Abstract: This disclosure relates generally to financial crimes and more particularly to methods and systems for detecting financial crimes in an enterprise. In one embodiment, a method for detection of financial crimes is disclosed. The method includes consolidating, via a processor, data associated with financial transactions collected from multifarious data sources. The method further includes identifying, via the processor, one or more financial crime scenarios based on correlation and interdependencies between data collected from the multifarious data sources. The method finally includes predicting in real-time, via the processor, one or more financial crimes by applying artificial intelligence and analytics to the one or more financial crime scenarios and the data collected from the multifarious data sources. Figure 3
CLIAMS:WE CLAIM
1. A method for detecting financial crimes, the method comprising:
consolidating, via a processor, data associated with financial transactions collected from multifarious data sources;
identifying, via the processor, at least one financial crime scenario based on correlation and interdependencies between data collected from the multifarious data sources; and
predicting in real-time, via the processor, at least one financial crime by applying artificial intelligence and analytics to the at least one financial crime scenario and the data collected from the multifarious data sources.
2. The method of claim 1, wherein the multifarious data sources are selected from a group comprising social media data, Know Your Customer (KYC) data, payment data, trade data, employee data, Anti Money Laundering (AML) data, market abuse data, Foreign Account Tax Compliance Act (FATCA) data, credit Bureau data, and Human Resource (HR) data.
3. The method of claim 1 further comprising archiving at least a portion of data collected from multifarious data sources, the at least a portion is one of historic data and non-active data.
4. The method of claim 1, wherein predicting comprises creating behavioral profiles associated with each of internal employees, traders, and customers.
5. The method of claim 4, wherein prediction corresponding to the internal employees is associated with internal organization fraud, prediction corresponding to the traders is associated with trade surveillance, and prediction corresponding to the customers is associated with anti-money laundering.
6. The method of claim 4, wherein predicting comprises clustering each of internal employees, traders, and customers into a plurality of categories based on associated behavioral profiles and risk scores.
7. The method of claim 6, wherein predicting comprises identifying high risk outliers for each of the employees, traders, and customers based on clustering into the plurality of categories.
8. The method of claim 6, wherein predicting comprises detecting suspicious pattern within a network of individuals associated with each of the employees, traders, and customers based on associated behavioral profiles, risk scores, and a plurality of parameters.
9. The method of claim 8, wherein the plurality of parameters is selected from a group comprising physical address of an individual, Internet Protocol (IP) address, device ID, and social media information.
10. A system for detecting financial crimes, the system comprising:
at least one processors; and
a computer-readable medium storing instructions that, when executed by the at least one processor, cause the at least one processor to perform operations comprising:
consolidating, via a processor, data associated with financial transactions collected from multifarious data sources;
identifying, via the processor, at least one financial crime scenario based on correlation and interdependencies between data collected from the multifarious data sources; and
predicting in real-time, via the processor, at least one financial crime by applying artificial intelligence and analytics to the at least one financial crime scenario and the data collected from the multifarious data sources.
11. The system of claim 10, wherein the multifarious data sources are selected from a group comprising social media data, Know Your Customer (KYC) data, payment data, trade data, employee data, Anti Money Laundering (AML) data, market abuse data, Foreign Account Tax Compliance Act (FATCA) data, credit Bureau data, and Human Resource (HR) data.
12. The system of claim 10, wherein the operations further comprise archiving at least a portion of data collected from multifarious data sources, the at least a portion is one of historic data and non-active data.
13. The system of claim 10, wherein the operation of predicting further comprises operation of creating behavioral profiles associated with each of internal employees, traders, and customers.
14. The system of claim 13, wherein prediction corresponding to the internal employees is associated with internal organization fraud, prediction corresponding to the traders is associated with trade surveillance, and prediction corresponding to the customers is associated with anti-money laundering.
15. The system of claim 13, wherein the operation of predicting comprises the operation of clustering each of internal employees, traders, and customers into a plurality of categories based on associated behavioral profiles and risk scores.
16. The system of claim 15, wherein the operation of predicting comprises the operation of identifying high risk outliers for each of the employees, traders, and customers based on clustering into the plurality of categories.
17. The system of claim 15, wherein the operation of predicting comprises the operation of detecting suspicious pattern within a network of individuals associated with each of the employees, traders, and customers based on associated behavioral profiles, risk scores, and a plurality of parameters.
18. The system of claim 17, wherein the plurality of parameters is selected from a group comprising physical address, Internet Protocol (IP) address, device ID, and social media information.
19. A non-transitory computer-readable storage medium for rationalizing a portfolio of assets, when executed by a computing device, cause the computing device to:
consolidate, via a processor, data associated with financial transactions collected from multifarious data sources;
identify, via the processor, at least one financial crime scenario based on correlation and interdependencies between data collected from the multifarious data sources; and
predict in real-time, via the processor, at least one financial crime by applying artificial intelligence and analytics to the at least one financial crime scenario and the data collected from the multifarious data sources.
Dated this 17th day of July, 2015
Swetha S.N.
Of K&S Partners
Agent for the Applicant
,TagSPECI:TECHNICAL FIELD
This disclosure relates generally to financial crimes and more particularly to methods and systems for detecting financial crimes in an enterprise.
| # | Name | Date |
|---|---|---|
| 1 | 3655-CHE-2015-FER.pdf | 2019-11-29 |
| 1 | IP31941-spec.pdf | 2015-07-17 |
| 2 | IP31941-fig.pdf | 2015-07-17 |
| 2 | 3655-CHE-2015- CORRESPONDENCE-F1-PA-130115.pdf | 2016-06-20 |
| 3 | FORM 5-IP31941.pdf | 2015-07-17 |
| 3 | 3655-CHE-2015-FORM1-130115.pdf | 2016-06-20 |
| 4 | FORM 3-IP31941.pdf | 2015-07-17 |
| 4 | 3655-CHE-2015-POWER OF ATTORNEY-130115.pdf | 2016-06-20 |
| 5 | 3655-CHE-2015 FORM-9 17-07-2015.pdf | 2015-07-17 |
| 5 | abstract 3655-CHE-2015.jpg | 2015-07-25 |
| 6 | 3655-CHE-2015 FORM-18 17-07-2015.pdf | 2015-07-17 |
| 6 | 3655CHE2015_Prioritydocumentrequest.pdf | 2015-07-23 |
| 7 | 3655-CHE-2015 FORM-18 17-07-2015.pdf | 2015-07-17 |
| 7 | 3655CHE2015_Prioritydocumentrequest.pdf | 2015-07-23 |
| 8 | 3655-CHE-2015 FORM-9 17-07-2015.pdf | 2015-07-17 |
| 8 | abstract 3655-CHE-2015.jpg | 2015-07-25 |
| 9 | 3655-CHE-2015-POWER OF ATTORNEY-130115.pdf | 2016-06-20 |
| 9 | FORM 3-IP31941.pdf | 2015-07-17 |
| 10 | FORM 5-IP31941.pdf | 2015-07-17 |
| 10 | 3655-CHE-2015-FORM1-130115.pdf | 2016-06-20 |
| 11 | IP31941-fig.pdf | 2015-07-17 |
| 11 | 3655-CHE-2015- CORRESPONDENCE-F1-PA-130115.pdf | 2016-06-20 |
| 12 | IP31941-spec.pdf | 2015-07-17 |
| 12 | 3655-CHE-2015-FER.pdf | 2019-11-29 |
| 1 | SearchStrategyMatrix_27-11-2019.pdf |