CN114493843A - Business approval method and device, electronic equipment and computer readable medium - Google Patents
Business approval method and device, electronic equipment and computer readable medium Download PDFInfo
- Publication number
- CN114493843A CN114493843A CN202210099077.3A CN202210099077A CN114493843A CN 114493843 A CN114493843 A CN 114493843A CN 202210099077 A CN202210099077 A CN 202210099077A CN 114493843 A CN114493843 A CN 114493843A
- Authority
- CN
- China
- Prior art keywords
- determining
- money
- approval
- white list
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 116
- 230000008569 process Effects 0.000 claims abstract description 61
- 238000012550 audit Methods 0.000 claims abstract description 52
- 230000004044 response Effects 0.000 claims abstract description 12
- 238000004590 computer program Methods 0.000 claims description 19
- 230000002159 abnormal effect Effects 0.000 claims description 11
- 238000012544 monitoring process Methods 0.000 claims description 11
- 230000000694 effects Effects 0.000 abstract description 14
- 238000012545 processing Methods 0.000 abstract description 10
- 238000010586 diagram Methods 0.000 description 13
- 238000012552 review Methods 0.000 description 12
- 230000008676 import Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 7
- 238000011835 investigation Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 238000007726 management method Methods 0.000 description 5
- 230000008520 organization Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 238000013475 authorization Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 239000000047 product Substances 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 208000035473 Communicable disease Diseases 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011217 control strategy Methods 0.000 description 1
- 238000013524 data verification Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 208000015181 infectious disease Diseases 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The application discloses a business approval method, a business approval device, electronic equipment and a computer readable medium, which relate to the technical field of big data, in particular to the technical field of data processing, and the method comprises the following steps: receiving a service approval request, acquiring a request type identifier corresponding to the service approval request, and locking an emergency program in response to determining that the request type identifier is an emergency identifier; acquiring a corresponding user identifier according to the service approval request, calling a preset white list, judging whether the user identifier is in the preset white list, if not, unlocking the emergency program, and returning to the request failure; if so, starting an emergency program, acquiring risk information corresponding to the business approval request, and calling a basic approval rule base to examine the risk information; judging whether the audit is passed, if so, determining the money amount, and issuing the money corresponding to the money amount; if not, the business approval request is intercepted, and the early warning process is executed. The service handling efficiency is improved, and the service handling effect is improved.
Description
Technical Field
The present application relates to the field of big data technologies, and in particular, to a method and an apparatus for business approval, an electronic device, and a computer-readable medium.
Background
At present, when some excellent small and micro enterprises meet the requirement of emergency loan, the conventional loan process is tedious. And when the excellent small and micro enterprises need to continue using the credit funds, the principal funds need to be returned, the bridging cost of the excellent small and micro enterprises caused by financing and repayment funds is increased, and the loan requirements of the excellent small and micro enterprises cannot be flexibly met.
In the process of implementing the present application, the inventor finds that at least the following problems exist in the prior art:
when some excellent small and micro enterprises meet the requirement of emergency loan, the conventional loan process is complicated, the examination and approval review process is long, and the effect of the common method for screening the risk enterprises through the white list is poor.
Disclosure of Invention
In view of this, embodiments of the present application provide a business approval method, a business approval apparatus, an electronic device, and a computer readable medium, which can solve the problems that when some excellent small and small enterprises meet an urgent loan requirement, the conventional loan process is tedious, the approval and review process is long, and the effect of the common method for screening risk enterprises through a white list is poor.
In order to achieve the above object, according to an aspect of an embodiment of the present application, there is provided a business approval method, including:
receiving a service approval request, acquiring a request type identifier corresponding to the service approval request, and locking an emergency program in response to determining that the request type identifier is an emergency identifier;
acquiring a corresponding user identifier according to the service approval request, calling a preset white list, judging whether the user identifier is in the preset white list, if not, unlocking the emergency program, and returning to the request failure;
if so, starting an emergency program, acquiring risk information corresponding to the business approval request, and calling a basic approval rule base to examine and verify the risk information;
judging whether the audit is passed, if so, determining the money amount, and issuing the money corresponding to the money amount; if not, the business approval request is intercepted, and the early warning process is executed.
Optionally, before invoking the preset white list, the method further includes:
calling a preset internal control list, and performing pre-examination on the user identification;
and responding to the fact that the user identification is not in the preset internal control list, determining that the pre-review is passed, and further executing a white list review process.
Optionally, the business approval method further includes:
and responding to the user identification in the preset internal control list, returning the rejection identification and sending early warning information.
Optionally, determining the money amount comprises:
determining net asset information corresponding to the user identification, and further generating a corresponding pre-granted credit limit;
and determining an audit score corresponding to the risk information, and further determining the money amount based on the pre-granted credit amount and the audit score.
Optionally, determining the money amount based on the pre-granted credit amount and the audit score includes:
determining a quota set corresponding to the audit score according to the corresponding relation between the preset audit score and the quota;
and matching the pre-granted credit line with each line in the line set, and determining the line obtained by matching as the money line.
Optionally, determining the amount obtained by matching as an amount of money, including:
and determining the amount closest to the pre-granted credit amount in the amount set as the money amount.
Optionally, the method further comprises:
and monitoring the money state of the user in the preset white list, responding to the abnormal money state, returning the user identification corresponding to the user with the abnormal state and sending alarm information.
Optionally, the method further comprises:
regularly acquiring the money states corresponding to the newly added money issuing user and the historical money issuing user;
and updating the preset white list based on the money state.
In addition, the present application further provides a service approval apparatus, including:
the receiving unit is configured to receive the service approval request, obtain a request type identifier corresponding to the service approval request, and lock an emergency program in response to determining that the request type identifier is an emergency identifier;
the first auditing unit is configured to acquire a corresponding user identifier according to the service approval request, call a preset white list, judge whether the user identifier is in the preset white list, unlock the emergency program if the user identifier is not in the preset white list, and return to the request failure;
the second auditing unit is configured to start an emergency program if the first auditing unit is configured to start the emergency program, acquire risk information corresponding to the business approval request, and further call the basic approval rule base to audit the risk information;
the execution unit is configured to judge whether the audit is passed, if so, the money amount is determined, and the money corresponding to the money amount is issued; if not, the business approval request is intercepted, and the early warning process is executed.
Optionally, the apparatus further comprises a pre-auditing unit configured to:
calling a preset internal control list, and performing pre-examination on the user identification;
and responding to the fact that the user identification is not in the preset internal control list, determining that the pre-review is passed, and further executing a white list review process.
Optionally, the pre-audit unit is further configured to:
and responding to the user identification in the preset internal control list, returning the rejection identification and sending early warning information.
Optionally, the execution unit is further configured to:
determining net asset information corresponding to the user identification, and further generating a corresponding pre-granted credit limit;
and determining an audit score corresponding to the risk information, and further determining the money amount based on the pre-granted credit amount and the audit score.
Optionally, the execution unit is further configured to:
determining a quota set corresponding to the audit score according to a preset corresponding relation between the audit score and the quota;
and matching the pre-granted credit line with each line in the line set, and determining the line obtained by matching as the money line.
Optionally, the execution unit is further configured to:
and determining the amount closest to the pre-credit amount in the amount set as the money amount.
Optionally, the service approval apparatus further includes a monitoring unit configured to:
and monitoring the money state of the user in the preset white list, responding to the abnormal money state, returning the user identification corresponding to the user with the abnormal state and sending alarm information.
Optionally, the apparatus further comprises a white list updating unit configured to:
regularly acquiring the money states corresponding to the newly added money issuing user and the historical money issuing user;
and updating the preset white list based on the money state.
In addition, the present application further provides an electronic device for business approval, including: one or more processors; a storage device for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the business approval method as described above.
In addition, the present application also provides a computer readable medium, on which a computer program is stored, which when executed by a processor implements the business approval method as described above.
To achieve the above object, according to still another aspect of embodiments of the present application, there is provided a computer program product.
A computer program product according to an embodiment of the present application includes a computer program, and when the computer program is executed by a processor, the method for service approval according to an embodiment of the present application is implemented.
One embodiment of the above invention has the following advantages or benefits: the method comprises the steps of receiving a service approval request, obtaining a request type identifier corresponding to the service approval request, and locking an emergency program in response to determining that the request type identifier is an emergency identifier; acquiring a corresponding user identifier according to the service approval request, calling a preset white list, judging whether the user identifier is in the preset white list, if not, unlocking the emergency program, and returning to the request failure; if so, starting an emergency program, acquiring risk information corresponding to the business approval request, and calling a basic approval rule base to examine and verify the risk information; judging whether the audit is passed, if so, determining the money amount, and issuing the money corresponding to the money amount; if not, the business approval request is intercepted, and the early warning process is executed. Direct approval intervention can be provided for enterprise users with good loan records through a white list and a basic approval rule base, the approval and review process is shortened through simplifying the business operation process, the business handling efficiency is improved, the business handling effect is improved, the credit demand of enterprise users with high quality stock is quickly met, the enterprise departure dilemma is supported, and the stable and healthy development of enterprises is helped.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a further understanding of the application and are not to be construed as limiting the application. Wherein:
fig. 1 is a schematic view of a main flow of a business approval method according to a first embodiment of the present application;
FIG. 2 is a schematic diagram of the main flow of a business approval method according to a second embodiment of the present application;
fig. 3 is a schematic view of an application scenario of a business approval method according to a third embodiment of the present application;
FIG. 4 is a schematic diagram of the major elements of a business approval apparatus according to an embodiment of the present application;
FIG. 5 is an exemplary system architecture diagram to which embodiments of the present application may be applied;
fig. 6 is a schematic structural diagram of a computer system suitable for implementing the terminal device or the server according to the embodiment of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness. According to the technical scheme, the data acquisition, storage, use, processing and the like meet relevant regulations of national laws and regulations.
Fig. 1 is a schematic view of a main flow of a business approval method according to a first embodiment of the present application, and as shown in fig. 1, the business approval method includes:
step S101, receiving a service approval request, obtaining a request type identifier corresponding to the service approval request, and locking an emergency program in response to determining that the request type identifier is an emergency identifier.
In this embodiment, an executing body (for example, a server) of the loan approval method may receive the request for approval of the loan approval service through a wired connection or a wireless connection. The business approval request may be, for example, a loan approval request, or a money transfer approval request of a department, and the specific content of the business approval process is not limited in the embodiment of the present application. The embodiments of the present application take loan approval as an example for description. And the executive body responds to the fact that the type identifier carried in the loan approval business approval request is an emergency identifier, and indicates that the current loan approval business approval request is a loan approval business approval request sent in an emergency, specifically, the emergency may be a period of infectious disease attack, for example. When the execution subject determines that the request type identifier is the emergency identifier, the emergency program can be locked immediately to avoid being occupied by other processes, so that the loan approval business approval request can be processed in time.
And step S102, acquiring a corresponding user identifier according to the service approval request, and calling a preset white list.
The executive body may import the whitelist into audit after locking the emergency program. Specifically, the white list import may be aggregated by a division operator specific post with a list of small micro-businesses with good loan records and the import performed. After the successful import, the general organization operator rechecks the list information, including but not limited to the loan debt items of the white list small and micro enterprises, the enterprise industry type, the import operator number and organization, the import time and other information. And after the general organization passes the rechecking, formally importing the white list data into the system.
Specifically, after the emergency program is locked by the executive body, a preset white list can be directly called, the white list of the stock user with the good loan records is judged, and for small and micro enterprises with good loan records, if the enterprises are judged not to meet the relevant characteristics, the white list auxiliary loan approval method is not applicable. The small-scale enterprise with good loan records specified in the embodiment of the application meets the following conditions: the mechanism has applied for loan products; the loan record has no rules for triggering any approval and rejection; the last loan success was recorded within a certain time frame.
The embodiment of the application integrates the white list auxiliary approval system for the rapid loan integration of the small and micro enterprises, thereby reducing the loan approval cost and providing convenience for the loan of the small and micro enterprises. The white list auxiliary approval system is integrated, so that the links of admission, approval and the like can be reduced, the complete loan credit granting process is not required to be carried out on the stock user again, and only the necessary rule approval is required. Meanwhile, the loan state of the users in the white list is monitored and maintained, and the users in the white list can respond to the loan quickly.
Step S103, judging whether the user identification is in a preset white list.
And step S104, if not, unlocking the emergency program, and returning to the failure request.
And step S105, if yes, starting an emergency program, acquiring risk information corresponding to the business approval request, and calling a basic approval rule base to examine and verify the risk information.
The risk information may include, for example, whether the corresponding business information of the user identifier is a small-sized business with a small amount of loan, whether a repayment is expected, whether a loan is overdue and not yet paid, a total loan amount, a total outstanding loan amount, and the like.
After the executive body imports the white list data into the system, the executive body can automatically carry out data verification on the white list data, including verifying whether enterprise information corresponding to the user identification is small and tiny enterprises which are loaned once, expected repayment once, overdue and un-repayment left, total loan amount, total un-repayment amount, import state, import expiration time and a plurality of preposed rules, refusing to access the white list credit approval basic approval rule process for enterprises which do not meet the white list requirement, and setting the white list state as 'refusal'. And starting an emergency program for enterprises meeting the white list requirements, acquiring risk information such as whether enterprise information corresponding to the user identification corresponding to the business examination and approval request is small and tiny enterprises which have loaned once, whether repayment is expected once, whether overdue unpaid loans exist, total loan amount, total unpaid loans and the like, and calling a basic examination and approval rule base to examine and verify the risk information.
And step S106, judging whether the audit is passed.
Step S107, if yes, determining the money amount and issuing the money corresponding to the money amount.
And step S108, if not, intercepting the service approval request and executing an early warning process.
If the basic approval rule base passes the examination and verification of the risk information corresponding to the loan approval request, the final loan amount can be evaluated based on the risk information, and then the loan with the corresponding amount is issued; and if the basic approval rule base does not pass the examination and verification of the risk information corresponding to the loan approval request, intercepting the loan approval request, executing an early warning process, and further performing list monitoring and list maintenance on each list in the white list so as to ensure the latest white list in real time and improve the accuracy of the examination and verification of the white list.
In the embodiment of the application, the loan of the small and micro enterprise is as follows: the small and micro enterprise loan is a loan issued by a credit agency by taking the small and micro enterprise as an object. And (3) credit granting: comprehensively considering data such as credit investigation, settlement, tax payment, industrial and commercial enterprises and data such as financial assets, security, credit status of enterprise owners, establishing risk approval admission rules for users, automating approval processes, and returning approval results and corresponding loan amounts. White list auxiliary approval system: the white list auxiliary approval system is a loan auxiliary approval system based on white list authentication and provided by an organization. By uploading and checking the white list of the enterprise with effective authentication and directly accessing the white list to the existing loan process, the process of checking layer by layer is reduced, and the enterprise with urgent needs can more smoothly complete the petition of the petty loan.
The loan auxiliary approval system based on the white list authentication can be quickly switched into the current loan process and quickly responds to solve the urgent necessary loan requirements for small and micro enterprises, and through uploading and auditing the white list of the enterprise with effective authentication and directly accessing the white list into the current loan process, the number of examination links is reduced layer by layer, so that the enterprises with urgent requirements can more smoothly complete small and micro loan authorization. The continuity, the stability and the sustainability of the work of relieving difficulties of small and micro enterprises are kept, and the quality and the effect of user service management are improved.
In the embodiment, a request type identifier corresponding to a service approval request is obtained by receiving the service approval request, and an emergency program is locked in response to determining that the request type identifier is an emergency identifier; acquiring a corresponding user identifier according to the service approval request, calling a preset white list, judging whether the user identifier is in the preset white list, if not, unlocking the emergency program, and returning to the request failure; if so, starting an emergency program, acquiring risk information corresponding to the business approval request, and calling a basic approval rule base to examine and verify the risk information; judging whether the audit is passed, if so, determining the money amount, and issuing the money corresponding to the money amount; if not, the business approval request is intercepted, and the early warning process is executed. Direct approval intervention can be provided for enterprise users with good loan records through a white list and a basic approval rule base, the approval and review process is shortened through simplifying the business operation process, the business handling efficiency is improved, the business handling effect is improved, the credit demand of enterprise users with high quality stock is quickly met, the enterprise departure dilemma is supported, and the stable and healthy development of enterprises is helped.
Fig. 2 is a schematic main flow diagram of a business approval method according to a second embodiment of the present application, and as shown in fig. 2, the business approval method includes:
step S201, receiving a service approval request, obtaining a request type identifier corresponding to the service approval request, and locking an emergency program in response to determining that the request type identifier is an emergency identifier.
And step S202, acquiring a corresponding user identifier according to the service approval request.
And step S203, calling a preset internal control list, and performing pre-examination on the user identification.
And step S204, responding to the situation that the user identification is not in the preset internal control list, determining that the pre-examination is passed, and further executing a white list examination process.
Specifically, the business approval method further includes:
and responding to the user identification in the preset internal control list, returning the rejection identification and sending early warning information.
And the internal control list is the blacklist. The execution subject can firstly call the internal control list before calling the white list so as to directly conduct the money rejection processing on the enterprises in the internal control list, and therefore the follow-up white list auditing process does not need to be called. And the service approval resources are saved, and the efficiency is improved. When the executive body determines that the user identification of the current enterprise initiating the business approval request is not in the internal control list, the executive body can determine that the pre-audit of the internal control list passes, and then call the white list to perform the subsequent audit process.
Step S205, a preset white list is called.
Step S206, determining whether the user identifier is in a preset white list.
Step S207, if not, the emergency program is unlocked, and the request is returned to fail.
In the embodiment of the application, when the execution main body judges that the user identifier is not in the preset white list, the request for executing the service approval request through the emergency program is returned to fail, but the service approval request is not executed, and when the service approval request cannot be executed through the emergency program, the service approval request can be processed through a conventional service approval process, and the process is possibly complicated and can be processed.
And step S208, if so, starting an emergency program, acquiring risk information corresponding to the business approval request, and calling a basic approval rule base to examine and verify the risk information.
In step S209, it is determined whether the audit is passed.
Step S210, if yes, determining the money amount, and issuing the money corresponding to the money amount.
Specifically, determining the money amount comprises the following steps:
determining net asset information corresponding to the user identification, and further generating a corresponding pre-granted credit limit; and determining an auditing score corresponding to the risk information, and further determining a money amount, such as a loan amount or a department payment amount, based on the pre-granted credit amount and the auditing score.
The executive subject may invoke the score card model to determine an audit score corresponding to the risk information. First, the executing principal may determine one or more lines to which the audit score corresponds. The number of the quota corresponding to the audit score is not limited in the embodiment of the application.
Specifically, determining the money amount based on the pre-granted credit amount and the audit score comprises the following steps:
determining a quota set (for example, 650, 600, 630 ten thousands) corresponding to the audit score according to the preset corresponding relationship between the audit score and the quota; the pre-granted credit limit (for example 649 ten thousand) is matched with each limit in the limit set, and the limit obtained by matching (namely 650 ten thousand which is closest to 649 ten thousand) is determined as the money limit (namely 650 ten thousand).
Specifically, determining the amount obtained by matching as the money amount includes:
and determining the amount closest to the pre-granted credit amount in the amount set as the money amount. The money amount can be the amount of the loan to be placed.
The executive subject can determine the amount with the minimum difference with the pre-granted credit amount in all the amounts corresponding to the auditing scores as the final money amount.
And step S211, if not, intercepting the service approval request and executing an early warning process.
Specifically, the business approval method further includes:
and monitoring the money state of the user in the preset white list, responding to the abnormal money state, returning the user identification corresponding to the user with the abnormal state and sending alarm information. The payment status, for example, the loan status may be a overdue status, a status in which the loan is interrupted several times, or a status in which a large amount of the loan is not paid. The loan status is not particularly limited in the embodiments of the present application.
Specifically, the execution subject may remove the returned user with the abnormal state from the white list, and further update the white list to ensure that the white list is up to date in real time.
Specifically, the business approval method further includes:
regularly acquiring the money states corresponding to the newly added money issuing user and the historical money issuing user; and updating the preset white list based on the money state.
For example, taking a loan service as an example, the executive body may acquire loan states corresponding to a newly added loan issuance user within a preset time range close to the current time and a historical loan issuance user outside the preset time; and whether the users conform to the stock user white list judgment rule with good loan records or not is analyzed: the mechanism has applied for loan products; the loan record has no rules for triggering any approval and rejection; the last loan success was recorded within a certain time frame. And then adding the conforming users into the white list and updating the white list.
The white list is accessed into the existing loan process to obtain a white list auxiliary loan system, and the executive body can inquire loan process information of the associated loan of the white list user, track and monitor the loan information of the loan granted through the white list in real time, and reduce loan risks. And finally, the white list can be maintained, and the information and the process state of the white list can be more flexibly processed.
The white list auxiliary loan system shortens the examination and approval rechecking process, improves the service handling efficiency, improves the service handling effect, quickly meets the credit requirement of a high-quality user with stock and improves the user satisfaction by simplifying the service operation process. The user can continue to use the credit funds without returning the principal funds, and the 'bridging' cost generated by the user for raising the repayment funds is reduced. On the basis of scientifically judging the risk condition of the user, the user meeting the conditions is selected to give credit and loan, and the potential risk is effectively controlled. The method has important effects on improving the service efficiency of high-quality stock users, reducing the enterprise cost and the like.
The white list auxiliary loan system of the embodiment of the application determines the stock users with good loan records through the white list, avoids artificial subjective influence, and controls important risk points through a basic examination and approval rule base after the white list takes effect, so that the risk points of a wind control strategy are reduced. And finally, carrying out integrated management on the white list, including auditing the white list data by the increased involvement approval process, and monitoring, maintaining and intervening the white list data. The loan with uncertain risk in the white list can be corrected or terminated in time, and further the loan process is comprehensively controlled by risk. Aiming at enterprises with urgent loan requirements in special cases, the method can effectively make up the deficiency of credit granting and approval, and is helpful for the enterprises to more flexibly financing and solve the difficult and painful points in the current stage. Especially for small micro-enterprises related to the medical production industry during epidemic situations. The loan process experience is favorably improved, the continuity, the stability and the sustainability of relieving and relieving difficulties of small enterprises are kept, and the quality and the effect of user service management are improved.
Fig. 3 is a schematic application scenario diagram of a service approval method according to a third embodiment of the present application. The business approval method provided by the embodiment of the application is applied to a scene that a small micro enterprise has an urgent money demand. Taking loan approval as an example, as shown in fig. 3, when a user applies for a small and micro enterprise loan, first, the user is given credit for the amount according to the clean property conditions of the small and micro enterprise and the home of the enterprise owner. Then checking the internal control list information of the small and micro enterprises and the enterprise owners. On the basis, a stock user white list with good loan records is imported and audited by an organization, if the audit is passed, namely the small and micro enterprise is in the user white list, an emergency program is started, a basic approval rule base of a white list auxiliary approval system integration mechanism is called to directly perform necessary rule approval on the loan application of the user, and finally the approval determines whether to accept the loan application, if the necessary rule approval is not passed, loan rejection processing is executed, the loan state of the white list user in the white list is monitored, early-warned and maintained, and the list, the list maintenance and the list monitoring are performed on the user who just joins the white list. If the necessary rule approval is passed, a subscription payout is executed.
If the small micro-enterprise is not in the user white list, calling a conventional loan approval program, executing credit investigation examination of personal credit investigation and enterprise credit investigation on the small micro-enterprise, responding to the passing of the credit investigation examination, executing approval of a preset approval rule, responding to the passing of the approval, calling a scoring card model to score credit investigation information, responding to the obtained score being greater than a preset threshold value, determining the passing of the score, determining a final credit line based on the score, and executing signing and paying based on the final credit line. And when the credit investigation, the approval rule approval and the grading card model approval are not passed, executing the rejection processing. The enterprise owner can be the actual controller of the enterprise, namely the founder. User authorization, i.e., authorizing the business owner to handle the loan, may typically be one who is identified by several stakeholders, i.e., the business owner. Credit line pre-crediting, and credit line coarse crediting. The internal control list may be a black list.
According to the embodiment of the application, the white list loan assistance is used as the process intervention of calculating the loan of the small and micro enterprise, the theoretical method is combined with the actual method, the accurate identification of the small and micro enterprise with good credit is enhanced, the white list intervention examination and approval are carried out, and the defects of the traditional credit granting calculation method are overcome. And establishing a credit approval rule for the small and micro enterprises according to the basic model and the monitoring condition of the white list loan auxiliary system. The embodiment of the application adopts the white list loan auxiliary system to participate in the existing loan approval process, solves the financing difficulty for the loan of the small and micro enterprise with special conditions more flexibly, supplements the existing user credit approval system, and carries out quick and reliable credit approval on the user. In consideration of actual special scenes, the white list loan auxiliary system is applied to the actual loan approval process of the small and micro enterprises, and innovative financial products are invented by guiding practice in theory. The white list loan auxiliary system model of the embodiment of the application can provide direct examination and approval intervention for enterprises with existing good loan records, shortens examination and approval review processes, improves service handling efficiency, improves service handling effect and quickly meets credit requirements of high-quality users in stock by simplifying service operation processes. The method can support enterprises affected by epidemic situations to go out of predicament and stably and healthily develop.
Fig. 4 is a schematic diagram of main units of a business approval apparatus according to an embodiment of the present application. As shown in fig. 4, the business approval apparatus includes a receiving unit 401, a first auditing unit 402, a second unit 403, and an executing unit 404.
A receiving unit 401 configured to receive the service approval request, obtain a request type identifier corresponding to the service approval request, and lock the emergency program in response to determining that the request type identifier is the emergency identifier;
the first auditing unit 402 is configured to acquire a corresponding user identifier according to the service approval request, call a preset white list, judge whether the user identifier is in the preset white list, unlock the emergency program if the user identifier is not in the preset white list, and return to the request failure;
a second auditing unit 403, configured to start an emergency program if the request is positive, obtain risk information corresponding to the service approval request, and further invoke a basic approval rule base to audit the risk information;
an execution unit 404 configured to determine whether the audit is passed, determine the money amount if the audit is passed, and issue the money corresponding to the money amount; if not, the business approval request is intercepted, and the early warning process is executed.
In some embodiments, the apparatus further comprises a pre-audit unit, not shown in fig. 4, configured to: calling a preset internal control list, and performing pre-examination on the user identification; and responding to the fact that the user identification is not in the preset internal control list, determining that the pre-review is passed, and further executing a white list review process.
In some embodiments, the pre-audit unit is further configured to: and responding to the user identification in the preset internal control list, returning the rejection identification and sending early warning information.
In some embodiments, the execution unit 404 is further configured to: determining net asset information corresponding to the user identification, and further generating a corresponding pre-granted credit limit; and determining an audit score corresponding to the risk information, and further determining the money amount based on the pre-granted credit amount and the audit score.
In some embodiments, the execution unit 404 is further configured to: determining a quota set corresponding to the audit score according to the corresponding relation between the preset audit score and the quota; and matching the pre-granted credit line with each line in the line set, and determining the line obtained by matching as the money line.
In some embodiments, the execution unit 404 is further configured to: and determining the amount closest to the pre-granted credit amount in the amount set as the money amount.
In some embodiments, the business approval apparatus further includes a monitoring unit, not shown in fig. 4, configured to: and monitoring the money state of the user in the preset white list, responding to the abnormal money state, returning the user identification corresponding to the user with the abnormal state and sending alarm information.
In some embodiments, the apparatus further comprises a white list updating unit, not shown in fig. 4, configured to: regularly acquiring the money states corresponding to the newly added money issuing user and the historical money issuing user; and updating the preset white list based on the money state.
It should be noted that, in the present application, the service approval method and the service approval apparatus have a corresponding relationship in the specific implementation content, so the repeated content is not described again.
Fig. 5 illustrates an exemplary system architecture 500 to which the business approval method or the business approval apparatus according to the embodiment of the present application may be applied.
As shown in fig. 5, the system architecture 500 may include terminal devices 501, 502, 503, a network 504, and a server 505. The network 504 serves to provide a medium for communication links between the terminal devices 501, 502, 503 and the server 505. Network 504 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 501, 502, 503 to interact with a server 505 over a network 504 to receive or send messages or the like. The terminal devices 501, 502, 503 may have various communication client applications installed thereon, such as shopping applications, web browser applications, search applications, instant messaging tools, mailbox clients, social platform software, etc. (for example only).
The terminal devices 501, 502, 503 may be various electronic devices having a business approval processing screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 505 may be a server providing various services, such as a background management server (for example only) providing support for business approval requests submitted by users using the terminal devices 501, 502, 503. The background management server can receive the service approval request, acquire a request type identifier corresponding to the service approval request, and lock an emergency program in response to determining that the request type identifier is an emergency identifier; acquiring a corresponding user identifier according to the service approval request, calling a preset white list, judging whether the user identifier is in the preset white list, if not, unlocking the emergency program, and returning to the request failure; if so, starting an emergency program, acquiring risk information corresponding to the business approval request, and calling a basic approval rule base to examine and verify the risk information; judging whether the audit is passed, if so, determining the money amount, and issuing the money corresponding to the money amount; if not, the business approval request is intercepted, and the early warning process is executed. Direct approval intervention can be provided for enterprise users with good loan records through the white list and the basic approval rule base, the approval and review process is shortened through simplifying the business operation process, the business handling efficiency is improved, the business handling effect is improved, the credit requirement of enterprise users with high quality stock is quickly met, the enterprise is supported to leave a predicament, and the stable and healthy development of the enterprise is helped.
It should be noted that the service approval method provided in the embodiment of the present application is generally executed by the server 505, and accordingly, the service approval apparatus is generally disposed in the server 505.
It should be understood that the number of terminal devices, networks, and servers in fig. 5 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 6, shown is a block diagram of a computer system 600 suitable for use in implementing a terminal device of an embodiment of the present application. The terminal device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 6, the computer system 600 includes a Central Processing Unit (CPU)601 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. In the RAM603, various programs and data necessary for the operation of the computer system 600 are also stored. The CPU601, ROM602, and RAM603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output section 607 including a signal processing section such as a Cathode Ray Tube (CRT), a liquid crystal credit authorization inquiry processor (LCD), and the like, and a speaker and the like; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted in the storage section 608 as necessary.
In particular, according to embodiments disclosed herein, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, embodiments disclosed herein include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611. The above-described functions defined in the system of the present application are executed when the computer program is executed by the Central Processing Unit (CPU) 601.
It should be noted that the computer readable medium shown in the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may include, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes a receiving unit, a first auditing unit, a second auditing unit, and an executing unit. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs, and when the one or more programs are executed by one device, the device receives a service approval request, acquires a request type identifier corresponding to the service approval request, and locks an emergency program in response to determining that the request type identifier is an emergency identifier; acquiring a corresponding user identifier according to the service approval request, calling a preset white list, judging whether the user identifier is in the preset white list, if not, unlocking the emergency program, and returning to the request failure; if so, starting an emergency program, acquiring risk information corresponding to the business approval request, and calling a basic approval rule base to examine and verify the risk information; judging whether the audit is passed, if so, determining the money amount, and issuing the money corresponding to the money amount; if not, the business approval request is intercepted, and the early warning process is executed.
The computer program product of the present application includes a computer program, and the computer program, when executed by a processor, implements the business approval method in the embodiments of the present application.
According to the technical scheme of the embodiment of the application, direct approval intervention can be provided for enterprise users with existing good loan records through the white list and the basic approval rule base, the approval rechecking process is shortened through simplifying the business operation process, the business handling efficiency is improved, the business handling effect is improved, the credit requirement of enterprise users with high quality in stock is quickly met, and the enterprise is supported to go out of a predicament and help the enterprise to stably and healthily develop.
The above-described embodiments should not be construed as limiting the scope of the present application. Those skilled in the art will appreciate that various modifications, combinations, sub-combinations, and substitutions can occur, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Claims (16)
1. A business approval method is characterized by comprising the following steps:
receiving a service approval request, acquiring a request type identifier corresponding to the service approval request, and locking an emergency program in response to determining that the request type identifier is an emergency identifier;
acquiring a corresponding user identifier according to the service approval request, calling a preset white list, judging whether the user identifier is in the preset white list, if not, unlocking the emergency program, and returning to request failure;
if so, starting an emergency program, acquiring risk information corresponding to the business approval request, and calling a basic approval rule base to examine and verify the risk information;
judging whether the audit is passed, if so, determining the money amount, and issuing the money corresponding to the money amount; if not, the business approval request is intercepted, and an early warning process is executed.
2. The method of claim 1, wherein prior to said invoking the pre-set white list, the method further comprises:
calling a preset internal control list, and performing pre-examination on the user identification;
and responding to the fact that the user identification is not in the preset internal control list, determining that the pre-examination is passed, and further executing a white list examination process.
3. The method of claim 2, further comprising:
and responding to the user identification in the preset internal control list, returning a refusal identification and sending early warning information.
4. The method of claim 2, wherein said determining a money amount comprises:
determining net asset information corresponding to the user identification, and further generating a corresponding pre-granted credit limit;
and determining an audit score corresponding to the risk information, and further determining a money amount based on the pre-granted credit amount and the audit score.
5. The method of claim 4, wherein determining an amount of money based on the pre-granted credit line and the audit score comprises:
determining a quota set corresponding to the audit score according to a preset corresponding relation between the audit score and a quota;
and matching the pre-granted credit line with each line in the line set, and determining the line obtained by matching as a money line.
6. The method of claim 5, wherein the determining the amount obtained by matching as the money amount comprises:
and determining the amount which is closest to the pre-granted credit amount in the amount set as the money amount.
7. The method according to any one of claims 1 to 6, further comprising:
and monitoring the money state of the users in the preset white list, responding to the abnormal money state, returning the user identification corresponding to the user with the abnormal state and sending alarm information.
8. The method according to any one of claims 1 to 6, further comprising:
the method comprises the steps of obtaining money states corresponding to a newly added money issuing user and a historical money issuing user at regular time;
and updating the preset white list based on the money status.
9. A business approval apparatus, comprising:
the receiving unit is configured to receive a service approval request, acquire a request type identifier corresponding to the service approval request, and lock an emergency program in response to determining that the request type identifier is an emergency identifier;
the first auditing unit is configured to acquire a corresponding user identifier according to the service approval request, call a preset white list, judge whether the user identifier is in the preset white list, unlock the emergency program if the user identifier is not in the preset white list, and return to request failure;
the second auditing unit is configured to start an emergency program if the first auditing unit is configured to start the emergency program, acquire risk information corresponding to the business approval request, and further call a basic approval rule base to audit the risk information;
the execution unit is configured to judge whether the audit is passed, if so, the money amount is determined, and the money corresponding to the money amount is issued; if not, the business approval request is intercepted, and an early warning process is executed.
10. The apparatus according to claim 9, wherein the apparatus further comprises a pre-auditing unit configured to:
calling a preset internal control list, and performing pre-examination on the user identification;
and responding to the fact that the user identification is not in the preset internal control list, determining that the pre-examination is passed, and further executing a white list examination process.
11. The apparatus of claim 10, wherein the pre-audit unit is further configured to:
and responding to the user identification in the preset internal control list, returning a refusal identification and sending early warning information.
12. The apparatus of claim 10, wherein the execution unit is further configured to:
determining net asset information corresponding to the user identification, and further generating a corresponding pre-granted credit limit;
and determining an audit score corresponding to the risk information, and further determining a money amount based on the pre-granted credit amount and the audit score.
13. The apparatus of claim 12, wherein the execution unit is further configured to:
determining a quota set corresponding to the audit score according to a preset corresponding relation between the audit score and a quota;
and matching the pre-granted credit line with each line in the line set, and determining the line obtained by matching as a money line.
14. An electronic device for business approval, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-8.
15. A computer-readable medium, on which a computer program is stored, which program, when being executed by a processor, is adapted to carry out the method of any one of claims 1-8.
16. A computer program product comprising a computer program, characterized in that the computer program realizes the method according to any of claims 1-8 when executed by a processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210099077.3A CN114493843A (en) | 2022-01-27 | 2022-01-27 | Business approval method and device, electronic equipment and computer readable medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210099077.3A CN114493843A (en) | 2022-01-27 | 2022-01-27 | Business approval method and device, electronic equipment and computer readable medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114493843A true CN114493843A (en) | 2022-05-13 |
Family
ID=81476165
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210099077.3A Pending CN114493843A (en) | 2022-01-27 | 2022-01-27 | Business approval method and device, electronic equipment and computer readable medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114493843A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115860749A (en) * | 2023-02-09 | 2023-03-28 | 支付宝(杭州)信息技术有限公司 | Data processing method, device and equipment |
CN116308736A (en) * | 2023-02-15 | 2023-06-23 | 广州市花都万穗小额贷款股份有限公司 | Loan money early warning management system |
CN116582370A (en) * | 2023-07-13 | 2023-08-11 | 陕西科威盛电子科技有限公司 | Multi-level risk management and control digital safety system and safety monitoring and management method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106651570A (en) * | 2016-12-27 | 2017-05-10 | 中国建设银行股份有限公司 | System and method for real-time loan approval |
CN107330670A (en) * | 2017-06-29 | 2017-11-07 | 喀什博雅成信网络科技有限公司 | One kind automation loan approval system and method |
CN109102386A (en) * | 2018-06-04 | 2018-12-28 | 北京至信普林科技有限公司 | Risk control method and device based on big data |
CN112907361A (en) * | 2021-03-29 | 2021-06-04 | 中国建设银行股份有限公司 | Method and device for processing loan application |
-
2022
- 2022-01-27 CN CN202210099077.3A patent/CN114493843A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106651570A (en) * | 2016-12-27 | 2017-05-10 | 中国建设银行股份有限公司 | System and method for real-time loan approval |
CN107330670A (en) * | 2017-06-29 | 2017-11-07 | 喀什博雅成信网络科技有限公司 | One kind automation loan approval system and method |
CN109102386A (en) * | 2018-06-04 | 2018-12-28 | 北京至信普林科技有限公司 | Risk control method and device based on big data |
CN112907361A (en) * | 2021-03-29 | 2021-06-04 | 中国建设银行股份有限公司 | Method and device for processing loan application |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115860749A (en) * | 2023-02-09 | 2023-03-28 | 支付宝(杭州)信息技术有限公司 | Data processing method, device and equipment |
CN116308736A (en) * | 2023-02-15 | 2023-06-23 | 广州市花都万穗小额贷款股份有限公司 | Loan money early warning management system |
CN116308736B (en) * | 2023-02-15 | 2024-04-19 | 广州市花都万穗小额贷款股份有限公司 | Loan money early warning management system |
CN116582370A (en) * | 2023-07-13 | 2023-08-11 | 陕西科威盛电子科技有限公司 | Multi-level risk management and control digital safety system and safety monitoring and management method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210097627A1 (en) | Systems and methods for enhanced organizational transparency using a credit chain | |
US20200050599A1 (en) | Self-cleaning token vault | |
CN114493843A (en) | Business approval method and device, electronic equipment and computer readable medium | |
KR20160121576A (en) | System and method for facilitating financial loans | |
CA3165099A1 (en) | System and method for assessing a digital interaction with a digital third party account service | |
AU2016361449A1 (en) | An electronic security system and method for investment transaction | |
CN113724077A (en) | Loan approval method, device and system | |
CN113487436A (en) | Service processing method and device, electronic equipment and storage medium | |
US11997103B2 (en) | Graduated accounts using assertions | |
CN115564415A (en) | Order payment and settlement method and device | |
CN114065285A (en) | Cross-organization credit granting management method and system based on block chain | |
CN110738480B (en) | Digital asset hosting risk control method, device and storage medium | |
CN114066615A (en) | Trusted payment method, device, electronic equipment and storage medium | |
CN114418586A (en) | Reserved mobile phone number verification method, reserved mobile phone number verification device, reserved mobile phone number verification electronic equipment, reserved mobile phone number verification medium and program product | |
CN114170027A (en) | Processing method and device for public accumulation fund payment account, electronic equipment and storage medium | |
CN113487438A (en) | Processing method and device of accumulation fund service | |
US10216830B2 (en) | Multicomputer processing of client device request data using centralized event orchestrator and link discovery engine | |
CN111898886A (en) | Collective asset clearing and checking system | |
CN113706045B (en) | Funds payment method, apparatus, device, medium and program product | |
CN111047277B (en) | Nuclear protection system, method, device and computer readable medium | |
US12069046B2 (en) | Multi-tier tokenization with long term token | |
CN113139869B (en) | Credit authorization query processing method and device | |
KR20100065872A (en) | Loan managing system of a auction balance using of rights insurance | |
CN115619542A (en) | Data processing method and device | |
CN116167837A (en) | Method and device for fund supervision |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |