Sign In to Follow Application
View All Documents & Correspondence

Methods And Systems For Detecting Financial Crimes In An Enterprise

Abstract: This disclosure relates generally to financial crimes and more particularly to methods and systems for detecting financial crimes in an enterprise. In one embodiment, a method for detection of financial crimes is disclosed. The method includes consolidating, via a processor, data associated with financial transactions collected from multifarious data sources. The method further includes identifying, via the processor, one or more financial crime scenarios based on correlation and interdependencies between data collected from the multifarious data sources. The method finally includes predicting in real-time, via the processor, one or more financial crimes by applying artificial intelligence and analytics to the one or more financial crime scenarios and the data collected from the multifarious data sources. Figure 3

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
17 July 2015
Publication Number
31/2015
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
ipo@knspartners.com
Parent Application

Applicants

WIPRO LIMITED
Doddakannelli, Sarjapur Road, Bangalore 560035, Karnataka, India.

Inventors

1. HEMANT MANOHAR WARADKAR
403, Gaurang, Prasun Dham, Thergaon Road, Chinchwad, Pune 411 033, Maharashtra, India.

Specification

CLIAMS:WE CLAIM
1. A method for detecting financial crimes, the method comprising:
consolidating, via a processor, data associated with financial transactions collected from multifarious data sources;
identifying, via the processor, at least one financial crime scenario based on correlation and interdependencies between data collected from the multifarious data sources; and
predicting in real-time, via the processor, at least one financial crime by applying artificial intelligence and analytics to the at least one financial crime scenario and the data collected from the multifarious data sources.
2. The method of claim 1, wherein the multifarious data sources are selected from a group comprising social media data, Know Your Customer (KYC) data, payment data, trade data, employee data, Anti Money Laundering (AML) data, market abuse data, Foreign Account Tax Compliance Act (FATCA) data, credit Bureau data, and Human Resource (HR) data.
3. The method of claim 1 further comprising archiving at least a portion of data collected from multifarious data sources, the at least a portion is one of historic data and non-active data.
4. The method of claim 1, wherein predicting comprises creating behavioral profiles associated with each of internal employees, traders, and customers.
5. The method of claim 4, wherein prediction corresponding to the internal employees is associated with internal organization fraud, prediction corresponding to the traders is associated with trade surveillance, and prediction corresponding to the customers is associated with anti-money laundering.
6. The method of claim 4, wherein predicting comprises clustering each of internal employees, traders, and customers into a plurality of categories based on associated behavioral profiles and risk scores.
7. The method of claim 6, wherein predicting comprises identifying high risk outliers for each of the employees, traders, and customers based on clustering into the plurality of categories.
8. The method of claim 6, wherein predicting comprises detecting suspicious pattern within a network of individuals associated with each of the employees, traders, and customers based on associated behavioral profiles, risk scores, and a plurality of parameters.
9. The method of claim 8, wherein the plurality of parameters is selected from a group comprising physical address of an individual, Internet Protocol (IP) address, device ID, and social media information.
10. A system for detecting financial crimes, the system comprising:
at least one processors; and
a computer-readable medium storing instructions that, when executed by the at least one processor, cause the at least one processor to perform operations comprising:
consolidating, via a processor, data associated with financial transactions collected from multifarious data sources;
identifying, via the processor, at least one financial crime scenario based on correlation and interdependencies between data collected from the multifarious data sources; and
predicting in real-time, via the processor, at least one financial crime by applying artificial intelligence and analytics to the at least one financial crime scenario and the data collected from the multifarious data sources.
11. The system of claim 10, wherein the multifarious data sources are selected from a group comprising social media data, Know Your Customer (KYC) data, payment data, trade data, employee data, Anti Money Laundering (AML) data, market abuse data, Foreign Account Tax Compliance Act (FATCA) data, credit Bureau data, and Human Resource (HR) data.
12. The system of claim 10, wherein the operations further comprise archiving at least a portion of data collected from multifarious data sources, the at least a portion is one of historic data and non-active data.
13. The system of claim 10, wherein the operation of predicting further comprises operation of creating behavioral profiles associated with each of internal employees, traders, and customers.
14. The system of claim 13, wherein prediction corresponding to the internal employees is associated with internal organization fraud, prediction corresponding to the traders is associated with trade surveillance, and prediction corresponding to the customers is associated with anti-money laundering.
15. The system of claim 13, wherein the operation of predicting comprises the operation of clustering each of internal employees, traders, and customers into a plurality of categories based on associated behavioral profiles and risk scores.
16. The system of claim 15, wherein the operation of predicting comprises the operation of identifying high risk outliers for each of the employees, traders, and customers based on clustering into the plurality of categories.
17. The system of claim 15, wherein the operation of predicting comprises the operation of detecting suspicious pattern within a network of individuals associated with each of the employees, traders, and customers based on associated behavioral profiles, risk scores, and a plurality of parameters.
18. The system of claim 17, wherein the plurality of parameters is selected from a group comprising physical address, Internet Protocol (IP) address, device ID, and social media information.
19. A non-transitory computer-readable storage medium for rationalizing a portfolio of assets, when executed by a computing device, cause the computing device to:
consolidate, via a processor, data associated with financial transactions collected from multifarious data sources;
identify, via the processor, at least one financial crime scenario based on correlation and interdependencies between data collected from the multifarious data sources; and
predict in real-time, via the processor, at least one financial crime by applying artificial intelligence and analytics to the at least one financial crime scenario and the data collected from the multifarious data sources.

Dated this 17th day of July, 2015

Swetha S.N.
Of K&S Partners
Agent for the Applicant
,TagSPECI:TECHNICAL FIELD
This disclosure relates generally to financial crimes and more particularly to methods and systems for detecting financial crimes in an enterprise.

Documents

Application Documents

# Name Date
1 3655-CHE-2015-FER.pdf 2019-11-29
1 IP31941-spec.pdf 2015-07-17
2 IP31941-fig.pdf 2015-07-17
2 3655-CHE-2015- CORRESPONDENCE-F1-PA-130115.pdf 2016-06-20
3 FORM 5-IP31941.pdf 2015-07-17
3 3655-CHE-2015-FORM1-130115.pdf 2016-06-20
4 FORM 3-IP31941.pdf 2015-07-17
4 3655-CHE-2015-POWER OF ATTORNEY-130115.pdf 2016-06-20
5 3655-CHE-2015 FORM-9 17-07-2015.pdf 2015-07-17
5 abstract 3655-CHE-2015.jpg 2015-07-25
6 3655-CHE-2015 FORM-18 17-07-2015.pdf 2015-07-17
6 3655CHE2015_Prioritydocumentrequest.pdf 2015-07-23
7 3655-CHE-2015 FORM-18 17-07-2015.pdf 2015-07-17
7 3655CHE2015_Prioritydocumentrequest.pdf 2015-07-23
8 3655-CHE-2015 FORM-9 17-07-2015.pdf 2015-07-17
8 abstract 3655-CHE-2015.jpg 2015-07-25
9 3655-CHE-2015-POWER OF ATTORNEY-130115.pdf 2016-06-20
9 FORM 3-IP31941.pdf 2015-07-17
10 FORM 5-IP31941.pdf 2015-07-17
10 3655-CHE-2015-FORM1-130115.pdf 2016-06-20
11 IP31941-fig.pdf 2015-07-17
11 3655-CHE-2015- CORRESPONDENCE-F1-PA-130115.pdf 2016-06-20
12 IP31941-spec.pdf 2015-07-17
12 3655-CHE-2015-FER.pdf 2019-11-29

Search Strategy

1 SearchStrategyMatrix_27-11-2019.pdf