Large organizations, such as financial institutions and other large enterprise organizations, may provide many different products and/or services. To support these complex and large-scale operations, a large organization may own, operate, and/or maintain many different computer systems that service different internal users and/or external users in connection with different products and services. In addition, some computer systems internal to the organization may be configured to exchange information with computer systems external to the organization so as to provide and/or support different products and services offered by the organization.
Distributed peer-to-peer systems, such as blockchains or other distributed ledger computing systems may be freely accessible, often without ownership from a single entity and may be leveraged to facilitate cryptocurrency exchange. For example, with a blockchain payments network, processing, settlement, and validation of transactions correctly facilitates a secure and immutable record of cryptocurrency transactions. Because of the open and distributed nature of such payment networks, financial organizations may have difficulty meeting requirements of certain laws and regulations such as the Bank Secrecy act to detect and report suspicious money exchange activities. Because cryptocurrency exchanges are often configured to mask ownership of participating digital wallets, cryptocurrency transactions may be considered to be untraceable due to the extreme difficulty in tracing. For example, cryptocurrency tumblers or mixers may set up a cryptocurrency exchange structure to “wash” cryptocurrency and obscure an exchange path. For example, an individual may transfer an amount (e.g., $100) to a mixer, who then divides that $100 between multiple digital wallets (e.g. 3 digital wallets). In doing so, the mixers are masking ill-gotten gains. As a result of the complexity associated with the multiple cryptocurrency exchange environments and their exchanges, it may be difficult for such an organization, such as a financial institution, to ensure transactions facilitated via these cryptocurrency exchanges meet regulatory standards.
The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosure. The summary is not an extensive overview of the disclosure. It is neither intended to identify key or critical elements of the disclosure nor to delineate the scope of the disclosure. The following summary presents some concepts of the disclosure in a simplified form as a prelude to the description below.
Aspects of the disclosure relate to computer systems that provide effective, efficient, scalable, and convenient ways of securely and uniformly managing how internal computer systems exchange information with external computer systems to provide and/or support different products and services offered by an organization (e.g., a financial institution, and the like).
A system of one or more computers can be configured to perform particular operations or actions by virtue of having software, firmware, hardware, or a combination of them installed on the system that in operation causes or cause the system to perform the actions. One or more computer programs can be configured to perform particular operations or actions by virtue of including instructions that, when executed by data processing apparatus, cause the apparatus to perform the actions. One general aspect includes identification and tracing (or tracking) of electronic transactions via a cryptocurrency tracing system associated with one or more distributed ledger computing systems and/or cryptocurrency exchanges.
Various aspects of the disclosure relate to automated identification of illicit transfers of cryptocurrency via mixing organizations. A cryptocurrency tracing system is configured to transfer a series of electronic transactions between known digital wallets via a suspect mixing organization. The cryptocurrency tracing system traces each cryptocurrency transaction through a plurality of mixing digital wallets to identify all possible mixing digital wallets being used by the mixing organization. Based on the identified mixing digital wallets, suspect digital wallets are identified and a second series of transactions are initiated between the known digital wallets via the mixing digital wallets. Based on these transfers, suspect digital wallets can be monitored to identify cryptocurrency transfer patterns representative of an attempt to obscure illicit funds transfers. Once identified, the suspect digital wallets may be automatically frozen.
The cryptocurrency tracing system may send an amount of crypto coins (or other cryptocurrency) to a suspected tumbler on a periodic basis (e.g., every 5 minutes), such as via electronic transaction of a known quantity of cryptocurrency. The cryptocurrency tracing system may then monitor the distribution of the cryptocurrency, have a time-date stamp of how the tumbler was working at the time. For example, if a cryptocurrency coin sent from a first wallet and 4 different coins may be received as output in my wallet, the sent coins may have a talk-back beacon (e.g., a tracing pattern) on them enabling mapping of the coin's exit from the tumbler and into which wallets it landed in for that point in time. The system can then track where the money ended up. The final wallets are considered to be the exit nodes. Machine learning may be used to identify where the money is likely to end up, such as by using historical data of coin prices, time and date stamps, and transaction volume combined with historical information stored in a database of known malicious wallets. This concept may be analogized to adding food dye to see where the liquid ends up via 3rd party tumblers. The path taken can be reconstructed with a time and date stamp and then, when wanting to track a wallet's actual historical use of the mixer, the historical path is known to unmask to path through a series of digital wallets that the cryptocurrency amounts took from sender to receiver.
These features, along with many others, are discussed in greater detail below.
The present disclosure is illustrated by way of example and not limited in the accompanying figures in which like reference numerals indicate similar elements and in which:
In the following description of various illustrative embodiments, reference is made to the accompanying drawings, which form a part hereof, and in which is shown, by way of illustration, various embodiments in which aspects of the disclosure may be practiced. It is to be understood that other embodiments may be utilized, and structural and functional modifications may be made, without departing from the scope of the present disclosure.
It is noted that various connections between elements are discussed in the following description. It is noted that these connections are general and, unless specified otherwise, may be direct or indirect, wired or wireless, and that the specification is not intended to be limiting in this respect.
As used throughout this disclosure, computer-executable “software and data” can include one or more: algorithms, applications, application program interfaces (APIs), attachments, big data, daemons, emails, encryptions, databases, datasets, drivers, data structures, file systems or distributed file systems, firmware, graphical user interfaces, images, instructions, machine learning (e.g., supervised, semi-supervised, reinforcement, and unsupervised), middleware, modules, objects, operating systems, processes, protocols, programs, scripts, tools, and utilities. The computer-executable software and data is on tangible, computer-readable memory (local, in network-attached storage, or remote), can be stored in volatile or non-volatile memory, and can operate autonomously, on-demand, on a schedule, and/or spontaneously.
“Computer machines” can include one or more: general-purpose or special-purpose network-accessible administrative computers, clusters, computing devices, computing platforms, desktop computers, distributed systems, enterprise computers, laptop or notebook computers, primary node computers, nodes, personal computers, portable electronic devices, servers, node computers, smart devices, tablets, and/or workstations, which have one or more microprocessors or executors for executing or accessing the computer-executable software and data. References to computer machines and names of devices within this definition are used interchangeably in this specification and are not considered limiting or exclusive to only a specific type of device. Instead, references in this disclosure to computer machines and the like are to be interpreted broadly as understood by skilled artisans. Further, as used in this specification, computer machines also include all hardware and components typically contained therein such as, for example, processors, executors, cores, volatile and non-volatile memories, communication interfaces, etc.
Computer “networks” can include one or more local area networks (LANs), wide area networks (WANs), the Internet, wireless networks, digital subscriber line (DSL) networks, frame relay networks, asynchronous transfer mode (ATM) networks, virtual private networks (VPN), or any combination of the same. Networks also include associated “network equipment” such as access points, ethernet adaptors (physical and wireless), firewalls, hubs, modems, routers, and/or switches located inside the network and/or on its periphery, and software executing on the foregoing.
The above-described examples and arrangements are merely some examples of arrangements in which the systems described herein may be used. Various other arrangements employing aspects described herein may be used without departing from the innovative concepts described.
A simplified block diagram is show to represent direct payments between digital wallets is shown in
The cryptocurrency tracing computing system 504 may comprise one or more computing devices and/or other computer components (e.g., processors, memories, communication interfaces) configured to perform one or more functions as described herein. Further details associated with the architecture of the cryptocurrency tracing computing system 504 are described with reference to
The application computing systems 508 and/or the client computing systems 522 may comprise one or more computing devices and/or other computer components (e.g., processors, memories, communication interfaces). In addition, the application computing systems 508 and/or the client computing systems 522 may be configured to host, execute, and/or otherwise provide one or more enterprise applications. In some cases, the application computing systems 508 may host one or more services configured facilitate operations requested through one or more API calls, such as data retrieval and/or initiating processing of specified functionality. In some cases, the client computing systems 522 may be configured to communicate with one or more of the application computing systems 508 such as via direct communications and/or API function calls and the services. In an arrangement where the private network 525 is associated with a financial institution (e.g., a bank), the application computing systems 508 may be configured, for example, to host, execute, and/or otherwise provide one or more transaction processing programs, such as an online banking application, fund transfer applications, and/or other programs associated with the financial institution. The application computing systems 508 and/or the client computing systems 522 may comprise various servers and/or databases that store and/or otherwise maintain account information, such as financial account information including account balances, transaction history, account owner information, and/or other information. In addition, the application computing systems 508 and/or the client computing systems 522 may process and/or otherwise execute transactions on specific accounts based on commands and/or other information received from other computer systems comprising the computing environment 500. In some cases, one or more of the application computing systems 508 and/or the client computing systems 522 may be configured, for example, to host, execute, and/or otherwise provide one or more transaction processing programs, such as electronic fund transfer applications, online loan processing applications, and/or other programs associated with the financial institution.
The application computing systems 508 may be one or more host devices (e.g., a workstation, a server, and the like) or mobile computing devices (e.g., smartphone, tablet). In addition, an application computing systems 508 may be linked to and/or operated by a specific enterprise user (who may, for example, be an employee or other affiliate of the enterprise organization) who may have administrative privileges to perform various operations within the private network 525. In some cases, the application computing systems 508 may be capable of performing one or more layers of user identification based on one or more different user verification technologies including, but not limited to, password protection, pass phrase identification, biometric identification, voice recognition, facial recognition and/or the like. In some cases, a first level of user identification may be used, for example, for logging into an application or a web server and a second level of user identification may be used to enable certain activities and/or activate certain access rights.
The client computing systems 520 may comprise one or more computing devices and/or other computer components (e.g., processors, memories, communication interfaces). The client computing systems 520 may be configured, for example, to host, execute, and/or otherwise provide one or more transaction processing programs, such as goods ordering applications, electronic fund transfer applications, online loan processing applications, and/or other programs associated with providing a product or service to a user. With reference to the example where the client computing systems 520 is for processing an electronic exchange of goods and/or services. The client computing systems 520 may be associated with a specific goods purchasing activity, such as purchasing a vehicle, transferring title of real estate may perform communicate with one or more other platforms within the client computing systems 520. In some cases, the client computing systems 520 may integrate API calls to request data, initiate functionality, or otherwise communicate with the one or more application computing systems 508, such as via the services. For example, the services may be configured to facilitate data communications (e.g., data gathering functions, data writing functions, and the like) between the client computing systems 520 and the one or more application computing systems 508. In some cases, the client computing systems 520 may include legal and/or governmental computing systems used to report and/or manage instances of suspected improper monetary transfers. For example, under a governmental regulation, the enterprise organization may be required to submit a report when suspected illicit monetary transfers are identified. Such reports may include electronic transfer records, identifiers of source digital wallets, recipient digital wallets, mixer digital wallets, transfer paths between the source digital wallet, one or more intermediary digital wallets, and the recipient digital wallets, dates of the electronic transactions, amounts associated with the electronic transactions, and/or other like information.
The user device(s) 510 may be computing devices (e.g., desktop computers, laptop computers) or mobile computing device (e.g., smartphones, tablets) connected to the network 525. The user device(s) 510 may be configured to enable the user to access the various functionalities provided by the devices, applications, and/or systems in the network 525.
The database(s) 516 may comprise one or more computer-readable memories storing information that may be used by the cryptocurrency tracing computing system 504. For example, the database(s) 516 may store identifiers of affiliated digital wallets (e.g., a source digital wallet, a recipient digital wallet), tracing records of a plurality of electronic transactions between the affiliated digital wallets, identifiers of mixer digital wallets, identifiers of suspect illicit sourcing digital wallets, identifiers of suspect illicit recipient digital wallets, and the like. In an arrangement, the database(s) 516 may be used for other purposes as described herein. In some cases, the client computing system 520 (e.g., a governmental agency computing system) may write data or read data to the database(s) 516 via the services.
In one or more arrangements, the cryptocurrency tracing computing system 504, the cryptocurrency management engine 524, the application computing systems 508, the client computing system 522, the client computing system 520, the user devices 510, and/or the other devices/systems in the computing environment 500 may be any type of computing device capable of receiving input via a user interface, and communicating the received input to one or more other computing devices in the computing environment 500. For example, the cryptocurrency tracing computing system 504, the cryptocurrency management engine 524, the application computing systems 508, the client computing system 522, the client computing system 520, the user devices 510, and/or the other devices/systems in the computing environment 500 may, in some instances, be and/or include server computers, desktop computers, laptop computers, tablet computers, smart phones, wearable devices, or the like that may comprised of one or more processors, memories, communication interfaces, storage devices, and/or other components. Any and/or all of the cryptocurrency tracing computing system 504, the cryptocurrency management engine 524, the application computing systems 508, the client computing system 522, the client computing system 520, the user devices 510, and/or the other devices/systems in the computing environment 500 may, in some instances, be and/or comprise special-purpose computing devices configured to perform specific functions.
Messages transmitted from and received at devices in the computing environment 500 may be encoded in one or more MAC data units and/or PHY data units. The MAC processor(s) 560 and/or the PHY processor(s) 565 of the cryptocurrency tracing computing system 504 may be configured to generate data units, and process received data units, that conform to any suitable wired and/or wireless communication protocol. For example, the MAC processor(s) 560 may be configured to implement MAC layer functions, and the PHY processor(s) 565 may be configured to implement PHY layer functions corresponding to the communication protocol. The MAC processor(s) 560 may, for example, generate MAC data units (e.g., MAC protocol data units (MPDUs)), and forward the MAC data units to the PHY processor(s) 565. The PHY processor(s) 565 may, for example, generate PHY data units (e.g., PHY protocol data units (PPDUs)) based on the MAC data units. The generated PHY data units may be transmitted via the TX/RX module(s) 570 over the private network 525. Similarly, the PHY processor(s) 565 may receive PHY data units from the TX/RX module(s) 565, extract MAC data units encapsulated within the PHY data units, and forward the extracted MAC data units to the MAC processor(s). The MAC processor(s) 560 may then process the MAC data units as forwarded by the PHY processor(s) 565.
One or more processors (e.g., the host processor(s) 555, the MAC processor(s) 560, the PHY processor(s) 565, and/or the like) of the cryptocurrency tracing computing system 504 may be configured to execute machine readable instructions stored in memory 550. The memory 550 may comprise (i) one or more program modules/engines having instructions that when executed by the one or more processors cause the cryptocurrency tracing computing system 504 to perform one or more functions described herein and/or (ii) one or more databases that may store and/or otherwise maintain information which may be used by the one or more program modules/engines and/or the one or more processors. The one or more program modules/engines and/or databases may be stored by and/or maintained in different memory units of the cryptocurrency tracing computing system 504 and/or by different computing devices that may form and/or otherwise make up the cryptocurrency tracing computing system 504. For example, the memory 550 may have, store, and/or comprise a transaction management engine 550-1, a monitoring and analysis engine 550-2, a reporting engine 550-3, and/or the like. The transaction management engine 550-1 may have instructions that direct and/or cause the cryptocurrency tracing computing system 504 to perform one or more operations associated with creating and/or facilitating electronic transfers between a source tracing digital wallet and a recipient tracing digital wallet and a frequency, amount, and/or cryptocurrency type of a series of electronic transactions, and the like. The monitoring and analysis engine 550-2 may process instructions that may cause the cryptocurrency tracing computing system 504 to perform monitoring and/or analysis of the cryptocurrency transactions initiated by the transaction management engine 550-1, identify mixer transaction patterns based on those transactions, such as via pattern analysis using a continuously trained machine learning model and/or other analysis method. The reporting engine 550-3 may have instructions that direct and/or cause the cryptocurrency tracing computing system 504 to perform one or more operations associated with generating alerts, providing interactive user interfaces that allow law enforcement personal to initiate automated law enforcement actions such as initiating a lockdown of digital wallets suspected of illicit activities, and the like.
While
Cryptocurrencies are often implemented on an anonymizing digital ledger platform (e.g., blockchain, holochain, and the like), such as the distributed ledger computing systems 532. While digital wallet ownership and/or electronic transactions may be anonymized, the digital leger platforms store information that provides transaction verification that allows the cryptocurrency universe to exist. Due to the difficulty in tracing cryptocurrency transactions, nefarious and/or malicious actors use then to mask movements of ill-gotten gains. However, this same immutable digital ledger information may be leveraged by the cryptocurrency tracing computing system 504 to trace cryptocurrency transaction through complex patterns of electronic transactions designed to obscure monetary movements of illicit gains.
For direct cryptocurrency transactions between digital wallets, tracing the transactions may be recorded through the publicly available logs integral to an associated digital ledger platforms (e.g., the distributed ledger computing systems 532). For example, bitcoin transactions may be traced via the associated blockchain-based ledgers. Because of potential opportunities to profit from illicit activities, and in an attempt to hide monetary transfers associated with those illicit activities, crypto-mixers have been formed to mask sending of a specified amount of money between a monetary source (e.g., a digital wallet) and a recipient. For example, the crypto-mixer (or “tumbler”) may receive a request to obscure a transfer of funds, from a source digital wallet (e.g., digital wallet 552) to a recipient digital wallet (e.g., digital wallet 554). The crypto-mixer (e.g., a user computing device or one or more of the user devices 510 configured to obscure electronic transactions between digital wallets) may utilize one or more intermediary digital wallets to facilitate the transfer. In some cases, the crypto-mixer may “layer” the intermediary digital wallets and/or may utilize different transfer patterns when attempting to obscure transfer of the illicit funds. The recipient digital wallet receives an expected amount of funds, but from one or more of a plurality of mixer digital wallets as shown in
Information obtained via the digital ledger computing system regarding suspect digital wallets may be augmented via additional data sources storing information concerning electronic transactions associated with digital wallets, such as an enterprise organization database (e.g., databases 516) (e.g., for products and/or services), vendor electronic transaction information, address information, governmental records information and/or the like. In some cases, the mixers may layer transfers via multiple layers of mixer wallets, and/or may exchange portions of the funds through different currencies (crypto currencies, country-backed currencies, precious metals, securities, and/or the like). The monitoring and analysis engine 550-3 may monitor the periodic electronic transaction continually sent from the sending digital wallet to the recipient digital wallet via the mixer to identify transfer patterns to and from the mixer's digital wallets such as transfer patters from source digital wallets recipient digital wallets, mixer digital wallets, and/or the like. In some cases, the monitoring and analysis engine 550-3 may incorporate a machine learning engine with a model trained to identify cryptocurrency transfer patterns to and/or from the mixer digital wallets. In some cases, the initial training of the machine learning model may be performed based on a historical data set, a simulated data set, and/or a combination. The machine learning model may be trained periodically (e.g., daily, weekly, monthly, quarterly, yearly) based on identified cryptocurrency transfer patterns and/or suspect and valid electronic transfers between digital wallets that occurred within that or other previous time periods. In some case, the machine learning model may be trained continuously based on currently monitored electronic transfers between digital wallets and/or identified cryptocurrency transfer patterns and/or feedback received via a user interface provided by the reporting engine 550-3.
The reporting engine 550-3 may generate a user interface screen that provides a visual representation of monetary movements, with or without a drill-down capability to see individual details as well as identifying similarities between patterns of illicit monetary movements. In some cases, the user interface screen may include one or more inputs that allow remote authorization to initiate automatic freezing of access to and/or from suspect digital wallets of senders, mixers, or recipients of the suspected illicit fund transfers.
In general, the cryptocurrency tracing computing system 504 may be configured to trace cryptocurrency transfers through one or more mixers such as by injecting a stream of cryptocurrency into the mixer to identify digital wallets used to transfer amounts of cryptocurrency through the mixer, identify other digital wallets transferring cryptocurrency into the mixer accounts and/or receiving transfers from mixer digital wallets. The cryptocurrency tracing computing system 504 may allow authorized systems (e.g., law enforcement computing systems, organizational computing systems, governmental computing systems, enterprise computing systems, and the like) to trace cryptocurrency transactions facilitated by mixing companies.
In some cases, the cryptocurrency tracing computing system 504, via the transaction management engine 550-1 may initiate one of a plurality of electronic transfers from an associated digital wallet through a mixer organization. The monitoring and analysis engine 550-2 may associate time and date information with each electronic transfer. When identifying a potential malicious actor, the monitoring and analysis engine 550-2 may identify other electronic transaction entering the mixer with the same time and date stamp, or within a predefined time window (e.g., 10 seconds, 30 seconds, 1 minute) that may be mixed with the electronic transaction sent from the sending digital wallet, so that the various mixer digital wallets may be identified. Additionally, when the mixer digital wallets are identified, potential illicit actor's digital wallets may be identified on a sending side and/or a receiving side. By tracking time and date stamps for transactions entering and leaving the mixer digital wallets, the monitoring and analysis engine 550-2 may be able to identify whether a malicious actor sent their money at a time (e.g., 12:10 PM), and at the same time, whether the mixer was mixing electronic transfers via a plurality of digital wallets. As such, the monitoring and analysis engine 550-2 can track the output down to the coin. To augment the tracing information, the monitoring and analysis engine 550-2 may utilize a “beacon” or “talk-back” approach to effectively know where cryptocurrency injected into the system ultimately landed. Using these features, the monitoring and analysis engine 550-2 may analyze suspected mixing entities and identify sources and/or targets that may have been suspected or had been previously unknown. In such cases, the monitoring and analysis engine 550-2 may schedule periodic electronic transactions (e.g., nearly continuous) of a small amount of cryptocurrency (e.g., fractional cryptocurrency units such as 0.001 units) such that the supplying digital wallet has a fresh supply to send to a mixer organization. Often, results of these transactions may not result in real-time identification of malicious activities involving illicit monetary movements, but over time the monitoring and analysis engine 550-2 may identify a pattern to allow automatic freezing of digital accounts and may provide law enforcement with evidence to build a case. In some cases, the monitoring and analysis engine 550-2 may analyze historical records stored in the distributed ledger computing systems 532 identify patterns of malicious activity based on the time and date stamp of recorded electronic transactions via the mixer digital wallets with respect to time and date stamps of each transaction of the series of periodic electronic transactions from the source digital wallet 552 to the recipient digital wallet 554 via the mixer digital wallets. The patterns of malicious activity may include electronic transfers from suspect digital wallets to suspect recipient digital wallets via the mixer digital wallets as shown in
In some cases, the monitoring and analysis engine 550-2 may utilize a multi-part process including a near constant (e.g., periodic), injection comprising low-value electronic transfers from a source digital wallet to a destination digital wallet and utilizing a mixer computing system suspected of illicit transfers of cryptocurrency. The monitoring and analysis engine 550-2 may identify a pattern of electronic transfers from the source digital wallet to the recipient digital wallet via the mixer digital wallets and may further actively monitor the electronic transfers by transferring larger sums to specifically identify times and dates associated with these injections of larger amounts to track the flow through the mixing system, to identify more suspect illicit digital wallets, both sourcing and receiving illicit funds.
In general, cryptocurrency use has increase in the past few years. As such, different cryptocurrencies have been created and/or have been used around the world. Additionally, thousands of cryptocurrencies have been created—over 20,000—with much less (e.g., about 10 thousand, about 11 thousand) being active in some form or another. While many cryptocurrencies exist, typically mixers may select a subset (e.g., 200 cryptocurrencies) of the total to use, such as the most capitalized, used, traded or the like. For example, the mixing organizations may use the ones that are available in high dollars and/or in high circulation. As such, the mixing companies may attempt to select particular cryptocurrencies based on an exchange rate at a given point in time (e.g., using the ones that have the most favorable exchange rates). As such, the monitoring and analysis engine 550-2 may include historical records of cryptocurrency exchange rates and other trading information (e.g., trading volume, availability, current popularity, and the like) when identifying trade patterns. For example, a particular suspect transaction may select a starting cryptocurrency and/or a target cryptocurrency, where the mixing organization may utilize different mixing digital wallets to increase their chances of making additional money on the exchange (e.g., by using one or more intermediary cryptocurrencies) when obscuring the desired transaction. The monitoring and analysis engine 550-2 may also identify patterns in the cryptocurrency ecosystem to identify whether mixing is being done with particular cryptocurrencies (e.g., a highest volume cryptocurrency, a cryptocurrency with increasing popularity due, and/or the like).
In an illustrative example, some cryptocurrencies such as bitcoin has enough volume so that trades do not exhibit large ask spread, so exchanges in bitcoin are easy. However, on another day, bitcoin trades may be less favorable, so the mixing organization adjusts their algorithm such that a percentage of output using Bitcoin is changed to trade more in Doge coins or other cryptocurrencies. The monitoring and analysis engine 550-2 may identify a mixing pattern being used, such as whether the mixer is distributing the transferred currency as 27%, Bitcoin, 13%, Doge coin, and the like. The low dollar, high volume transaction chains by the tracing source wallet sending through the mixing is held to be constant, so that the monitoring and analysis engine 550-2 can recognize patterns in the sending path based on time of day, exchange rates, trading volumes, and the like. While the mixing organization may use fixed patterns (e.g., 27% of bitcoins at 6 pm), they may also vary that percentage based on multiple parameters, from which patterns can be identified. The monitoring and analysis engine 550-2 may also track cryptocurrency values on various exchanges and identify a formula or algorithm that may be used maximize value while transferring through the mixing digital wallets. As such, the monitoring and analysis engine 550-2 may identify exchanges used by the mixers to see whether volume discounts, and/or currency types, and/or dollar value types to obtain a favorable exchange or reduction in transaction fees.
The monitoring and analysis engine 550-2 may also identify digital wallets that receive transfers from the sending digital wallet and source transfers to the receiving digital wallet, so over time, the monitoring and analysis engine 550-2 may identify all mixing digital wallets used as part of the transfer process. Using the mixing digital wallet identifiers, the sending and/or receiving digital wallets utilizing the mixing services can also be identified. As such, the monitoring and analysis engine 550-2 can build patterns of transfers that can be used to build a characteristic data set associated with one or more malicious actor networks attempting to obscure funds transfers. In some cases, the mixers may become suspicious of constant injection of fund streams. As such, the transaction management engine 550-1 may use multiple sourcing digital wallets to send funds to the mixing organizations and multiple receiving digital wallets to receive transfers from the mixing organizations. In some cases, the transaction management engine 550-1 may vary the amount of funds sent in each transaction over time to obfuscate the monitoring activities. For example, the transaction management engine 550-1 may utilize continuous transactions streams of low values, but may vary the source and/or targets, cryptocurrencies, transaction amounts of the stream and/or individual transactions within the stream, and the like. Additionally, the transaction management engine 550-1 may vary a number of sending wallets, a number of receiving wallets, vary sending times, sending dates, volume of transaction (e.g., rate of transactions within the stream), cryptocurrency types, and the like that are sent through the mixing organization.
The cryptocurrency tracing computing system 504 is cryptocurrency (and digital ledger platform) agnostic and is not tied to any particular cryptocurrency (e.g., Bitcoin) and applies to all cryptocurrencies that exist today as well as similar cryptocurrencies created in the future as transacted via digital wallets. The cryptocurrency tracing computing system 504 uses public or at least publicly accessible digital wallets that can be monitored via an accessible ledger system. In some cases, the monitored data may be augmented with certificates and/or digital wallet information, fees charged by the mixing organizations, exchange rates, trading volume information and/or other trading platform data.
One or more aspects of the disclosure may be embodied in computer-usable data or computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices to perform the operations described herein. Generally, program modules include routines, programs, objects, components, data structures, and the like that perform particular tasks or implement particular abstract data types when executed by one or more processors in a computer or other data processing device. The computer-executable instructions may be stored as computer-readable instructions on a computer-readable medium such as a hard disk, optical disk, removable storage media, solid-state memory, RAM, and the like. The functionality of the program modules may be combined or distributed as desired in various embodiments. In addition, the functionality may be embodied in whole or in part in firmware or hardware equivalents, such as integrated circuits, application-specific integrated circuits (ASICs), field programmable gate arrays (FPGA), and the like. Particular data structures may be used to more effectively implement one or more aspects of the disclosure, and such data structures are contemplated to be within the scope of computer executable instructions and computer-usable data described herein.
Various aspects described herein may be embodied as a method, an apparatus, or as one or more computer-readable media storing computer-executable instructions. Accordingly, those aspects may take the form of an entirely hardware embodiment, an entirely software embodiment, an entirely firmware embodiment, or an embodiment combining software, hardware, and firmware aspects in any combination. In addition, various signals representing data or events as described herein may be transferred between a source and a destination in the form of light or electromagnetic waves traveling through signal-conducting media such as metal wires, optical fibers, or wireless transmission media (e.g., air or space). In general, the one or more computer-readable media may be and/or include one or more non-transitory computer-readable media.
As described herein, the various methods and acts may be operative across one or more computing servers and one or more networks. The functionality may be distributed in any manner, or may be located in a single computing device (e.g., a server, a client computer, and the like). For example, in alternative embodiments, one or more of the computing platforms discussed above may be combined into a single computing platform, and the various functions of each computing platform may be performed by the single computing platform. In such arrangements, any and/or all of the above-discussed communications between computing platforms may correspond to data being accessed, moved, modified, updated, and/or otherwise used by the single computing platform. Additionally, or alternatively, one or more of the computing platforms discussed above may be implemented in one or more virtual machines that are provided by one or more physical computing devices. In such arrangements, the various functions of each computing platform may be performed by the one or more virtual machines, and any and/or all of the above-discussed communications between computing platforms may correspond to data being accessed, moved, modified, updated, and/or otherwise used by the one or more virtual machines.
Aspects of the disclosure have been described in terms of illustrative embodiments thereof. Numerous other embodiments, modifications, and variations within the scope and spirit of the appended claims will occur to persons of ordinary skill in the art from a review of this disclosure. For example, one or more of the steps depicted in the illustrative figures may be performed in other than the recited order, and one or more depicted steps may be optional in accordance with aspects of the disclosure.