Method for detecting suspicious transactions
0 Assignments
0 Petitions
Accused Products
Abstract
A method is described for detecting suspicious financial transactions, especially those as identified by the federal Bank Security Act. An automated means of processing financial data to identify suspicious transactions is described as well as a means to assign and manage a manual review of transactions to employees through an automated method, and to enable distribution of review information through and automated technique. The present invention also provides a method to monitor and enforce employee compliance with federal anti-money laundering laws and organization policy. Furthermore, the present invention provides a method to automatically monitor financial transactions with a collection of specified criteria and send immediate real-time feedback and disabling (lockout) information to terminals where such transactions originate.
50 Citations
42 Claims
-
1-25. -25. (canceled)
-
26. A method for analyzing financial instruments, comprising
transmitting the financial instruments to a clearing entity; -
receiving digitized images of the financial instruments and instructions from the clearing entity; determining if the instructions comprise a request for further review of the financial instruments; if instructions comprise a request, assigning review of the digitized images to a reviewer workstation; receiving analysis of the financial instruments from the reviewer workstation, the analysis comprising a determination of whether the financial instruments represent a plurality of consecutive high-value purchases that exceed a threshold amount; and generating a report if the determination is positive. - View Dependent Claims (27, 28, 29, 30, 31, 32)
-
-
33. A method for analyzing a purchase of a financial instrument, the method comprising:
-
obtaining identity information identifying a customer who is a purchaser of a first financial instrument; detecting at least one second financial instrument purchased on the same day as the first financial instrument by a purchaser having the same identity information as the customer; determining a total dollar value by adding a value of the first financial instrument to a sum of dollar values of the at least one second financial instrument; storing the identity information if the total dollar value is equal to or above a first threshold amount; and generating a report if the total dollar value is equal to or above a second threshold amount. - View Dependent Claims (34, 35, 36, 37, 38, 39)
-
-
40. A method for detecting suspicious transactions, the method comprising:
-
storing a file having predefined fill fields; obtaining terms of a financial transaction, the terms comprising identity information identifying a first customer who is a purchaser of a financial instrument in the financial transaction; comparing the terms of the financial transaction to a first criteria indicative of suspicious activities; if the first criteria are satisfied, merging predefined fill fields with respective terms of the financial transaction; and generating a report comprising the fill fields and the terms. - View Dependent Claims (41, 42)
-
Specification