Font Size: a A A

The Design And Implementation Of Suspicious Transaction Monitoring And Management System Based On J2EE

Posted on:2017-09-01Degree:MasterType:Thesis
Country:ChinaCandidate:T ShenFull Text:PDF
GTID:2348330512454799Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The development of the Internet is booming, China is bringing out the "Internet plus" thought, with different people living in different fields of Internet technology,reducing the heavy manual work by computer technology, improving working efficiency, making the computer with a better understanding of people's production and life by the use of big data technology. At the same time, helping people to achieve a better production and living environment, and it is also the ultimate goal of the computer development. Making full use of the Internet and information technology is the new direction of technology development, especially in the financial field, to improve the level of information technology in the filed of financial security has become an important study worth focusing on.In recent years, the financial industry in China is also developing rapidly, at the same time, financial crimes are increasingly rampant, seriously endangering the people's property security. There are a large number of criminals using various means to transfer illegal income to their legal income, the main measure is taking advantage of financial institutions to make a variety of complex transactions, and then the illegal currency will become legal in this way. This behavior mainly includes 3 parts: firstly,deposit the illegal income into financial institutions, then, make a variety of complex frequent transactions through financial institutions, such as investment in the stock market, inter-bank transfers and other complex ways, concealing the true source of funds, so that the funds in the book seems to be legitimate. Finally, from the use of a number of legal transactions, the criminals get the money back. Through the above steps, the criminals make it possible that the funds are legal.In order to curb illegal criminal acts listed above, the Chinese government has made a lot of efforts, not only to establish a lot of laws and regulations, but also increasing the extend of supervision, realizing a lot of effective work. However, on this basis, China's system construction and suspicious transaction tracking system is not that advanced. In the face of the huge transaction data generated every day, the speed of traditional manual identification methods and artificial way of reporting has been far behind the speed of crime criminals. Therefore, the use of monitoring a largenumber of transaction information technology by financial institutions, and identify the suspicious customers from the suspicious transaction information, thus establishing monitoring and tracking platform for illegal and criminal acts is becoming more and more important with the passage of time.The design of suspicious transaction monitoring and management system is using the characteristics of financial institutions. Though establishment the reasonable rules and use the computer technology to realize automatic monitoring and report, it can provide powerful help for the financial institutions.The main contents of this paper include the following aspects:1. The introduction of suspicious transaction monitoring management system,and the analysis of suspicious transaction monitoring management system at home and abroad, and we fully elaborate the characteristics and advantages of the system;2. The introduction of key technologies of the suspicious transaction monitoring and management system, and the analysis and design of main functions of the system.we also design the system background database;3. Complete the development and the implementation of suspicious transaction monitoring and management system, and introduce the development process and testing process of the suspicious transaction monitoring and management system;4. Summarize the design and development process of the suspicious transaction monitoring and management system, and look forward to the future development and extensible space of the suspicious transaction monitoring management system.
Keywords/Search Tags:Suspicious transactions, MVC, J2EE, My SQL database
PDF Full Text Request
Related items