[go: up one dir, main page]

WO2008129282A1 - Système fédéré de rapport d'activité suspecte (sar) - Google Patents

Système fédéré de rapport d'activité suspecte (sar) Download PDF

Info

Publication number
WO2008129282A1
WO2008129282A1 PCT/GB2008/001389 GB2008001389W WO2008129282A1 WO 2008129282 A1 WO2008129282 A1 WO 2008129282A1 GB 2008001389 W GB2008001389 W GB 2008001389W WO 2008129282 A1 WO2008129282 A1 WO 2008129282A1
Authority
WO
WIPO (PCT)
Prior art keywords
sar
coupled
matching
consent
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/GB2008/001389
Other languages
English (en)
Inventor
Michael Johnston
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
INFINITI Ltd
Original Assignee
INFINITI Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by INFINITI Ltd filed Critical INFINITI Ltd
Publication of WO2008129282A1 publication Critical patent/WO2008129282A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Definitions

  • US2004/0215558A1 discloses a method of producing a suspicious activity reports by financial institute.
  • the transaction processing device stores and configures information which generates SAR based on set instigation criteria which is not comprehensive to incorporate wide range of available information to meet every institutes set criteria.
  • US20030220878 A1 discloses systems and methods for suspicious activity detection based on evaluating electronic value transfers and generating a report.
  • WO2004/025540A2 discloses a method for detecting suspicious transactions. Automated method manages and assigns manual transactions and enables distribution of review information. Overall an automated system monitors financial transactions with collection of specified criteria e.g.
  • US2007/0028301A1 discloses a method of monitoring on line fraud activity by online businesses, banks, ISP's to provide security providers with fraud feed e.g. e-mail messages, where online information as first entity is received, analyzed, created as normalized data related to fraudulent activity in readable form and the data stored.
  • US20050257261 A1 provides solutions for dealing with unethical uses of electronic mail, and in particular, with attempts to use email messages to facilitate online fraud.
  • WO2005/109225 discloses online fraud solution for dealing with unethical uses of electronic mail. The method gathers incoming email message, analyze, and categorize it as a fraudulent and also identify resource locator.
  • WO2004097597 A2 discloses a method of confirming the validity of an identification presented by an individual in a financial transaction includes receiving transaction information at a transaction device that is usable to perform the financial transaction.
  • Both WO2005/093546 & US2005/0203881 disclose user behaviour information in database to detect unusual activity based on statistics- based intrusion detection (SBID) and rule-based intrusion detection (RBID).
  • SBID statistics- based intrusion detection
  • RBID rule-based intrusion detection
  • US20020059130 A1 discloses method and apparatus to detect fraudulent activities within a network-based auction facility.
  • US2006/0285665 discloses method and apparatus for fraud detection, based on voice monitoring.
  • US2006/0041508A1 discloses a method and system for tracking fraudulent activities associated with web sites.
  • the system includes a fraud tracking server which is connected to database, where server via communication module is linked to multiple client devices, and is able to identify potential spoof sites.
  • US2005/0267827A1 discloses a method and system to evaluate anti- laundering risk includes, (a) identifying a person, (b) a country associated with person, (c) financial product associated with person, (d) customer type, (e)risk rating set by predetermined criteria related such as country, financial product and customer type.
  • Both US2003/0174823A1 & WO01/52518A1 disclose a fraud preventing system by (a) identifying one or more fraud indicators, (b) assign a weighted value to each of indicator, (c) detect if indicators are present in pending or past transactions associated with account, (d) set minimum risk level of indicators, (e) calculate cumulative risk level of indicators detected in past transactions associated with the account e.g. calling card and (f) exceeds predetermined threshold value, verify the request with account owner.
  • WO2006/130819A2 shows a dynamic multidimensional risk weighted suspicious activities detection method in a stored database. Characteristics of subjects are put into mathematical model to produce risk values for each subject based on activity and background.
  • US2005/0102219A1 discloses a centralized computerized financial network to enable government agencies, financial institutions etc. to cooperate in combating terrorism, money laundering, drug dealing, fraud, identity theft, and/or other criminal activity involving banks and other financial institutions.
  • a computerized United Crimes Elimination Network (“UCEN”) utilizes the infrastructure where data collection about SAR's is carried by an authorized person from financial institution, who 94 can manually enter information, conduct search or upload information.
  • the centralized network can further request the financial institute to
  • the network is a database which stores information on SAR's which
  • An embodiment of the invention is a SAR's management
  • Financial service provider initiates SAR's by the system or
  • Financial service provider sends SAR's and or Consent to
  • the system automatically sends SAR's/consents to FIU or
  • FIU implements Routing of SAR's and Consents to appropriate
  • FIU also assesses security with linkage to police department (s)
  • FIU sends feed back to Financial service provider 159 13.
  • FIU allows access for auditing by FSP's, police departments and
  • Another embodiment of the invention is SAR product with combination
  • Another embodiment is a system designed to be used by individuals, to
  • This system interface is a platform
  • SAR person or company
  • activity assessment header and footer.
  • the SAR matching method involves number of combinations of some
  • 214 is a method for person with address and information, company with
  • SAR's initiation system is combination and
  • the SAR consent process is a system and method which involves
  • the SAR status is a system and method which involves combination of
  • the SAR routing is a system and method which involves combination of
  • 236 can be formed by using a logical and physical routing divide. 237
  • the SAR audit is a system and method which involves combination of
  • the SAR security is a system and method which involves combination
  • Another embodiment of the invention is a system and product for SAR
  • 252 offers individual case management system and customised system 253
  • This invention is a system and product to manage, coordinate and
  • Reporting Institution detects suspicious activity.
  • Figure 1 shows schematic of SAR system. SAR's are initiated (1 ) by
  • the Consent request is different from
  • the FIU implements Routing (4) of SAR's and
  • Figure 3 shows a SAR initiation process and method which involves
  • 345 process can be used by FSP's, police departments and government
  • 349 collate information in same format.
  • Figure 4 shows a method for SAR searching which involves searching
  • 354 subject could be for a person or a company. Both header and footer
  • 355 can incorporate subject, associated subject or activity related
  • a SAR may be associated with an existing subject held in another
  • Figure 5 shows a method of SAR matching (19) a number of
  • Figure 6 shows a combined method for SAR matching and searching
  • Figure 7 shows a system for another SAR's initiation format - method 2
  • 393 elements 49 to 57 can take in any order and number.
  • Figure 8 shows a SAR consent (12) system and method which involves
  • Figure 10 shows a SAR routing status (14) system and method which
  • 407 management such as destination (68), source (69) and strategy (70).
  • Figure 10b shows details about destination (68) and strategy (70) and
  • Each destination (68) can have its own
  • 421 network to use e.g. wireless or cable, satellite or terrestrial,
  • first valid area code e.g. post code of main subject
  • a destination may want
  • 537 access each other's systems when for example matching or searching
  • Another requestor with a higher security level may be given a
  • the feedback contains information such as;
  • Figure 13 shows a SAR Audit (16) system and method which involves
  • 560 can be initiated or instigated by FSP (s), police department (s) and
  • 565 management such as ownership (84), expiry date (85) and access (86).
  • Searching (88) allows a search request to
  • 580 come under all security aspects presented in figure 14.
  • time between retries (92) can be set as a fixed interval or a
  • 585 may communicate with me (94) and the request queues (95) can be
  • the feedback includes not only
  • the FIU uses the system to automatically route incoming
  • the FIU is now able to filter out sensitive information
  • 626 cycle is applicable to any FIU in any country. 627
  • This new 659 information can then be used to combat application fraud, money 660 laundering and other crimes where criminals use stolen identifies.
  • 661 662 The structures defined on following examples format deemed suitable 663 for the UK. 664 Defines example formats for; person subject, company subject, 665 transaction, information, address, activity assessment, exists. 666 667 Example 2: 668 Company Subject (main or associated)
  • 702 table in database can store 30 address lines. 703
  • 706 user interface can cater for any language on a per end-user basis. 707
  • a main subject is either a person (as in
  • 713 subject is either a person (as in example 3) or a company (as in
  • a subject be they a main subject or an associated subject and

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Il y a des sérieuses préoccupations concernant les liens entre le terrorisme, le crime et le blanchiment d'argent, de telle sorte que diverses directives sur le blanchiment d'argent sont apparues ainsi que d'autres éléments de législation. La présente invention est un système et un produit pour gérer, coordonner et améliorer le cycle de vie de rapport d'activité suspecte (SAR). Elle est utilisée pour les rapporteurs SAR tels que les fournisseurs de service financier (FSP); permettant la création efficace de SAR et de consentements. Ensuite, le SAR/Consentement ultérieur est soumis à une autorité de collecte appelée unité de coordination et de rassemblement d'information frauduleuse (FIU). Les buts de la FIU sont d'assurer que les SAR/Consentement sont ensuite soumis à enquête pour un achèvement dans le délai par les agences d'application de la loi et autres agences. Le résultat de l'investigation d'un SAR/Consentement peut être une saisie des actifs, l'arrestation d'individus, le fait de soumettre des sociétés à des procédures légales, etc. Afin que le cycle de vie complet SAR/Consentement se déroule sans accrocs et dans les délais beaucoup plus d'éléments sons nécessaires. Par exemple, les agences gouvernementales financent souvent la FIU et demandent des rapports d'information de gestion réguliers pour justifier le financement. Les FSP bénéficient également de rapports similaires qui aident à justifier l'effort qu'ils ont effectué lors de la création et de la soumission. Les équipes enquêtant sur des SAR/Consentements reçus nécessitent des moyens pour prioriser, faire des comparaisons croisées de nouveaux SAR avec une variété de sources de données, des recherches par comparaison avec des listes de personnes recherchées, etc. Cette invention se focalise sur un système fédéré où deux systèmes ou davantage coopèrent aux objectifs du cycle de vie SAR/Consentement/Rétroaction. Cette amélioration permet à certaines ou à toutes les diverses parties prenantes (FSP, FIU, application de la loi, agent gouvernemental, etc.) impliquées dans le cycle de vie de SAR/Consentement/Rétroaction d'utiliser leur propre système pour une partie aussi étendue ou aussi réduit du cycle de vie qu'elles le souhaitent, plutôt qu'elles aient à se reposer uniquement sur un système centralisé où par exemple les systèmes et les données sont situés uniquement dans le FIU. Ceci crée un environnement où chaque partie prenante a plus d'options. Par exemple, elles peuvent souhaiter utiliser un ensemble différent de SAR historiques lors d'un recoupement, ou utiliser différentes politiques d'évaluation, etc... Les parties prenantes ont néanmoins la possibilité de coopérer et d'effectuer leur part dans le cycle de vie. Lorsqu'on réunit ces systèmes ensembles, on crée un cycle de vie SAR/Consentement/rétroaction de manière bien plus flexible. Ceci fournit également un moyen pour que les cycles de vie de SAR/consentement/rétroaction dans différents pays/Etats coopèrent et partagent des données tout au long du cycle de vie.
PCT/GB2008/001389 2007-04-21 2008-04-21 Système fédéré de rapport d'activité suspecte (sar) Ceased WO2008129282A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0707841A GB0707841D0 (en) 2007-04-21 2007-04-21 SAR federated system
GB0707841.3 2007-04-21

Publications (1)

Publication Number Publication Date
WO2008129282A1 true WO2008129282A1 (fr) 2008-10-30

Family

ID=38135291

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2008/001389 Ceased WO2008129282A1 (fr) 2007-04-21 2008-04-21 Système fédéré de rapport d'activité suspecte (sar)

Country Status (2)

Country Link
GB (1) GB0707841D0 (fr)
WO (1) WO2008129282A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9621357B2 (en) 2014-10-16 2017-04-11 Verato, Inc. System and method for providing consent management

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006099159A2 (fr) * 2005-03-10 2006-09-21 Yuh-Shen Song Reseau d'affaires anti-crimes financiers
WO2006130819A2 (fr) * 2005-05-31 2006-12-07 Yuh-Shen Song Detecteur dynamique d'activites suspectes a ponderation de risques multidimensionnels
US20070028301A1 (en) * 2005-07-01 2007-02-01 Markmonitor Inc. Enhanced fraud monitoring systems

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006099159A2 (fr) * 2005-03-10 2006-09-21 Yuh-Shen Song Reseau d'affaires anti-crimes financiers
WO2006130819A2 (fr) * 2005-05-31 2006-12-07 Yuh-Shen Song Detecteur dynamique d'activites suspectes a ponderation de risques multidimensionnels
US20070028301A1 (en) * 2005-07-01 2007-02-01 Markmonitor Inc. Enhanced fraud monitoring systems

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9621357B2 (en) 2014-10-16 2017-04-11 Verato, Inc. System and method for providing consent management

Also Published As

Publication number Publication date
GB0707841D0 (en) 2007-05-30

Similar Documents

Publication Publication Date Title
TWI861080B (zh) 用於防範金融犯罪之電腦實施方法、電腦系統及電腦可讀媒體
US20120173570A1 (en) Systems and methods for managing fraud ring investigations
US20070174214A1 (en) Integrated fraud management systems and methods
US7958032B2 (en) Generating event messages corresponding to event indicators
US20120143649A1 (en) Method and system for dynamically detecting illegal activity
US20020138417A1 (en) Risk management clearinghouse
US20230274279A1 (en) System and method for identity chaining
US20040117316A1 (en) Method for detecting suspicious transactions
Berman When Database Queries Are Fourth Amendment Searches
US20060085370A1 (en) System for identifying data relationships
Van Nguyen The modus operandi of transnational computer fraud: a crime script analysis in Vietnam
US20110087495A1 (en) Suspicious entity investigation and related monitoring in a business enterprise environment
US20050102210A1 (en) United crimes elimination network
US20240403884A1 (en) System and method for processing information associated with specified finance-related activities
US20100121833A1 (en) Suspicious activities report initiation
US20080270206A1 (en) Method for detecting suspicious transactions
TW202232919A (zh) 電子郵件憑證系統
US12299759B1 (en) Computer-based system for facilitating the execution of law enforcement duties
US20040103049A1 (en) Fraud prevention system
US20140258117A1 (en) Methods and systems for handling currency
Garin et al. Machine learning in classifying bitcoin addresses
US20070265946A1 (en) Aggregating event indicators
US20100312679A1 (en) System and Method for Analyzing Bank Payment Patterns
WO2008129282A1 (fr) Système fédéré de rapport d'activité suspecte (sar)
Holt et al. Assessing the correlates of cryptofraud victimization reporting

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08737048

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08737048

Country of ref document: EP

Kind code of ref document: A1