CN113592298A - Enterprise tax risk assessment method - Google Patents
Enterprise tax risk assessment method Download PDFInfo
- Publication number
- CN113592298A CN113592298A CN202110869404.4A CN202110869404A CN113592298A CN 113592298 A CN113592298 A CN 113592298A CN 202110869404 A CN202110869404 A CN 202110869404A CN 113592298 A CN113592298 A CN 113592298A
- Authority
- CN
- China
- Prior art keywords
- enterprise
- authorized
- service
- server
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000012502 risk assessment Methods 0.000 title claims abstract description 12
- 238000013475 authorization Methods 0.000 claims description 21
- 238000012544 monitoring process Methods 0.000 claims description 12
- 230000002159 abnormal effect Effects 0.000 claims description 6
- 241000406668 Loxodonta cyclotis Species 0.000 claims description 3
- 238000007689 inspection Methods 0.000 claims description 3
- 238000013507 mapping Methods 0.000 claims description 3
- 238000011156 evaluation Methods 0.000 description 3
- 230000008520 organization Effects 0.000 description 3
- 206010010071 Coma Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000007635 classification algorithm Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Human Resources & Organizations (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Economics (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- General Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- General Business, Economics & Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Primary Health Care (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Game Theory and Decision Science (AREA)
- Computing Systems (AREA)
- Bioethics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
An enterprise tax risk assessment method comprises the following steps: s1: the server verifies the industrial and commercial system according to the received contract, inquires whether the corresponding service enterprise in the contract is legal, and if so, enters the next step; s2: the server creates a corresponding service account according to the contract and automatically generates a service account and a default password; s3: the server automatically sends the service account and the default password to a client of a service enterprise; s4: the server verifies the industrial and commercial system according to the received contract, inquires whether the corresponding authorized enterprise in the contract is legal, and if so, enters the next step; through the working process adopted by the invention, the pain point of credit rating of enterprise level in the existing industry can be effectively solved, and the financial health and the enterprise operation condition of the target enterprise can be known in detail in real time.
Description
Technical Field
The invention relates to the field of enterprise information, in particular to an enterprise tax risk assessment method.
Background
Credit rating, also known as credit worthiness rating or reputation assessment, is an important content and basis for establishing a social credit system. According to the general definition, the credit rating is an economic activity which is expressed by the credit rating service organization, based on the objective and fair position of a third party, according to a standard evaluation index system, applies a scientific evaluation method to perform a strict evaluation procedure, comprehensively understands, investigates and analyzes credit records, enterprise quality, management capacity, operation level, external environment, financial condition, development prospect and the like of market participating subjects such as enterprises, financial institutions, bond issuers and social organizations, comprehensively evaluates the ability of fulfilling commitment and various possible risks in the future after investigation and research, and expresses the superiority and inferiority of the credit rating service organization by a certain symbol and publishes the credit rating service organization to the public in society.
The credit rating industry is a special intermediary service in a financial system, the credit rating is to guide financial capital investment and economic decision by evaluating debt repayment risks of enterprises and governments, and the credit rating is directly related to the pricing right of financial products and influences the formation of the national credit market interest rate and exchange rate and is closely related to the national financial ownership and economic safety. Therefore, in a sense, the credit rating is an important force for maintaining the national financial ownership, represents the national status of a country in the international financial service system, and is an important business related to the security of the national financial strategy.
However, the existing credit rating working system needs more multidimensional characteristic attributes to be processed, which causes the problems of large task amount, complex implementation of classification algorithm, strong dependence, inflexibility, incapability of tracking and positioning and the like, and is not suitable for credit rating application with high real-time requirement.
Disclosure of Invention
The invention provides an enterprise tax risk assessment method aiming at the defects of the prior art, and the specific technical scheme is as follows:
an enterprise tax risk assessment method is characterized in that: the method comprises the following steps:
s1: the server verifies the industrial and commercial system according to the received contract, inquires whether the corresponding service enterprise in the contract is legal, and if so, enters the next step;
s2: the server creates a corresponding service account according to the contract and automatically generates a service account and a default password;
s3: the server automatically sends the service account and the default password to a client of a service enterprise;
s4: the server verifies the industrial and commercial system according to the received contract, inquires whether the corresponding authorized enterprise in the contract is legal, and if so, enters the next step;
s5: the server creates a corresponding authorized account according to the contract and automatically generates an authorized account and a default password;
s6: the server automatically sends the authorization account and the default password to a client of an authorization enterprise;
s7: the service enterprise sends a list matched with the invitation relation of the enterprise needing authorization to a server;
s8: the server checks the list after receiving the invitation list, and if the authorized enterprises of the list are in the database of the server, the server makes invitation synchronization to the invited authorized enterprises;
s9: the method comprises the following steps that working personnel download service contracts from a client of a service enterprise in a unified mode and perform offline signing;
s10: the authorized enterprise client maintains simultaneous monitoring of the tax system and the business system.
In order to better implement the present invention, the monitoring process of the authorized enterprise client includes the following steps:
s10-1: if the authorization enterprise client side and the service enterprise client side keep the authorization relationship, entering the next step;
s10-2: authorizing the enterprise client to synchronously start monitoring, and mapping a monitoring state by the service enterprise client;
s10-3: the authorized enterprise inquires the ticket pool data through an interface command of the tax system in the next month;
s10-4: the tax system generates a tax report and returns the tax report to the authorization enterprise;
s10-5: the authorized enterprise inquires the operation information through an interface command of the industrial and commercial system;
s10-6: the business system generates an operation report and returns the operation report to the authorized enterprise;
s10-7: the authorized enterprise sends the report to the service enterprise, and the service enterprise synchronizes the information to the server after receiving the report.
Further: comprises the following steps of 11:
s11-1: the tax system generates monthly reports of the data periodically and sends the monthly reports to the client of the authorized enterprise;
s11-2: the authorized enterprise sends the monthly report to the client of the service enterprise;
s11-3: a client of a service enterprise performs data synchronization to a server;
s11-4: the industrial and commercial system monitors the data of the authorized enterprises in real time, and if the data of the authorized enterprises are abnormal, the next step is carried out;
s11-5: and the industrial and commercial system synchronizes the abnormal data to the authorization enterprise client, the service enterprise client and the server respectively.
Further: the tax system adopts a data interface command provided by elephant and comet cloud.
Further: the industrial and commercial system adopts a data interface command provided by a sky-eye inspection.
The invention has the beneficial effects that: through the working process adopted by the invention, the module provided by the invention is in data intercommunication with the tax system and the industrial and commercial system of a third party, so that the pain of credit rating of enterprise level in the existing industry can be effectively solved, and the financial health and the enterprise operation condition of a target enterprise can be known in detail in real time.
Drawings
FIG. 1 is a flow chart of the operation of the present invention;
FIG. 2 is a monitoring flow chart;
fig. 3 is a flowchart of the operation of step 11.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1 to 3:
an enterprise tax risk assessment method is characterized in that: the method comprises the following steps:
s1: the server verifies the industrial and commercial system according to the received contract, inquires whether the corresponding service enterprise in the contract is legal, and if so, enters the next step;
s2: the server creates a corresponding service account according to the contract and automatically generates a service account and a default password;
s3: the server automatically sends the service account and the default password to a client of a service enterprise;
s4: the server verifies the industrial and commercial system according to the received contract, inquires whether the corresponding authorized enterprise in the contract is legal, and if so, enters the next step;
s5: the server creates a corresponding authorized account according to the contract and automatically generates an authorized account and a default password;
s6: the server automatically sends the authorization account and the default password to a client of an authorization enterprise;
s7: the service enterprise sends a list matched with the invitation relation of the enterprise needing authorization to a server;
s8: the server checks the list after receiving the invitation list, and if the authorized enterprises of the list are in the database of the server, the server makes invitation synchronization to the invited authorized enterprises;
s9: the method comprises the following steps that working personnel download service contracts from a client of a service enterprise in a unified mode and perform offline signing;
s10: the authorized enterprise client maintains simultaneous monitoring of the tax system and the business system. In this embodiment, the tax system uses a data interface command provided by elephant, coma and cloud. The industrial and commercial system adopts a data interface command provided by a sky-eye inspection.
The specific flow of S10 is as follows:
s10-1: if the authorization enterprise client side and the service enterprise client side keep the authorization relationship, entering the next step;
s10-2: authorizing the enterprise client to synchronously start monitoring, and mapping a monitoring state by the service enterprise client;
s10-3: the authorized enterprise inquires the ticket pool data through an interface command of the tax system in the next month;
s10-4: the tax system generates a tax report and returns the tax report to the authorization enterprise;
s10-5: the authorized enterprise inquires the operation information through an interface command of the industrial and commercial system;
s10-6: the business system generates an operation report and returns the operation report to the authorized enterprise;
s10-7: the authorized enterprise sends the report to the service enterprise, and the service enterprise synchronizes the information to the server after receiving the report.
The method further comprises a step 11, wherein the step 11 specifically comprises the following steps:
s11-1: the tax system generates monthly reports of the data periodically and sends the monthly reports to the client of the authorized enterprise;
s11-2: the authorized enterprise sends the monthly report to the client of the service enterprise;
s11-3: a client of a service enterprise performs data synchronization to a server;
s11-4: the industrial and commercial system monitors the data of the authorized enterprises in real time, and if the data of the authorized enterprises are abnormal, the next step is carried out;
s11-5: and the industrial and commercial system synchronizes the abnormal data to the authorization enterprise client, the service enterprise client and the server respectively.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.
Claims (5)
1. An enterprise tax risk assessment method is characterized in that: the method comprises the following steps:
s1: the server verifies the industrial and commercial system according to the received contract, inquires whether the corresponding service enterprise in the contract is legal, and if so, enters the next step;
s2: the server creates a corresponding service account according to the contract and automatically generates a service account and a default password;
s3: the server automatically sends the service account and the default password to a client of a service enterprise;
s4: the server verifies the industrial and commercial system according to the received contract, inquires whether the corresponding authorized enterprise in the contract is legal, and if so, enters the next step;
s5: the server creates a corresponding authorized account according to the contract and automatically generates an authorized account and a default password;
s6: the server automatically sends the authorization account and the default password to a client of an authorization enterprise;
s7: the service enterprise sends a list matched with the invitation relation of the enterprise needing authorization to a server;
s8: the server checks the list after receiving the invitation list, and if the authorized enterprises of the list are in the database of the server, the server makes invitation synchronization to the invited authorized enterprises;
s9: the method comprises the following steps that working personnel download service contracts from a client of a service enterprise in a unified mode and perform offline signing;
s10: the authorized enterprise client maintains simultaneous monitoring of the tax system and the business system.
2. The enterprise tax risk assessment method according to claim 1, wherein: the monitoring process of the authorized enterprise client comprises the following steps:
s10-1: if the authorization enterprise client side and the service enterprise client side keep the authorization relationship, entering the next step;
s10-2: authorizing the enterprise client to synchronously start monitoring, and mapping a monitoring state by the service enterprise client;
s10-3: the authorized enterprise inquires the ticket pool data through an interface command of the tax system in the next month;
s10-4: the tax system generates a tax report and returns the tax report to the authorization enterprise;
s10-5: the authorized enterprise inquires the operation information through an interface command of the industrial and commercial system;
s10-6: the business system generates an operation report and returns the operation report to the authorized enterprise;
s10-7: the authorized enterprise sends the report to the service enterprise, and the service enterprise synchronizes the information to the server after receiving the report.
3. The enterprise tax risk assessment method according to claim 1, wherein: comprises the following steps of 11:
s11-1: the tax system generates monthly reports of the data periodically and sends the monthly reports to the client of the authorized enterprise;
s11-2: the authorized enterprise sends the monthly report to the client of the service enterprise;
s11-3: a client of a service enterprise performs data synchronization to a server;
s11-4: the industrial and commercial system monitors the data of the authorized enterprises in real time, and if the data of the authorized enterprises are abnormal, the next step is carried out;
s11-5: and the industrial and commercial system synchronizes the abnormal data to the authorization enterprise client, the service enterprise client and the server respectively.
4. The enterprise tax risk assessment method according to claim 3, wherein: the tax system adopts a data interface command provided by elephant and comet cloud.
5. The enterprise tax risk assessment method according to claim 4, wherein: the industrial and commercial system adopts a data interface command provided by a sky-eye inspection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110869404.4A CN113592298A (en) | 2021-07-30 | 2021-07-30 | Enterprise tax risk assessment method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110869404.4A CN113592298A (en) | 2021-07-30 | 2021-07-30 | Enterprise tax risk assessment method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113592298A true CN113592298A (en) | 2021-11-02 |
Family
ID=78252375
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110869404.4A Pending CN113592298A (en) | 2021-07-30 | 2021-07-30 | Enterprise tax risk assessment method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113592298A (en) |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20070080093A (en) * | 2006-02-06 | 2007-08-09 | 주식회사 이상네트웍스 | Method for providing credit evaluation service of e-market place trading company and system thereof |
CN101272281A (en) * | 2008-04-22 | 2008-09-24 | 北京邮电大学 | System and method for providing network service relating to four parties |
CN101667266A (en) * | 2008-09-03 | 2010-03-10 | 山东征信信用管理咨询有限公司 | Credit rating management consultation system |
CN104618407A (en) * | 2013-11-04 | 2015-05-13 | 航天信息股份有限公司 | Method and system for the tax department to monitor operation of enterprises |
CN104992264A (en) * | 2015-06-01 | 2015-10-21 | 康玉龙 | Enterprise operation condition real time monitoring system |
CN106412026A (en) * | 2016-09-09 | 2017-02-15 | 上海润吧信息技术有限公司 | Public network service system based on enterprise service outsourcing |
CN106709797A (en) * | 2017-01-03 | 2017-05-24 | 山东浪潮商用系统有限公司 | Tax-related information interaction platform |
CN106934732A (en) * | 2017-02-13 | 2017-07-07 | 北京优炫软件股份有限公司 | A kind of science service provides method |
CN108876291A (en) * | 2018-05-25 | 2018-11-23 | 江苏财税通信息科技有限公司 | A kind of enterprise operation data collection system, method and cloud server |
CN109345372A (en) * | 2018-09-06 | 2019-02-15 | 江西汉辰金融科技集团有限公司 | Credit-graded approach, system and computer readable storage medium |
CN109785097A (en) * | 2018-12-24 | 2019-05-21 | 航天信息股份有限公司 | So that value-added tax system is generated authority by registering automatically and obtain the method and system of authority |
CN111047432A (en) * | 2019-12-11 | 2020-04-21 | 中国铁路网络有限公司 | Method and device for realizing loan of small and micro enterprises |
CN112581253A (en) * | 2020-12-08 | 2021-03-30 | 爱信诺征信有限公司 | Method for determining credit limit and secure multiparty computing system |
CN112862338A (en) * | 2021-02-24 | 2021-05-28 | 深圳微众信用科技股份有限公司 | Enterprise credit report acquisition method and related equipment |
-
2021
- 2021-07-30 CN CN202110869404.4A patent/CN113592298A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20070080093A (en) * | 2006-02-06 | 2007-08-09 | 주식회사 이상네트웍스 | Method for providing credit evaluation service of e-market place trading company and system thereof |
CN101272281A (en) * | 2008-04-22 | 2008-09-24 | 北京邮电大学 | System and method for providing network service relating to four parties |
CN101667266A (en) * | 2008-09-03 | 2010-03-10 | 山东征信信用管理咨询有限公司 | Credit rating management consultation system |
CN104618407A (en) * | 2013-11-04 | 2015-05-13 | 航天信息股份有限公司 | Method and system for the tax department to monitor operation of enterprises |
CN104992264A (en) * | 2015-06-01 | 2015-10-21 | 康玉龙 | Enterprise operation condition real time monitoring system |
CN106412026A (en) * | 2016-09-09 | 2017-02-15 | 上海润吧信息技术有限公司 | Public network service system based on enterprise service outsourcing |
CN106709797A (en) * | 2017-01-03 | 2017-05-24 | 山东浪潮商用系统有限公司 | Tax-related information interaction platform |
CN106934732A (en) * | 2017-02-13 | 2017-07-07 | 北京优炫软件股份有限公司 | A kind of science service provides method |
CN108876291A (en) * | 2018-05-25 | 2018-11-23 | 江苏财税通信息科技有限公司 | A kind of enterprise operation data collection system, method and cloud server |
CN109345372A (en) * | 2018-09-06 | 2019-02-15 | 江西汉辰金融科技集团有限公司 | Credit-graded approach, system and computer readable storage medium |
CN109785097A (en) * | 2018-12-24 | 2019-05-21 | 航天信息股份有限公司 | So that value-added tax system is generated authority by registering automatically and obtain the method and system of authority |
CN111047432A (en) * | 2019-12-11 | 2020-04-21 | 中国铁路网络有限公司 | Method and device for realizing loan of small and micro enterprises |
CN112581253A (en) * | 2020-12-08 | 2021-03-30 | 爱信诺征信有限公司 | Method for determining credit limit and secure multiparty computing system |
CN112862338A (en) * | 2021-02-24 | 2021-05-28 | 深圳微众信用科技股份有限公司 | Enterprise credit report acquisition method and related equipment |
Non-Patent Citations (2)
Title |
---|
徐祺;崔久强;: "企业网络信用服务系统研究与应用", 电子商务, no. 06 * |
陈庭兰;汪永超;: "中小制造企业项目式融资信用评估原理与系统研究", 机械, no. 10 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
VenkateswaraRao et al. | Credit Investigation and Comprehensive Risk Management System based Big Data Analytics in Commercial Banking | |
Brennan et al. | High-frequency measures of informed trading and corporate announcements | |
Kuhn et al. | Learning from WorldCom: Implications for fraud detection through continuous assurance | |
Ettredge et al. | Fair value measurements and audit fees: Evidence from the banking industry | |
Petkov | Artificial intelligence (AI) and the accounting function—A revisit and a new perspective for developing framework | |
US20110288996A1 (en) | Automatically Decisioning Transaction Requests | |
US20130346328A1 (en) | Method and system for assessing compliance risk of regulated institutions | |
Greineder et al. | The generic InsurTech ecosystem and its strategic implications for the digital transformation of the insurance industry | |
CN112330439A (en) | Financial risk identification device and method based on five-stream-in-one business data | |
CN113689289A (en) | Method and equipment based on bank risk control | |
Aljaaidi et al. | The impact of artificial intelligence applications on the performance of accountants and audit firms in Saudi Arabia | |
CN110288038A (en) | A kind of classification method and device of enterprise | |
Mouatassim et al. | Proposal for an implementation methodology of key risk indicators system: Case of investment management process in Moroccan asset management company | |
CN113592298A (en) | Enterprise tax risk assessment method | |
US20120123807A1 (en) | Systems, methods, and apparatus for enterprise billing and accounts receivable | |
Md Noor et al. | Earnings management and deferred tax | |
KR101666824B1 (en) | Chain bankruptcy risk management system and bankruptcy risk management method using the same | |
Yan | Research on financial field integrating artificial intelligence: Application basis, case analysis, and SVR model-based overnight | |
CN115496370A (en) | Warranty service management system and management method | |
Ceske et al. | Quantifying event risk: the next convergence | |
Bruno et al. | On the possible tools for the prevention of non-performing loans. A case study of an Italian bank | |
CN115601124A (en) | Post-loan judicial management system based on block chain | |
Muntermann | Event-driven mobile financial information services: Design of an intraday decision support system | |
Berdiyor | Issues of organizing audit of quality costs | |
Singh et al. | Application of Internet of Things and Machine Learning in Improving Supply Chain Financial Risk Management System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |