CN115311103B - Risk assessment system and method - Google Patents

Risk assessment system and method Download PDF

Info

Publication number
CN115311103B
CN115311103B CN202211194516.5A CN202211194516A CN115311103B CN 115311103 B CN115311103 B CN 115311103B CN 202211194516 A CN202211194516 A CN 202211194516A CN 115311103 B CN115311103 B CN 115311103B
Authority
CN
China
Prior art keywords
module
information
risk
matching
voice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211194516.5A
Other languages
Chinese (zh)
Other versions
CN115311103A (en
Inventor
曾斌斌
陈英杰
赵建国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Pacific Property Insurance Co Ltd Sichuan Branch
Original Assignee
China Pacific Property Insurance Co Ltd Sichuan Branch
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Pacific Property Insurance Co Ltd Sichuan Branch filed Critical China Pacific Property Insurance Co Ltd Sichuan Branch
Priority to CN202211194516.5A priority Critical patent/CN115311103B/en
Publication of CN115311103A publication Critical patent/CN115311103A/en
Application granted granted Critical
Publication of CN115311103B publication Critical patent/CN115311103B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/78Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/783Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/26Speech to text systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • General Physics & Mathematics (AREA)
  • Library & Information Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computational Linguistics (AREA)
  • Human Computer Interaction (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • General Business, Economics & Management (AREA)
  • Acoustics & Sound (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to the technical field of risk assessment, and discloses a risk assessment system and method, which comprises the following steps: the risk factor input conversion module is used for voice input risk description and converting corresponding voice information into corresponding character information, and meanwhile, video input video information of related risk factors and converting the video information into corresponding picture information; the matching module is used for matching the text information and the picture information in real time according to a preset rule; the countermeasure storage module is used for receiving the risk description of the risk factor entry conversion module and matching a proper improvement suggestion according to the received risk description; and the report generation module is used for generating a risk assessment report according to the data transmitted by the risk factor entry conversion module, the matching module and the strategy storage module. The invention can match the character information and the image information through the preset conditions to form a complete and vivid risk assessment report with authenticity.

Description

Risk assessment system and method
Technical Field
The invention relates to the technical field of risk assessment, in particular to a risk assessment system and method.
Background
In the prior art, when risk assessment is required to be performed on a certain target object, an evaluator is usually used to set check points according to experience to perform on-site investigation, and then investigation conditions of the check points are recorded on paper; after the on-site investigation is finished, the evaluators also need to write evaluation reports according to the professional ability of individuals. The method has the problems of low efficiency, incomplete information collection and the like, and the writing of the evaluation report excessively depends on the personal professional skills of an evaluator, so that the accuracy of the evaluation result is not high in some cases, and an applicant and an underwriter are subjected to unknown risks. The application number of 201711342577.0 and the application name of "a method and a system for evaluating risk of insurance target" (referred to as "antecedent"), which provide a method and a system for evaluating risk of insurance target, have the advantages of high efficiency, perfect information collection and the like, can automatically generate an evaluation table and an evaluation report, are beneficial to on-site investigation and report writing, and improve the accuracy of the risk evaluation result of insurance target, but the evaluation table established in the antecedent only has description of characters and does not have the matching of pictures and characters, and the evaluation report has two disadvantages:
1. no picture is used for proving corresponding characters, and authenticity is lacked;
2. only the description of the characters is needed, and the defects cannot be clear at a glance and are not vivid.
Disclosure of Invention
The invention provides a risk assessment system and a method, which take a plurality of uncertain and sudden risk factors which are investigated in the process of investigation into assessment items, so that an assessment report is complete and accurate.
The invention is realized by the following technical scheme:
a risk assessment system comprising:
the login module is used for collecting the name of the object to be evaluated and the evaluated insurance type;
the risk factor input conversion module is used for voice inputting risk description of the risk factor of the object to be evaluated or voice inputting risk name of the risk factor and corresponding risk description, converting corresponding voice information into corresponding text information, simultaneously, video inputting video information of the related risk factor, and converting the video information into corresponding picture information;
the matching module is used for matching the text information and the picture information in real time according to a preset rule, so that each risk factor has corresponding text information and picture information;
the strategy storage module is used for receiving the risk description of the risk factor input conversion module and matching a proper improvement suggestion according to the received risk description;
and the report generating module is used for generating a risk assessment report according to the data transmitted by the matching module and the strategy storage module.
As optimization, the risk factor recording and converting module comprises a first video input module, a first video converting module, a first voice input module, a first voice converting module, a second video input module, a second video converting module, a second voice input module and a second voice converting module, the second video input module, the second video converting module, the second voice input module and the second voice converting module form an indefinite risk factor input module, the input ends of the first video input module and the first voice input module are respectively connected with a conventional risk factor selecting module, a skip module is arranged between the login module and the conventional risk factor selecting module, the first video input module and the first voice input module are respectively connected with the matching module through the first video converting module and the first voice converting module,
the input ends of the second video input module and the second voice input module are respectively connected with the login module, and the second video input module and the second voice input module are respectively connected with the matching module through the second video conversion module and the second voice conversion module;
the conventional risk factor selection module comprises a plurality of existing risk factor selection submodules corresponding to different insurance types and is used for respectively storing the risk names of the conventional risk factors corresponding to the different insurance types as evaluation items;
the uncertain risk factor input module is used for collecting and checking uncertain risk factors;
the skipping module is used for skipping to a corresponding existing risk factor selection sub-module according to the insurance risk;
the first voice input module is used for receiving first voice information corresponding to the conventional risk factor after the evaluator selects the risk name of the conventional risk factor, and the first voice information comprises the specific risk description of the conventional risk factor;
the first voice conversion module is used for converting the first voice information into at least one first text information;
the first video input module is used for receiving first video information corresponding to the evaluator after the evaluator selects the risk name of the conventional risk factor;
the first video conversion module is used for converting the first video information into at least one first picture information;
the second voice input module is used for receiving second voice information of the evaluator, and the second voice information comprises risk names of the uncertain risk factors and specific risk descriptions of the uncertain risk factors;
the second voice conversion module is used for converting the first voice information into at least one second text information;
the second video input module is used for receiving second video information of the evaluator;
the second video conversion module is used for converting the first video information into at least one second picture information;
the matching module is used for matching at least one first character message with at least one first picture message according to a preset rule, respectively endowing the at least one first character message and the at least one first picture message which are successfully matched with one first matching code, then transmitting the at least one first character message to the countermeasure storage module, and transmitting the at least one first picture message to the report generation module;
the matching module is further used for matching the at least one second text message with the at least one second picture message according to a preset rule, respectively endowing the at least one second text message and the at least one second picture message which are successfully matched with one second matching code, then transmitting the at least one second text message to the countermeasure storage module, and transmitting the at least one second picture message to the report generation module.
As an optimization, the first video conversion module converts the first video information into at least one first picture information by frame intervals, and the second video conversion module converts the second video information into at least one second picture information by frame intervals.
As optimization, the first voice conversion module is further configured to extract a first key sentence from at least one piece of first text information, the matching module matches the first key sentence with the first picture information according to a preset rule, assigns a first matching code to the matched first picture information and the first text information where the first key sentence is located, and then respectively outputs the first picture information and the first text information assigned with the first matching code to the report generation module and the countermeasure storage module, where a risk name of a conventional risk factor corresponds to one first matching code;
the second voice conversion module is also used for extracting a second keyword from at least one second text message, the matching module matches the second keyword with the second picture message according to a preset rule, the matched second picture message and the second text message where the second keyword is located are endowed with a second matching code, the second picture message and the second text message endowed with the second matching code are respectively output to the report generation module and the countermeasure storage module, and the risk name of an uncertain risk factor corresponds to one second matching code.
As an optimization, the first and second key sentences have a first structure consisting of "subject + predicate + object" or "subject + predicate" without negatives, or the first and second key sentences have a second structure consisting of "subject + object + predicate + object" or "subject + predicate + object" with negatives, wherein the subject in the first and second structures can be omitted and the omitted subject can be derived from the object or risk name, and the preset rule is:
a. when the subject is a carrier of an object, and the first key sentence or the second key sentence is of a second structure, taking the subject without the object as a first condition, if the first key sentence has no subject, taking the subject without the object corresponding to the object obtained by object derivation as the first condition, if the subject of the first key sentence or the subject obtained by derivation is preceded by a fixed language, taking the fixed language as a second condition, matching first picture information or second picture information having the first condition and the second condition, and if the subject of the first key sentence or the subject obtained by derivation is preceded by the fixed language, matching the first picture information or the second picture information having the first condition;
b. when the object is free of carriers or objects, the first key sentence or the second key sentence is of a first structure or a second structure, the subject is used as a first condition, if the first key sentence is free of the subject, the subject derived through the object is used as the first condition, if the subject of the first key sentence is preceded by a fixed language, the fixed language is used as a second condition, and first picture information or second picture information having the first condition and the second condition at the same time is matched, and if the subject of the first key sentence is preceded by the fixed language, the first picture information or the second picture information having the first condition is matched.
As an optimization, the format of the first matching code is different from the format of the second matching code.
The invention also discloses a risk assessment method, and the risk assessment system based on the risk assessment method is characterized by comprising the following steps:
s1, selecting conventional risk factors corresponding to insurance types as evaluation items to be checked according to evaluated objects, and inputting first voice information and first video information;
s2, judging whether an indefinite risk factor exists in the process of checking, if so, checking by taking the indefinite risk factor as an evaluation item, inputting second voice information and second video information, and then jumping to S3, otherwise, directly jumping to S3;
and S3, generating a risk assessment report according to the investigation result of the assessment item.
As optimization, the specific process of S1 is:
s1.1, selecting the evaluation items in the sub-module according to the existing risk factors to carry out risk investigation one by one, entering S1.2 when the risk name of the conventional risk factor corresponding to a certain evaluation item is investigated to have hidden danger, or else, carrying out investigation on the next evaluation item;
s1.2, shooting a place with hidden danger into first video information through a first video input module, and describing the specific risk of the place with hidden danger into first voice information through a first voice input module;
s1.3, converting the second video information into at least one first text message through a first video conversion module, and converting the first voice message into at least one first text message through a first voice conversion module;
s1.4, matching the at least one first text message and the at least one first picture message through a matching module according to a preset rule, respectively endowing the at least one first text message and the at least one first picture message which are successfully matched with the same first matching code, then transmitting the at least one first text message to a strategy storage module, and transmitting the at least one first picture message to a report generating module.
As optimization, the specific steps of taking the uncertain risk factors as evaluation items in S2 are as follows:
s2.1, shooting a place with hidden danger into second video information through a second video input module, and describing the place with hidden danger into second voice information through a second voice input module;
s2.2, converting the first video information into at least one piece of second picture information through a second video conversion module, and converting the second voice information into at least one piece of second text information through a second voice conversion module;
and S2.3, matching the at least one piece of second text information with the at least one piece of second picture information through a matching module, respectively giving the at least one piece of second text information and the at least one piece of second picture information which are successfully matched with the same second matching code, transmitting the at least one piece of second text information to the countermeasure storage module, and transmitting the at least one piece of second picture information to a report generating module.
As optimization, the specific steps of matching the first text information and the first picture information, generating a risk assessment report are as follows: extracting a first key sentence from at least one piece of first text information, matching the first key sentence with the first picture information by the matching module according to a preset rule, endowing the matched first picture information and the first text information where the first key sentence is located with a first matching code, and then respectively outputting the first picture information and the first text information endowed with the first matching code to a report generating module and a countermeasure storage module, wherein a risk name of a conventional risk factor corresponds to one first matching code, and the countermeasure storage module receives the first text information for recording risk description and then matches the first text information with a proper improvement suggestion according to the received risk description; the report generation module integrates first picture information, first text information and corresponding improvement suggestions belonging to the same first matching code into a corresponding conventional risk factor column for representing the hidden danger of the conventional risk factor, wherein the conventional risk factor column comprises a risk name, a risk description, the improvement suggestions and a live photo of the conventional risk factor;
the specific steps of matching the second text information with the second picture information and generating a risk assessment report are as follows: extracting a second keyword from at least one piece of second text information, matching the second keyword with the second picture information by the matching module according to a preset rule, endowing the matched second picture information and the second text information where the second keyword is located with a second matching code, and respectively outputting the second picture information and the second text information endowed with the second matching code to a report generating module and a countermeasure storage module, wherein a risk name of an indefinite risk factor corresponds to one second matching code, and the countermeasure storage module receives the second text information recording a risk description and a risk name and then matches the second text information with a proper improvement suggestion according to the received risk description; the report generation module integrates second picture information, second text information and corresponding improvement suggestions belonging to the same second matching code into a corresponding indefinite risk factor column for representing the hidden danger of the indefinite risk factor, wherein the indefinite risk factor column comprises the risk name, the risk description, the improvement suggestions and the scene photo of the indefinite risk factor.
Compared with the prior art, the invention has the following advantages and beneficial effects:
on the basis of setting conventional risk factor evaluation items, the method can also be incorporated into a final evaluation report aiming at irregular sudden risk factors, so that the integrity and the accuracy of the evaluation report are improved;
through the corresponding conversion module, the corresponding voice information and the corresponding video information can be converted into the text information and the image information respectively, evaluators do not need to correspondingly edit the voice information and the video information one by one in the evaluation process, and the text information and the image information can be matched through preset conditions to form a complete and vivid risk evaluation report with authenticity.
Drawings
In order to more clearly illustrate the technical solutions of the exemplary embodiments of the present invention, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and that for those skilled in the art, other related drawings can be obtained from these drawings without inventive effort. In the drawings:
FIG. 1 is a schematic structural diagram of a risk assessment system according to the present invention;
FIG. 2 is a top page interface diagram of a risk assessment system according to the present invention;
FIG. 3 is an interface diagram of a conventional risk factor selection module of a risk assessment system according to the present invention.
Reference numbers and corresponding part names in the drawings:
the system comprises a 1-login module, a 2-skip module, a 3-conventional risk factor selection module, a 3 a-existing risk factor selection sub-module, a 4-uncertain risk factor input module, a 4 a-second voice input module, a 4 b-second video input module, a 4 c-second voice conversion module, a 4 d-second video conversion module, a 5-first video input module, a 6-first video conversion module, a 7-first voice input module, a 8-first voice conversion module, a 9-matching module, a 10-strategy storage module and a 11-report generation module.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to examples and accompanying drawings, and the exemplary embodiments and descriptions thereof are only used for explaining the present invention and are not meant to limit the present invention.
Example 1
As shown in fig. 1, a risk assessment system according to the present invention may be mounted in an existing electronic device, such as a mobile phone or other electronic devices with a touch screen, and includes:
and the login module 1 is used for collecting the name of the object to be evaluated and the kind of the insurance risk to be evaluated.
On the system home page, an input field for inputting the name of the object of the evaluated object and a click field for clicking the evaluated insurance category are provided, as shown in fig. 2.
And the risk factor input conversion module is used for voice inputting the risk description of the risk factor of the object to be evaluated or the risk name of the risk factor and the corresponding risk description, converting the corresponding voice information into the corresponding text information, and simultaneously, video inputting the video information of the related risk factor and converting the video information into the corresponding picture information.
The matching module 9 is configured to match the text information and the picture information in real time according to a preset rule, so that each risk factor has corresponding text information and picture information;
the risk factor recording and converting module is divided into two parts, one part corresponds to the conventional risk factor selecting module 3, the other part corresponds to the uncertain risk factor input module 4, and the uncertain risk factor input module 4 is used for collecting and checking the uncertain risk factors.
The risk factor input conversion module corresponding to the conventional risk factor selection module 3 comprises a first video input module 5, a first video conversion module 6, a first voice input module 7 and a first voice conversion module 8, wherein the input ends of the first video input module 5 and the first voice input module 7 are respectively connected with the conventional risk factor selection module 3, a skip module 2 is arranged between the login module 1 and the conventional risk factor selection module 3, and the skip module 2 is used for skipping to a corresponding existing risk factor selection sub-module 3a according to the insurance risk; the first video input module 5 and the first voice input module 7 are respectively connected with the matching module 9 through the first video conversion module 6 and the first voice conversion module 8, wherein,
the conventional risk factor selection module 3 comprises a plurality of existing risk factor selection submodules 3a corresponding to different insurance types, and is used for respectively storing the risk names of the conventional risk factors corresponding to the different insurance types as evaluation items;
as shown in fig. 3, a partial interface diagram of module 3 is selected for conventional risk factors. In fig. 3, the hidden danger name is a risk name, and for the risk name, there are 3 options in total, where "yes" indicates that the hidden danger exists in the target object, and "no" indicates that the hidden danger does not exist in the target object, and "not applicable" indicates that the risk name is not applicable to evaluate the target object.
The first voice input module 7 is used for receiving first voice information corresponding to the evaluator after selecting the risk name of the conventional risk factor, wherein the first voice information includes a specific risk description of the conventional risk factor;
the first voice conversion module 8 is configured to convert the first voice information into at least one first text information; meanwhile, the first voice conversion module 8 is further configured to extract a first key sentence from at least one piece of first text information, the matching module 9 matches the first key sentence with the first picture information according to a preset rule, assigns a first matching code to the matched first picture information and the first text information where the first key sentence is located, and then respectively outputs the first picture information and the first text information assigned with the first matching code to the report generation module 11 and the countermeasure storage module 10, where a risk name of a conventional risk factor corresponds to one first matching code;
the first video input module 5 is used for receiving first video information corresponding to the risk name of the conventional risk factor selected by the evaluator;
the first video conversion module 6 is configured to convert the first video information into at least one first picture information;
the first voice input module 7, the first video input module 5, the first voice conversion module 8 and the first video conversion module 6 are used for the evaluator to enter corresponding information after selecting the corresponding risk factor in the conventional risk factor selection module 3.
The matching module 9 matches the at least one first text message and the at least one first picture message according to a preset rule, and respectively assigns the at least one first text message and the at least one first picture message that are successfully matched to the same first matching code, and then transmits the at least one first text message to the countermeasure storage module 10 and the at least one first picture message to the report generation module 11.
When the evaluator checks that the evaluation item in the conventional risk factor selection module 3 has a hidden danger, the evaluator clicks yes, then the first voice module and the first video module pop up automatically, and the evaluator shoots the hidden danger and carries out risk description. The first voice module and the first video module can be the same pop-up window, and after the first video information and the first voice information are input, the first video conversion module 6 converts the first video information into a plurality of first picture information according to frames; the first voice conversion module 8 converts the first voice information into first text information and extracts first key sentences (there may be a plurality of) and then matches the first key sentences with the first picture information one by one through the matching module 9 according to preset rules, and finally finds the first key sentences and the first picture information in one-to-one correspondence. The rule followed by the extraction of the first key statement is: the subject, predicate and object are extracted for each sentence, and if there is no subject or object, the subject or object is not extracted, and if there is a negative word in the sentence (the negative word may be a predicate or a complement), the negative word is also extracted together.
The risk factor input conversion module corresponding to the indefinite risk factor input module 4 comprises a second video input module 4b, a second video conversion module 4d, a second voice input module 4a and a second voice conversion module 4c, wherein the input ends of the second video input module 4b and the second voice input module 4a are respectively connected with the login module 1, and the second video input module 4b and the second voice input module 4a are respectively connected with the matching module 9 through the second video conversion module 4d and the second voice conversion module 4 c;
the second voice input module 4a is configured to receive second voice information of the evaluator, where the second voice information includes a risk name of the uncertain risk factor and a specific risk description of the uncertain risk factor;
the second voice conversion module 4c is configured to convert the first voice message into at least one second text message; meanwhile, the second voice conversion module 4c is further configured to extract a second keyword from at least one piece of second text information, the matching module 9 matches the second keyword with the second picture information according to a preset rule, assigns a second matching code to the matched second picture information and the second text information where the second keyword is located, and then outputs the second picture information and the second text information assigned with the second matching code to the report generation module 11 and the countermeasure storage module 10, respectively, where a risk name of an indefinite risk factor corresponds to one second matching code;
the second video input module 4b is used for receiving second video information of the evaluator;
the second video conversion module 4d is configured to convert the first video information into at least one second picture information.
The matching module 9 is configured to match the at least one second text message and the at least one second picture message according to a preset rule, and respectively assign the at least one second text message and the at least one second picture message that are successfully matched to a same second matching code, and then transmit the at least one second text message to the countermeasure storage module 10 and transmit the at least one second picture message to the report generation module 11.
The first matching code and the second matching code have different formats, for example, the first matching code starts with the number 1 and may be followed by the number + letter, and the second matching code starts with the letter a and may be followed by the number + letter, which has the advantage that it is possible to distinguish whether the text information and the picture information belong to the conventional risk factor or the uncertain risk factor, and change the uncertain risk factor into the conventional risk factor after the uncertain risk factor appears in a certain target object for a plurality of times (for example, 5 times).
For example, when the evaluation item which does not belong to the conventional risk factor selection module 3 is inspected in the inspection process, the second voice input module and the second video input module are started, the risk name of the uncertain risk factor, the specific risk description of the uncertain risk factor and the related video are input, and the on-off keys of the second voice module and the second video input module can be set to be the same, namely the video with voice is directly input, so that the second voice information and the second video information can be conveniently and simultaneously input. The evaluator inputs the video (second video information) of the risk factor and speaks the name of the risk factor and the risk description (second voice information) of the risk factor, the name of the risk can be defined by the evaluator, the risk factor can be described vividly, and after the description and the shooting are finished, the process is consistent with the processes of the first voice conversion module 8, the first video conversion module 6 and the matching module 9 of the conventional risk factor selection module 3.
Next, a preset rule followed by matching the text information and the picture information is specifically introduced.
The rules followed by the extraction of the first key statement and the second key statement are as follows: the subject, predicate and object are extracted for each sentence, and if there is no subject or object, the subject or object is not extracted, and if there is a negator in the sentence (the negator may be a predicate or a complement), the negator is also extracted together.
Therefore, the first key sentence and the second key sentence have two cases as follows:
the first condition is that the first key sentence and the second key sentence are a first structure consisting of a subject + predicate + object or a subject + predicate without a negation;
a second structure in which the first and second key sentences each include a "subject + object + predicate + object" or "subject + predicate + complement + object" or "subject + predicate" or "subject + object + predicate" or the like, with a negation;
the subject in case one and case two may be omitted according to the speaking habits, and the omitted subject may be derived from the object or risk name.
The specific preset rule is as follows:
a. when the subject is a carrier of an object, and the first key sentence or the second key sentence is of a second structure, taking the subject without the object as a first condition, if the first key sentence has no subject, taking the subject without the object corresponding to the object obtained by object derivation as the first condition, if the subject of the first key sentence or the subject obtained by derivation is preceded by a fixed language, taking the fixed language as a second condition, matching first picture information or second picture information having the first condition and the second condition, and if the subject of the first key sentence or the subject obtained by derivation is preceded by the fixed language, matching the first picture information or the second picture information having the first condition;
the term "carrier" as used herein means a carrier that indicates whether or not an object is attached to a subject, and if so, the subject is the object. For example, a worker wears a safety helmet, the subject is the worker, and the object is the safety helmet, and the worker is a carrier of the safety helmet because the safety helmet is worn on the head of the worker.
For another example, the first text message is "the on-site person on the overhead does not fasten a safety belt according to the regulations", the first key sentence is extracted as "the on-site person does not fasten a safety belt", the subject without the object is taken as the first condition, that is, the first condition is "the worker who does not wear a safety helmet", that is, the worker with hair or an optical head is taken as the first condition, and the second condition is "on the overhead", so that the first picture information of the worker with hair or an optical head on the overhead is matched with the first text message. For example, when the risk factor description is performed on the two hidden dangers, the second description can be separated from the first description by several seconds, so that the first key sentences can be extracted separately to be matched with the corresponding first picture information respectively. However, since the two first key sentences and the corresponding first picture information both belong to the same risk name, the first matching codes obtained by the two first key sentences and the corresponding first picture information are the same, which facilitates the subsequent placement and classification of the first voice information and the first picture information belonging to the same conventional risk factor when the report generation module 11 generates the evaluation report. The operation of the variable risk factor is the same.
b. When the object is free of carriers or objects, the first key sentence or the second key sentence is of a first structure or a second structure, the subject is used as a first condition, if the first key sentence is free of the subject, the subject derived through the object is used as the first condition, if the subject of the first key sentence is preceded by a fixed language, the fixed language is used as a second condition, and first picture information or second picture information having the first condition and the second condition at the same time is matched, and if the subject of the first key sentence is preceded by the fixed language, the first picture information or the second picture information having the first condition is matched.
When the object is not a carrier or an object, and the first key sentence or the second key sentence is the first structure, for example, the first character information is "article stacking disorder such as a rebar head at an overhead work construction site", the first key sentence is extracted as "article stacking disorder", the subject "article" is set as the first condition, and the overhead work construction site "is set as the second condition, so that the first picture information of the article at the overhead work construction site is matched with the first character information.
When the object is not a carrier or is not a object, and the first key sentence or the second key sentence is a second structure, for example, the first text information is 'bridge deck, construction platform and other adjacent edge non-warning signs and protection facilities', the first key sentence is extracted as 'adjacent edge non-warning signs and protection facilities', the subject 'adjacent edge' is used as a first condition, and the bridge deck and the construction platform are used as a second condition, so that the first picture information of the adjacent edges of the bridge deck and the construction platform is matched with the first text information.
The countermeasure storage module 10 is used for receiving the risk description of the risk factor entry conversion module and matching a proper improvement suggestion according to the received risk description;
specifically, the countermeasure storage module 10 may also extract keywords of the obtained data, find improvement suggestions for mapping, and find keywords, may find predicates and objects in a sentence, for example, the received information is "the worker does not fasten a seat belt as required", the countermeasure storage module 10 extracts keywords as "unfastened seat belt", which facilitates finding improvement suggestions for mapping, and negative words may be equivalent, for example, the countermeasure storage module 10 stores "unfastened seat belt", when the extracted keywords are "unfastened seat belt", which is equivalent to "unfastened seat belt", then find corresponding improvement suggestions "to strengthen the field worker safety education and the field violation detection and treatment level" in the database. For searching the corresponding improvement suggestions, the search for the keywords or the keywords may be performed in a patent search manner, which is not described herein again.
The subject and predicate in a sentence can also be searched, for example, the received information is "deformation, water seepage, and flushing may exist in the cofferdam construction process", the countermeasure storage module 10 extracts the keyword "cofferdam deformation, water seepage, and flushing", and then searches for a corresponding improvement suggestion according to the keyword.
And the report generating module 11 is used for generating a risk assessment report routine risk factor selecting module 3 and a strategy storing module 10 according to the data transmitted by the risk factor recording and converting module, the matching module 9 and the strategy storing module 10.
Example 2
The invention also discloses a risk assessment method, and the risk assessment system based on the risk assessment method is characterized by comprising the following steps:
s1, selecting conventional risk factors corresponding to insurance types as evaluation items to be checked according to evaluated objects, and inputting first voice information and first video information;
s2, judging whether an indefinite risk factor exists in the process of checking, if so, checking by taking the indefinite risk factor as an evaluation item, inputting second voice information and second video information, and then jumping to S3, otherwise, directly jumping to S3;
and S3, generating a risk assessment report according to the investigation result of the assessment item.
In this embodiment, in S3, the risk assessment report includes a risk name, a risk description specific to the risk factor, an improvement suggestion, and corresponding risk image information.
In this embodiment, the specific process of S1 is as follows:
s1.1, selecting the evaluation items in the sub-module 3a to carry out risk investigation one by one according to the existing risk factors, entering S1.2 when the risk name of the conventional risk factor corresponding to a certain evaluation item is investigated to have hidden danger, or else, carrying out investigation on the next evaluation item;
s1.2, shooting a place with hidden danger into first video information through a first video input module 5, and describing the specific risk of the place with hidden danger into first voice information through a first voice input module 7;
s1.3, converting the second video information into at least one first text message through a first video conversion module 6, and converting the first voice message into at least one first text message through a first voice conversion module 8;
s1.4, matching the at least one first character message and the at least one first picture message through a matching module 9 according to a preset rule, respectively giving the at least one first character message and the at least one first picture message which are successfully matched with the same first matching code, then transmitting the at least one first character message to a countermeasure storage module 10, and transmitting the at least one first picture message to a report generating module 11.
In this embodiment, the specific steps of examining the indefinite risk factors as evaluation items in S2 are as follows:
s2.1, shooting a place with hidden danger into second video information through a second video input module 4b, and describing the place with hidden danger into second voice information through a second voice input module 4 a;
s2.2, converting the first video information into at least one piece of second picture information through a second video conversion module 4d, and converting the second voice information into at least one piece of second character information through a second voice conversion module 4 c;
and S2.3, matching the at least one piece of second character information with the at least one piece of second picture information through the matching module 9, respectively giving the at least one piece of second character information and the at least one piece of second picture information which are successfully matched with the same second matching code, transmitting the at least one piece of second character information to the countermeasure storage module 10, and transmitting the at least one piece of second picture information to the report generating module 11.
In this embodiment, the specific steps of matching the first text information and the first picture information and generating the risk assessment report include: extracting a first key sentence from at least one piece of first text information, matching the first key sentence with the first picture information by the matching module 9 according to a preset rule, endowing the matched first picture information and the first text information where the first key sentence is located with a first matching code, and then respectively outputting the first picture information and the first text information endowed with the first matching code to the report generating module 11 and the countermeasure storage module 10, wherein a risk name of a conventional risk factor corresponds to one first matching code, and the countermeasure storage module 10 receives the first text information recorded with risk description and then matches the first text information with a proper improvement suggestion according to the received risk description; the report generating module 11 integrates the first picture information, the first text information and the corresponding improvement suggestions belonging to the same first matching code into a corresponding conventional risk factor column for representing the hidden danger of the conventional risk factor, wherein the conventional risk factor column includes the risk name, the risk description, the improvement suggestions and the live photos of the conventional risk factor;
the specific steps of matching the second text information with the second picture information and generating a risk assessment report are as follows:
extracting a second keyword from at least one piece of second text information, matching the second keyword with the second picture information by the matching module 9 according to a preset rule, endowing the matched second picture information and the second text information where the second keyword is located with a second matching code, and then respectively outputting the second picture information and the second text information endowed with the second matching code to the report generating module 11 and the countermeasure storage module 10, wherein a risk name of an indefinite risk factor corresponds to one second matching code, the countermeasure storage module 10 receives the second text information recording a risk description and a risk name, and then matches the second text information to a proper improvement suggestion according to the received risk description; the report generating module 11 integrates the second picture information, the second text information and the corresponding improvement suggestions belonging to the same second matching code into a corresponding indefinite risk factor column for representing the hidden danger of the indefinite risk factor, wherein the indefinite risk factor column includes a risk name, a risk description, an improvement suggestion and a field photo of the indefinite risk factor.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (7)

1. A risk assessment system, comprising:
the login module is used for collecting the name of the object to be evaluated and the evaluated insurance type;
the risk factor input conversion module is used for voice inputting risk description of the risk factor of the object to be evaluated or voice inputting risk name of the risk factor and corresponding risk description, converting corresponding voice information into corresponding text information, simultaneously, video inputting video information of the related risk factor, and converting the video information into corresponding picture information;
the matching module is used for matching the text information and the picture information in real time according to a preset rule, so that each risk factor has corresponding text information and picture information;
the strategy storage module is used for receiving the risk description of the risk factor input conversion module and matching a proper improvement suggestion according to the received risk description;
the report generation module is used for generating a risk assessment report according to the data transmitted by the risk factor input conversion module, the matching module and the strategy storage module;
the risk factor recording and converting module comprises a first video input module, a first video converting module, a first voice input module, a first voice converting module, a second video input module, a second video converting module, a second voice input module and a second voice converting module, the second video input module, the second voice input module and the second voice converting module form an indefinite risk factor input module, the input ends of the first video input module and the first voice input module are respectively connected with a conventional risk factor selecting module, a skip module is arranged between the login module and the conventional risk factor selecting module, the first video input module and the first voice input module are respectively connected with the matching module through the first video converting module and the first voice converting module,
the input ends of the second video input module and the second voice input module are respectively connected with the login module, and the second video input module and the second voice input module are respectively connected with the matching module through the second video conversion module and the second voice conversion module;
the conventional risk factor selection module comprises a plurality of existing risk factor selection sub-modules corresponding to different insurance types and is used for respectively storing the risk names of the conventional risk factors corresponding to the different insurance types as evaluation items;
the uncertain risk factor input module is used for collecting and checking uncertain risk factors;
the skipping module is used for skipping to the corresponding existing risk factor selection sub-module according to the insurance risk;
the first voice input module is used for receiving first voice information corresponding to an evaluator after selecting a risk name of a conventional risk factor, and the first voice information comprises a specific risk description of the conventional risk factor;
the first voice conversion module is used for converting the first voice information into at least one first text information;
the first video input module is used for receiving first video information corresponding to the risk name of the conventional risk factor selected by the evaluator;
the first video conversion module is used for converting the first video information into at least one first picture information;
the second voice input module is used for receiving second voice information of the evaluator, and the second voice information comprises risk names of the uncertain risk factors and specific risk descriptions of the uncertain risk factors;
the second voice conversion module is used for converting the first voice information into at least one second text information;
the second video input module is used for receiving second video information of the evaluator;
the second video conversion module is used for converting the first video information into at least one second picture information;
the matching module is used for matching at least one first character message with at least one first picture message according to a preset rule, respectively endowing the at least one first character message and the at least one first picture message which are successfully matched with one first matching code, then transmitting the at least one first character message to the countermeasure storage module, and transmitting the at least one first picture message to the report generation module;
the matching module is further used for matching the at least one piece of second text information with the at least one piece of second picture information according to a preset rule, respectively endowing the at least one piece of second text information and the at least one piece of second picture information which are successfully matched with the same second matching code, then transmitting the at least one piece of second text information to the strategy storage module, and transmitting the at least one piece of second picture information to the report generating module;
the first voice conversion module is also used for extracting a first key sentence from at least one piece of first text information, the matching module matches the first key sentence with the first picture information according to a preset rule, the matched first picture information and the first text information where the first key sentence is located are endowed with a first matching code, then the first picture information and the first text information endowed with the first matching code are respectively output to the report generation module and the countermeasure storage module, and the risk name of one conventional risk factor corresponds to one first matching code;
the second voice conversion module is also used for extracting a second keyword from at least one second text message, the matching module matches the second keyword with the second picture message according to a preset rule, gives a second matching code to the matched second picture message and the second text message where the second keyword is located, and then respectively outputs the second picture message and the second text message which are given with the second matching code to the report generation module and the countermeasure storage module, wherein the risk name of one uncertain risk factor corresponds to one second matching code;
the first and second key sentences have a first structure consisting of "subject + predicate + object" or "subject + predicate" without negatives, or a second structure in which the first and second key sentences consist of "subject + object + predicate + object" or "subject + predicate + complement + object" or "subject + predicate + object" or "subject + object + predicate" or "predicate + object" with a negation, the first structure and the second structure may have a subject omitted, and the omitted subject may be derived according to an object or a risk name, where the preset rule is:
a. when the subject is a carrier of an object, and the first key sentence or the second key sentence is of a second structure, taking the subject without the object as a first condition, if the first key sentence has no subject, taking the subject without the object corresponding to the object obtained by object derivation as the first condition, if the subject of the first key sentence or the subject obtained by derivation is preceded by a fixed language, taking the fixed language as a second condition, matching first picture information or second picture information having the first condition and the second condition, and if the subject of the first key sentence or the subject obtained by derivation is preceded by the fixed language, matching the first picture information or the second picture information having the first condition;
b. when the object is free of carriers or objects, the first key sentence or the second key sentence is of a first structure or a second structure, the subject is used as a first condition, if the first key sentence is free of the subject, the subject derived through the object is used as the first condition, if the subject of the first key sentence is preceded by a fixed language, the fixed language is used as a second condition, and first picture information or second picture information having the first condition and the second condition at the same time is matched, and if the subject of the first key sentence is preceded by the fixed language, the first picture information or the second picture information having the first condition is matched.
2. The risk assessment system according to claim 1, wherein the first video conversion module converts the first video information into at least one first picture information by frame interval, and the second video conversion module converts the second video information into at least one second picture information by frame interval.
3. A risk assessment system according to claim 1, wherein the format of said first matching code is different from the format of said second matching code.
4. A risk assessment method based on the risk assessment system according to any one of claims 1 to 3, comprising:
s1, selecting conventional risk factors corresponding to insurance risk types as evaluation items to be checked according to evaluated objects, and inputting first voice information and first video information;
s2, judging whether an indefinite risk factor exists in the process of checking, if so, checking by taking the indefinite risk factor as an evaluation item, inputting second voice information and second video information, and then jumping to S3, otherwise, directly jumping to S3;
and S3, generating a risk assessment report according to the investigation result of the assessment item.
5. The risk assessment method according to claim 4, wherein the specific process of S1 is:
s1.1, selecting the evaluation items in the sub-modules one by one according to the existing risk factors to carry out risk investigation, entering S1.2 when the risk name of the conventional risk factor corresponding to a certain evaluation item is investigated to have hidden danger, or else, carrying out investigation on the next evaluation item;
s1.2, shooting a place with hidden danger into first video information through a first video input module, and describing the place with hidden danger into first voice information through a first voice input module;
s1.3, converting the second video information into at least one first text message through a first video conversion module, and converting the first voice message into at least one first text message through a first voice conversion module;
s1.4, matching the at least one first text message and the at least one first picture message through a matching module according to a preset rule, respectively endowing the at least one first text message and the at least one first picture message which are successfully matched with the same first matching code, then transmitting the at least one first text message to a strategy storage module, and transmitting the at least one first picture message to a report generating module.
6. The risk assessment method according to claim 5, wherein the step of examining the uncertain risk factors as assessment items in S2 comprises the following specific steps:
s2.1, shooting a place with hidden danger into second video information through a second video input module, and describing the place with hidden danger into second voice information through a second voice input module;
s2.2, converting the first video information into at least one piece of second picture information through a second video conversion module, and converting the second voice information into at least one piece of second text information through a second voice conversion module;
and S2.3, matching the at least one piece of second text information with the at least one piece of second picture information through a matching module, respectively giving the at least one piece of second text information and the at least one piece of second picture information which are successfully matched with the same second matching code, transmitting the at least one piece of second text information to the countermeasure storage module, and transmitting the at least one piece of second picture information to a report generating module.
7. The risk assessment method according to claim 6, wherein the step of matching the first text information with the first picture information and generating the risk assessment report comprises the specific steps of:
extracting a first key sentence from at least one piece of first text information, matching the first key sentence with first picture information by the matching module according to a preset rule, endowing the matched first picture information and the first text information where the first key sentence is located with a first matching code, and then respectively outputting the first picture information and the first text information endowed with the first matching code to the report generation module and the countermeasure storage module, wherein a risk name of a conventional risk factor corresponds to one first matching code, and the countermeasure storage module receives the first text information recording risk description and then matches the first text information with a proper improvement suggestion according to the received risk description; the report generation module integrates first picture information, first text information and corresponding improvement suggestions belonging to the same first matching code into a corresponding conventional risk factor column for representing the hidden danger of the conventional risk factor, wherein the conventional risk factor column comprises a risk name, a risk description, the improvement suggestions and a live photo of the conventional risk factor;
the specific steps of matching the second text information with the second picture information and generating a risk assessment report are as follows:
extracting a second keyword from at least one piece of second text information, matching the second keyword with second picture information by the matching module according to a preset rule, endowing the matched second picture information and the second text information where the second keyword is located with a second matching code, and respectively outputting the second picture information and the second text information endowed with the second matching code to a report generating module and a countermeasure storage module, wherein a risk name of an indefinite risk factor corresponds to one second matching code, and the countermeasure storage module receives the second text information recording a risk description and a risk name and then matches the second text information with a proper improvement suggestion according to the received risk description; the report generation module integrates second picture information, second text information and corresponding improvement suggestions belonging to the same second matching code into a corresponding indefinite risk factor column for representing the hidden danger of the indefinite risk factor, wherein the indefinite risk factor column comprises the risk name, the risk description, the improvement suggestions and the scene photo of the indefinite risk factor.
CN202211194516.5A 2022-09-29 2022-09-29 Risk assessment system and method Active CN115311103B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211194516.5A CN115311103B (en) 2022-09-29 2022-09-29 Risk assessment system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211194516.5A CN115311103B (en) 2022-09-29 2022-09-29 Risk assessment system and method

Publications (2)

Publication Number Publication Date
CN115311103A CN115311103A (en) 2022-11-08
CN115311103B true CN115311103B (en) 2022-12-30

Family

ID=83867356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211194516.5A Active CN115311103B (en) 2022-09-29 2022-09-29 Risk assessment system and method

Country Status (1)

Country Link
CN (1) CN115311103B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105847376A (en) * 2016-04-11 2016-08-10 深圳市永兴元科技有限公司 Vehicle insurance assessment system and method
CN110009475A (en) * 2019-02-12 2019-07-12 平安科技(深圳)有限公司 Risk checks method for monitoring, device, computer equipment and storage medium
CN110147726A (en) * 2019-04-12 2019-08-20 财付通支付科技有限公司 Business quality detecting method and device, storage medium and electronic device
CN110457676A (en) * 2019-06-26 2019-11-15 平安科技(深圳)有限公司 Extracting method and device, storage medium, the computer equipment of evaluation information
WO2021027156A1 (en) * 2019-08-15 2021-02-18 平安科技(深圳)有限公司 Crop survey method and apparatus employing video, and computer device
US11190733B1 (en) * 2017-10-27 2021-11-30 Theta Lake, Inc. Systems and methods for application of context-based policies to video communication content
CN114549221A (en) * 2022-02-24 2022-05-27 深圳壹账通科技服务有限公司 Vehicle accident loss processing method and device, computer equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9838877B2 (en) * 2008-04-02 2017-12-05 Yougetitback Limited Systems and methods for dynamically assessing and mitigating risk of an insured entity
US10740846B2 (en) * 2014-12-31 2020-08-11 Esurance Insurance Services, Inc. Visual reconstruction of traffic incident based on sensor device data
CN108257032A (en) * 2017-12-14 2018-07-06 民太安财产保险公估股份有限公司 One kind is used for insurance subject methods of risk assessment and system
WO2020191382A1 (en) * 2019-03-21 2020-09-24 Warner Bros. Entertainment Inc. Automatic media production risk assessment using electronic dataset
CN113849760B (en) * 2021-12-02 2022-07-22 云账户技术(天津)有限公司 Sensitive information risk assessment method, system and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105847376A (en) * 2016-04-11 2016-08-10 深圳市永兴元科技有限公司 Vehicle insurance assessment system and method
US11190733B1 (en) * 2017-10-27 2021-11-30 Theta Lake, Inc. Systems and methods for application of context-based policies to video communication content
CN110009475A (en) * 2019-02-12 2019-07-12 平安科技(深圳)有限公司 Risk checks method for monitoring, device, computer equipment and storage medium
CN110147726A (en) * 2019-04-12 2019-08-20 财付通支付科技有限公司 Business quality detecting method and device, storage medium and electronic device
CN110457676A (en) * 2019-06-26 2019-11-15 平安科技(深圳)有限公司 Extracting method and device, storage medium, the computer equipment of evaluation information
WO2021027156A1 (en) * 2019-08-15 2021-02-18 平安科技(深圳)有限公司 Crop survey method and apparatus employing video, and computer device
CN114549221A (en) * 2022-02-24 2022-05-27 深圳壹账通科技服务有限公司 Vehicle accident loss processing method and device, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于3G技术的移动视频查勘系统原型的设计与应用;廖卓彦;《数字技术与应用》;20111015;第47+51页 *

Also Published As

Publication number Publication date
CN115311103A (en) 2022-11-08

Similar Documents

Publication Publication Date Title
Camburu et al. e-snli: Natural language inference with natural language explanations
Thorne et al. The fact extraction and VERification (FEVER) shared task
CN110704682B (en) Method and system for intelligently recommending background music based on video multidimensional characteristics
JP2012524339A (en) Concept-based analysis of structured and unstructured data using concept inheritance
US20100198756A1 (en) Methods and systems for matching records and normalizing names
US20160110415A1 (en) Using question answering (qa) systems to identify answers and evidence of different medium types
CN113742733B (en) Method and device for extracting trigger words of reading and understanding vulnerability event and identifying vulnerability type
WO2021010744A1 (en) Method and device for analyzing sales conversation based on speech recognition
CN111783428A (en) Emergency management type objective question automatic generation system based on deep learning
CN112667813B (en) Method for identifying sensitive identity information of referee document
CN114756675A (en) Text classification method, related equipment and readable storage medium
CN115311103B (en) Risk assessment system and method
Liu A location independent machine learning approach for early fake news detection
CN106095998A (en) Be applied to intelligent terminal precisely searches topic method and device
US11620826B2 (en) Processing apparatus, processing method, and non-transitory storage medium
CN114492362B (en) Method and system for generating research and report questions and answers and computer readable storage medium
CN116401343A (en) Data compliance analysis method
CN115329310A (en) Semantic rule-based picture verification method and system
CN112990110B (en) Method for extracting key information from research report and related equipment
CN114491209A (en) Method and system for mining enterprise business label based on internet information capture
CN111275410A (en) Remote interaction method for remote counselor of enterprise
CN111651960A (en) Optical character joint training and recognition method for moving from contract simplified form to traditional form
JP4569780B2 (en) Text management device and text management method
KR102617320B1 (en) Apparatus and method for classifying creative work usign artificial intelligence
CN116841424B (en) Screen capture monitoring method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant