CN113379540A - Capital data analysis system - Google Patents

Capital data analysis system Download PDF

Info

Publication number
CN113379540A
CN113379540A CN202011240340.3A CN202011240340A CN113379540A CN 113379540 A CN113379540 A CN 113379540A CN 202011240340 A CN202011240340 A CN 202011240340A CN 113379540 A CN113379540 A CN 113379540A
Authority
CN
China
Prior art keywords
module
data
analysis
full
screening
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011240340.3A
Other languages
Chinese (zh)
Inventor
邓昌智
徐连强
孙道坤
李维红
苏帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongke Jinsheng Beijing Technology Co ltd
Original Assignee
Zhongke Jinsheng Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongke Jinsheng Beijing Technology Co ltd filed Critical Zhongke Jinsheng Beijing Technology Co ltd
Priority to CN202011240340.3A priority Critical patent/CN113379540A/en
Publication of CN113379540A publication Critical patent/CN113379540A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of transaction data processing, in particular to a fund data analysis system, which comprises a screening system and an artificial intelligence system, wherein the screening system is electrically connected with the artificial intelligence system; the invention has the beneficial effects that: analyzing and screening all accounts through a screening system, and distinguishing common users from abnormal users; the artificial intelligence system is used for consulting the former committing skills and learning new laws and regulations, and carrying out big data intelligent analysis on abnormal users provided by the screening system; the invention greatly improves the case handling efficiency through data analysis, reduces the loss in time, and assists the public security system personnel to capture the case of a lawbreaker as soon as possible from data clues.

Description

Capital data analysis system
Technical Field
The invention relates to the technical field of transaction data processing, in particular to a fund data analysis system.
Background
Underground money banks are illegal financial institutions, the underground money banks are free outside financial supervision systems, financial services such as fund storage lending and the like are illegally carried out by utilizing or partially utilizing fund settlement networks of the financial institutions, and the quantity and the fund throughput of the underground money banks in China are difficult to accurately count.
In general, the process of hiding, disguising or investing illegally harvested income through legal activities or construction of underground money banks is called money laundering; money laundering in a narrow sense refers to a process of legalizing criminal income by various means in order to cover its true source and existence, and these criminal activities mainly include: drug-trafficking, smuggling, fraud, greedy, bribery, tax evasion, etc.; the generalized money laundering includes, in addition to the narrow meaning of money laundering: firstly, washing legal funds into black money for illegal use, namely washing white money into black money, for example, using bank loan for smuggling through money washing; secondly, washing one legal fund into another surface legal fund to achieve the purpose of occupation, namely washing white money, for example, transferring national assets to a personal account through money washing; and thirdly, the legal income is evaded and monitored through money laundering, for example, the legal income is transferred to the outsides through money laundering by foreign enterprises.
Through the evolution of the underground money bank money-washing technology, if the restriction is limited by laws, some action criteria and traditional staring tactics, law enforcement personnel do not have the energy and do not have the relatively beneficial measures of 'weapons'.
The method is characterized in that the method comprises the steps of identifying the money laundering behavior of a user of an underground money bank, identifying the money laundering behavior of the user, identifying the goods invoice, striking a casino, identifying an insurance bill, trading securities, evaluating and identifying antiques and the like. With the rapid iteration of the big data era, transaction behaviors have penetrated into all corners, and almost every transaction is endowed with scientific and technical information and changes silently. These approaches are varied and cannot be achieved from manpower, financial resources or energy.
Disclosure of Invention
The invention aims to overcome the defects and provide a capital data analysis system which greatly improves case handling efficiency through data analysis, reduces loss in time and assists public security system personnel to capture lawbreakers to put down cases as soon as possible from data clues.
In order to achieve the purpose, the invention adopts the following technical scheme:
the fund data analysis system comprises a screening system and an artificial intelligence system, wherein the screening system is electrically connected with the artificial intelligence system;
the screening system is used for analyzing and screening a common account and distinguishing common users from abnormal users;
the artificial intelligence system is used for consulting former committing measures and learning new laws and regulations and carrying out big data intelligent analysis on abnormal users provided by the screening system.
Further, the artificial intelligence system comprises a robot learning module, an experience module and an analysis comparison module;
the robot learning module is used for learning new crime manipulation and new laws and regulations for the artificial intelligent system;
the experience module is used for enabling the artificial intelligence system to fully know the money laundering method used previously;
the analysis comparison module is used for intelligently analyzing big data of abnormal users provided by the screening system.
Further, the analysis and comparison module comprises a full element analysis module, a full chain analysis module, a full data coverage module, a full environment analysis module and a planning module;
the full-element analysis module is used for analyzing and comparing according to the fund flow, the information flow, the personnel flow and the goods flow, analyzing suspicious information and sending an analysis result to the overall planning module;
the full-chain analysis module is used for screening and distinguishing a core criminal account, a transition account, a customer account and an upstream criminal account according to the abnormal users transmitted back by the screening system and transmitting a screening result to the overall planning module;
the full data coverage module is used for performing full coverage investigation on the abnormal users returned by the screening system according to historical crime data, real crime data, personnel information, fund details, full attribute expansion and full bill summarization, and sending investigation results to the overall planning module;
the whole environment analysis module carries out crime early warning according to the abnormal users sent back by the screening system, carries out model deduction development on crime means, and sends early warning information and model deduction development results to the overall planning module;
the overall planning module is used for integrating analysis results of the full-factor analysis module, the full-chain analysis module, the full-data coverage module and the full-environment analysis module, finding out a crime chain and warning early warning.
Furthermore, the screening system comprises a core screening module, a human-enterprise penetration module, an explosion algorithm module and a closed loop searching module;
the core screening module is used for expanding the associated main body and the associated transaction data, expanding the transaction data of the money bank and determining whether the money bank group is stable;
the person-enterprise penetration module is used for associating corporate identity and shareholder identity by using the identity card number, and quickly penetrating and filtering out related companies and close related persons behind individuals by using industrial and commercial data, anti-money laundering data, cloud searching resources and the like;
the explosion algorithm module is used for finding out a list of enterprises with common foreign payment and foreign collection according to the analysis result of the man-enterprise penetration module and the data of the artificial intelligence system, and then finding out a list of enterprises with common collection according to foreign companies;
the closed loop searching module is used for finding out that the domestic income and payment account is transferred to a transitional account, the transitional account is transferred to the overseas money bank account, and the overseas money bank account is transferred to the domestic income and payment account through the transitional account according to the analysis result of the point explosion algorithm module, and combining the anti-money laundering bank data and the foreign exchange management office data, so that partial core individuals and enterprises are locked.
The invention has the beneficial effects that:
according to the technical scheme, the invention has the beneficial effects that: analyzing and screening the common account through a screening system to distinguish common users from abnormal users; the artificial intelligence system is used for consulting the former committing skills and learning new laws and regulations, and carrying out big data intelligent analysis on abnormal users provided by the screening system; the invention greatly improves the case handling efficiency through data analysis, reduces the loss in time, and assists the public security system personnel to capture the case of a lawbreaker as soon as possible from data clues.
Drawings
In order to more clearly illustrate the detailed description of the invention or the technical solutions in the prior art, the drawings that are needed in the detailed description of the invention or the prior art will be briefly described below. Throughout the drawings, like elements or portions are generally identified by like reference numerals. In the drawings, elements or portions are not necessarily drawn to scale.
FIG. 1 is a schematic diagram of the overall architecture of a capital data analysis system;
FIG. 2 is a schematic diagram of the structure of an analysis and comparison module in a tax subsystem in a fund data analysis system;
Detailed Description
Referring to fig. 1 and 2, the present embodiment provides a fund data analysis system, which includes a screening system and an artificial intelligence system, wherein the screening system is electrically connected to the artificial intelligence system;
the screening system is used for analyzing and screening a common account and distinguishing common users from abnormal users;
the artificial intelligence system is used for consulting former committing measures and learning new laws and regulations and carrying out big data intelligent analysis on abnormal users provided by the screening system.
When the system is used, a screening system is used for analyzing and screening a common account to distinguish a common user from an abnormal user; the artificial intelligence system is used for consulting the former committing skills and learning new laws and regulations, and carrying out big data intelligent analysis on abnormal users provided by the screening system; the invention greatly improves the case handling efficiency through data analysis, reduces the loss in time, and assists the public security system personnel to capture the case of a lawbreaker as soon as possible from data clues.
Referring to fig. 1 and 2, the artificial intelligence system includes a robot learning module, an experience module, and an analysis comparison module;
the robot learning module is used for learning new crime manipulation and new laws and regulations for the artificial intelligent system;
the experience module is used for enabling the artificial intelligence system to fully know the money laundering method used previously;
the analysis comparison module is used for intelligently analyzing big data of abnormal users provided by the screening system.
Referring to fig. 1 and 2, the analysis and comparison module includes a full element analysis module, a full chain analysis module, a full data coverage module, a full environment analysis module and a orchestration module;
the full-element analysis module is used for analyzing and comparing according to the fund flow, the information flow, the personnel flow and the goods flow, analyzing suspicious information and sending an analysis result to the overall planning module;
the full-chain analysis module is used for screening and distinguishing a core criminal account, a transition account, a customer account and an upstream criminal account according to the abnormal users transmitted back by the screening system and transmitting a screening result to the overall planning module;
the full data coverage module is used for performing full coverage investigation on the abnormal users returned by the screening system according to historical crime data, real crime data, personnel information, fund details, full attribute expansion and full bill summarization, and sending investigation results to the overall planning module;
the whole environment analysis module carries out crime early warning according to the abnormal users sent back by the screening system, carries out model deduction development on crime means, and sends early warning information and model deduction development results to the overall planning module;
the overall planning module is used for integrating analysis results of the full-factor analysis module, the full-chain analysis module, the full-data coverage module and the full-environment analysis module, finding out a crime chain and warning early warning.
Referring to fig. 1 and 2, the screening system includes a core screening module, a human-enterprise penetration module, a detonation algorithm module, and a closed loop search module;
the core screening module is used for expanding the associated main body and the associated transaction data, expanding the transaction data of the money bank and determining whether the money bank group is stable;
the person-enterprise penetration module is used for associating corporate identity and shareholder identity by using the identity card number, and quickly penetrating and filtering out related companies and close related persons behind individuals by using industrial and commercial data, anti-money laundering data, cloud searching resources and the like;
the explosion algorithm module is used for finding out a list of enterprises with common foreign payment and foreign collection according to the analysis result of the man-enterprise penetration module and the data of the artificial intelligence system, and then finding out a list of enterprises with common collection according to foreign companies;
the closed loop searching module is used for finding out that the domestic income and payment account is transferred to a transitional account, the transitional account is transferred to the overseas money bank account, and the overseas money bank account is transferred to the domestic income and payment account through the transitional account according to the analysis result of the point explosion algorithm module, and combining the anti-money laundering bank data and the foreign exchange management office data, so that partial core individuals and enterprises are locked.
The specific embodiments described herein are merely illustrative of the spirit of the invention. Various modifications, additions and substitutions for the described embodiments may be made by those skilled in the art without departing from the scope and spirit of the invention as defined by the accompanying claims.

Claims (4)

1. A system for analyzing capital data, characterized by: the system comprises a screening system and an artificial intelligence system, wherein the screening system is electrically connected with the artificial intelligence system;
the screening system is used for analyzing and screening all accounts and distinguishing common users from abnormal users;
the artificial intelligence system is used for consulting former committing measures and learning new laws and regulations and carrying out big data intelligent analysis on abnormal users provided by the screening system.
2. The fund data analysis system according to claim 1, wherein: the artificial intelligence system comprises a robot learning module, an experience module and an analysis comparison module;
the robot learning module is used for learning new crime manipulation and new laws and regulations for the artificial intelligent system;
the experience module is used for enabling the artificial intelligence system to fully know the money laundering method used previously;
the analysis comparison module is used for intelligently analyzing big data of abnormal users provided by the screening system.
3. The fund data analysis system according to claim 2, wherein: the analysis comparison module comprises a full-factor analysis module, a full-chain analysis module, a full-data coverage module, a full-environment analysis module and a planning module;
the full-element analysis module is used for analyzing and comparing according to the fund flow, the information flow, the personnel flow and the goods flow, analyzing suspicious information and sending an analysis result to the overall planning module;
the full-chain analysis module is used for screening and distinguishing a core criminal account, a transition account, a customer account and an upstream criminal account according to the abnormal users transmitted back by the screening system and transmitting a screening result to the overall planning module;
the full data coverage module is used for performing full coverage investigation on the abnormal users returned by the screening system according to historical crime data, real crime data, personnel information, fund details, full attribute expansion and full bill summarization, and sending investigation results to the overall planning module;
the whole environment analysis module carries out crime early warning according to the abnormal users sent back by the screening system, carries out model deduction development on crime means, and sends early warning information and model deduction development results to the overall planning module;
the overall planning module is used for integrating analysis results of the full-factor analysis module, the full-chain analysis module, the full-data coverage module and the full-environment analysis module, finding out a crime chain and warning early warning.
4. The fund data analysis system according to claim 1, wherein: the screening system comprises a core screening module, a man-enterprise penetration module, a detonation algorithm module and a closed loop searching module;
the core screening module is used for expanding the associated main body and the associated transaction data, expanding the transaction data of the money bank and determining whether the money bank group is stable;
the person-enterprise penetration module is used for associating corporate identity and shareholder identity by using the identity card number, and quickly penetrating and filtering out related companies and close related persons behind individuals by using industrial and commercial data, anti-money laundering data, cloud searching resources and the like;
the explosion algorithm module is used for finding out a list of enterprises with common foreign payment and foreign collection according to the analysis result of the man-enterprise penetration module and the data of the artificial intelligence system, and then finding out a list of enterprises with common collection according to foreign companies;
the closed loop searching module is used for finding out that the domestic income and payment account is transferred to a transitional account, the transitional account is transferred to the overseas money bank account, and the overseas money bank account is transferred to the domestic income and payment account through the transitional account according to the analysis result of the point explosion algorithm module, and combining the anti-money laundering bank data and the foreign exchange management office data, so that partial core individuals and enterprises are locked.
CN202011240340.3A 2020-11-09 2020-11-09 Capital data analysis system Pending CN113379540A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011240340.3A CN113379540A (en) 2020-11-09 2020-11-09 Capital data analysis system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011240340.3A CN113379540A (en) 2020-11-09 2020-11-09 Capital data analysis system

Publications (1)

Publication Number Publication Date
CN113379540A true CN113379540A (en) 2021-09-10

Family

ID=77569116

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011240340.3A Pending CN113379540A (en) 2020-11-09 2020-11-09 Capital data analysis system

Country Status (1)

Country Link
CN (1) CN113379540A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109461078A (en) * 2018-10-22 2019-03-12 中信网络科技股份有限公司 A kind of abnormal transaction identification method and system based on funds transaction network
CN110046993A (en) * 2018-12-15 2019-07-23 深圳壹账通智能科技有限公司 Illicit gain legalizes behavior monitoring method, system, computer installation and medium
US20190325528A1 (en) * 2018-04-24 2019-10-24 Brighterion, Inc. Increasing performance in anti-money laundering transaction monitoring using artificial intelligence
CN111127200A (en) * 2019-11-25 2020-05-08 中国建设银行股份有限公司 Method and device for monitoring suspicious transactions of anti-money laundering
CN111126828A (en) * 2019-12-19 2020-05-08 浙江邦盛科技有限公司 Knowledge graph-based multilayer fund abnormal flow direction monitoring method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190325528A1 (en) * 2018-04-24 2019-10-24 Brighterion, Inc. Increasing performance in anti-money laundering transaction monitoring using artificial intelligence
CN109461078A (en) * 2018-10-22 2019-03-12 中信网络科技股份有限公司 A kind of abnormal transaction identification method and system based on funds transaction network
CN110046993A (en) * 2018-12-15 2019-07-23 深圳壹账通智能科技有限公司 Illicit gain legalizes behavior monitoring method, system, computer installation and medium
CN111127200A (en) * 2019-11-25 2020-05-08 中国建设银行股份有限公司 Method and device for monitoring suspicious transactions of anti-money laundering
CN111126828A (en) * 2019-12-19 2020-05-08 浙江邦盛科技有限公司 Knowledge graph-based multilayer fund abnormal flow direction monitoring method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王达山;: "基于互联网金融的反洗钱模型探索", 金融电子化, no. 03 *

Similar Documents

Publication Publication Date Title
Schreyer et al. Detection of anomalies in large scale accounting data using deep autoencoder networks
CN110852878B (en) Credibility determination method, device, equipment and storage medium
CN112668614B (en) Anti-money laundering studying and judging method
Deng Application analysis on blockchain technology in cross-border payment
CN112541698A (en) Method and system for identifying enterprise risks based on external characteristics of enterprise
Suresh et al. A hybrid approach for detecting suspicious accounts in money laundering using data mining techniques
Barua et al. Swindle: Predicting the probability of loan defaults using catboost algorithm
Singh et al. Big data as a service and application for indian banking sector
Goyal et al. Review on credit card fraud detection using data mining classification techniques & machine learning algorithms
CN115879548B (en) Knowledge graph construction method and system for customer identity recognition
KR102110889B1 (en) System for providing AI clause inspection
CN113379540A (en) Capital data analysis system
CN112669039B (en) Knowledge graph-based customer risk management and control system and method
KR20210106592A (en) Method, apparatus and computer program for classifying cryptocurrency accounts using artificial intelligence
Keskar Comparing different models for credit card fraud detection
Sapozhnikova et al. Distributed infrastructure for big data processing in the transaction monitoring systems
Yesseleva-Plonka Blockchain network system for assessing SMEs’ creditworthiness
Bodhankar et al. The Smart Application of Data Mining in the Detection of Fraudulent Transactions
US20220300977A1 (en) Real-time malicious activity detection using non-transaction data
Duan et al. Data flow tracking-based block chain modelling
Mohammed et al. Fraud detection of credit card using logistic regression
Xie A machine learning approach to detect fraudulent customers based on their financial transaction history
Chen et al. Research and Implementation of Bank Credit Card Fraud Detection System Based on Reinforcement Learning and LSTM
Priya et al. Digital payments: a scheme for fraud data collection and use in Indian banking sector
Bagle et al. Anti Money Laundering System to Detect Suspicious Account

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination