CN113724094A - Risk information checking method, device, equipment and medium - Google Patents

Risk information checking method, device, equipment and medium Download PDF

Info

Publication number
CN113724094A
CN113724094A CN202111012501.8A CN202111012501A CN113724094A CN 113724094 A CN113724094 A CN 113724094A CN 202111012501 A CN202111012501 A CN 202111012501A CN 113724094 A CN113724094 A CN 113724094A
Authority
CN
China
Prior art keywords
information
data
verified
common management
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111012501.8A
Other languages
Chinese (zh)
Inventor
杨刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Pension Insurance Corp
Original Assignee
Ping An Pension Insurance Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Pension Insurance Corp filed Critical Ping An Pension Insurance Corp
Priority to CN202111012501.8A priority Critical patent/CN113724094A/en
Publication of CN113724094A publication Critical patent/CN113724094A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Mathematical Physics (AREA)
  • Biophysics (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Molecular Biology (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

The invention discloses a method, a device, equipment and a medium for checking risk information, wherein the method comprises the following steps: screening initial screening information meeting the screening rules from the information to be checked according to the screening rules, judging whether the data to be checked in the initial screening information meet the common management conditions or not, if so, generating common management prompt information and sending the common management prompt information to a corresponding second terminal, and performing risk check on the common management check information fed back by the second terminal and the corresponding data to be checked according to a risk check model to obtain a common management check result of whether risks exist or not. The invention belongs to the technical field of detection models, and by the method, the common management verification information fed back by the second terminal can be combined with the data to be verified to perform comprehensive risk verification, and the accurate risk verification can be performed on the data to be verified based on the common management risk verification, so that the accuracy of the risk verification on the data to be verified is improved.

Description

Risk information checking method, device, equipment and medium
Technical Field
The invention relates to the technical field of artificial intelligence, belongs to an application scene of intelligent risk verification in a smart city, and particularly relates to a risk information verification method, a risk information verification device, risk information verification equipment and a risk information verification medium.
Background
With the health of insurance systems and the promotion of insurance awareness of people, more and more people choose to buy insurance to guarantee the rights and interests, for example, people can buy medical insurance and settle the claims through the medical insurance to reimburse medical expenses. In order to improve the risk resistance of insurance, risk identification needs to be performed on the information related to the insurance applicant, for example, medical information of a user is generally acquired for identification when medical expense reimbursement is performed, whether the medical information of the user meets claim settlement conditions is judged, and a claim is settled if the medical information meets the claim settlement conditions. However, in the above process, only the internal system is used to identify and verify the relevant information of the user, the obtained information is not comprehensive, and the insurance cannot be comprehensively risk-controlled, so that the existing risk cannot be accurately and comprehensively identified. Therefore, the prior art method has the problem that the risk verification cannot be accurately carried out.
Disclosure of Invention
The embodiment of the invention provides a risk information checking method, a risk information checking device and a risk information checking medium, and aims to solve the problem that the risk checking cannot be accurately carried out in the prior art.
In a first aspect, an embodiment of the present invention provides a risk information checking method, which includes:
if information to be verified input by a first terminal is received, screening initial screening information meeting a screening rule from the information to be verified according to a preset screening rule, wherein the initial screening information comprises at least one piece of data to be verified;
judging whether each data to be verified in the initial screening information meets a preset common management condition or not;
if the data to be verified meet the common management condition, generating common management prompt information according to the data to be verified and sending the common management prompt information to a second terminal corresponding to the data to be verified to perform common management verification;
and if receiving the common management verification information fed back by the second terminal according to the common management prompt information, performing risk verification on the common management verification information and the corresponding data to be verified according to a preset risk verification model to obtain a common management verification result of whether risks exist.
In a second aspect, an embodiment of the present invention provides a risk information checking apparatus, which includes:
the device comprises an initial screening information acquisition unit, a verification unit and a verification unit, wherein the initial screening information acquisition unit is used for screening initial screening information meeting a screening rule from information to be verified according to a preset screening rule if the information to be verified input by a first terminal is received, and the initial screening information comprises at least one piece of data to be verified;
the data judgment unit is used for judging whether each piece of data to be verified in the initial screening information meets a preset common management condition or not;
a common management prompt information sending unit, configured to generate common management prompt information according to the data to be verified and send the common management prompt information to a second terminal corresponding to the data to be verified to perform common management verification if the data to be verified meets the common management condition;
and the common management verification result acquisition unit is used for carrying out risk verification on the common management verification information and the corresponding data to be verified according to a preset risk verification model if common management verification information fed back by the second terminal according to the common management prompt information is received, so as to obtain a common management verification result of whether risks exist.
In a third aspect, an embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the risk information checking method according to the first aspect when executing the computer program.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and the computer program, when executed by a processor, causes the processor to execute the risk information checking method according to the first aspect.
The embodiment of the invention provides a risk information checking method and device, computer equipment and a readable storage medium. Screening initial screening information meeting the screening rules from the information to be checked according to the screening rules, judging whether the data to be checked in the initial screening information meet the common management conditions or not, if so, generating common management prompt information and sending the common management prompt information to a corresponding second terminal, and performing risk check on the common management check information fed back by the second terminal and the corresponding data to be checked according to a risk check model to obtain a common management check result of whether risks exist or not. By the method, the common management verification information fed back by the second terminal can be combined with the data to be verified to perform comprehensive risk verification, the data to be verified can be subjected to accurate risk verification based on the common management risk verification, and the accuracy of the risk verification of the data to be verified is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow chart of a risk information verification method according to an embodiment of the present invention;
fig. 2 is a schematic view of an application scenario of the risk information verification method according to the embodiment of the present invention;
fig. 3 is a schematic sub-flow chart of a risk information verification method according to an embodiment of the present invention;
fig. 4 is a schematic view of another sub-flow of a risk information verification method according to an embodiment of the present invention;
fig. 5 is another schematic flow chart of a risk information checking method according to an embodiment of the present invention;
fig. 6 is a schematic view of another sub-flow of a risk information verification method according to an embodiment of the present invention;
fig. 7 is a schematic view of another sub-flow of a risk information verification method according to an embodiment of the present invention;
fig. 8 is another schematic flow chart of a risk information checking method according to an embodiment of the present invention;
fig. 9 is a schematic block diagram of a risk information verifying apparatus according to an embodiment of the present invention;
FIG. 10 is a schematic block diagram of a computer device provided by an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1 and fig. 2, fig. 1 is a schematic flow chart illustrating a risk information verification method according to an embodiment of the present invention; fig. 2 is a schematic view of an application scenario of the risk information verification method according to the embodiment of the present invention; the risk information checking method is applied to the management server 10, the risk information checking method is executed through application software installed in the management server 10, the management server establishes network connection with at least one first terminal 20 and a second terminal 30 to transmit data information, the first terminal 20 is a terminal device used for managing the management server 10 inside, the first terminal 20 can be an administrator terminal used by an administrator, such as a desktop computer, a notebook computer, a tablet computer or a mobile phone, etc., the second terminal 30 is a terminal device capable of receiving common management checking information input by a user and feeding the common management checking information back to the management server 10, such as a desktop computer, a notebook computer, a tablet computer or a mobile phone, etc., the management server 10 is a server end capable of receiving the common management checking information from the second terminal 30 and performing risk checking on data to be checked to obtain a common management checking result, such as a server built by an enterprise or government agency. As shown in fig. 1, the method includes steps S110 to S140.
S110, if information to be verified input by a first terminal is received, screening initial screening information meeting a screening rule from the information to be verified according to a preset screening rule, wherein the initial screening information comprises at least one piece of data to be verified.
And if the information to be verified input by the first terminal is received, screening out initial screening information meeting the screening rule from the information to be verified according to a preset screening rule. The management server can receive the information to be claimed, which is input by an administrator through the first terminal, wherein the administrator is a user of the first terminal. Taking the medical insurance claim risk verification as an example, the information to be verified may include a plurality of pieces of claim data, one piece of claim data corresponds to one piece of data to be verified, and each piece of claim data is data information including customer data information, treatment information, and a claim amount. The screening rule at this time is a specific rule for screening the claim data from the information to be claimed, and the corresponding data to be verified can be obtained through screening by the screening rule and combined to form initial screening information, wherein the initial screening information includes at least one piece of data to be verified. Wherein the screening rule comprises a cost rate threshold and a screening type.
In an embodiment, as shown in fig. 3, step S110 includes sub-steps S111, S112, S113 and S114.
And S111, obtaining historical data information corresponding to each piece of data to be checked in the information to be checked in a pre-stored historical database.
Historical data information corresponding to each piece of data to be checked can be obtained from a historical database. Taking medical insurance claim risk verification as an example, the historical database may be a historical claim information base, the historical claim information base may be a database which is configured in advance in the management server and is used for storing historical claim information, the data to be verified includes client data information such as client names and client numbers, and the client numbers are numbering information uniquely corresponding to each client. The historical insurance policy corresponding to the client in the historical database can be determined according to the client data information contained in the data to be verified, the corresponding historical data information in the historical database can be obtained according to the historical insurance policy, the historical data information can be historical claim information, one historical insurance policy can correspond to zero, one or more pieces of historical claim information, and the historical claim information corresponding to the data to be verified can be historical claim information contained in the last year or historical claim information contained in a plurality of years within a plurality of years.
And S112, judging whether the comprehensive cost rate in the historical data information corresponding to each piece of data to be verified exceeds the cost rate threshold value.
The comprehensive cost rate can be obtained by calculating historical data information corresponding to the data to be verified, specifically, taking the data to be verified as the claim data, performing superposition calculation on the claim amount in the historical claim information corresponding to the claim data, and dividing the calculated value obtained by the superposition calculation by the premium sum corresponding to the historical claim information, so as to obtain the comprehensive cost rate, wherein if the historical claim information corresponding to the claim data is zero, the calculated comprehensive cost rate is 0. And judging whether the calculated comprehensive cost rate is greater than a cost rate threshold value, and if so, indicating that the comprehensive cost rate exceeds the cost rate threshold value.
In addition, the insurance unit of the client can be obtained, unit historical claim settlement information corresponding to the insurance unit is obtained from the historical claim settlement database, and the unit comprehensive cost rate is calculated based on the unit historical claim settlement information. And under the condition that the comprehensive cost rate is not greater than the cost rate threshold, judging whether the unit comprehensive cost rate is greater than the cost rate threshold, if the unit comprehensive cost rate is not greater than the cost rate threshold, judging that the comprehensive cost rate does not exceed the cost rate threshold, and otherwise, judging that the comprehensive cost rate exceeds the cost rate threshold.
S113, if the comprehensive cost rate in the historical data information corresponding to the data to be verified exceeds the cost rate threshold value, judging whether the data to be verified is matched with the screening type.
If the comprehensive cost rate corresponding to the data to be verified exceeds the cost rate threshold value, further judging whether the data to be verified is matched with the screening type, taking medical insurance claim risk verification as an example, and screening the type including the disease treatment type which does not meet the common management; for example, the screening type may include hypertension, diabetes, birth clinic, etc. If the data to be verified is the claim settlement data, whether the treatment information in the claim settlement data is matched with any treatment type in the screening types or not can be judged. And if the visit information of the claim data is matched with any visit type in the screening types, judging that the claim data is matched with the screening types, or else, judging that the claim data is not matched with the screening types.
And S114, acquiring the data to be verified which is not matched with the screening type and determining the data to be verified as the initial screening information.
And acquiring data to be verified which is not matched with the screening type according to a judgment result obtained by judging each data to be verified, and combining all the obtained data to be verified to obtain initial screening information.
And S120, judging whether each data to be verified in the initial screening information meets a preset common management condition.
And judging whether each data to be verified in the initial screening information meets a preset common management condition. Whether the data to be verified contained in the initial screening information meets a common management condition can be judged, and the common management condition is condition information which is configured in the management server in advance and used for judging whether the data to be verified meets the common management condition.
In an embodiment, as shown in fig. 4, step S120 includes substeps S121 and S122.
And S121, acquiring a common management matching rule matched with each piece of data to be verified in the common management condition.
The common management condition comprises a plurality of common management matching rules, taking the data to be verified as the claim data as an example, each piece of data to be verified also comprises a corresponding claim type, and one common management matching rule matched with the claim type can be obtained from the common management condition according to the claim type in the claim data.
And S122, judging whether each piece of data to be verified is matched with a corresponding common management matching rule or not so as to judge whether the data to be verified meets the common management condition or not.
Taking medical insurance claim risk verification as an example, taking data to be verified as claim data, acquiring the claim information of the current year corresponding to the data to be verified from the historical database, performing classification statistics on the claim information of the current year and the claim data to obtain a classification statistical result, and judging whether the classification statistical result is matched with the corresponding common management matching rule or not so as to judge whether the claim data meets the common management requirement or not. Specifically, the classification statistical result includes statistical information for performing classification statistics on the claim information of the year and the claim responsibility and the treatment type of the claim data, the corresponding co-management matching rule includes limit information of the statistical quantity corresponding to the claim responsibility and the treatment type, whether the statistical information in the classification statistical result does not exceed the quantity limit in the co-management matching rule can be judged, and if not, it is indicated that the data to be verified meets the co-management condition; otherwise, the data to be verified does not meet the common management condition.
For example, the common management matching rule corresponding to a certain data to be verified is shown in table 1.
Numbering Responsibility of paying Type of visit Number of visits Limitation of single hospitalization days
1 Outpatient and hospitalization Accident of 3
2 Outpatient service Disease and disorder 5
3 Hospitalization with a drug Disease and disorder 2
4 Hospitalization with a drug Accident + disease 30
TABLE 1
In an embodiment, as shown in fig. 5, step S1201 is further included after step S120.
S1201, if the data to be verified do not meet the common management condition, performing risk verification on the data to be verified according to a preset wind control sampling inspection rule to obtain a risk verification result.
And if the data to be verified does not meet the common management condition, performing risk verification on the data to be verified according to a preset wind control sampling inspection rule to obtain a risk verification result. Specifically, taking the data to be verified as the claim data as an example, the account amount of the claim data is counted to obtain an account statistical result, and the risk verification can be performed on the account statistical result according to the wind-controlled sampling inspection rule. The wind-controlled spot check rule comprises the amount limits such as single bill amount limit, single-time diagnosis total amount limit, diagnosis daily average amount limit and the like, whether the statistical amount in the bill statistical result does not exceed the amount limit in the wind-controlled spot check rule or not can be judged, and if the statistical amount does not exceed the amount limit in the wind-controlled spot check rule, the risk check result of the data to be checked is obtained and passes the check; otherwise, obtaining the risk verification result of the data to be verified as that the verification is not passed.
S130, if the data to be verified meet the common management condition, generating common management prompt information according to the data to be verified and sending the common management prompt information to a second terminal corresponding to the data to be verified to perform common management verification.
And if the data to be verified meets the common management condition, generating common management prompt information according to the data to be verified and sending the common management prompt information to a second terminal corresponding to the data to be verified so as to perform common management verification. If the data to be verified meet the common management condition, generating corresponding common management prompt information according to the data to be verified and sending the common management prompt information to the corresponding second terminal, wherein a user of the second terminal can be a manager of the insurance enterprise.
In one embodiment, as shown in fig. 6, step S130 includes sub-steps S131 and S132.
S131, generating corresponding common management prompt information according to the data to be verified.
And generating corresponding co-management prompt information according to the data to be verified, specifically, taking the data to be verified as the claim data as an example, obtaining information such as the name, the number, the sex, the age, the occupation, the date of the doctor, the information of the doctor, the past medical history and the like of the client from the claim data, combining the information with pre-stored verification request information to generate corresponding co-management prompt information, wherein the verification request information is request information for requesting a user corresponding to the second terminal to feed back the co-management verification information.
S132, sending the common management prompt message to a second terminal corresponding to the terminal address in the data to be verified.
The data to be verified also comprises a terminal address, the terminal address is the internet address information of a second terminal corresponding to the insurance enterprise, and the generated co-management prompt information can be sent to the corresponding second terminal through the terminal address.
And S140, if the common management verification information fed back by the second terminal according to the common management prompt information is received, performing risk verification on the common management verification information and the corresponding to-be-verified data according to a preset risk verification model to obtain a common management verification result of whether risks exist.
And if receiving the common management verification information fed back by the second terminal according to the common management prompt information, performing risk verification on the common management verification information and the corresponding data to be verified according to a preset risk verification model to obtain a common management verification result of whether risks exist. The risk checking model comprises a feature extraction rule, a checking neural network and a checking judgment rule. And after receiving the common management prompt information, the second terminal can feed back corresponding common management verification information, wherein the common management verification information comprises attendance information and health state information corresponding to the customer to which the data to be verified belongs. The characteristic extraction rule is a specific rule for extracting characteristic information from the health state information and the data to be verified respectively, the verification neural network is a neural network constructed based on artificial intelligence, the verification neural network analyzes and calculates the verification characteristic information and the target characteristic information respectively to obtain corresponding verification characteristic output information and target characteristic output information, and the verification judgment rule is a specific rule for judging the obtained verification characteristic output information and the target characteristic output information to obtain a common management verification result.
In an embodiment, as shown in fig. 7, step S140 includes sub-steps S141, S142, S143, S144, and S145.
And S141, judging whether the attendance information of the co-administration checking information is matched with the attendance date in the data to be checked.
Whether attendance information in the co-administration check-up information is matched with the attendance date in the data to be checked or not can be judged, specifically, whether non-holiday periods in the attendance date are matched with the absenteeism date in the attendance information or not can be judged, and if the non-holiday periods in the attendance date are matched with the absenteeism date, the attendance information is judged to be matched with the attendance date; otherwise, judging that the obtained attendance information is not matched with the attendance date. And if the attendance information is not matched with the right date, directly obtaining a co-management verification result of the data to be verified with claim settlement risk.
And S142, if the attendance information is matched with the attendance date, extracting corresponding target characteristic information from the data to be verified according to the characteristic extraction rule.
The corresponding target feature information can be extracted from the data to be verified according to the feature extraction rule, specifically, the feature extraction rule includes a plurality of extraction items, an item value corresponding to each extraction item can be extracted from the data to be verified according to the extraction items included in the feature extraction rule, and the corresponding item value is converted according to the conversion rule corresponding to the extraction item, so that the corresponding target feature information can be obtained, and the target feature information includes a plurality of feature values, each feature value corresponding to one extraction item.
For example, if the feature extraction rule includes extraction items such as gender, age, occupation, information about medical treatment, and past medical history, a project value corresponding to each extraction item can be obtained. If the item value is a numerical value, extracting a characteristic value calculation formula which can be contained in the item, and calculating the item value which is the numerical value through the characteristic value calculation formula to obtain a corresponding characteristic value; if the item value is a non-numerical value, extracting the mapping relation between the key words and the characteristic values in the item, and mapping and converting the non-numerical value item value into the corresponding characteristic value through the mapping relation.
S143, extracting corresponding verification feature information from the health state information of the common management verification information according to the feature extraction rule.
The feature extraction rule also comprises a feature keyword set, the feature keyword set comprises a plurality of feature keywords and feature codes corresponding to the feature keywords, whether the health state information comprises character segments matched with the feature keywords or not can be judged, the feature codes corresponding to the character segments matched with the feature keywords in the health state information are obtained according to matching results, the obtained feature codes are combined to obtain verification feature information corresponding to the health state information, and if the health state information comprises a plurality of character segments matched with the same feature keywords, the corresponding verification feature information also comprises a plurality of repeated feature codes matched with the feature keywords.
And S144, inputting the verification characteristic information and the target characteristic information into the verification neural network respectively to calculate to obtain corresponding verification characteristic output information and target characteristic output information.
The check characteristic information and the target characteristic information can be respectively input into a check neural network, specifically, the check neural network can be composed of two input layers, a plurality of intermediate layers and an output layer, and correlation is performed between each input layer and the first intermediate layer, between the intermediate layer and other intermediate layers adjacent to each other in front and back, and between the last intermediate layer and the output layer through correlation formulas, for example, a certain correlation formula can be represented by a linear function. Each input layer comprises a plurality of input nodes, the first input layer is used for inputting verification characteristic information, the number of the input nodes contained in the first input layer is not less than the number of characteristic codes contained in the verification characteristic information, the second input layer is used for inputting target characteristic information, the number of the input nodes contained in the second input layer is equal to the number of the extraction items, and the number of the input nodes in the first input layer can be equal to or not equal to the number of the input nodes in the second input layer. The verification characteristic information can be input through the first input layer, and at the moment, the numerical value of each input node in the second input layer is zero; and then inputting target characteristic information through a second input layer, wherein the numerical value of each input node in the first input layer is zero. The output layer comprises a plurality of output nodes, the output layer can input the characteristic output information corresponding to the corresponding input information, and the number of characteristic output values contained in the characteristic output information is equal to the number of output nodes contained in the output layer. The verification feature output information corresponding to the verification feature information and the target feature output information corresponding to the target feature information can be obtained through the output layer, the verification feature output information can be used for quantitatively representing the implicit features of the verification feature information, the target feature output information can be used for quantitatively representing the implicit features of the target feature information, the value ranges of the feature output values contained in the feature output information are all [0,1], and as the verification feature output information and the target feature output information contain the same number of the feature output values, the feature dimensions of the verification feature information and the target feature information are unified through the verification neural network.
And S145, verifying and judging the verification feature output information and the target feature output information according to a verification judgment rule to obtain a common management verification result of whether claim settlement risks exist or not.
The verification characteristic output information and the target characteristic output information can be verified and judged according to the verification judgment rule to obtain a common management verification result, and the common management verification result can be that claim settlement risks exist or no claim settlement risks exist. Specifically, the check judgment rule comprises a check coefficient calculation formula and a check coefficient threshold, a check coefficient between the check characteristic output information and the target characteristic output information can be calculated through the check coefficient calculation formula, whether the check coefficient is greater than the check coefficient threshold or not is judged, and if the check coefficient is not greater than the check coefficient threshold, a common management check result with claim settlement risk is obtained; otherwise, obtaining a common management verification result without claim settlement risk.
For example, the check coefficient calculation formula may be expressed by formula (1).
Figure BDA0003239468380000101
Wherein N is the number of output nodes contained in the output layer, i is an integer and i is e [1, N],RiFor checking the ith characteristic output value, T, in the characteristic output informationiOutput information for target featureAnd i characteristic output values, wherein X is a check coefficient obtained by calculation.
In an embodiment, as shown in fig. 8, step S150 is further included after step S140.
S150, uploading the common management verification result to a block chain.
And obtaining corresponding digest information based on the result of the co-administration check, specifically, obtaining the digest information by hashing the result of the co-administration check, for example, by using the sha256s algorithm. Uploading summary information to the blockchain can ensure the safety and the fair transparency of the user. The user equipment may download the summary information from the blockchain to verify whether the common management verification result is tampered. The blockchain referred to in this example is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm, and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
The technical method can be applied to application scenes including intelligent risk checking, such as intelligent government affairs, intelligent city management, intelligent community, intelligent security, intelligent logistics, intelligent medical treatment, intelligent education, intelligent environmental protection and intelligent traffic, and the like, so that the construction of a smart city is promoted.
In the risk information checking method provided by the embodiment of the invention, initial screening information meeting the screening rule is screened from the information to be checked according to the screening rule, whether the data to be checked in the initial screening information meets the common management condition is judged, if yes, common management prompt information is generated and sent to a corresponding second terminal, and the common management checking information fed back by the second terminal and the corresponding data to be checked are subjected to risk checking according to the risk checking model to obtain the common management checking result of whether the risk exists. By the method, the common management verification information fed back by the second terminal can be combined with the data to be verified to perform comprehensive risk verification, the data to be verified can be subjected to accurate risk verification based on the common management risk verification, and the accuracy of the risk verification of the data to be verified is improved.
The embodiment of the invention also provides a risk information checking device, which can be configured in the management server and is used for executing any embodiment of the risk information checking method. Specifically, please refer to fig. 9, and fig. 9 is a schematic block diagram of a risk information checking apparatus according to an embodiment of the present invention.
As shown in fig. 9, the risk information verifying apparatus 100 includes an initial screening information obtaining unit 110, a data judging unit 120, a common management prompting information transmitting unit 130, and a common management verification result obtaining unit 140.
An initial screening information obtaining unit 110, configured to, if information to be verified input by a first terminal is received, screen initial screening information that meets a screening rule from the information to be verified according to a preset screening rule, where the initial screening information includes at least one piece of data to be verified.
In an embodiment, the initial filtering information obtaining unit 110 includes sub-units: the historical data information acquisition unit is used for acquiring historical data information corresponding to each piece of data to be verified in the information to be verified in a prestored historical database; the comprehensive cost rate judging unit is used for judging whether the comprehensive cost rate in the historical data information corresponding to each piece of data to be verified exceeds the cost rate threshold value or not; the type judging unit is used for judging whether the data to be verified is matched with the screening type or not if the comprehensive cost rate in the historical data information corresponding to the data to be verified exceeds the cost rate threshold value; and the initial screening information determining unit is used for acquiring the data to be verified which is not matched with the screening type and determining the data to be verified as the initial screening information.
A data determining unit 120, configured to determine whether each piece of data to be verified in the initial screening information meets a preset common management condition.
In an embodiment, the data determining unit 120 includes sub-units: a common management matching rule obtaining unit, configured to obtain a common management matching rule that matches each piece of data to be verified in the common management condition; and the rule matching judgment unit is used for judging whether each piece of data to be verified is matched with the corresponding common management matching rule so as to judge whether the piece of data to be verified meets the common management condition.
In an embodiment, the risk information checking apparatus 100 further includes sub-units: and the risk checking unit is used for carrying out risk checking on the data to be checked according to a preset wind control sampling check rule to obtain a risk checking result if the data to be checked does not meet the common management condition.
And a common management prompt information sending unit 130, configured to generate common management prompt information according to the data to be verified and send the common management prompt information to a second terminal corresponding to the data to be verified to perform common management verification if the data to be verified meets the common management condition.
In a specific embodiment, the common management prompting information sending unit 130 includes sub-units: a common management prompt information generating unit, configured to generate corresponding common management prompt information according to the data to be verified; and the prompt information sending unit is used for sending the common management prompt information to a second terminal corresponding to the terminal address in the data to be verified.
A common management verification result obtaining unit 140, configured to, if common management verification information fed back by the second terminal according to the common management prompting information is received, perform risk verification on the common management verification information and the corresponding data to be verified according to a preset risk verification model, so as to obtain a common management verification result of whether a risk exists.
In an embodiment, the common management verification result obtaining unit 140 includes sub-units: the attendance information judging unit is used for judging whether attendance information of the co-management verification information is matched with the attendance date in the data to be verified; the target characteristic information acquisition unit is used for extracting corresponding target characteristic information from the data to be verified according to the characteristic extraction rule if the attendance information is matched with the attendance date; the verification characteristic information acquisition unit is used for extracting corresponding verification characteristic information from the health state information of the common management verification information according to the characteristic extraction rule; the output information acquisition unit is used for respectively inputting the verification characteristic information and the target characteristic information into the verification neural network to calculate to obtain corresponding verification characteristic output information and target characteristic output information; and the verification judgment unit is used for verifying and judging the verification characteristic output information and the target characteristic output information according to a verification judgment rule to obtain a common management verification result of whether the claim settlement risk exists or not.
In an embodiment, the risk information checking apparatus 100 further includes sub-units: and the common management checking information storage unit is used for uploading the common management checking result to the block chain.
The risk information checking device provided by the embodiment of the invention applies the risk information checking method, selects the initial screening information meeting the screening rule from the information to be checked according to the screening rule, judges whether the data to be checked in the initial screening information meets the common management condition, generates the common management prompt information and sends the common management prompt information to the corresponding second terminal if the data meets the common management condition, and carries out risk checking on the common management checking information fed back by the second terminal and the corresponding data to be checked according to the risk checking model to obtain the common management checking result of whether the risk exists. By the method, the common management verification information fed back by the second terminal can be combined with the data to be verified to perform comprehensive risk verification, the data to be verified can be subjected to accurate risk verification based on the common management risk verification, and the accuracy of the risk verification of the data to be verified is improved.
The risk information checking means described above may be implemented in the form of a computer program that can be run on a computer device as shown in fig. 10.
Referring to fig. 10, fig. 10 is a schematic block diagram of a computer device according to an embodiment of the present invention. The computer device may be a management server for performing a risk information verification method for intelligently verifying a risk.
Referring to fig. 10, the computer device 500 includes a processor 502, memory, and a network interface 505 connected by a system bus 501, where the memory may include a storage medium 503 and an internal memory 504.
The storage medium 503 may store an operating system 5031 and a computer program 5032. The computer program 5032, when executed, may cause the processor 502 to perform a risk information checking method, wherein the storage medium 503 may be a volatile storage medium or a non-volatile storage medium.
The processor 502 is used to provide computing and control capabilities that support the operation of the overall computer device 500.
The internal memory 504 provides an environment for the operation of the computer program 5032 in the storage medium 503, and when the computer program 5032 is executed by the processor 502, the processor 502 may be caused to execute the risk information checking method.
The network interface 505 is used for network communication, such as providing transmission of data information. Those skilled in the art will appreciate that the configuration shown in fig. 10 is a block diagram of only a portion of the configuration associated with aspects of the present invention and is not intended to limit the computing device 500 to which aspects of the present invention may be applied, and that a particular computing device 500 may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
The processor 502 is configured to run the computer program 5032 stored in the memory to implement the corresponding functions in the risk information checking method.
Those skilled in the art will appreciate that the embodiment of a computer device illustrated in fig. 10 does not constitute a limitation on the specific construction of the computer device, and that in other embodiments a computer device may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components. For example, in some embodiments, the computer device may only include a memory and a processor, and in such embodiments, the structures and functions of the memory and the processor are consistent with those of the embodiment shown in fig. 10, and are not described herein again.
It should be understood that, in the embodiment of the present invention, the Processor 502 may be a Central Processing Unit (CPU), and the Processor 502 may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
In another embodiment of the invention, a computer-readable storage medium is provided. The computer readable storage medium may be a volatile or non-volatile computer readable storage medium. The computer readable storage medium stores a computer program, wherein the computer program, when executed by a processor, implements the steps included in the risk information checking method described above.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses, devices and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided by the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only a logical division, and there may be other divisions when the actual implementation is performed, or units having the same function may be grouped into one unit, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention essentially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a computer-readable storage medium, which includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned computer-readable storage media comprise: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method for risk information verification, the method comprising:
if information to be verified input by a first terminal is received, screening initial screening information meeting a screening rule from the information to be verified according to a preset screening rule, wherein the initial screening information comprises at least one piece of data to be verified;
judging whether each data to be verified in the initial screening information meets a preset common management condition or not;
if the data to be verified meet the common management condition, generating common management prompt information according to the data to be verified and sending the common management prompt information to a second terminal corresponding to the data to be verified to perform common management verification;
and if receiving the common management verification information fed back by the second terminal according to the common management prompt information, performing risk verification on the common management verification information and the corresponding data to be verified according to a preset risk verification model to obtain a common management verification result of whether risks exist.
2. The method for verifying risk information according to claim 1, wherein the screening rule includes a cost rate threshold and a screening type, and the screening of the initial screening information satisfying the screening rule from the information to be verified according to a preset screening rule includes:
acquiring historical data information corresponding to each piece of data to be verified in the information to be verified in a prestored historical database;
judging whether the comprehensive cost rate in the historical data information corresponding to each piece of data to be verified exceeds the cost rate threshold value or not;
if the comprehensive cost rate in the historical data information corresponding to the data to be verified exceeds the cost rate threshold value, judging whether the data to be verified is matched with the screening type;
and acquiring data to be verified which is not matched with the screening type and determining the data to be verified as the initial screening information.
3. The method for verifying risk information according to claim 1, wherein the determining whether each piece of data to be verified in the initial screening information satisfies a preset common management condition includes:
acquiring a common management matching rule matched with each piece of data to be verified in the common management condition;
and judging whether each piece of data to be verified is matched with a corresponding common management matching rule or not so as to judge whether the data to be verified meets the common management condition or not.
4. The method for verifying risk information according to claim 1, wherein after determining whether each piece of data to be verified in the initial screening information satisfies a preset common management condition, the method further comprises:
and if the data to be verified does not meet the common management condition, performing risk verification on the data to be verified according to a preset wind control sampling inspection rule to obtain a risk verification result.
5. The risk information checking method according to claim 1, wherein the generating of the common management prompt information according to the data to be checked and sending the common management prompt information to a second terminal corresponding to the data to be checked for common management checking comprises:
generating corresponding common management prompt information according to the data to be verified;
and sending the common management prompt message to a second terminal corresponding to the terminal address in the data to be verified.
6. The risk information checking method according to claim 1, wherein the risk checking model includes a feature extraction rule, a checking neural network, and a checking judgment rule, and the performing risk checking on the common management checking information and the corresponding data to be checked according to a preset risk checking model to obtain a common management checking result indicating whether a risk exists includes:
judging whether attendance information of the shared management verification information is matched with the attendance date in the data to be verified;
if the attendance information is matched with the attendance date, extracting corresponding target characteristic information from the data to be verified according to the characteristic extraction rule;
extracting corresponding verification feature information from the health state information of the common management verification information according to the feature extraction rule;
inputting the verification characteristic information and the target characteristic information into the verification neural network respectively to calculate to obtain corresponding verification characteristic output information and target characteristic output information;
and verifying and judging the verification characteristic output information and the target characteristic output information according to a verification judgment rule to obtain a common management verification result of whether the claim settlement risk exists or not.
7. The method for checking risk information according to claim 1, wherein the risk checking the common management checking information and the corresponding data to be checked according to a preset risk checking model, and after obtaining a common management checking result indicating whether a risk exists, further comprising:
and uploading the common management verification result to a block chain.
8. A risk information verification apparatus, the apparatus comprising:
the device comprises an initial screening information acquisition unit, a verification unit and a verification unit, wherein the initial screening information acquisition unit is used for screening initial screening information meeting a screening rule from information to be verified according to a preset screening rule if the information to be verified input by a first terminal is received, and the initial screening information comprises at least one piece of data to be verified;
the data judgment unit is used for judging whether each piece of data to be verified in the initial screening information meets a preset common management condition or not;
a common management prompt information sending unit, configured to generate common management prompt information according to the data to be verified and send the common management prompt information to a second terminal corresponding to the data to be verified to perform common management verification if the data to be verified meets the common management condition;
and the common management verification result acquisition unit is used for carrying out risk verification on the common management verification information and the corresponding data to be verified according to a preset risk verification model if common management verification information fed back by the second terminal according to the common management prompt information is received, so as to obtain a common management verification result of whether risks exist.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the risk information checking method according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the risk information checking method according to any one of claims 1 to 7.
CN202111012501.8A 2021-08-31 2021-08-31 Risk information checking method, device, equipment and medium Pending CN113724094A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111012501.8A CN113724094A (en) 2021-08-31 2021-08-31 Risk information checking method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111012501.8A CN113724094A (en) 2021-08-31 2021-08-31 Risk information checking method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN113724094A true CN113724094A (en) 2021-11-30

Family

ID=78679765

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111012501.8A Pending CN113724094A (en) 2021-08-31 2021-08-31 Risk information checking method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN113724094A (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001066007A1 (en) * 2000-03-03 2001-09-13 Joerg Hohnloser Medical risk assessment system and method
CN106952165A (en) * 2017-03-13 2017-07-14 平安科技(深圳)有限公司 The method and system of vehicle insurance Claims Resolution setting loss
CN109146696A (en) * 2018-09-03 2019-01-04 汇保医联信息科技有限公司 Air control check method, device and the electronic equipment of business insurance
CN109857750A (en) * 2019-01-17 2019-06-07 深圳壹账通智能科技有限公司 Settlement of insurance claim decision-making technique, device, computer equipment and storage medium
WO2019149021A1 (en) * 2018-02-01 2019-08-08 阿里巴巴集团控股有限公司 Data processing method and apparatus for claims settlement service, and electronic device and server
CN110175925A (en) * 2019-04-16 2019-08-27 阿里巴巴集团控股有限公司 Verify processing method, device, server and the system of user information
CN110363417A (en) * 2019-07-02 2019-10-22 北京淇瑀信息科技有限公司 Financial risks strategy-generating method, device and electronic equipment
CN110704426A (en) * 2019-09-06 2020-01-17 中国平安财产保险股份有限公司 Data verification method, electronic device and computer readable storage medium
CN111339126A (en) * 2020-02-27 2020-06-26 平安医疗健康管理股份有限公司 Medical data screening method and device, computer equipment and storage medium
CN112529429A (en) * 2020-12-16 2021-03-19 平安科技(深圳)有限公司 Customer information checking method and device, computer equipment and storage medium
CN112541831A (en) * 2020-12-16 2021-03-23 中国人寿保险股份有限公司 Medical insurance risk identification method, device, medium and electronic equipment
CN113240266A (en) * 2021-05-11 2021-08-10 北京沃东天骏信息技术有限公司 Risk management method and device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001066007A1 (en) * 2000-03-03 2001-09-13 Joerg Hohnloser Medical risk assessment system and method
CN106952165A (en) * 2017-03-13 2017-07-14 平安科技(深圳)有限公司 The method and system of vehicle insurance Claims Resolution setting loss
WO2019149021A1 (en) * 2018-02-01 2019-08-08 阿里巴巴集团控股有限公司 Data processing method and apparatus for claims settlement service, and electronic device and server
CN109146696A (en) * 2018-09-03 2019-01-04 汇保医联信息科技有限公司 Air control check method, device and the electronic equipment of business insurance
CN109857750A (en) * 2019-01-17 2019-06-07 深圳壹账通智能科技有限公司 Settlement of insurance claim decision-making technique, device, computer equipment and storage medium
CN110175925A (en) * 2019-04-16 2019-08-27 阿里巴巴集团控股有限公司 Verify processing method, device, server and the system of user information
CN110363417A (en) * 2019-07-02 2019-10-22 北京淇瑀信息科技有限公司 Financial risks strategy-generating method, device and electronic equipment
CN110704426A (en) * 2019-09-06 2020-01-17 中国平安财产保险股份有限公司 Data verification method, electronic device and computer readable storage medium
CN111339126A (en) * 2020-02-27 2020-06-26 平安医疗健康管理股份有限公司 Medical data screening method and device, computer equipment and storage medium
CN112529429A (en) * 2020-12-16 2021-03-19 平安科技(深圳)有限公司 Customer information checking method and device, computer equipment and storage medium
CN112541831A (en) * 2020-12-16 2021-03-23 中国人寿保险股份有限公司 Medical insurance risk identification method, device, medium and electronic equipment
CN113240266A (en) * 2021-05-11 2021-08-10 北京沃东天骏信息技术有限公司 Risk management method and device

Similar Documents

Publication Publication Date Title
Kallus et al. Assessing algorithmic fairness with unobserved protected class using data combination
WO2019169826A1 (en) Risk control method for determining irregular medical insurance behavior by means of data analysis
Van Capelleveen et al. Outlier detection in healthcare fraud: A case study in the Medicaid dental domain
Ekin et al. Statistical medical fraud assessment: exposition to an emerging field
CN109472705B (en) Method, system, computer device and storage medium for claim settlement
US20130085769A1 (en) Characterizing healthcare provider, claim, beneficiary and healthcare merchant normal behavior using non-parametric statistical outlier detection scoring techniques
US20110288886A1 (en) System and method for detecting drug fraud and abuse
US20070198336A1 (en) Automated system and method for discounting medical bills of self-pay patients
US10776890B1 (en) Generation from data threats and predictive application of the data models
US8108225B2 (en) Method, system, and software for analysis of a billing process
US20060190334A1 (en) Automated system and method for discounting medical bills of self-pay patients
US11361381B1 (en) Data integration and prediction for fraud, waste and abuse
CN111180065A (en) Insurance user evaluation method and device, electronic equipment and computer readable medium
CN112529429A (en) Customer information checking method and device, computer equipment and storage medium
CN112507212A (en) Intelligent return visit method and device, electronic equipment and readable storage medium
CN110490750B (en) Data identification method, system, electronic equipment and computer storage medium
CN110941644A (en) Policy data generation method, device, equipment and storage medium
CN112581291B (en) Risk assessment change detection method, apparatus, device and storage medium
US20160259896A1 (en) Segmented temporal analysis model used in fraud, waste, and abuse detection
CN113436725A (en) Data processing method, system, computer device and computer readable storage medium
Saripalli et al. Assessment of healthcare claims rejection risk using machine learning
CN113869996A (en) Stepped credit analysis measuring and calculating method, device, equipment and medium
CN113724094A (en) Risk information checking method, device, equipment and medium
CN109523394B (en) Risk detection method, device and storage medium based on data processing
CN114840660A (en) Service recommendation model training method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination