About Family Office Clients Financial Intelligence Capabilities Partnerships Leadership Enquire Log In
Back to Financial Intelligence
Architecture & Technical Detail

A unified data, evidence and
governance fabric.

Most financial-crime stacks consist of multiple integrated products: KYC in one system, AML scenarios in another, screening in a third, fraud in a fourth, case management in a fifth. DigiDoe Financial Intelligence unifies these within a single canonical data model, an evidence vault, a controlled AI layer, and a governance plane — designed together from inception.

A · Unified Financial-Crime Data Fabric

One canonical model.
Not five integrated stores.

Every entity in the system—person, company, account, transaction, counterparty, risk signal, evidence object, decision, case, and control—is a first-class object within a single financial crime data model. The key architectural property is temporal lineage: the platform knows not only what a customer looks like today, but also what was known at the time of onboarding, at the time of a transaction, at the time of alert closure, and at the time of SAR/STR decisioning.

PERSON

Natural persons

Applicants, directors, authorised users, beneficial owners, settlors, protectors, trustees, signatories, controllers and related parties.

LEGAL ENTITY

Companies, funds, trusts

Companies, funds, SPVs, trusts, partnerships, foundations, public entities and other legal arrangements.

OWNERSHIP EDGE

Direct & indirect

Direct ownership, indirect ownership, voting rights, control by other means, nominee relationships, trust roles, senior-managing-official fallback.

ACCOUNT / WALLET

Multi-rail positions

Multi-currency accounts, virtual IBANs, safeguarded references, wallets, payment instruments, ledger positions.

TRANSACTION

Every flow, including attempts

Payments, FX conversions, batch payments, internal transfers, capital calls, redemptions, settlements, treasury movements — including failed and attempted transactions.

COUNTERPARTY

Both sides of every flow

Senders, recipients, correspondents, intermediaries, beneficiaries, merchants, wallet addresses and bank accounts.

RISK SIGNAL

Every observation, scored

Sanctions hits, PEP exposure, adverse media, fraud scores, device anomalies, behavioural drift, geographic risk, typology matches and model outputs.

EVIDENCE OBJECT

Every piece of proof

ID documents, registry extracts, ownership charts, board resolutions, source-of-funds evidence, contracts, investigator notes, FIU correspondence.

DECISION

Every choice, with rationale

Accept, reject, request information, freeze, hold, escalate, de-risk, file SAR/STR, no-file, close alert, reopen, senior-management approval.

B · Evidence Vault

The product does not just store evidence.
It operates through it.

The Evidence Vault is a first-class subsystem, not a document repository attached to case management. Every submitted document, registry response, screening result, risk score, transaction snapshot, investigator action and approval is recorded with a timestamp, user or service identity, source, hash and version. A regulator can reconstruct the exact customer profile, ownership graph, transaction sequence and evidence set as they existed at the time the decision was made.

Why It Matters

AMLR Article 77 expects retention of CDD documents, transaction records, suspicion assessments, STR copies and information-sharing records — with full lineage.

Immutable evidence chain

Every artefact stored append-only with timestamp, identity, source, hash and version. No silent overwrites.

Decision provenance

Every risk decision links to the data, rule version, model version, policy version and human approver used at that point in time.

Reconstructable case state

Time-travel a customer profile, ownership graph or transaction sequence back to the exact moment a decision was made.

Retention & legal-hold engine

Retention is enforced by jurisdiction, entity type, relationship status, investigation status and active legal holds — not by manual purge cycles.

Redaction & privacy controls

Case bundles export with role-based redaction, data minimisation and jurisdictional residency controls.

Tamper-evident audit trail

Append-only audit records support internal audit, external audit, regulator review and FIU requests as a single source of truth.

C · AI Architecture

AI as a controlled intelligence layer.
Not an ungoverned decision-maker.

Every AI output in DigiDoe Financial Intelligence is evidence-linked. Every generated statement points to underlying data, document, transaction, screening hit, rule, model output or investigator note. This is the central safeguard against AI hallucination in regulated financial-crime operations — and the reason the platform can use AI aggressively without surrendering supervisory defensibility.

DOCUMENT AI

Identity & ownership extraction

Extracts identity, ownership, registry, trust and source-of-wealth data. Human validation gates high-risk or low-confidence extractions.

ENTITY RESOLUTION

Cross-source linking

Links persons, entities, addresses, devices, accounts and counterparties — with confidence score, match explanation and override.

RISK SCORING

Multi-axis assessment

Scores onboarding, customer, counterparty, transaction and network risk — with explainability, validation and drift monitoring.

TYPOLOGY DETECTION

Pattern & anomaly

Detects emerging typologies and anomalous patterns, with backtesting and threshold governance attached to every detection.

CASE ASSISTANT

Investigation copilot

Summarises facts, identifies missing evidence, drafts analyst notes — with human approval and an immutable final-decision record.

SAR/STR NARRATIVE

Regulatory drafting

Drafts jurisdiction-specific narratives from case evidence — MLRO review, evidence-linked statements, no hallucinated facts.

End-to-End Workflow

One example: a complex
cross-border corporate onboarding

Application

A cross-border corporate group applies for a DigiDoe account. The onboarding engine identifies entity type, jurisdictions, directors, authorised users, shareholders and expected payment behaviour.

Document intelligence

Document AI extracts registry data, constitutional documents, ownership charts and board resolutions. Each artefact lands in the Evidence Vault with full lineage.

Ownership graph

The KYB graph engine constructs the ownership/control tree, applies AMLR threshold logic and identifies UBOs — including indirect ownership and control-by-other-means.

Continuous screening

The company, directors, UBOs, controllers, signatories and related entities are screened against sanctions, PEP and adverse-risk sources — with the full ownership-and-control logic applied.

Risk assessment

The risk engine scores customer risk based on structure complexity, jurisdictions, business activity, payment corridors, ownership opacity, expected volumes and source-of-funds evidence.

EDD & senior approval

If risk is elevated, the EDD workflow requests source-of-wealth/source-of-funds evidence and routes the case for MLRO or senior-management approval — with explicit decision rationale.

Live monitoring

Once approved, the expected-behaviour profile becomes the baseline for transaction monitoring. Every payment is checked against expected corridors, counterparties, currencies, velocity, payment purpose and the known ownership graph.

Investigation

If unusual activity occurs, an investigation case opens with all onboarding, KYB, screening, payment and behavioural evidence already attached — no manual reconstruction required.

SAR/STR & retention

If suspicion is confirmed, the SAR/STR module drafts a jurisdiction-specific report and evidence bundle for MLRO approval and FIU submission. The full chain is retained in the Evidence Vault for audit and regulatory review.

Security & Resilience

Designed for regulated financial infrastructure

IAM

Identity & access

SSO, MFA, biometric approval for sensitive actions, privileged access management, least-privilege roles.

DATA

Encryption & isolation

Encryption in transit and at rest, field-level encryption for sensitive PII, key management and tenant isolation.

AUDIT

Tamper-evident

Append-only audit logs, cryptographic hashes, immutable event history and exportable audit packages.

RESILIENCE

Continuity & SLA

Business continuity, disaster recovery, incident logging, SLA monitoring and dependency mapping.

SoD

Segregation of duties

Maker-checker controls, MLRO approval, QA sampling, senior-management approval and restricted SAR access.

PRIVACY

Data subject controls

Data minimisation, purpose limitation, retention schedules, DSAR workflows and jurisdictional residency.

DigiDoe is FCA-authorised, ISO 27001 and ISO 22301 certified, with independent annual financial-crime compliance audit obligations.

Walk through the architecture with our team

A technical deep-dive with our Financial Intelligence engineers and compliance architects — calibrated to your environment, your data and your regulator.