CN110969444A - Enterprise bidding qualification analysis method and device - Google Patents

Enterprise bidding qualification analysis method and device Download PDF

Info

Publication number
CN110969444A
CN110969444A CN201811162608.9A CN201811162608A CN110969444A CN 110969444 A CN110969444 A CN 110969444A CN 201811162608 A CN201811162608 A CN 201811162608A CN 110969444 A CN110969444 A CN 110969444A
Authority
CN
China
Prior art keywords
enterprise
supplier
data
qualification
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811162608.9A
Other languages
Chinese (zh)
Inventor
陈文莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gridsum Technology Co Ltd
Original Assignee
Beijing Gridsum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Gridsum Technology Co Ltd filed Critical Beijing Gridsum Technology Co Ltd
Priority to CN201811162608.9A priority Critical patent/CN110969444A/en
Publication of CN110969444A publication Critical patent/CN110969444A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents

Abstract

The invention discloses an enterprise bidding qualification analysis method and device, wherein the method comprises the following steps: acquiring enterprise identifications of a plurality of suppliers; obtaining enterprise operation data of each supplier according to the enterprise identification; the enterprise operation data corresponds to a preset qualification auditing rule; and analyzing whether the supplier accords with the qualification auditing rule or not according to the obtained enterprise operation data. The invention can analyze whether each supplier accords with the qualification audit rule, help the bidding enterprise to identify risks in time and prevent the bidders from illegal and illegal operations in time.

Description

Enterprise bidding qualification analysis method and device
Technical Field
The application relates to the technical field of data processing, in particular to an enterprise bidding qualification analysis method and device.
Background
At present, the auditing and analyzing of the qualification of the supplier are all based on the bidding materials which are voluntarily declared by the supplier, once the supplier falsely declares and falsely declares the bidding materials, illegal conditions and violation conditions can be caused, and the real bidding qualification of the supplier is difficult to determine.
Disclosure of Invention
In view of the above, the present application is directed to providing a method and apparatus for enterprise bid qualification analysis that overcomes or at least partially solves the above-mentioned problems.
The enterprise bidding qualification analysis method provided by the embodiment of the application comprises the following steps:
acquiring enterprise identifications of a plurality of suppliers;
obtaining enterprise operation data of each supplier according to the enterprise identification; the enterprise operation data corresponds to a preset qualification auditing rule;
and analyzing whether the supplier accords with the qualification auditing rule or not according to the obtained enterprise operation data.
Optionally, the qualification audit rule includes: a first sub-rule and/or a second sub-rule;
the first sub-rule comprises: the responsible persons of any two suppliers are different, and no direct or indirect management relation or stock control relation exists;
the second sub-rule comprises: and the supplier does not have illegal records meeting preset conditions in a preset time range.
Optionally, when the qualification rules include the first sub-rule, the enterprise operation data includes equity data, job data and investment data; analyzing whether the supplier accords with the qualification auditing rule or not according to the obtained enterprise operation data specifically comprises:
judging whether the same suppliers with the same responsible persons exist according to the job data of each supplier; if yes, the suppliers with the same responsible person do not accord with the qualification auditing rule;
judging whether a target figure exists or not according to the stock right data and the job data; the target person is at the job function of a first supplier and is at the stock or job function of a second supplier; if yes, the supplier to which the target character belongs does not conform to the qualification auditing rule;
judging whether the investment and invested relation exists between the suppliers according to the enterprise identification and the investment data of each supplier; if yes, the plurality of suppliers with the investment and invested relation do not accord with the qualification auditing rule.
Optionally, the method further includes:
and constructing a stock right relation diagram and/or an investment relation diagram of each supplier by using the enterprise operation data, and pushing the stock right relation diagram and/or the investment relation diagram to the bidding enterprise.
Optionally, when the qualification rules include the second sub-rule, the enterprise operation data includes illegal data of the suppliers in the preset time range; when the illegal data are acquired, analyzing whether the supplier accords with the qualification audit rule according to the acquired enterprise operation data, specifically comprising:
judging whether the acquired illegal data of the target provider has illegal records meeting the preset conditions or not; the target supplier is any one of the plurality of suppliers;
and when the obtained illegal data of the target provider has an illegal record meeting the preset conditions, the target provider does not meet the qualification auditing rule.
Optionally, the method further includes:
pushing the bidding data of each supplier to a bidding enterprise; the bidding data carries the qualification analysis result and the enterprise identification of the supplier.
The enterprise bid qualification analysis device provided by the embodiment of the application comprises: a first acquisition unit, a second acquisition unit and an eligibility analysis unit;
the first acquisition unit is used for acquiring enterprise identifications of a plurality of suppliers;
the second obtaining unit is used for obtaining enterprise operation data of each supplier according to the enterprise identification; the enterprise operation data corresponds to a preset qualification auditing rule;
and the qualification analysis unit is used for analyzing whether the supplier accords with the qualification auditing rule or not according to the obtained enterprise operation data.
Optionally, the qualification audit rule includes: a first sub-rule and/or a second sub-rule;
the first sub-rule comprises: the responsible persons of any two suppliers are different, and no direct or indirect management relation or stock control relation exists;
the second sub-rule comprises: and the supplier does not have illegal records meeting preset conditions in a preset time range.
Optionally, when the qualification rules include the first sub-rule, the enterprise operation data includes equity data, job data and investment data; the qualification analysis unit specifically comprises: the first judgment subunit, the second judgment subunit, the third judgment subunit and the first determination subunit;
the first judging subunit is configured to judge whether the same suppliers with the same responsible person exist according to the job data of each supplier;
the second judging subunit is configured to judge whether a target person exists according to the stock right data and the job data; the target person is at the job function of a first supplier and is at the stock or job function of a second supplier;
the third judging subunit is used for judging whether the investment and invested relation exists between the suppliers according to the enterprise identification and the investment data of each supplier;
the first determining subunit is configured to determine that the suppliers with the same principal do not comply with the qualification audit rule when the determination result of the first determining subunit is yes; the second judging subunit is further configured to determine that the provider to which the target person belongs does not comply with the qualification audit rule when the judgment result of the second judging subunit is yes; and the third judging subunit is further configured to determine that none of the multiple suppliers with the investment and invested relationship meets the qualification audit rule when the judgment result of the third judging subunit is yes.
Optionally, the method further includes: a first pushing unit;
and the first pushing unit is used for constructing a stock right relation diagram and/or an investment relation diagram of each supplier by using the enterprise operation data and pushing the stock right relation diagram and/or the investment relation diagram to the bidding enterprise.
Optionally, when the qualification rules include the second sub-rule, the enterprise operation data includes illegal data of the suppliers in the preset time range; the qualification analysis unit specifically comprises: a fourth judging subunit and a second determining subunit;
the fourth judging subunit is configured to, when the second obtaining unit obtains the illegal data of the target provider within the preset time range, judge whether the obtained illegal data has an illegal record meeting the preset condition; the target supplier is any one of the plurality of suppliers;
the second determining subunit is configured to determine that the target provider does not comply with the qualification rules when the fourth determining subunit determines that there is a violation record that complies with the preset condition.
Optionally, the method further includes: a second pushing unit;
the second pushing unit is used for pushing the bidding data of each supplier to a bidding enterprise; the bidding data carries the qualification analysis result and the enterprise identification of the supplier.
The embodiment of the present application also provides a storage medium, on which a program is stored, which when executed by a processor implements any one of the enterprise bid qualification analysis methods provided by the above embodiments.
The present application further provides a processor, wherein the processor is configured to execute a program, where the program executes any one of the enterprise bid qualification analysis methods provided in the foregoing embodiments.
By means of the technical scheme, the enterprise bidding qualification analysis method and the enterprise bidding qualification analysis device, enterprise operation data corresponding to the qualification audit rules are obtained according to enterprise identifications of all bidding suppliers, and then whether each supplier accords with the qualification audit rules or not can be analyzed according to the obtained enterprise operation results of all suppliers, so that the relation among all suppliers can be accurately obtained, whether the suppliers have major illegal records or not can be judged, risks can be timely identified for bidding enterprises, and illegal operations of bidders can be timely prevented.
The foregoing description is only an overview of the technical solutions of the present application, and the present application can be implemented according to the content of the description in order to make the technical means of the present application more clearly understood, and the following detailed description of the present application is given in order to make the above and other objects, features, and advantages of the present application more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the application. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart illustrating a method for analyzing enterprise bid qualification provided by an embodiment of the present application;
FIG. 2 is a schematic diagram illustrating a data cleansing method according to an embodiment of the present disclosure;
FIG. 3 is a flowchart illustrating a method for enterprise bid qualification analysis according to an embodiment of the present application;
FIG. 4 is a flow diagram illustrating another enterprise bid qualification analysis method provided by embodiments of the present application;
FIG. 5 is a schematic diagram illustrating a presentation of an analysis result according to an embodiment of the present disclosure;
FIG. 6 is a schematic structural diagram of an enterprise bid qualification analysis device according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of another enterprise bid qualification analysis apparatus according to an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
At present, whether bidding enterprises obtain information such as whether suppliers participating in bidding are the same responsible person, direct stock control or management relation, whether the suppliers participating in bidding have major illegal records in the last three years or not is all the bidding materials which are self-reported by the suppliers, and the real bidding qualification of the suppliers is difficult to determine.
Therefore, the embodiment of the application provides an enterprise bidding qualification analysis method and device, massive information on the internet is utilized, enterprise operation data related to qualification auditing rules are crawled according to enterprise identifications of all suppliers and serve as the basis of qualification analysis, materials which are self-consciously declared by the suppliers are not limited, the relation among all suppliers can be objectively obtained, whether the suppliers have major illegal records or not is judged, the tendering enterprise is helped to recognize risks in time, double 'wisdom' is provided for the tendering enterprise, and illegal operations of bidders are prevented.
For ease of understanding, a specific application scenario of the present application is first described below.
In the bidding process, a general enterprise establishes a purchasing bidding information system to input information data of each supplier. The information data of the suppliers in the purchase bidding information system includes but is not limited to: the enterprise name, the industrial and commercial registration number, the organization code, the taxpayer identification number, the legal person and other key information can be obtained from the bidding materials which are voluntarily declared by the supplier, or can be obtained by utilizing the internet data cleaning. The enterprise bidding qualification analysis method and device provided by the embodiment of the application can be embedded in the existing purchasing bidding information system to be used as a supplement, and can also be independently configured in other systems, and a big data platform is built by using internet data to realize analysis and verification of the bidding qualification of each supplier in the purchasing bidding information system, and the application does not limit the method.
Based on the above-mentioned ideas, in order to make the above-mentioned objects, features and advantages of the present application more comprehensible, specific embodiments of the present application are described in detail below with reference to the accompanying drawings.
Referring to fig. 1, a schematic flowchart of an enterprise bid qualification analysis method according to an embodiment of the present disclosure is shown.
The enterprise bidding qualification analysis method provided by the embodiment of the application comprises the following steps S101-S103.
S101: enterprise identifications of a plurality of suppliers are obtained.
In the embodiment of the present application, a supplier refers to a company participating in a purchase bid, and may include only one bidding activity (e.g., a current bidding activity), or may include a plurality of bidding activities (e.g., a current bidding activity and one or more historical bidding activities), which is not limited herein.
The enterprise identification includes, but is not limited to, any one or more of the enterprise name, the industrial and commercial registration number, the organization code, the taxpayer identification number, the legal person and other key information of the supplier, and can be obtained by accessing the supplier information data in the purchase bidding information system. In addition, the enterprise identities of the various suppliers may also be obtained through direct entry or other means, which are not listed here. In practical applications, the data warehouse ETL may be used for collection.
ETL (Extract-Transform-Load) is used to describe the process of extracting (Extract), Transform (Transform), and loading (Load) data from a source to a destination. ETL is an important ring of building a data warehouse, but objects are not limited to data warehouses. And the user extracts the required data from the data source, and finally loads the data into the data warehouse according to a predefined data warehouse model after data cleaning.
S102: and acquiring the enterprise operation data of each supplier according to the enterprise identification.
In the embodiment of the application, the obtained enterprise operation data corresponds to a preset qualification auditing rule. The qualification auditing rule is used for auditing whether the nuclear supplier meets the bidding qualification standard of the bidding enterprise, and generally needs to meet the requirements of related laws and regulations of the current state. In practical applications, the qualification rules may only include the provisions of the relevant national laws and regulations, and may also be customized and supplemented to the qualification rules according to the additional requirements of the bidding enterprises, so as to analyze whether the suppliers meet the additional qualification requirements.
In an example, the qualification audit rule may specifically include: a first sub-rule and/or a second sub-rule; wherein the first sub-rule comprises: the responsible persons of any two suppliers are different, and no direct or indirect management relation or stock control relation exists; the second sub-rule comprises: the supplier does not have illegal records meeting preset conditions in a preset time range. The preset conditions correspond to the judgment basis of the major illegal records specified by the state.
In another example, according to the specific requirements of the bidding enterprise on the bidding enterprise, in addition to the first sub-rule and the second sub-rule, the qualification rules may also include the specific requirements of the bidding enterprise, such as the requirement of the supplier to have a specific qualification, the requirement of the size to reach a certain level, etc., which are not listed here.
In the embodiment of the present application, the obtained enterprise operation data corresponds to a preset qualification audit rule, which means that whether a supplier meets the qualification audit rule can be determined by using the enterprise operation data. For example, when the eligibility review rule includes a first sub-rule, the enterprise business data includes equity data, job data, and investment data; when the qualification rules include the second sub-rule, the enterprise operation data includes the supplier's illegal data within a preset time range (e.g., three years). In practical application, a web crawler technology can be adopted to obtain equity data, job data and investment data of an enterprise from the internet (such as a sky-eye searching network) and obtain illegal data from court open referee document data, full-scale worker data, trademark data and open litigation data on the internet.
In addition, the data collected by the web crawler can be extracted into a data warehouse through the ETL, the collected data is cleaned in the modes of conversion, mapping, filtering and the like, and enterprise operation data of each supplier is arranged and structured. For example, the enterprise business data after cleaning may form the following data structure: business name, business registration number, organization code, taxpayer identification number, legal person, equity structure, investment relationship, invested relationship, case time, court, case type, fine amount, whether it is responsible for a shut down, whether it is a revoked license, or a license.
In a specific example, a plurality of codes corresponding to one supplier may occur in the purchase bid information system, and a mapping strategy is required to be adopted to clean the codes uniformly. For example, company a coded XX and company a coded YY appear in the procurement tender information system. In another specific example, the data crawled from the internet may be duplicative, some of which may be due to naming conventions or misspellings, such as the full name and abbreviation of the supplier. At this time, data deduplication and filtering are required, and key information (such as a business registration number, an organization code, a taxpayer identification number, and the like) of the data needs to be analyzed through a data mining technology, so that the names can be converted or mapped to ensure that the names meet data quality requirements (such as full names of suppliers). The purpose of data cleansing is to ensure data consistency, and the principle is shown in fig. 2.
It should be noted that, in the specific implementation, a database may be constructed by obtaining various information (including enterprise operation information) of a large number of suppliers from the internet in advance, and then, in the application, the enterprise operation information of the suppliers is obtained from the constructed database according to the enterprise identification of the supplier actually participating in the bidding activity and the qualification auditing rule of the bidding, so as to analyze the bidding qualification. The specific construction process of the database and the data structure thereof are similar to those described above for the enterprise business data, and are not described herein again.
S103: and analyzing whether the supplier accords with the qualification auditing rule or not according to the obtained enterprise operation data.
In practical applications, an Open Database Connectivity (ODBC) may be used to connect the enterprise databases, and then the bidding quotations of each provider may be configured, queried and analyzed according to the required data (i.e., the qualification rules). In the following, it will be exemplified how to analyze whether the supplier meets the qualification rules or not according to the specific content of the qualification rules, and how to push the analysis result to the bidding enterprise, which is not described herein again.
ODBC, which is generated to solve data sharing between heterogeneous databases, has become a main part of The Windows Open System Architecture (WOSA) and a database access interface standard based on The Windows environment. The ODBC provides a uniform interface for accessing heterogeneous databases, allows an application program to access Data managed by different database Management systems (DBMS) by taking Structured Query Language (SQL) as a Data access standard; the application program is enabled to directly manipulate the data in the database, and changes along with changes of the database are avoided. ODBC can be used to access database files on a variety of computers, and even to access non-database objects such as Excel and ASCI I data files.
In the embodiment of the application, the enterprise operation data corresponding to the qualification audit rule is obtained according to the enterprise identification of each bidding supplier, and then whether each supplier accords with the qualification audit rule or not can be analyzed according to the obtained enterprise operation result of each supplier, so that the relation among the suppliers can be accurately obtained, whether the supplier has a major illegal record or not can be judged, the enterprise can be helped to identify risks in time, and illegal operations of bidders can be prevented in time.
The following illustrates how to analyze whether the supplier meets the qualification rules according to the specific content of the qualification rules.
In a first aspect, as shown in fig. 3, when the qualification rules include the first sub-rule, and the enterprise operation data includes equity data, job data, and investment data, step S103 may specifically include the following steps S301 to S303.
S301: and judging whether the same suppliers with the same responsible persons exist according to the job data of each supplier. If the same responsible person exists between two or more suppliers, the suppliers with the same responsible person do not accord with the qualification audit rule.
In an embodiment of the present application, the due job data may include identity information (e.g., one or more of name, identification number, passport number, etc.) of the principal of the key job within the supplier. The key positions may include legal persons, partners, joint creators, directors, supervisors, general managers, etc., and in practical applications, the level and range of the key position responsible persons included in the position data may be set according to specific needs, which are not listed one by one. When the responsible persons with the same identity information exist in the role data of the first supplier and the role data of the second supplier, the responsible persons of the same identity information exist in the plurality of suppliers (namely, the first supplier and the second supplier). The first and second providers are any two of a plurality of providers participating in a bidding activity.
S302: and judging whether the target person exists or not according to the stock right data and the job data. And if the target task exists, the suppliers to which the target task belongs do not accord with the qualification auditing rule.
In embodiments of the present application, the equity data may include identity information (e.g., one or more of a name, identification number, passport number, etc.) of a holder (e.g., an shareholder) in the supplier. When the same identity information is in the job data of the first supplier and in the job data or the stock right data of the second supplier, the target person (i.e. the person corresponding to the identity information) is considered to be present. That is, the target person is at work in a first supplier and is at stock or at work in a second supplier.
S303: and judging whether the investment and the invested relation exists between the suppliers or not according to the enterprise identification and the investment data of the suppliers. If yes, the plurality of suppliers with the investment and invested relation do not accord with qualification auditing rules.
In embodiments of the present application, the investment data may include an identification of the investment object and/or the sponsor of the supplier (e.g., one or more of a business name, a business registration number, an organization code, a taxpayer identification number, etc.). If the business identification of the first supplier is the same as the record in the investment data of the second supplier, an investment and invested relationship exists between the first supplier and the second supplier.
In the embodiment of the present application, the execution sequence of steps S301 to S303 is not limited, and may be executed serially in any order or in parallel.
In a second aspect, when the qualification rules include a second sub-rule, the enterprise operation data includes the supplier's illegal data within a preset time range (e.g., three years); when the illegal data is acquired, step S103 may specifically include:
and judging whether the acquired illegal data of the target supplier has illegal records meeting preset conditions. The target provider is any one of a plurality of providers participating in the bid. If yes, the target supplier does not conform to the qualification rules.
In the embodiment of the present application, the preset condition may be specifically set according to the provisions of the bidding enterprises and/or laws and regulations, and is used for determining whether the target provider has a violation record that does not meet the bidding requirement. In some possible implementations, the preset condition is used to determine whether the violation record belongs to a significant violation record specified by the regulation. The major illegal record refers to the administrative penalty of the supplier for criminal punishment or responsible for stopping production and business, suspending sales of licenses or licenses, large amount of fines and the like due to illegal operation.
The criminal penalty of the supplier for illegal operation refers to the criminal penalty of the supplier in the operation activity, such as adopting the means of false report or false qualification reporting to cheat the government to purchase and agree with the same action related to the operation activity, and also includes the criminal penalty of the illegal action in the operation activity unrelated to the government purchase, such as producing, selling fake commodity crimes, smuggling, destroying financial management order crimes, financial fraud crimes, damaging tax collection and management crimes, invading intellectual property crimes, disturbing market order and other various social connotation market economic order crimes. It should be noted that criminal punishment that the supplier is not subjected to by the illegal activities or the personal violation of the high-level manager of the supplier is not included, such as the bribribery of the high-level manager.
The provider is subjected to an administrative penalty, which refers to the situation that the provider is subjected to administrative penalties such as warnings, fines, illegal property or illegal property not collected, production halt in accountability, temporary discount or cancellation license or license. A "major record of violation" is only attributed to suppliers being committed to an administrative penalty in terms of shutting down production, suspending or suspending the sale of licenses or licenses, larger amounts of fines, etc.
In practical application, the court published judgment document and the administrative penalty information in a preset time range (such as 3 years) crawled from the internet can be used, the data meeting the major illegal recording conditions are judged by establishing a knowledge graph of the court judgment document and the administrative penalty, and then the data are checked according to the enterprise name of the supplier to judge whether the supplier participating in the bidding activity has the major illegal recording.
The above details how to analyze whether the suppliers participating in the bidding activity qualify for bidding according to the qualification rules. In practical application, the analysis result can be pushed to the bidding enterprise to help the bidding enterprise to identify risks in time.
Referring to fig. 4, a schematic flow chart of another enterprise bid qualification analysis method according to an embodiment of the present application is shown.
Specifically, in some possible implementation manners of the embodiment of the present application, after step S103, the method may further include:
s104: and pushing the bidding data of each supplier to the bidding enterprise.
In the embodiment of the application, the bidding data carries qualification analysis results and enterprise identifications of all suppliers, the analysis results of the suppliers can be pushed to a purchasing bidding information system, and the analysis results can also be informed to the bidding enterprises through other modes (such as mails, information and the like) so as to help the bidding enterprises to identify risks in time and prevent bidders from operating illegally.
In practical application, the bidding enterprise relationship and the major illegal records can be graphically displayed through the visual platform, the identification result can also be pushed to a purchasing bidding information system of an enterprise, and when a supplier enterprise bidding document is received or called, the relationship between bidders and the major illegal record confirmation result are prompted, so that the enterprise is helped to identify risks in time, and the condition that the bidders violate the laws is avoided.
In one example, a visualization chart may be used in conjunction with the configured presentation data presentation. In data configuration, the data association relationship is represented by a starting node and a terminating node. For example, the originating node may be a provider participating in a bidding activity and the terminating node may be a subsidiary of the provider, with the data being combined with the graphical presentation at the time of presentation based on this relationship, as shown in FIG. 5. When the bidding enterprise does not have bidding qualification, the bidding enterprise can be prompted by the warning symbols in the icons, and in some possible designs, in order to enable the bidding enterprise to better know the information of each supplier, the equity relationship diagram and/or the investment relationship diagram of each supplier can be constructed by the enterprise management data and pushed to the bidding enterprise.
In another example, the analysis result may be pushed to the bidding enterprise in a form of a graph, and when the bidding enterprise does not have the bidding qualification, the bidding enterprise may be prompted by using an alert field, for example, as shown in the following table, if the first supplier and the second supplier have the same legal person and do not meet the qualification audit rule, the bidding enterprise is prompted in the alert field. In some possible designs, a specific reason why the status information does not meet the qualification rules may also be displayed in the warning field, and the specific display manner is not limited in the embodiments of the present application.
Figure RE-GDA0001872767370000121
Based on the enterprise bidding qualification analysis method provided by the embodiment, the embodiment of the application further provides an enterprise bidding qualification analysis device.
Referring to fig. 6, the device of an enterprise bid qualification analysis device according to an embodiment of the present disclosure is schematically illustrated.
The enterprise bid qualification analysis device provided by the embodiment of the application comprises: a first acquisition unit 100, a second acquisition unit 200, and an eligibility analysis unit 300;
a first obtaining unit 100, configured to obtain enterprise identifications of multiple suppliers;
a second obtaining unit 200, configured to obtain enterprise operation data of each provider according to the enterprise identifier; the enterprise operation data corresponds to a preset qualification auditing rule;
and the qualification analysis unit 300 is used for analyzing whether the supplier meets qualification auditing rules or not according to the obtained enterprise operation data.
As an example, the qualification rules may specifically include: a first sub-rule and/or a second sub-rule;
the first sub-rule comprises: the responsible persons of any two suppliers are different, and no direct or indirect management relation or stock control relation exists;
the second sub-rule comprises: the supplier does not have illegal records meeting preset conditions in a preset time range.
In some possible implementations, as shown in fig. 7, when the eligibility review rule includes a first sub-rule, the enterprise business data includes equity data, job data, and investment data; the qualification analyzing unit 300 may specifically include: a first judgment subunit 301, a second judgment subunit 302, a third judgment subunit 303, and a first determination subunit 304;
a first determining subunit 301, configured to determine whether there are providers with the same principal according to the job data of each provider;
a second judging subunit 302, configured to judge whether a target person exists according to the stock right data and the job data; the target person is at the job site of the first supplier and the stock or job site of the second supplier;
a third determining subunit 303, configured to determine, according to the enterprise identifier and the investment data of each provider, whether an investment-to-be-invested relationship exists between the providers;
a first determining subunit 304, configured to determine that the suppliers with the same principal do not comply with the qualification audit rule when the determination result of the first determining subunit 301 is yes; the second judging subunit 302 is further configured to, when the judgment result is yes, determine that the provider to which the target person belongs does not conform to the qualification audit rule; and is further configured to determine that none of the multiple suppliers with the investment and invested relationship meets the qualification audit rule when the judgment result of the third judging subunit 303 is yes.
With continued reference to fig. 7, in some possible implementations, when the eligibility-review rule includes the second sub-rule, the enterprise operation data includes violation data of the supplier within a preset time range; the qualification analyzing unit 300 may specifically include: a fourth judgment subunit 305 and a second determination subunit 306;
a fourth determining subunit 305, configured to determine whether there is an illegal record meeting the preset conditions in the obtained illegal data when the second obtaining unit 200 obtains the illegal data of the target provider within the preset time range. The target provider is any one of a plurality of providers participating in the bid.
A second determining subunit 306, configured to determine that the target provider does not comply with the qualification rules when the fourth determining subunit 305 determines that there is a violation record that complies with the preset condition.
In some possible implementation manners of the embodiment of the present application, the apparatus may further include: a first pushing unit (not shown in the figure);
and the first pushing unit is used for constructing a stock right relation diagram and/or an investment relation diagram of each supplier by utilizing the enterprise operation data and pushing the stock right relation diagram and/or the investment relation diagram to the bidding enterprise.
In some possible implementation manners of the embodiment of the present application, the apparatus may further include: a second pushing unit (not shown in the figure);
the second pushing unit is used for pushing the bidding data of each supplier to the bidding enterprise; the bidding data carries the qualification analysis result and the enterprise identification of the supplier.
In the embodiment of the application, enterprise operation data corresponding to the qualification audit rule is obtained from the internet according to the enterprise identification of each bidding supplier, and then whether each supplier accords with the qualification audit rule or not can be analyzed according to the obtained enterprise operation result of each supplier, so that the relation among the suppliers can be accurately obtained, whether the supplier has a major illegal record or not can be judged, the bidding enterprise can be helped to identify risks in time, and illegal operations of bidders can be prevented in time.
The enterprise bid qualification analysis device comprises a processor and a memory, wherein the first acquisition unit, the second acquisition unit, the qualification analysis unit and the like are stored in the memory as program units, and the program units stored in the memory are executed by the processor to realize corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more than one, and whether each supplier accords with the qualification audit rule is analyzed by adjusting the kernel parameters, so that the tendering enterprise is helped to identify risks in time, and the bidders are prevented from illegal and illegal operations in time.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
The embodiment of the application provides a storage medium, wherein a program is stored on the storage medium, and the program can realize any one of the enterprise bid qualification analysis methods provided by the embodiment when being executed by a processor.
The embodiment of the present application provides a processor, which is configured to execute a program, where the program executes any one of the enterprise bid qualification analysis methods provided in the foregoing embodiments.
The embodiment of the application provides equipment, the equipment comprises a processor, a memory and a program which is stored on the memory and can run on the processor, and the following steps are realized when the processor executes the program:
acquiring enterprise identifications of a plurality of suppliers;
obtaining enterprise operation data of each supplier according to the enterprise identification; the enterprise operation data corresponds to a preset qualification auditing rule;
and analyzing whether the supplier accords with the qualification auditing rule or not according to the obtained enterprise operation data.
Optionally, the qualification audit rule includes: a first sub-rule and/or a second sub-rule;
the first sub-rule comprises: the responsible persons of any two suppliers are different, and no direct or indirect management relation or stock control relation exists;
the second sub-rule comprises: and the supplier does not have illegal records meeting preset conditions in a preset time range.
Optionally, when the qualification rules include the first sub-rule, the enterprise operation data includes equity data, job data and investment data; analyzing whether the supplier accords with the qualification auditing rule or not according to the obtained enterprise operation data specifically comprises:
judging whether the same suppliers with the same responsible persons exist according to the job data of each supplier; if yes, the suppliers with the same responsible person do not accord with the qualification auditing rule;
judging whether a target figure exists or not according to the stock right data and the job data; the target person is at the job function of a first supplier and is at the stock or job function of a second supplier; if yes, the supplier to which the target character belongs does not conform to the qualification auditing rule;
judging whether the investment and invested relation exists between the suppliers according to the enterprise identification and the investment data of each supplier; if yes, the plurality of suppliers with the investment and invested relation do not accord with the qualification auditing rule.
Optionally, the method further includes:
and constructing a stock right relation diagram and/or an investment relation diagram of each supplier by using the enterprise operation data, and pushing the stock right relation diagram and/or the investment relation diagram to the bidding enterprise.
Optionally, when the qualification rules include the second sub-rule, the enterprise operation data includes illegal data of the suppliers in the preset time range; when the illegal data are acquired, analyzing whether the supplier accords with the qualification audit rule according to the acquired enterprise operation data, specifically comprising:
judging whether the acquired illegal data of the target provider has illegal records meeting the preset conditions or not; the target supplier is any one of the plurality of suppliers;
and when the obtained illegal data of the target provider has an illegal record meeting the preset conditions, the target provider does not meet the qualification auditing rule.
Optionally, the method further includes:
pushing the bidding data of each supplier to a bidding enterprise; the bidding data carries the qualification analysis result and the enterprise identification of the supplier.
The device herein may be a server, a PC, a PAD, a mobile phone, etc.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a data processing device:
acquiring enterprise identifications of a plurality of suppliers;
obtaining enterprise operation data of each supplier according to the enterprise identification; the enterprise operation data corresponds to a preset qualification auditing rule;
and analyzing whether the supplier accords with the qualification auditing rule or not according to the obtained enterprise operation data.
Optionally, the qualification audit rule includes: a first sub-rule and/or a second sub-rule;
the first sub-rule comprises: the responsible persons of any two suppliers are different, and no direct or indirect management relation or stock control relation exists;
the second sub-rule comprises: and the supplier does not have illegal records meeting preset conditions in a preset time range.
Optionally, when the qualification rules include the first sub-rule, the enterprise operation data includes equity data, job data and investment data; analyzing whether the supplier accords with the qualification auditing rule or not according to the obtained enterprise operation data specifically comprises:
judging whether the same suppliers with the same responsible persons exist according to the job data of each supplier; if yes, the suppliers with the same responsible person do not accord with the qualification auditing rule;
judging whether a target figure exists or not according to the stock right data and the job data; the target person is at the job function of a first supplier and is at the stock or job function of a second supplier; if yes, the supplier to which the target character belongs does not conform to the qualification auditing rule;
judging whether the investment and invested relation exists between the suppliers according to the enterprise identification and the investment data of each supplier; if yes, the plurality of suppliers with the investment and invested relation do not accord with the qualification auditing rule.
Optionally, the method further includes:
and constructing a stock right relation diagram and/or an investment relation diagram of each supplier by using the enterprise operation data, and pushing the stock right relation diagram and/or the investment relation diagram to the bidding enterprise.
Optionally, when the qualification rules include the second sub-rule, the enterprise operation data includes illegal data of the suppliers in the preset time range; when the illegal data are acquired, analyzing whether the supplier accords with the qualification audit rule according to the acquired enterprise operation data, specifically comprising:
judging whether the acquired illegal data of the target provider has illegal records meeting the preset conditions or not; the target supplier is any one of the plurality of suppliers;
and when the obtained illegal data of the target provider has an illegal record meeting the preset conditions, the target provider does not meet the qualification auditing rule.
Optionally, the method further includes:
pushing the bidding data of each supplier to a bidding enterprise; the bidding data carries the qualification analysis result and the enterprise identification of the supplier.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. Information may be computer readable instructions, data structures, units of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method for analyzing bid qualification of an enterprise, the method comprising:
acquiring enterprise identifications of a plurality of suppliers;
obtaining enterprise operation data of each supplier according to the enterprise identification; the enterprise operation data corresponds to a preset qualification auditing rule;
and analyzing whether the supplier accords with the qualification auditing rule or not according to the obtained enterprise operation data.
2. The method of claim 1, wherein the qualification rules comprise: a first sub-rule and/or a second sub-rule;
the first sub-rule comprises: the responsible persons of any two suppliers are different, and no direct or indirect management relation or stock control relation exists;
the second sub-rule comprises: and the supplier does not have illegal records meeting preset conditions in a preset time range.
3. The method of claim 2, wherein when the qualification rules include the first sub-rule, the business operations data includes equity data, job data, and investment data; analyzing whether the supplier accords with the qualification auditing rule or not according to the obtained enterprise operation data specifically comprises:
judging whether the same suppliers with the same responsible persons exist according to the job data of each supplier; if yes, the suppliers with the same responsible person do not accord with the qualification auditing rule;
judging whether a target figure exists or not according to the stock right data and the job data; the target person is at the job function of a first supplier and is at the stock or job function of a second supplier; if yes, the supplier to which the target character belongs does not conform to the qualification auditing rule;
judging whether the investment and invested relation exists between the suppliers according to the enterprise identification and the investment data of each supplier; if yes, the plurality of suppliers with the investment and invested relation do not accord with the qualification auditing rule.
4. The method of claim 3, further comprising:
and constructing a stock right relation diagram and/or an investment relation diagram of each supplier by using the enterprise operation data, and pushing the stock right relation diagram and/or the investment relation diagram to the bidding enterprise.
5. The method according to any one of claims 2-4, wherein when the qualification rules include the second sub-rule, the enterprise business data includes supplier violation data for the preset time frame; when the illegal data are acquired, analyzing whether the supplier accords with the qualification audit rule according to the acquired enterprise operation data, specifically comprising:
judging whether the acquired illegal data of the target provider has illegal records meeting the preset conditions or not; the target supplier is any one of the plurality of suppliers;
and when the obtained illegal data of the target provider has an illegal record meeting the preset conditions, the target provider does not meet the qualification auditing rule.
6. The method of any one of claims 1-4, further comprising:
pushing the bidding data of each supplier to a bidding enterprise; the bidding data carries the qualification analysis result and the enterprise identification of the supplier.
7. An enterprise bid qualification analysis apparatus, the apparatus comprising: a first acquisition unit, a second acquisition unit and an eligibility analysis unit;
the first acquisition unit is used for acquiring enterprise identifications of a plurality of suppliers;
the second obtaining unit is used for obtaining enterprise operation data of each supplier according to the enterprise identification; the enterprise operation data corresponds to a preset qualification auditing rule;
and the qualification analysis unit is used for analyzing whether the supplier accords with the qualification auditing rule or not according to the obtained enterprise operation data.
8. The apparatus of claim 7, wherein the qualification rules comprise: a first sub-rule and/or a second sub-rule;
the first sub-rule comprises: the responsible persons of any two suppliers are different, and no direct or indirect management relation or stock control relation exists;
the second sub-rule comprises: and the supplier does not have illegal records meeting preset conditions in a preset time range.
9. A storage medium having stored thereon a program which, when executed by a processor, implements the enterprise bid qualification analysis method of any of claims 1-6.
10. A processor, configured to execute a program, wherein the program when executed performs the enterprise bid qualification analysis method of any of claims 1-6.
CN201811162608.9A 2018-09-30 2018-09-30 Enterprise bidding qualification analysis method and device Pending CN110969444A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811162608.9A CN110969444A (en) 2018-09-30 2018-09-30 Enterprise bidding qualification analysis method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811162608.9A CN110969444A (en) 2018-09-30 2018-09-30 Enterprise bidding qualification analysis method and device

Publications (1)

Publication Number Publication Date
CN110969444A true CN110969444A (en) 2020-04-07

Family

ID=70029411

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811162608.9A Pending CN110969444A (en) 2018-09-30 2018-09-30 Enterprise bidding qualification analysis method and device

Country Status (1)

Country Link
CN (1) CN110969444A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112487209A (en) * 2020-12-15 2021-03-12 厦门市美亚柏科信息股份有限公司 String mark behavior analysis method based on knowledge graph, terminal equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020156857A1 (en) * 2001-04-20 2002-10-24 Provere, Inc. Method and system for posting requests for bids for professional services
CN106355471A (en) * 2016-08-31 2017-01-25 天津京东智联科技发展有限公司 Bidding data processing method and system
CN106570159A (en) * 2016-11-07 2017-04-19 国家电网公司 Supplier bidding document qualification information verification system and method
CN107239891A (en) * 2017-05-26 2017-10-10 山东省科学院情报研究所 A kind of bid checking method based on big data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020156857A1 (en) * 2001-04-20 2002-10-24 Provere, Inc. Method and system for posting requests for bids for professional services
CN106355471A (en) * 2016-08-31 2017-01-25 天津京东智联科技发展有限公司 Bidding data processing method and system
CN106570159A (en) * 2016-11-07 2017-04-19 国家电网公司 Supplier bidding document qualification information verification system and method
CN107239891A (en) * 2017-05-26 2017-10-10 山东省科学院情报研究所 A kind of bid checking method based on big data

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112487209A (en) * 2020-12-15 2021-03-12 厦门市美亚柏科信息股份有限公司 String mark behavior analysis method based on knowledge graph, terminal equipment and storage medium

Similar Documents

Publication Publication Date Title
Darabseh et al. Risks and opportunities for reforming construction with blockchain: Bibliometric study
Bahrami et al. Innovation in market management by utilizing business intelligence: introducing proposed framework
US20080208661A1 (en) Method and system of using anrtifacts to identify elements of a component business model
Al Naimi et al. A systematic mapping review exploring 10 years of research on supply chain resilience and reconfiguration
CA2779034A1 (en) High-risk procurement analytics and scoring system
Górecki Big data as a project risk management tool
Felicetti et al. Total quality management and corporate social responsibility: a systematic review of the literature and implications of the COVID-19 pandemics
Patterson et al. The use of information technology in risk management
Schwinn et al. Design patterns for data integration
Klimova Digital technology in risk-based approach of continuous audit
CN110969444A (en) Enterprise bidding qualification analysis method and device
Trofimov et al. Optimal database design for the storage of financial information relating to real estate investments
Görener Risk based internal audit
Turluev et al. Artificial Intelligence in Corporate Governance Systems
US20140149186A1 (en) Method and system of using artifacts to identify elements of a component business model
Nugroho et al. Recommendations for improving data management process in government of bandung regency using COBIT 4.1 framework
CN114757546A (en) Risk early warning method, device, equipment and medium
Fleckenstein et al. Implementing a data strategy
Maji et al. IC disclosure practices in India using a comprehensive disclosure framework: A study of knowledge-based companies
Sadyrin et al. Prospects for using big data in financial analysis
CN107688902B (en) High and new technology entrepreneurship model analysis and evaluation method
Fleig et al. KeyPro-A decision support system for discovering important business processes in information systems
Isikdag et al. Data integration capability evaluation of ERP systems: A construction industry perspective
Ryan et al. A Statistical Business Register spine as a new approach to support data integration and firm-level data linking: An ABS perspective
Shelest et al. Olap Systems As The Modern Data Preparation Tools For Outdoor Advertising Data Mining

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200407