Systems and methods for producing suspicious activity reports in financial transactions
First Claim
Patent Images
1. A computer-implemented method of producing a suspicious activity report, comprising:
- storing, by a computerized financial transaction system, configuration information wherein the configuration information configures the system to produce suspicious activity reports based on certain criteria, and wherein the certain criteria comprises both a mandatory SAR threshold and a SAR prompt threshold;
receiving by the computerized financial transaction system, transaction information comprising an amount of a transaction;
determining by the computerized financial transaction system, based on the transaction information and the certain criteria, whether a suspicious activity report is to be prepared, wherein determining whether the suspicious activity report is to be prepared comprises;
comparing by the computerized financial transaction system, the amount of the transaction to the mandatory SAR threshold; and
comparing by the computerized financial transaction system, the amount of the transaction to the SAR prompt threshold and, if triggered by the comparison, displaying a prompt that asks an operator if he wants to prepare a suspicious activity report; and
generating by the computerized financial transaction system, a suspicious activity report containing at least some of the transaction information.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of producing a suspicious activity reports includes storing configuration information at a transaction processing device. The configuration information configures the device to produce suspicious activity reports based on certain criteria. The method also includes receiving transaction information and determining, based on the transaction information and the certain criteria, whether a suspicious activity report is to be prepared. The method also includes generating a suspicious activity report containing at least some of the transaction information.
-
Citations
15 Claims
-
1. A computer-implemented method of producing a suspicious activity report, comprising:
-
storing, by a computerized financial transaction system, configuration information wherein the configuration information configures the system to produce suspicious activity reports based on certain criteria, and wherein the certain criteria comprises both a mandatory SAR threshold and a SAR prompt threshold; receiving by the computerized financial transaction system, transaction information comprising an amount of a transaction; determining by the computerized financial transaction system, based on the transaction information and the certain criteria, whether a suspicious activity report is to be prepared, wherein determining whether the suspicious activity report is to be prepared comprises; comparing by the computerized financial transaction system, the amount of the transaction to the mandatory SAR threshold; and comparing by the computerized financial transaction system, the amount of the transaction to the SAR prompt threshold and, if triggered by the comparison, displaying a prompt that asks an operator if he wants to prepare a suspicious activity report; and generating by the computerized financial transaction system, a suspicious activity report containing at least some of the transaction information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method of producing a suspicious activity report, comprising:
-
storing, by a computerized financial transaction system, configuration information at wherein the configuration information configures the system to produce suspicious activity reports based on certain criteria and wherein the certain criteria comprises both a mandatory SAR threshold and a SAR prompt threshold; receiving, by the computerized financial transaction system, transaction information, wherein the transaction information comprises an amount of a transaction; determining, by the computerized financial transaction system, based on the transaction information and the certain criteria, whether a suspicious activity report is to be prepared, wherein determining whether the suspicious activity report is to be prepared comprises; comparing, by the computerized financial transaction system, the amount of the transaction to the mandatory SAR threshold; comparing, by the computerized financial transaction system, the amount of the transaction to the SAR prompt threshold; and generating, by the computerized financial transaction system, a suspicious activity report containing at least some of the transaction information, wherein generating a suspicious activity report comprises; printing, by the computerized financial transaction system, a suspicious activity report having a portion of the additional information and also having blanks for receiving additional suspicious activity report information.
-
-
9. A computerized transaction processing device, comprising:
-
an input device arranged to receive transaction information and SAR information; a display screen arranged to display information to an operator; and application software that programs the transaction device to; store configuration information, wherein the configuration information configures the device to produce suspicious activity reports based on certain criteria, wherein the certain criteria comprises both a SAR prompt threshold and a mandatory SAR threshold; receive transaction information, wherein the transaction information comprises an amount of a transaction; determine based on the transaction information and the certain criteria, whether a suspicious activity report is to be prepared, wherein determining whether the suspicious activity report is to be prepared comprises; comparing the amount of the transaction to the mandatory SAR threshold; and comparing the amount of the transaction to the SAR prompt threshold; and generate a suspicious activity report containing at least some of the transaction information. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
Specification