguising or investing illegally harvested income through legal activities or construction of underground money banks is called money laundering; money laundering in a narrow sense refers to a process of legalizing criminal income by various means in order to cover its true source and existence, and these criminal activities mainly include: drug-trafficking, smuggling, fraud, greedy, bribery, tax evasion, etc.; the generalized money laundering includes, in addition to the narrow meaning of money laundering: firstly, washing legal funds into black money for illegal use, namely washing white money into black money, for example, using bank loan for smuggling through money washing; secondly, washing one legal fund into another surface legal fund to achieve the purpose of occupation, namely washing white money, for example, transferring national assets to a personal account through money washing; and thirdly, the legal income is evaded and monitored through money laundering, for example, the legal income is transferred to the outsides through money laundering by foreign enterprises.
Through the evolution of the underground money bank money-washing technology, if the restriction is limited by laws, some action criteria and traditional staring tactics, law enforcement personnel do not have the energy and do not have the relatively beneficial measures of 'weapons'.
The method is characterized in that the method comprises the steps of identifying the money laundering behavior of a user of an underground money bank, identifying the money laundering behavior of the user, identifying the goods invoice, striking a casino, identifying an insurance bill, trading securities, evaluating and identifying antiques and the like. With the rapid iteration of the big data era, transaction behaviors have penetrated into all corners, and almost every transaction is endowed with scientific and technical information and changes silently. These approaches are varied and cannot be achieved from manpower, financial resources or energy.
Disclosure of Invention
The invention aims to overcome the defects and provide a capital data analysis system which greatly improves case handling efficiency through data analysis, reduces loss in time and assists public security system personnel to capture lawbreakers to put down cases as soon as possible from data clues.
In order to achieve the purpose, the invention adopts the following technical scheme:
the fund data analysis system comprises a screening system and an artificial intelligence system, wherein the screening system is electrically connected with the artificial intelligence system;
the screening system is used for analyzing and screening a common account and distinguishing common users from abnormal users;
the artificial intelligence system is used for consulting former committing measures and learning new laws and regulations and carrying out big data intelligent analysis on abnormal users provided by the screening system.
Further, the artificial intelligence system comprises a robot learning module, an experience module and an analysis comparison module;
the robot learning module is used for learning new crime manipulation and new laws and regulations for the artificial intelligent system;
the experience module is used for enabling the artificial intelligence system to fully know the money laundering method used previously;
the analysis comparison module is used for intelligently analyzing big data of abnormal users provided by the screening system.
Further, the analysis and comparison module comprises a full element analysis module, a full chain analysis module, a full data coverage module, a full environment analysis module and a planning module;
the full-element analysis module is used for analyzing and comparing according to the fund flow, the information flow, the personnel flow and the goods flow, analyzing suspicious information and sending an analysis result to the overall planning module;
the full-chain analysis module is used for screening and distinguishing a core criminal account, a transition account, a customer account and an upstream criminal account according to the abnormal users transmitted back by the screening system and transmitting a screening result to the overall planning module;
the full data coverage module is used for performing full coverage investigation on the abnormal users returned by the screening system according to historical crime data, real crime data, personnel information, fund details, full attribute expansion and full bill summarization, and sending investigation results to the overall planning module;
the whole environment analysis module carries out crime early warning according to the abnormal users sent back by the screening system, carries out model deduction development on crime means, and sends early warning information and model deduction development results to the overall planning module;
the overall planning module is used for integrating analysis results of the full-factor analysis module, the full-chain analysis module, the full-data coverage module and the full-environment analysis module, finding out a crime chain and warning early warning.
Furthermore, the screening system comprises a core screening module, a human-enterprise penetration module, an explosion algorithm module and a closed loop searching module;
the core screening module is used for expanding the associated main body and the associated transaction data, expanding the transaction data of the money bank and determining whether the money bank group is stable;
the person-enterprise penetration module is used for associating corporate identity and shareholder identity by using the identity card number, and quickly penetrating and filtering out related companies and close related persons behind individuals by using industrial and commercial data, anti-money laundering data, cloud searching resources and the like;
the explosion algorithm module is used for finding out a list of enterprises with common foreign payment and foreign collection according to the analysis result of the man-enterprise penetration module and the data of the artificial intelligence system, and then finding out a list of enterprises with common collection according to foreign companies;
the closed loop searching module is used for finding out that the domestic income and payment account is transferred to a transitional account, the transitional account is transferred to the overseas money bank account, and the overseas money bank account is transferred to the domestic income and payment account through the transitional account according to the analysis result of the point explosion algorithm module, and combining the anti-money laundering bank data and the foreign exchange management office data, so that partial core individuals and enterprises are locked.
The invention has the beneficial effects that:
according to the technical scheme, the invention has the beneficial effects that: analyzing and screening the common account through a screening system to distinguish common users from abnormal users; the artificial intelligence system is used for consulting the former committing skills and learning new laws and regulations, and carrying out big data intelligent analysis on abnormal users provided by the screening system; the invention greatly improves the case handling efficiency through data analysis, reduces the loss in time, and assists the public security system personnel to capture the case of a lawbreaker as soon as possible from data clues.
Drawings
In order to more clearly illustrate the detailed description of the invention or the technical solutions in the prior art, the drawings that are needed in the detailed description of the invention or the prior art will be briefly described below. Throughout the drawings, like elements or portions are generally identified by like reference numerals. In the drawings, elements or portions are not necessarily drawn to scale.
FIG. 1 is a schematic diagram of the overall architecture of a capital data analysis system;
FIG. 2 is a schematic diagram of the structure of an analysis and comparison module in a tax subsystem in a fund data analysis system;
Detailed Description
Referring to fig. 1 and 2, the present embodiment provides a fund data analysis system, which includes a screening system and an artificial intelligence system, wherein the screening system is electrically connected to the artificial intelligence system;
the screening system is used for analyzing and screening a common account and distinguishing common users from abnormal users;
the artificial intelligence system is used for consulting former committing measures and learning new laws and regulations and carrying out big data intelligent analysis on abnormal users provided by the screening system.
When the system is used, a screening system is used for analyzing and screening a common account to distinguish a common user from an abnormal user; the artificial intelligence system is used for consulting the former committing skills and learning new laws and regulations, and carrying out big data intelligent analysis on abnormal users provided by the screening system; the invention greatly improves the case handling efficiency through data analysis, reduces the loss in time, and assists the public security system personnel to capture the case of a lawbreaker as soon as possible from data clues.
Referring to fig. 1 and 2, the artificial intelligence system includes a robot learning module, an experience module, and an analysis comparison module;
the robot learning module is used for learning new crime manipulation and new laws and regulations for the artificial intelligent system;
the experience module is used for enabling the artificial intelligence system to fully know the money laundering method used previously;
the analysis comparison module is used for intelligently analyzing big data of abnormal users provided by the screening system.
Referring to fig. 1 and 2, the analysis and comparison module includes a full element analysis module, a full chain analysis module, a full data coverage module, a full environment analysis module and a orchestration module;
the full-element analysis module is used for analyzing and comparing according to the fund flow, the information flow, the personnel flow and the goods flow, analyzing suspicious information and sending an analysis result to the overall planning module;
the full-chain analysis module is used for screening and distinguishing a core criminal account, a transition account, a customer account and an upstream criminal account according to the abnormal users transmitted back by the screening system and transmitting a screening result to the overall planning module;
the full data coverage module is used for performing full coverage investigation on the abnormal users returned by the screening system according to historical crime data, real crime data, personnel information, fund details, full attribute expansion and full bill summarization, and sending investigation results to the overall planning module;
the whole environment analysis module carries out crime early warning according to the abnormal users sent back by the screening system, carries out model deduction development on crime means, and sends early warning information and model deduction development results to the overall planning module;
the overall planning module is used for integrating analysis results of the full-factor analysis module, the full-chain analysis module, the full-data coverage module and the full-environment analysis module, finding out a crime chain and warning early warning.
Referring to fig. 1 and 2, the screening system includes a core screening module, a human-enterprise penetration module, a detonation algorithm module, and a closed loop search module;
the core screening module is used for expanding the associated main body and the associated transaction data, expanding the transaction data of the money bank and determining whether the money bank group is stable;
the person-enterprise penetration module is used for associating corporate identity and shareholder identity by using the identity card number, and quickly penetrating and filtering out related companies and close related persons behind individuals by using industrial and commercial data, anti-money laundering data, cloud searching resources and the like;
the explosion algorithm module is used for finding out a list of enterprises with common foreign payment and foreign collection according to the analysis result of the man-enterprise penetration module and the data of the artificial intelligence system, and then finding out a list of enterprises with common collection according to foreign companies;
the closed loop searching module is used for finding out that the domestic income and payment account is transferred to a transitional account, the transitional account is transferred to the overseas money bank account, and the overseas money bank account is transferred to the domestic income and payment account through the transitional account according to the analysis result of the point explosion algorithm module, and combining the anti-money laundering bank data and the foreign exchange management office data, so that partial core individuals and enterprises are locked.
The specific embodiments described herein are merely illustrative of the spirit of the invention. Various modifications, additions and substitutions for the described embodiments may be made by those skilled in the art without departing from the scope and spirit of the invention as defined by the accompanying claims.
Claims (4)
1. A system for analyzing capital data, characterized by: the system comprises a screening system and an artificial intelligence system, wherein the screening system is electrically connected with the artificial intelligence system;
the screening system is used for analyzing and screening all accounts and distinguishing common users from abnormal users;
the artificial intelligence system is used for consulting former committing measures and learning new laws and regulations and carrying out big data intelligent analysis on abnormal users provided by the screening system.
2. The fund data analysis system according to claim 1, wherein: the artificial intelligence system comprises a robot learning module, an experience module and an analysis comparison module;
the robot learning module is used for learning new crime manipulation and new laws and regulations for the artificial intelligent system;
the experience module is used for enabling the artificial intelligence system to fully know the money laundering method used previously;
the analysis comparison module is used for intelligently analyzing big data of abnormal users provided by the screening system.
3. The fund data analysis system according to claim 2, wherein: the analysis comparison module comprises a full-factor analysis module, a full-chain analysis module, a full-data coverage module, a full-environment analysis module and a planning module;
the full-element analysis module is used for analyzing and comparing according to the fund flow, the information flow, the personnel flow and the goods flow, analyzing suspicious information and sending an analysis result to the overall planning module;
the full-chain analysis module is used for screening and distinguishing a core criminal account, a transition account, a customer account and an upstream criminal account according to the abnormal users transmitted back by the screening system and transmitting a screening result to the overall planning module;
the full data coverage module is used for performing full coverage investigation on the abnormal users returned by the screening system according to historical crime data, real crime data, personnel information, fund details, full attribute expansion and full bill summarization, and sending investigation results to the overall planning module;
the whole environment analysis module carries out crime early warning according to the abnormal users sent back by the screening system, carries out model deduction development on crime means, and sends early warning information and model deduction development results to the overall planning module;
the overall planning module is used for integrating analysis results of the full-factor analysis module, the full-chain analysis module, the full-data coverage module and the full-environment analysis module, finding out a crime chain and warning early warning.
4. The fund data analysis system according to claim 1, wherein: the screening system comprises a core screening module, a man-enterprise penetration module, a detonation algorithm module and a closed loop searching module;
the core screening module is used for expanding the associated main body and the associated transaction data, expanding the transaction data of the money bank and determining whether the money bank group is stable;
the person-enterprise penetration module is used for associating corporate identity and shareholder identity by using the identity card number, and quickly penetrating and filtering out related companies and close related persons behind individuals by using industrial and commercial data, anti-money laundering data, cloud searching resources and the like;
the explosion algorithm module is used for finding out a list of enterprises with common foreign payment and foreign collection according to the analysis result of the man-enterprise penetration module and the data of the artificial intelligence system, and then finding out a list of enterprises with common collection according to foreign companies;
the closed loop searching module is used for finding out that the domestic income and payment account is transferred to a transitional account, the transitional account is transferred to the overseas money bank account, and the overseas money bank account is transferred to the domestic income and payment account through the transitional account according to the analysis result of the point explosion algorithm module, and combining the anti-money laundering bank data and the foreign exchange management office data, so that partial core individuals and enterprises are locked.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011240340.3A CN113379540A (en) | 2020-11-09 | 2020-11-09 | Capital data analysis system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011240340.3A CN113379540A (en) | 2020-11-09 | 2020-11-09 | Capital data analysis system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113379540A true CN113379540A (en) | 2021-09-10 |
Family
ID=77569116
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011240340.3A Pending CN113379540A (en) | 2020-11-09 | 2020-11-09 | Capital data analysis system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113379540A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109461078A (en) * | 2018-10-22 | 2019-03-12 | 中信网络科技股份有限公司 | A kind of abnormal transaction identification method and system based on funds transaction network |
CN110046993A (en) * | 2018-12-15 | 2019-07-23 | 深圳壹账通智能科技有限公司 | Illicit gain legalizes behavior monitoring method, system, computer installation and medium |
US20190325528A1 (en) * | 2018-04-24 | 2019-10-24 | Brighterion, Inc. | Increasing performance in anti-money laundering transaction monitoring using artificial intelligence |
CN111127200A (en) * | 2019-11-25 | 2020-05-08 | 中国建设银行股份有限公司 | Method and device for monitoring suspicious transactions of anti-money laundering |
CN111126828A (en) * | 2019-12-19 | 2020-05-08 | 浙江邦盛科技有限公司 | Knowledge graph-based multilayer fund abnormal flow direction monitoring method |
-
2020
- 2020-11-09 CN CN202011240340.3A patent/CN113379540A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190325528A1 (en) * | 2018-04-24 | 2019-10-24 | Brighterion, Inc. | Increasing performance in anti-money laundering transaction monitoring using artificial intelligence |
CN109461078A (en) * | 2018-10-22 | 2019-03-12 | 中信网络科技股份有限公司 | A kind of abnormal transaction identification method and system based on funds transaction network |
CN110046993A (en) * | 2018-12-15 | 2019-07-23 | 深圳壹账通智能科技有限公司 | Illicit gain legalizes behavior monitoring method, system, computer installation and medium |
CN111127200A (en) * | 2019-11-25 | 2020-05-08 | 中国建设银行股份有限公司 | Method and device for monitoring suspicious transactions of anti-money laundering |
CN111126828A (en) * | 2019-12-19 | 2020-05-08 | 浙江邦盛科技有限公司 | Knowledge graph-based multilayer fund abnormal flow direction monitoring method |
Non-Patent Citations (1)
Title |
---|
王达山;: "基于互联网金融的反洗钱模型探索", 金融电子化, no. 03 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Schreyer et al. | Detection of anomalies in large scale accounting data using deep autoencoder networks | |
CN110852878B (en) | Credibility determination method, device, equipment and storage medium | |
CN112668614B (en) | Anti-money laundering studying and judging method | |
Deng | Application analysis on blockchain technology in cross-border payment | |
CN112541698A (en) | Method and system for identifying enterprise risks based on external characteristics of enterprise | |
Suresh et al. | A hybrid approach for detecting suspicious accounts in money laundering using data mining techniques | |
Barua et al. | Swindle: Predicting the probability of loan defaults using catboost algorithm | |
Singh et al. | Big data as a service and application for indian banking sector | |
Goyal et al. | Review on credit card fraud detection using data mining classification techniques & machine learning algorithms | |
CN115879548B (en) | Knowledge graph construction method and system for customer identity recognition | |
KR102110889B1 (en) | System for providing AI clause inspection | |
CN113379540A (en) | Capital data analysis system | |
CN112669039B (en) | Knowledge graph-based customer risk management and control system and method | |
KR20210106592A (en) | Method, apparatus and computer program for classifying cryptocurrency accounts using artificial intelligence | |
Keskar | Comparing different models for credit card fraud detection | |
Sapozhnikova et al. | Distributed infrastructure for big data processing in the transaction monitoring systems | |
Yesseleva-Plonka | Blockchain network system for assessing SMEs’ creditworthiness | |
Bodhankar et al. | The Smart Application of Data Mining in the Detection of Fraudulent Transactions | |
US20220300977A1 (en) | Real-time malicious activity detection using non-transaction data | |
Duan et al. | Data flow tracking-based block chain modelling | |
Mohammed et al. | Fraud detection of credit card using logistic regression | |
Xie | A machine learning approach to detect fraudulent customers based on their financial transaction history | |
Chen et al. | Research and Implementation of Bank Credit Card Fraud Detection System Based on Reinforcement Learning and LSTM | |
Priya et al. | Digital payments: a scheme for fraud data collection and use in Indian banking sector | |
Bagle et al. | Anti Money Laundering System to Detect Suspicious Account |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |