CN117610931A - International document risk prompting method, device, equipment and medium - Google Patents

International document risk prompting method, device, equipment and medium Download PDF

Info

Publication number
CN117610931A
CN117610931A CN202311633076.3A CN202311633076A CN117610931A CN 117610931 A CN117610931 A CN 117610931A CN 202311633076 A CN202311633076 A CN 202311633076A CN 117610931 A CN117610931 A CN 117610931A
Authority
CN
China
Prior art keywords
risk
document
international
processing
time limit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311633076.3A
Other languages
Chinese (zh)
Inventor
聂雪琴
钟玉兴
叶瑛锋
王虹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202311633076.3A priority Critical patent/CN117610931A/en
Publication of CN117610931A publication Critical patent/CN117610931A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Educational Administration (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The disclosure provides a risk prompting method for international documents, and the method is applicable to the field of information security, finance or other fields. The method comprises the following steps: analyzing the target international documents to obtain N document parameters; invoking a rule engine to verify N document parameters, wherein the rule engine comprises M rules, and each rule has corresponding international document service risk items; determining the risk type and processing time limit of the target international documents according to the verification result, wherein S risk types associated with the international document service type and the risk type under the international document service type are predetermined; and sending the risk prompt to a processor corresponding to the risk category and the processing time limit of the target international document.

Description

International document risk prompting method, device, equipment and medium
Technical Field
The present disclosure relates to the field of information security, finance, or other fields, and more particularly, to a risk prompting method, apparatus, device, medium, and program product for international documents.
Background
The international documents refer to a collective term of documents, files and certificates applied in the international settlement, by which the delivery, transportation, insurance, business check, customs clearance, collection, etc. of the international purchase and sale goods are handled. International documents business products are various, and in order to discover business risks in time, prompt messages are usually generated in the business handling process, and reports are generated after the handling is completed for business personnel to check. The existing document business risk prevention and control is still mainly based on manual intervention, early warning is carried out through multi-person rechecking and post-checking in the past, and the risk early warning and business monitoring capability is improved to a certain extent.
In the process of realizing the inventive concept, the inventor finds that risk prevention and control are performed manually, the efficiency is low, the cost is high, and a certain personnel operation risk exists. The early warning is carried out through multi-person rechecking and post-checking in the past, the business early warning information only prompts the lower-level mechanism of the financial institution, such as a bank website, and the prior risk prevention and control cannot be realized, and the risk early warning and business monitoring capability is further improved.
Disclosure of Invention
In view of the foregoing, the present disclosure provides a risk prompting method, apparatus, device, medium, and program product for international documents.
In one aspect of the embodiments of the present disclosure, there is provided a risk prompting method for an international document, including: analyzing the target international documents to obtain N document parameters; invoking a rule engine to verify N document parameters, wherein the rule engine comprises M rules, each rule has corresponding international document service risk items, and N and M are integers greater than or equal to 1; determining the risk type and processing time limit of the target international document according to the verification result, wherein S risk types associated with the international document service type and the risk type under the international document service type are predetermined, and S is an integer greater than or equal to 2; and sending the risk prompt to a processor corresponding to the risk category and the processing time limit of the target international document, wherein different risk categories and/or different processing time limits correspond to different processors, and the processor is used for processing the risk of the target international document.
According to an embodiment of the present disclosure, before sending the risk reminder to the processor corresponding to the risk category and processing time limit of the target international document, the method further comprises: matching the processing time limit with different levels of risk time limits, wherein the levels indicate the severity of the risk category, different levels having different risk time limits; and determining the processing party corresponding to the risk category and the processing time limit of the target international document according to the matching result, wherein different processing parties are arranged at different levels.
According to an embodiment of the present disclosure, different of the risk categories have the same or different risk time limit types, including natural days and workdays; and/or any one of said risk categories has a different risk time limit than the remaining at least one of said risk categories at the same said level.
According to an embodiment of the present disclosure, before the rule engine is invoked to verify N number of the document parameters, the method further includes: determining K1 international document service types and K2 risk types under each international document service type; determining K3 risk subtypes according to the states of the international documents under each risk category, wherein K1, K2 and K3 are integers greater than or equal to 1; and determining the risk type and the processing date corresponding to each risk subtype, wherein each rule comprises the international document service type, the risk type and the risk subtype to be checked, and each rule has the corresponding risk type and the processing date.
According to an embodiment of the disclosure, the risk category comprises at least one of: late payment, late receipt, long term unreliability and untimely submission of service applications, the long term including time exceeding a predetermined length of time.
According to an embodiment of the present disclosure, the risk subtype of the late-payment sink includes at least one of: long-term unpaid and accepted unpaid; or the risk subtype of the late sink includes at least one of: the long-term non-receipt and non-receipt after the receipt and the non-receipt after the receipt are not accepted; or the risk subtype of the late redemption includes at least one of: long-term undelayed or late undelayed.
According to an embodiment of the disclosure, each of the rules is characterized in the form of an SQL statement, and after parsing the target international document to obtain N document parameters, the method further comprises: storing N document parameters into a database table; wherein the calling the rule engine to verify the N document parameters comprises: executing M predetermined SQL sentences, and checking N document parameters stored in the database table.
According to an embodiment of the present disclosure, determining the processing time limit of the target international document according to the result of the verification includes: for any one of the rules, when the result representation of the rule check matches with the N document parameters, determining the time length between the current date and the date to be processed as the processing time limit.
Another aspect of the embodiments of the present disclosure provides a risk prompting device for an international document, including: the document analysis module is used for analyzing the target international documents to obtain N document parameters; the risk identification decision module is used for calling a rule engine to verify N document parameters, wherein the rule engine comprises M rules, each rule has corresponding international document service risk items, and N and M are integers which are greater than or equal to 1; the verification result processing module is used for determining the risk type and processing time limit of the target international documents according to the verification result, wherein S risk types associated with the international document service type and the risk type under the international document service type are predetermined, and S is an integer greater than or equal to 2; and the step-by-step early warning module is used for sending the risk prompt to a processor corresponding to the risk type and the processing time limit of the target international document, wherein different risk types and/or different processing time limits correspond to different processors, and the processor is used for processing the risk of the target international document.
Another aspect of an embodiment of the present disclosure provides an electronic device, including: one or more processors; and a storage means for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method as described above.
Another aspect of the disclosed embodiments also provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the method as described above.
Another aspect of the disclosed embodiments also provides a computer program product comprising a computer program which, when executed by a processor, implements a method as described above.
One or more of the above embodiments have the following advantages: the target international documents can be subjected to risk classification, and corresponding processing time limit is determined, so that risk processing is more accurate and timely. By sending the risk prompt to a specially responsible processing party, abnormal business grading early warning can be realized. Therefore, the risk prompt can be carried out on the international documents in an automatic mode, the risk early warning and business monitoring capability is improved, the manual operation risk is reduced, more accurate and efficient risk processing is realized, the business risk is rapidly identified, and the system wind control capability is improved.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be more apparent from the following description of embodiments of the disclosure with reference to the accompanying drawings, in which:
Fig. 1 schematically illustrates an application scenario diagram of a risk prompting method of an international document according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of a risk prompting method of an international document according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a verification flow diagram according to an embodiment of the disclosure;
FIG. 4 schematically illustrates a flow chart of predetermined rules according to an embodiment of the disclosure;
FIG. 5 schematically illustrates a visual diagram of rule engine content characterized in tabular form in accordance with an embodiment of the present disclosure;
FIG. 6 schematically illustrates a flow chart of a determination process according to an embodiment of the disclosure;
FIG. 7 schematically illustrates an example graph of risk timeframes characterized in tabular form in accordance with an embodiment of the present disclosure;
FIG. 8 schematically illustrates a flow chart of risk prompting of an international document according to further embodiments of the present disclosure;
FIG. 9 schematically illustrates an example of mail content rules according to an embodiment of the present disclosure;
FIG. 10 schematically illustrates an example of an automatic closed-loop hint condition in accordance with embodiments of the present disclosure;
FIG. 11 schematically illustrates a block diagram of a risk prompting device for an international document according to an embodiment of the present disclosure;
FIG. 12 schematically illustrates a block diagram of a risk prompting device for an international document according to another embodiment of the present disclosure;
Fig. 13 schematically shows a block diagram of a mail transmission module according to an embodiment of the present disclosure;
FIG. 14 schematically illustrates a block diagram of a risk service monitoring station module in accordance with an embodiment of the disclosure;
FIG. 15 schematically illustrates a block diagram of a hint information automatic closed loop module according to embodiments of the present disclosure; and
fig. 16 schematically illustrates a block diagram of an electronic device adapted to implement a risk prompting method for international documents according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
Fig. 1 schematically illustrates an application scenario diagram of a risk prompting method of an international document according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example in which embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but does not mean that embodiments of the present disclosure may not be used in other devices, systems, environments, or scenarios.
As shown in fig. 1, an application scenario 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only) may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (by way of example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and process the received data such as the user request, and feed back the processing result (e.g., the web page, information, or data obtained or generated according to the user request) to the terminal device.
The server 105 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as cloud computing, network service, and middleware service.
In an application program (abbreviated as APP) such as a client application program, a web application program, etc., a client (i.e., front end) and a server (i.e., back end) may perform data communication through a network message, for example, in the APP client, an international document call network request method that the server needs to obtain from the client is sent to the server.
It should be noted that, the risk prompting method of the international documents provided by the embodiment of the present invention may be executed by the terminal devices 101, 102, 103 or the server 105. Accordingly, the risk prompting device for international documents provided by the embodiment of the present invention may be generally disposed in the terminal device 101, 102, 103 or the server 105.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The risk prompting method of the international document according to the embodiment of the present disclosure will be described in detail below with reference to fig. 2 to 10 based on the scenario described in fig. 1.
Fig. 2 schematically illustrates a flow chart of a risk prompting method of an international document according to an embodiment of the present disclosure.
As shown in fig. 2, this embodiment includes:
in operation S210, the target international documents are parsed to obtain N document parameters.
The target international document is the international document to be inspected. International documents include various types of documents used in international trade to prove contract performance and commodity transportation, such as bill of lading, invoice, packing slip, and the like. For example, in the process of transporting goods from country A to country B, the related files such as bill of lading, invoice, packing list and the like are international documents. The document parameters include various information or data in the target international document, such as the name, quantity, value, etc. of the goods. Such as invoice numbers, quantity of goods, recipient names, and the like. For example, invoice number is INV001, goods number is 1000, and the name of the recipient is ABC Company, etc. are all document parameters.
Such as using Optical Character Recognition (OCR) techniques to automatically parse textual information in the document or incorporating image processing algorithms to extract image parameters in the document.
In operation S220, a rule engine is invoked to verify N document parameters, the rule engine including M rules, wherein each rule has a corresponding international document service risk item, and N and M are integers greater than or equal to 1.
The rule engine is a component embedded in the application program, realizes that rule verification is separated from application program codes, can accept data input of N document parameters, and executes M rules to verify each document parameter by using algorithm and logic judgment. Each rule refers to a criterion or criteria for judging and verifying the document parameters to determine business risk issues. For example, according to the relevant regulations, the amount of goods must be consistent with the amount in the bill of lading, which is a rule for the parameters of the documents. Business risk issues include potential risks or problems associated with the target international documents, such as false documents, errors or vulnerabilities, etc.
In operation S230, a risk category and a processing time limit of the target international document are determined according to the verification result, wherein S risk categories associated with the international document service category and the risk category under the category are predetermined, and S is an integer greater than or equal to 2.
The result of the check includes whether a rule is hit. The risk categories include different risk categories related to the target international documents divided according to the verification result. For example, according to the verification result, the risk types possibly related to the target international documents are false bill risks, abnormal cargo risks and the like. The processing time limit refers to the time limit required for processing the target international document risk according to the risk category. For example, for false document risk, the processing time limit may be 3 days of work. For abnormal cargo risk, the treatment time limit may be 5 working days. The processing time limit may be manually specified or predetermined for each risk category or service type.
In operation S240, the risk prompt is sent to a processor corresponding to the risk category and the processing time limit of the target international document, and different risk categories and/or different processing time limits correspond to different processors, where the processor is configured to process the risk of the target international document.
For example, for false document risk, the processor may be a bank headquarters. For abnormal cargo risk, the handler may be a level one. The risk reminder information may be sent using a communication protocol and an email system, as well as in combination with identity authentication and rights management techniques to ensure that only authorized processors can receive and process the risk reminder.
According to the embodiment of the disclosure, the target international documents can be subjected to risk classification, and corresponding processing time limit is determined, so that risk processing is more accurate and timely. By sending the risk prompt to a specially responsible processing party, abnormal business grading early warning can be realized. Therefore, the risk prompt can be carried out on the international documents in an automatic mode, the risk early warning and business monitoring capability is improved, the manual operation risk is reduced, more accurate and efficient risk processing is realized, the business risk is rapidly identified, and the system wind control capability is improved.
Fig. 3 schematically illustrates a verification flow diagram according to an embodiment of the disclosure.
Each rule is characterized in the form of an SQL sentence, and after analyzing the target international documents to obtain N document parameters, as shown in fig. 3, the method further comprises:
in operation S310, N document parameters are stored in a database table.
In operation S320, M predetermined SQL statements are executed to verify N document parameters stored in the database table. Operation S320 is one of the embodiments of operation S220.
For example, the rule for characterizing the judgment conditions of the verification may be embodied in the form of a set of both functions and parameter lists. The function may be an operator, specifically including an arithmetic operator (e.g., + -/etc.), a comparison operator (e.g., > < = etc.), a logical operator (e.g., & shu #shu |), etc., and may further include a calculation function. The parameter list is a structure of a plurality of groups, and is a parameter of a function, and each element in the plurality of groups can be the simplest structure (comprising a parameter type and a parameter value) or can be a complex structure (being a calculated value of the function and the parameter list).
The above may be characterized by SQL statements, which are abbreviations for structured query language (Structured Query Language), standard languages for interacting with databases. For example, SELECT FROM table_name is a common SQL query statement used to obtain all data in a table. A database table is a form of data organization in a database, typically consisting of rows and columns. For example, a customer table may contain customer information in columns, with each row representing specific information for one customer.
For example, SELECT COUNT (x) FROM table_ name WHERE parameter = 'value' is an SQL check statement for checking whether a parameter meets the requirement.
According to the embodiment of the disclosure, the centralized storage and management of the document parameters can be realized, the subsequent data processing and inquiry are convenient, the accuracy and compliance of the document parameters are ensured, and the efficiency and accuracy of processing international documents are improved.
Fig. 4 schematically illustrates a flow chart of predetermined rules according to an embodiment of the disclosure. FIG. 5 schematically illustrates a visual diagram of rule engine content characterized in tabular form, in accordance with an embodiment of the present disclosure.
Before invoking the rules engine to verify the N document parameters, as shown in fig. 4, this embodiment includes:
in operation S410, K1 international document service categories, and K2 risk categories under each international document service category are determined.
In operation S420, K3 risk subtypes are determined according to the states of the international documents under each risk category, where K1, K2, and K3 are integers greater than or equal to 1.
In some embodiments, referring to fig. 5, the risk categories include at least one of: late payment, late receipt, long term unreliability and untimely submission of service applications.
In some embodiments, referring to fig. 5, the risk subtype of the late payment sink includes at least one of: the risk subtypes of long-term unpaid, honored unpaid, or late sink include at least one of: the risk subtypes of long-term undeveloped and undeveloped after honored, or late honored include at least one of the following: long-term undelayed or late undelayed. Each risk subtype corresponds to each state of the international document, such as an abnormal state.
A Delayed payment transfer (Delayed payment) refers to the case where the payment draft is not paid according to the contracted time. For example, a company contracts with a provider to pay for a good in 30 days, but delays the payment date by more than a contracted time. The late receipt (Delayed collection) refers to the case where the receipt is not collected at the contracted time. For example, a company receives a draft from a customer, but fails to collect money to a bank in time for some reason, exceeding the contracted collection date. Late acceptance (Delayed acceptance) refers to the situation where the acceptance draft is not accepted according to the contracted time. For example, a company presents a draft to a provider for acceptance, which is not accepted by a bank until the contracted date of acceptance. Long term patent (Long-term unclosed documents) refers to the situation where a normally closed roll fails to be normally closed for an extended period of time. For example, a trade contract specifies that the buyer should submit the relevant closed coil document within 30 days, but the buyer has not yet submitted for more than 30 days. The failure to timely submit the service application (Untimely submission of business application) refers to the case where the service application cannot be timely submitted within a prescribed time. For example, a company may need to submit a financing application to a bank within one month, but the company fails to submit the application before a specified time.
According to the embodiment of the disclosure, risk situations such as late payment, late collection, late reception, long-term unreliability, and untimely service application submission can be timely discovered through checking the risk types. By further refining risk subtypes, such as long-term unpaid, honored unpaid, etc., specific risk situations and handling measures can be more accurately determined. The processing party can take corresponding measures according to actual conditions, such as urging payment, urging collection or taking legal measures to solve the problem. By checking and processing various risk conditions in time, the transaction risk can be reduced, and the rights and interests are ensured.
In operation S430, a risk category and a processing date corresponding to each risk subtype are determined, wherein each rule includes an international document service category to be verified, a risk category, and a risk subtype, and each rule has a corresponding risk category and a processing date.
As shown in fig. 5, traffic class 1, traffic class 2, traffic class 3, and traffic class 4 may be included. The business category 1 has risk categories of late-payment and late-acceptance. The business category 2 has risk categories of late acceptance and late sink. The traffic class 3 has a long-term unreliated risk class. The business category 4 has a risk category under which business applications are not submitted in time. The risk cues in fig. 5 describe a list of risk subtypes.
For example, the rule contents of the first row in fig. 5 include the business category 1 to be verified, the late payment, the long-term unpaid payment, the due date corresponding to the document expiration date +1, and the risk category a. The remaining row rules are not described in detail herein.
The international documents of various risk types can be checked, and corresponding risks can be processed in time. For example, if a situation of long-term unpaid exchange is found, corresponding risk prompting measures can be adopted, and a processing party can timely process the information, such as prompting payment or adopting legal measures to solve the problem, so that transaction risks can be effectively reduced, and rights and interests can be ensured.
In some embodiments, determining the processing time limit of the target international documents based on the result of the verification comprises: for any rule, when the result representation of the rule check matches with the N document parameters, the time length between the current date and the date to be processed is determined as the processing time limit.
Fig. 6 schematically illustrates a flow chart of a determination process according to an embodiment of the present disclosure. Fig. 7 schematically illustrates an example graph of risk time limits characterized in tabular form according to an embodiment of the present disclosure.
Before the risk prompt is sent to the processor corresponding to the risk category and the processing time limit of the target international document, as shown in fig. 6, the method further includes:
In operation S610, the process time limit is matched with different levels of risk time limit, where a level indicates the severity of the risk category, and different levels have different risk time limits. The severity of each level may be manually determined, for example, high, medium, and low. Ensuring that different levels of risk are handled within a specified time.
Illustratively, a risk time limit refers to the maximum time that an action is taken or the risk is handled within a certain time, as specified by the severity of the corresponding level of risk. Primary, secondary, tertiary, and quaternary hint days as shown in fig. 6.
In operation S620, the processing parties corresponding to the risk category and the processing time limit of the target international document are determined according to the matching result, and different processing parties are provided at different levels. By matching the processing time limit with risk time limits of different levels, it is ensured that the subjects of the processing task are arranged reasonably according to the risk severity.
Referring to fig. 7, different risk categories have the same or different risk time limit types, including natural days and workdays. And/or any one risk category has a different risk time limit than the remaining at least one risk category at the same level (e.g., primary, secondary, tertiary, and quaternary). For example, when different risk categories are handled, a natural day or a working day may be selected as a calculation method of the processing time limit as needed. Different risk categories may have different processing deadlines within the same level of risk.
In some embodiments, determining a treatment party based on the output treatment time limit (the natural day or workday day of the current date and the treatment date interval) includes:
if the first-level prompting days < = processing time limit < the second-level prompting days, the first-level business risk prompt is hit, and the processing party is determined to be the first-level processing party, such as a banking website.
If the number of the secondary prompting days < = processing time limit < the number of the tertiary prompting days, the secondary business risk prompt is hit, and the processing party is determined to be a secondary processing party, such as a secondary branch of a bank.
If the three-level prompting days < = processing time limit < four-level prompting days, hit the three-level business risk prompt, and determine that the processing party is a three-level processing party, such as a first-level branch of a bank.
If the number of the four-level prompt days < = processing time limit, hit the four-level business risk prompt, and determine that the processing party is a four-level processing party, such as a general bank.
If the international document hits the service risk prompt, checking whether the current service of the international document has prompt records, if so, updating risk information such as risk types, risk descriptions, processing time limits and the like, and if not, newly adding prompt records for mail prompt, checking processing by a risk monitoring platform and the like.
According to the embodiment of the disclosure, the risk of different levels can be processed in time by matching the processing time limit with the risk time limit of different levels, so that step-by-step early warning of international documents is realized, and the risk processing capability is improved.
Fig. 8 schematically illustrates a flow chart of risk prompting of an international document according to further embodiments of the present disclosure. Fig. 9 schematically illustrates an example of mail content rules according to an embodiment of the present disclosure. Fig. 10 schematically illustrates an example of an automatic closed-loop hint condition in accordance with embodiments of the present disclosure.
As shown in fig. 8, this embodiment includes:
in operation S801, the application system is initialized. The application system comprises a system for executing the risk prompting method of the international documents provided by the disclosure, and can also carry out service processing on the international documents.
The rules engine may be pre-deployed prior to application system initialization. The M rules stored and managed by the rule engine comprise business risk grading prompt rules, step-by-step early warning mechanisms, mail generation rules, automatic closed-loop rules and the like. For example, the method comprises the following steps:
step 1): and deploying a service risk grading prompt rule for automatically executing daily automatic identification and prompt of service risks.
Step 2): and establishing a step-by-step early warning mechanism of four types of risk grades according to the processing time limit, setting a level 1 risk to prompt a banking website only, a level 2 risk prompt to rise to a second-level branch of a bank, a level 3 risk prompt to rise to a first-level branch of the bank, and a level 4 risk prompt to rise to a banking headquarter.
Step 3): and (3) deploying a risk service prompt mail generation rule, generating prompt mails according to the risk service information acquired in the steps (1) and (2), and sending the prompt mails to related personnel. And after receiving the prompt, the related personnel feed back the processing opinion to the risk business record at the business monitoring station.
Step 4): the risk service prompt automatic closed-loop rule is deployed, so that the change of the state of the risk service can be intelligently identified, and the automatic closed-loop prompt information is provided. If the feedback opinion of the risk service record is empty, automatically pushing a reminding mail every day, and if the feedback opinion exists, automatically pushing the reminding frequency to be reduced from daily reminding to 14-day reminding once, until the risk service is completed in the step 5.
In operation S802, the application system starts to start.
In operation S803, a risk classification prompt rule is automatically executed, a service list to be risk prompted is obtained, international documents of each service in the service list are analyzed to obtain document parameters including organization, customer, currency, amount and the like, and risk information such as hit risk types, processing dates and the like is output.
In operation S804, a step-by-step early warning mechanism is performed to calculate a processing time limit for the acquired document parameters and risk information, and a risk prompt level corresponding to the business is intelligently identified.
In operation S805, as shown in fig. 9, a mail generation rule is called to generate and transmit risk presentation mail information of each organization.
In operation S806, the service personnel checks the risk service prompt information and feeds back comments.
In operation S807, as shown in fig. 10, an automatic closed-loop prompt rule is automatically executed, and when the risk service state changes to satisfy the closed-loop condition, the system automatically closes the risk prompt.
According to the embodiment of the disclosure, aiming at the defects existing in the prior art, the international document business risk classification prompting method based on a rule engine is provided, business risk early warning signals are set, intelligent prompting of business risk monitoring is achieved, a step-by-step early warning mechanism of multiple types of risk grades is established, the consulting and approving flow in a total-branch and various-level business management department system is optimized, and online and systematic whole-flow recording, tracking and tracing are achieved.
Based on the international document risk prompting method, the disclosure also provides a risk prompting device for the international document. The device will be described in detail below with reference to fig. 11.
Fig. 11 schematically illustrates a block diagram of a risk prompting device 1100 of an international document according to an embodiment of the present disclosure.
Referring to fig. 11, the risk prompting device 1l 00 of the international document may include a document parsing module 1110, a risk identification decision module 1120, a verification result processing module 1130, and a step-by-step early warning module 1140.
The document parsing module 1110 may perform operation S210 for parsing the target international document to obtain N document parameters.
In some embodiments, each rule is characterized in terms of an SQL statement, and after parsing the target international documents to obtain N document parameters, the N document parameters are stored in a database table. The document parsing module 1110 is configured to execute M predetermined SQL statements and verify N document parameters stored in the database table.
The risk identification decision module 1120 may execute operation S220, configured to invoke a rule engine to verify N document parameters, where the rule engine includes M rules, each rule has a corresponding international document service risk item, and N and M are integers greater than or equal to 1.
The verification result processing module 1130 may perform operation S230 for determining a risk category and a processing time limit of the target international document according to the verification result, wherein S risk categories associated with the international document service category and the risk category under the category are predetermined, and S is an integer greater than or equal to 2.
In some embodiments, the document parsing module 1110, the risk identification decision module 1120, and the verification result processing module 1130 cooperate to identify and suggest heterogeneous business risks, including late-payment, late-collection, late-receipt, long-term unclosed, non-timely submission of business applications, and the like. And calling a rule engine, and automatically executing and outputting information including branches, network points, clients, service types, service numbers, service amounts, processing dates, actual processing dates, total branch feedback comments and the like every day by pre-configuring service risk prompt rules. For example, the risk recognition decision module 1120 is configured to execute a service risk prompting rule on an international document related to a system service every day, determine whether a current date is greater than a service processing date, if so, enter a queue to be prompted, and output the processing date.
The step-by-step early warning module 1140 may perform operation S240, configured to send a risk prompt to a processor corresponding to a risk category and a processing time limit of the target international document, where different risk categories and/or different processing time limits correspond to different processors, and the processor is configured to process the risk of the target international document.
Illustratively, the step-by-step early warning module 1140 is configured to implement step-by-step early warning of multiple risk levels according to a processing time limit (natural day or working day between a current date and a processed date), apply an intelligent step-by-step early warning rule engine, implement a risk classification rule by configuration, execute a classification rule on a prompt message, and output a final risk prompt level of a service.
In some embodiments, the progressive pre-warning module 1140 is configured to match a processing time limit with different levels of risk time limits before sending the risk prompt to a processor corresponding to a risk category and a processing time limit of a target international document, where a level indicates a severity of the risk category, and the different levels have different risk time limits. And determining the processing party corresponding to the risk category and the processing time limit of the target international document according to the matching result, wherein different processing parties are arranged at different levels.
In some embodiments, the risk prompting device 1100 may further include a deployment module for determining K1 international document service categories and K2 risk categories for each international document service category before invoking the rules engine to verify the N document parameters. And determining K3 risk subtypes according to the states of the international documents under each risk category, wherein K1, K2 and K3 are integers greater than or equal to 1. And determining the risk type and the processing date corresponding to each risk subtype, wherein each rule comprises the international document service type, the risk type and the risk subtype to be checked, and each rule has the corresponding risk type and the processing date.
Illustratively, the deployment module may be configured to configure the identification rules in different scenarios according to conventions, regulations, etc., including but not limited to business categories, risk businesses, risk hint descriptions, processing dates, risk categories, etc., referring to fig. 5, business category 1 should pay for a document expiration date +1 day, and business category 1 should pay for a day before expiration of a acceptance after having been accepted. The deployment module may be configured to configure grading rules under different scenarios according to different service types and risk types, and fig. 6 includes, as a reference, risk types, processing time limit types, first-stage prompt days, second-stage prompt days, third-stage prompt days, and fourth-stage prompt days.
Fig. 12 schematically illustrates a block diagram of a risk prompting device of an international document according to another embodiment of the present disclosure. Fig. 13 schematically shows a block diagram of the mail transmission module according to an embodiment of the present disclosure. Fig. 1 4 schematically illustrates a block diagram of a risk service monitoring station module in accordance with an embodiment of the disclosure. Fig. 15 schematically illustrates a block diagram of the prompt message automatic closed loop module according to an embodiment of the disclosure.
Referring to fig. 12, in addition to the modules shown in fig. 11, the risk reminder 1100 may include a mail sending module 1150, a risk service monitoring station module 1160, and a reminder automatic loop module 1170.
In some embodiments, the mail sending module 1150 is configured to send different levels of business risk prompt mails to corresponding personnel, and each level of risk prompt mailbox account needs to be set in advance, where the first level prompt system automatically sends the mails to the website main department recipient, the second level prompt system automatically sends the mails to the second level main department recipient, the third level prompt system automatically sends the mails to the first level main department recipient, and the fourth level prompt system automatically sends the mails to the main department recipient, and the mail content includes, but is not limited to, all business information and risk information that the present institution has business risks.
Referring to fig. 13, the mail transmission module 1150 includes a mail content assembly rule configuration unit 1151, a mail content generation unit 1152, and a mail transmission unit 1153. The mail content rule configuration unit 1151 is configured to configure extraction rules of recipients, mail headers, mail texts, including, but not limited to, business risk prompting mechanisms, mail subjects, mail texts 1, mail texts 2, mail lists, and the like, and fig. 9 is a mail content rule example. The mail content generating unit 1152 is configured to count all the related sites, secondary branches and primary branches of the risk service, and generate mail content to be sent to the corresponding related institutions according to the rule configured by the mail content rule configuring unit 1151. If the risk service exists in the A website, the risk service prompt mail addressee account number set under the website is queried according to the website number, and other information required by the mail is generated according to the website-level mail content assembly rule, including the hyperlink, can directly reach the risk service detection station, so that service personnel can conveniently check and process the prompt information. If feedback comments exist, the automatic push reminding frequency is reduced from daily reminding to 14-day reminding once until the service state changes to prompt a closed loop. The mail sending unit 1153 sends the business risk prompt mail of the different institutions generated by the mail content generating unit 1152 to risk prompt mailbox account numbers of the institutions set in advance.
In some embodiments, the risk service monitoring station module 1160 is configured to enable a person associated with the mail prompt to directly access the risk service record in the risk service monitoring station of the system through the link in the mail, or directly log in the system to check the risk service information, and perform opinion feedback on the risk service record in the risk service monitoring station. And the report forms are checked and exported according to the dimensions of the type, time, clients, branch lines, prompt level, service processing state and the like of all data of the risk service monitoring station.
Referring to fig. 14, the risk service monitoring station module 1160 includes a risk service query derivation unit 1161 and a risk service opinion feedback unit 1162. The risk service inquiry and export unit 1161 is used for allowing service personnel of different institutions to enter the monitoring station, and can inquire all risk service data under the institutions, so that the data inquired by the risk service monitoring station can be used for checking and exporting reports according to dimensions such as risk types, risk prompt dates, service types, service currency amounts, clients, primary branches, secondary branches, network points, risk prompt levels, service processing states and the like. The risk service opinion feedback unit 1162 is used for the website to receive the prompt, for example, the service cannot update the service state in time, the reason needs to be fed back, and the opinion needs to be fed back after the upper level knows. And the consulting and approving flow in the business management department system of each level of the total branch is optimized, and the online and systematic full-flow recording, tracking and tracing are realized.
In some embodiments, the prompt information automatic closed-loop module 1170 is configured to automatically close the risk prompt when the state of the risk service changes, such as after payment of the unpaid service, after acceptance of the unpaid service, after closing of the unrendered service, or after closing of the unrendered service.
Referring to fig. 15, the hint information automatic closed loop module 1170 includes an automatic closed loop hint rule configuration unit 1171 and an automatic closed loop decision unit 1172. Automatic closed loop hint rule configuration unit 1171: different automatic closed-loop rules are configured according to the business risk types, and fig. 10 is an example of an automatic closed-loop prompt rule, including risk types and automatic closed-loop prompt conditions, if the risk types are unpaid, the automatic closed-loop prompt information is automatically closed after the business is paid for the whole amount or closed-loop, and the prompt of the business is not pushed any more. The automatic closed-loop decision unit 1172 is configured to execute a preconfigured automatic closed-loop rule on the prompted service information and risk information, and if the condition is met, close the risk prompt of the service to be processed, so that the risk prompt information of the service is not pushed any more.
Note that, the risk presenting apparatus 1100 includes modules for performing the steps of any one of the embodiments described above with reference to fig. 2 to 10, respectively. The implementation manner, the solved technical problems, the realized functions and the realized technical effects of each module/unit/sub-unit and the like in the apparatus part embodiment are the same as or similar to the implementation manner, the solved technical problems, the realized functions and the realized technical effects of each corresponding step in the method part embodiment, and are not repeated herein.
According to embodiments of the present disclosure, any of the document parsing module 1110, the risk identification decision module 1120, the verification result processing module 1130, the step-by-step pre-warning module 1140, the mail sending module 1150, the risk service monitoring station module 1160, and the prompt automatic closed-loop module 1170 may be combined in one module to be implemented, or any of the modules may be split into a plurality of modules. Alternatively, at least some of the functionality of one or more of the modules may be combined with at least some of the functionality of other modules and implemented in one module.
At least one of the document parsing module 1110, the risk identification decision module 1120, the verification result processing module 1130, the step-by-step pre-warning module 1140, the mail sending module 1150, the risk service monitoring station module 1160, and the prompt automatic closing module 1170 may be implemented, at least in part, as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system-on-chip, a system-on-substrate, a system-on-package, an Application Specific Integrated Circuit (ASIC), or in hardware or firmware in any other reasonable manner that integrates or encapsulates the circuitry, or in any one of or a suitable combination of three of software, hardware, and firmware, according to embodiments of the present disclosure. Alternatively, at least one of the document parsing module 1110, the risk identification decision module 1120, the verification result processing module 1130, the step-by-step pre-warning module 1140, the mail sending module 1150, the risk service monitoring station module 1160, and the prompt message automatic closed-loop module 1170 may be at least partially implemented as a computer program module, which when executed, may perform a corresponding function.
Fig. 16 schematically illustrates a block diagram of an electronic device adapted to implement a risk prompting method for international documents according to an embodiment of the present disclosure.
As shown in fig. 16, an electronic device 1600 according to an embodiment of the present disclosure includes a processor 1601 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 1602 or a program loaded from a storage section 1608 into a Random Access Memory (RAM) 1603. The processor 1601 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 1601 may also include on-board memory for caching purposes. The processor 1601 may include a single processing unit or multiple processing units for performing different actions in accordance with the method flows of the disclosed embodiments.
In the RAM1603, various programs and data necessary for the operation of the electronic device 1600 are stored. The processor 1601, ROM 1602, and RAM1603 are connected to each other by a bus 1604. The processor 1601 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 1602 and/or RAM 1603. Note that the program can also be stored in one or more memories other than the ROM 1602 and the RAM 1603. The processor 1601 may also perform various operations of a method flow according to an embodiment of the present disclosure by executing programs stored in one or more memories.
According to an embodiment of the disclosure, the electronic device 1600 may also include an input/output (I/O) interface 1605, the input/output (I/O) interface 1605 also being connected to the bus 1604. The electronic device 1600 may also include one or more of the following components connected to the I/O interface 1605: including an input portion 1606 of a keyboard, mouse, etc. Including an output portion 1607 such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), etc., and a speaker, etc. A storage section 1608 including a hard disk or the like. And a communication section 1609 including a network interface card such as a LAN card, a modem, or the like. The communication section 1609 performs communication processing via a network such as the internet. The drive 1610 is also connected to the I/O interface 1605 as needed. A removable medium 1611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on the drive 1610 so that a computer program read out therefrom is installed into the storage section 1608 as needed.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments. Or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 1602 and/or RAM 1603 described above and/or one or more memories other than ROM 1602 and RAM 1603.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the methods shown in the flowcharts. The program code, when executed in a computer system, causes the computer system to perform the methods provided by embodiments of the present disclosure.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 1601. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program can also be transmitted, distributed over a network medium in the form of signals, downloaded and installed via the communication portion 1609, and/or from the removable medium 1611. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such embodiments, the computer program may be downloaded and installed from a network via the communication portion 1609, and/or installed from the removable media 1611. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 1601. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be provided in a variety of combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (11)

1. A risk prompting method for international documents, comprising:
analyzing the target international documents to obtain N document parameters;
invoking a rule engine to verify N document parameters, wherein the rule engine comprises M rules, each rule has corresponding international document service risk items, and N and M are integers greater than or equal to 1;
determining the risk type and processing time limit of the target international document according to the verification result, wherein S risk types associated with the international document service type and the risk type under the international document service type are predetermined, and S is an integer greater than or equal to 2;
and sending the risk prompt to a processor corresponding to the risk category and the processing time limit of the target international document, wherein different risk categories and/or different processing time limits correspond to different processors, and the processor is used for processing the risk of the target international document.
2. The method of claim 1, wherein prior to sending a risk reminder to a processor corresponding to a risk category and processing time limit of the target international document, the method further comprises:
matching the processing time limit with different levels of risk time limits, wherein the levels indicate the severity of the risk category, different levels having different risk time limits;
and determining the processing party corresponding to the risk category and the processing time limit of the target international document according to the matching result, wherein different processing parties are arranged at different levels.
3. The method of claim 2, wherein,
different ones of the risk categories have the same or different risk time limit types, including natural days and workdays; and/or
Any one of the risk categories has a different risk time limit than the remaining at least one of the risk categories at the same said level.
4. A method according to any one of claims 1 to 3, wherein before invoking a rules engine to verify N of the document parameters, further comprising:
determining K1 international document service types and K2 risk types under each international document service type;
Determining K3 risk subtypes according to the states of the international documents under each risk category, wherein K1, K2 and K3 are integers greater than or equal to 1;
and determining the risk type and the processing date corresponding to each risk subtype, wherein each rule comprises the international document service type, the risk type and the risk subtype to be checked, and each rule has the corresponding risk type and the processing date.
5. The method of claim 4, wherein the risk category comprises at least one of:
late payment, late receipt, long term unreliability and untimely submission of service applications, the long term including time exceeding a predetermined length of time.
6. The method of claim 5, wherein,
the risk subtype of the late-payment sink includes at least one of: long-term unpaid and accepted unpaid; or (b)
The risk subtype of the late sink includes at least one of: the long-term non-receipt and non-receipt after the receipt and the non-receipt after the receipt are not accepted; or (b)
The risk subtype of the late redemption includes at least one of: long-term undelayed or late undelayed.
7. The method of claim 1, wherein each of the rules is characterized in terms of an SQL statement, the method further comprising, after parsing the target international documents to obtain N document parameters:
Storing N document parameters into a database table;
wherein the calling the rule engine to verify the N document parameters comprises:
executing M predetermined SQL sentences, and checking N document parameters stored in the database table.
8. The method of claim 4, wherein determining the processing time limit of the target international document based on the result of the verification comprises:
for any one of the rules, when the result representation of the rule check matches with the N document parameters, determining the time length between the current date and the date to be processed as the processing time limit.
9. A risk prompting device for international documents, comprising:
the document analysis module is used for analyzing the target international documents to obtain N document parameters;
the risk identification decision module is used for calling a rule engine to verify N document parameters, wherein the rule engine comprises M rules, each rule has corresponding international document service risk items, and N and M are integers which are greater than or equal to 1;
the verification result processing module is used for determining the risk type and processing time limit of the target international documents according to the verification result, wherein S risk types associated with the international document service type and the risk type under the international document service type are predetermined, and S is an integer greater than or equal to 2;
And the step-by-step early warning module is used for sending the risk prompt to a processor corresponding to the risk type and the processing time limit of the target international document, wherein different risk types and/or different processing time limits correspond to different processors, and the processor is used for processing the risk of the target international document.
10. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-8.
11. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method according to any of claims 1-8.
CN202311633076.3A 2023-11-30 2023-11-30 International document risk prompting method, device, equipment and medium Pending CN117610931A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311633076.3A CN117610931A (en) 2023-11-30 2023-11-30 International document risk prompting method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311633076.3A CN117610931A (en) 2023-11-30 2023-11-30 International document risk prompting method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN117610931A true CN117610931A (en) 2024-02-27

Family

ID=89959336

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311633076.3A Pending CN117610931A (en) 2023-11-30 2023-11-30 International document risk prompting method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN117610931A (en)

Similar Documents

Publication Publication Date Title
US7840455B1 (en) System and method of detecting fraudulent or erroneous invoices
US9268763B1 (en) Automatic interpretive processing of electronic transaction documents
US10878390B2 (en) Systems and methods for identifying suspect illicit merchants
CN111177275A (en) Block chain-based management method, terminal, device and storage medium
EP1811442A1 (en) Content center and method for business process applications
EP1804212A1 (en) Method and system for providing sponsored content based on user information
US20220301051A1 (en) Systems and methods for managing a loan application
US10657530B2 (en) Automated transactions clearing system and method
US20210035119A1 (en) Method and system for real-time automated identification of fraudulent invoices
US20230267537A1 (en) Transaction retrieval, transaction matching, alert generation, and processing of dispute alerts
US20120158583A1 (en) Automated bank transfers using identifier tokens
US20170372314A1 (en) Processing of dispute alerts
CN115660842A (en) Accounting checking method, device, equipment and storage medium
CN115471228A (en) Financial business certificate checking method, device, equipment and storage medium
CN117610931A (en) International document risk prompting method, device, equipment and medium
CN114881739A (en) Order event processing method and device, electronic equipment and storage medium
US11657348B2 (en) System for dynamic exception prioritization
US10325263B2 (en) Systems and methods for providing risk information
US20110179072A1 (en) Business document processor
US7882153B1 (en) Method and system for electronic messaging of trade data
US11900289B1 (en) Structuring unstructured data via optical character recognition and analysis
CN114445216A (en) Credit approval method, apparatus, device medium, and program product
CN116629230A (en) Document processing method, device, equipment and storage medium
CN115860673A (en) Asset data processing method and device, electronic equipment and storage medium
CN114897567A (en) Bill information processing method, device, medium and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination