CN115239396A - Order-escaping monitoring method and system - Google Patents
Order-escaping monitoring method and system Download PDFInfo
- Publication number
- CN115239396A CN115239396A CN202210955029.XA CN202210955029A CN115239396A CN 115239396 A CN115239396 A CN 115239396A CN 202210955029 A CN202210955029 A CN 202210955029A CN 115239396 A CN115239396 A CN 115239396A
- Authority
- CN
- China
- Prior art keywords
- resume
- suspicious
- target
- preset
- monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 63
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000012216 screening Methods 0.000 claims abstract description 17
- 230000015654 memory Effects 0.000 claims description 17
- 230000002452 interceptive effect Effects 0.000 claims description 11
- 230000004044 response Effects 0.000 claims description 10
- 238000004590 computer program Methods 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 abstract description 3
- 230000008569 process Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 238000012790 confirmation Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000013507 mapping Methods 0.000 description 3
- 238000003032 molecular docking Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0248—Avoiding fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/105—Human resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- General Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Entrepreneurship & Innovation (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Marketing (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Game Theory and Decision Science (AREA)
- Data Mining & Analysis (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the disclosure discloses a method and a system for monitoring a flight ticket, which comprises the following steps: screening the resume based on preset screening conditions to obtain a target resume with the risk of escaping from the resume; matching suspicious resumes meeting preset matching conditions in a local resume library based on the information of the target resumes; and responding to the received request for monitoring any suspicious resume, and determining whether the object corresponding to the suspicious resume is an escape object or not based on the information updated in real time by the suspicious resume. By means of the method for determining the evasion object after the suspicious resume is determined, the evasion object can be found in time, and the income loss caused by the evasion is reduced. The problem that order escaping monitoring cannot be carried out in the related technology is solved.
Description
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to a method and a system for monitoring a flight ticket.
Background
Hunting enterprise, the mechanism that helps the first enterprise to find the second that needs, to the order of the first enterprise, have first and second confirmed the condition under, the first is not to the situation that hunt enterprise withdraws money, and most hunting enterprises can't be to this fleeing single file for in time tracking control, and then lead to cost loss.
Disclosure of Invention
The present disclosure is directed to a method and system for monitoring a flight ticket.
In order to achieve the above object, according to a first aspect of the present disclosure, there is provided a flight ticket monitoring method including: screening the resume based on preset screening conditions to obtain a target resume with the risk of escaping from the resume; matching suspicious resumes meeting preset matching conditions in a local resume library based on the information of the target resumes; and responding to the received request for monitoring any suspicious resume, and determining whether the object corresponding to the suspicious resume is an escape object or not based on the information updated in real time by the suspicious resume.
Optionally, matching, based on the information of the target resume, the suspicious resumes meeting the preset matching condition in the local resume repository includes: matching the resume containing the preset fields in the local resume library as an initial suspicious resume based on the first preset fields in the target resume; if the number of the initial suspicious resume is not unique, whether a uniquely matched resume exists in the initial suspicious resume is determined based on a second preset field in the target resume; and if the third preset field in the target resume is matched with the preset target field, the resume is a suspicious resume.
Optionally, after responding to receiving the request for monitoring any suspicious resumes, the method further comprises: and acquiring target information of the any suspicious resume.
Optionally, the method further comprises: and receiving and storing the edited target information in response to receiving a request for editing the arbitrarily established target information sent by the user side interactive interface.
Optionally, in response to receiving a request for monitoring any suspicious resume, a mapping relationship is established between the establishment to be monitored and preset user information.
According to a second aspect of the present disclosure, there is provided an order evasion monitoring system comprising: the screening unit is configured to screen the resume based on preset screening conditions to obtain a target resume with the risk of escaping from the resume; the resume determining unit is configured to match suspicious resumes meeting preset matching conditions in the local resume library based on the information of the target resumes; and the monitoring unit is configured to respond to the received request for monitoring any suspicious resume, and determine whether the object corresponding to the suspicious resume is an escape object or not based on the information updated in real time by the suspicious resume.
Optionally, matching the suspicious resume meeting the preset matching condition in the local resume repository based on the information of the target resume includes: matching the resume containing the preset fields in the local resume library as an initial suspicious resume based on the first preset fields in the target resume; if the number of the initial suspicious resumes is not unique, whether a uniquely matched resume exists in the initial suspicious resumes is determined based on a second preset field in the target resumes; and if the third preset field in the target resume is matched with the preset target field, the resume is a suspicious resume.
Optionally, after responding to the received request for monitoring any suspicious resume, the target information of any suspicious resume is also obtained.
According to a third aspect of the present disclosure, there is provided a computer-readable storage medium storing computer instructions for causing a computer to execute the policy evasion monitoring method according to any one of the implementations of the first aspect.
According to a fourth aspect of the present disclosure, there is provided an electronic device comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to cause the at least one processor to perform the waybill monitoring method according to any one of the implementations of the first aspect.
In the method and system for monitoring the order evasion in the embodiment of the present disclosure, the method comprises: screening the resume based on preset screening conditions to obtain a target resume with the risk of escaping from the resume; matching suspicious resumes meeting preset matching conditions in a local resume library based on the information of the target resumes; and responding to the received request for monitoring any suspicious resume, and determining whether the object corresponding to the suspicious resume is an escape object or not based on the information updated in real time by the suspicious resume. Through the mode of determining the order-escaping object after determining the suspicious resume, the order-escaping object can be found in time, and the income loss caused by the order-escaping can be reduced. The problem that order escaping monitoring cannot be carried out in the related technology is solved.
Drawings
In order to more clearly illustrate the detailed description of the present disclosure or the technical solutions in the prior art, the drawings used in the detailed description or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of a method of flight ticket monitoring according to an embodiment of the present disclosure;
2-3 are schematic diagrams illustrating applications of the method for monitoring the evasion order according to the embodiment of the disclosure;
FIG. 4 is a schematic diagram of an application of the waybill avoidance monitoring system according to an embodiment of the present disclosure; and
fig. 5 is a schematic diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
In order to make the technical solutions of the present disclosure better understood by those skilled in the art, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are only some embodiments of the present disclosure, not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present disclosure without making creative efforts shall fall within the protection scope of the present disclosure.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged as appropriate for the embodiments of the disclosure described herein. Moreover, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that, in the present disclosure, the embodiments and the features of the embodiments may be combined with each other without conflict. The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
The system architecture applicable to the embodiment may include a server and a client, and the execution main body of the method of the embodiment may be the server, and the user may implement interaction with the server through the client, thereby implementing order monitoring. The order related information can be presented in the interactive interface of the user terminal.
According to an embodiment of the present disclosure, there is provided a policy evasion monitoring method, as shown in fig. 1, the method includes the following steps 101 to 103:
step 101: and screening the resume based on preset screening conditions to obtain the target resume with the risk of escaping the order.
In this embodiment, the resume can be screened by using the resume state of the second party (job seeker) as the screening condition. The status of the resume to be monitored can be obtained, if the status of the resume is in a state that the second party accepts the position invitation of the first party (recruiter) and the second party does not enter the position or leaves the position within the promised entry period, the target resume with the risk of escaping is determined, and exemplarily, the order in the confirmation offer and the guarantee period follow-up period can be the target resume, and the data of the non-entering or leaving can be the target resume.
Step 102: and matching the suspicious resumes meeting the preset matching conditions in the local resume library based on the information of the target resumes.
In this embodiment, it is determined whether the resume of party b is stored in the local resume repository in a matching manner, and if not, the target resume does not belong to the suspicious resume, otherwise, the target resume may belong to the suspicious resume. And only the resume meeting the preset matching condition can be determined as the suspicious resume.
As an optional implementation manner of this embodiment, based on the information of the target resume, matching the suspicious resumes meeting the preset matching condition in the local resume repository includes: matching the resume containing the preset fields in the local resume library as an initial suspicious resume based on the first preset fields in the target resume; if the number of the initial suspicious resumes is not unique, whether a uniquely matched resume exists in the initial suspicious resumes is determined based on a second preset field in the target resumes; and if the third preset field in the target resume is matched with the preset target field, the resume is a suspicious resume.
In this optional implementation, the query may be performed in the local resume repository based on a combination of the gender field, the earliest-to-function company name field, and the latest school name field in the target resume, if a matching result exists, the identity identification fields in the target resume may be matched, for example, the mobile phone number is used, if the identity identification fields are consistent, the target resume is an initial suspicious resume, if the identity identification fields are not consistent, the current target resume is not a suspicious resume, and the matching process is ended.
If the number of the initial suspicious resume is not unique, the initial suspicious resume can be compared in a local resume library through a name field in the target resume and a work experience field (which can comprise a work time period and a name of a working enterprise) in the resume, and if an inclusion relation exists, the suspicious resume is judged.
Referring to fig. 2, fig. 2 shows the resume-capable determination logic that may first determine orders at risk of order escape, confirm offer and order during the warranty follow-up, with the data that cannot enter or leave being likely target resumes. And then querying the resume library by using the combination condition of the gender, the earliest company name and the latest school name, if a return result exists, the target resume library is a local resume library, meanwhile, a mobile phone number is queried, if the result is consistent with the target resume library, the result is confirmed to be a suspected resume by comparing the mobile phone numbers, and if the result is inconsistent with the target resume library, the result is ended. If the result of the query is not unique, comparing the last name (first name) in the target resume and any two sections of working histories (starting time and company name) with the local resume library, if the result of the query is returned to be unique, comparing the company name recommended once with all company names in the hit resume, and if the result of the query is unique, judging that the resume is suspicious.
Step 103: in response to receiving a request for monitoring any suspicious resume, determining whether an object corresponding to the suspicious resume is an evasive object based on the information updated in real time by the suspicious resume.
In this embodiment, for the resume determined to be a resume capable of being resumed, any resume capable of being resumed may be monitored based on the monitoring request sent by the user side. When the suspicious resume is monitored, the updating information of the suspicious resume can be obtained in real time, whether the second party to which the suspicious resume belongs is in the role of the first party or not is determined, and if so, the first party is an evasion object.
As an optional implementation manner of this embodiment, after responding to the received request for monitoring any suspicious resumes, the method further includes: and acquiring target information of the any suspicious resume.
After determining the suspicious resume, the suspicious obtained resume's resume name, job title, customer name, time of employment, time of departure, associated company, and the like. After the target information is acquired, the suspicious information is provided to a user side interactive interface so as to be displayed in a preset form in the interactive interface.
As an optional implementation manner of this embodiment, the method further includes: and receiving and storing the edited target information in response to receiving a request for editing the arbitrarily established target information sent by the user side interactive interface.
As an optional implementation manner of this embodiment, the method further includes: and receiving and storing the edited target information in response to receiving a request for editing the arbitrarily established target information sent by the user side interactive interface.
In the optional implementation manner, the user can select the suspicious resume to be monitored through the interactive interface of the user side, the first party corresponding to the resume can be displayed on the page after the suspicious resume is selected, and the related information of the first party serving as the monitoring target can be displayed on the monitoring page. May include name, associated company name, job title, offer data, date monitored, status monitored (in monitoring, not started, done), etc. Such as shown in fig. 3.
As an optional implementation manner of this embodiment, the method further includes: and responding to a request for editing the arbitrarily established target information sent by a user side interactive interface, and receiving and storing the edited target information.
In this optional implementation manner, the information of the monitoring target may be edited in the monitoring interface, including deleting the monitoring target or modifying the monitoring related information.
As an optional implementation manner of this embodiment, in response to receiving a request for monitoring any suspicious resume, a mapping relationship is established between establishment to be monitored and preset user information.
In this optional implementation manner, the user who has the suspicious resume to be monitored may be determined in advance, and the user may configure the mapping relationship through the configuration interface. And then the management user can be quickly added to each suspicious resume.
Illustratively, suspicious orders are assigned to the attribution by historical data, candidates requiring monitoring are subsequently listed as data requiring monitoring by personal confirmation of the attribution.
Home confirmation logic: all the positions of the operation are allocated to the corresponding client docking consultants; and judging whether the docking personnel for changing the positions leave the positions or not for all offline positions, if so, allocating the docking personnel for changing the positions to the main area of the counselor, and if so, allocating the counselor for the main area to default personnel selection of the system. It is understood that a job may be assigned to only one advisor.
The embodiment can effectively and timely determine the benefit of finding the order-escaping security hunting enterprises through monitoring and analyzing the order-escaping data. The candidate's attention of the hunting consultant can be increased, thereby increasing the order, the order ending does not mean ending later, and the near situation of the candidate with more attention can be increased by recommending re-employment, thereby increasing the order amount and creating revenue.
According to the method and the system, the escaped orders are accurately matched through tracking, monitoring, calculating and analyzing the later stages of the orders, and the evidence legal maintenance rights and interests can be provided. Meanwhile, the system plays a role in monitoring the standardization of the industry behaviors, and is favorable for the whole industry to trend to standardization, reasonability and legality and to be more mature.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
According to an embodiment of the present disclosure, there is also provided a system for implementing the above mentioned policy evasion monitoring system, wherein the screening unit is configured to screen resumes based on preset screening conditions to obtain target resumes with policy evasion risks; the resume determining unit is configured to match suspicious resumes meeting preset matching conditions in the local resume library based on the information of the target resumes; and the monitoring unit is configured to respond to the received request for monitoring any suspicious resume, and determine whether the object corresponding to the suspicious resume is an escape object or not based on the information updated in real time by the suspicious resume.
As an optional implementation manner of this embodiment, based on the information of the target resume, matching the suspicious resumes meeting the preset matching condition in the local resume repository includes: matching the resume containing the preset fields in the local resume library as an initial suspicious resume based on the first preset fields in the target resume; if the number of the initial suspicious resumes is not unique, whether a uniquely matched resume exists in the initial suspicious resumes is determined based on a second preset field in the target resumes; and if the third preset field in the target resume is matched with the preset target field, the resume is a suspicious resume.
As an optional implementation manner of this embodiment, after responding to the received request for monitoring any suspicious resume, the target information of any suspicious resume is also obtained.
As an optional implementation manner of this embodiment, in response to receiving a request for editing arbitrarily established target information, which is sent by a user-side interactive interface, the edited target information is received and stored.
Illustratively, referring to fig. 4, a BI interface inside the enterprise may be set, and the user may perform order-escaping monitoring through an interactive interface at the user end. The system may include a suspicious order determination module and display the person's name, job title, customer name, time of job entry, etc. of the order in a suspicious order presentation interface. Meanwhile, information such as a customer name and an associated company name can be displayed after the monitoring target is selected. Order monitoring logic inside a human resource company (hunting enterprises) is formed in a BI page, and a consultant confirms to escape from individual selection through paying attention to the logic and reasonably maintains the own rights and interests of the enterprise through legal departments of the company.
An embodiment of the present disclosure provides an electronic device, as shown in fig. 5, the electronic device includes one or more processors 51 and a memory 52, where one processor 53 is taken as an example in fig. 5.
The controller may further include: an input device 53 and an output device 54.
The processor 51, the memory 52, the input device 53 and the output device 54 may be connected by a bus or other means, and the bus connection is exemplified in fig. 5.
The processor 51 may be a Central Processing Unit (CPU). The processor 51 may also be other general purpose processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or combinations thereof. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 52, which is a non-transitory computer-readable storage medium, may be used to store non-transitory software programs, non-transitory computer-executable programs, and modules, such as program instructions/modules corresponding to the control methods in the embodiments of the present disclosure. The processor 51 executes various functional applications of the server and data processing by running non-transitory software programs, instructions and modules stored in the memory 52, namely, implements the policy evasion monitoring method of the above-mentioned method embodiment.
The memory 52 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of a processing device operated by the server, and the like. Further, the memory 52 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 52 may optionally include memory located remotely from the processor 51, which may be connected to a network connection device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 53 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the processing device of the server. The output device 54 may include a display device such as a display screen.
One or more modules are stored in the memory 52, which when executed by the one or more processors 51 perform the method as shown in fig. 1.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above may be implemented by a computer program that can be stored in a computer-readable storage medium and that can be executed by a computer to instruct related hardware, where the computer program can include the processes of the embodiments of the motor control methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-only memory (ROM), a Random Access Memory (RAM), a flash memory (FlashMemory), a hard disk (hard disk drive, abbreviated as HDD) or a Solid State Drive (SSD), etc.; the storage medium may also comprise a combination of memories of the kind described above.
Although the embodiments of the present disclosure have been described in conjunction with the accompanying drawings, those skilled in the art may make various modifications and variations without departing from the spirit and scope of the present disclosure, and such modifications and variations fall within the scope defined by the appended claims.
Claims (10)
1. A method for flight ticket monitoring, comprising:
screening the resume based on preset screening conditions to obtain a target resume with the risk of escaping from the resume;
matching suspicious resumes meeting preset matching conditions in a local resume library based on the information of the target resumes;
in response to receiving a request for monitoring any suspicious resume, determining whether an object corresponding to the suspicious resume is an evasive object based on the information updated in real time by the suspicious resume.
2. The ticket evasion monitoring method of claim 1, wherein matching the suspicious resume meeting the preset matching condition in the local resume repository based on the information of the target resume comprises:
matching the resume containing the preset fields in the local resume library as an initial suspicious resume based on the first preset fields in the target resume;
if the number of the initial suspicious resume is not unique, whether a uniquely matched resume exists in the initial suspicious resume is determined based on a second preset field in the target resume;
and if the third preset field in the target resume is matched with the preset target field, the resume is a suspicious resume.
3. The ticket evasion monitoring method of claim 1, wherein after responding to receiving a request to monitor any suspicious resumes, the method further comprises: and acquiring target information of the any suspicious resume.
4. The ticket evasion monitoring method of claim 3, further comprising: and receiving and storing the edited target information in response to receiving a request for editing the arbitrarily established target information sent by the user side interactive interface.
5. The ticket evasion monitoring method of claim 1, wherein the establishment to be monitored is mapped with preset user information in response to receiving a request for monitoring any suspicious resumes.
6. An order evasion monitoring system, comprising:
the screening unit is configured to screen the resume based on preset screening conditions to obtain a target resume with the risk of escaping from the resume;
the resume determining unit is configured to match suspicious resumes meeting preset matching conditions in the local resume library based on the information of the target resumes;
and the monitoring unit is configured to respond to the received request for monitoring any suspicious resume, and determine whether the object corresponding to the suspicious resume is an evasive object or not based on the information updated in real time by the suspicious resume.
7. The ticket evasion monitoring system of claim 6, wherein matching the suspicious resume meeting the preset matching condition in the local resume repository based on the information of the target resume comprises:
matching the resume containing the preset fields in the local resume library as an initial suspicious resume based on the first preset fields in the target resume;
if the number of the initial suspicious resumes is not unique, whether a uniquely matched resume exists in the initial suspicious resumes is determined based on a second preset field in the target resumes;
and if the third preset field in the target resume is matched with the preset target field, the resume is a suspicious resume.
8. The ticket evasion monitoring system of claim 6, wherein the target information for any suspicious resume is also obtained after the request for monitoring the suspicious resume is received.
9. A computer-readable storage medium storing computer instructions for causing a computer to perform the method of claim 1-5.
10. An electronic device, comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to cause the at least one processor to perform the waybill monitoring method of any one of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210955029.XA CN115239396A (en) | 2022-08-10 | 2022-08-10 | Order-escaping monitoring method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210955029.XA CN115239396A (en) | 2022-08-10 | 2022-08-10 | Order-escaping monitoring method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115239396A true CN115239396A (en) | 2022-10-25 |
Family
ID=83678791
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210955029.XA Pending CN115239396A (en) | 2022-08-10 | 2022-08-10 | Order-escaping monitoring method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115239396A (en) |
-
2022
- 2022-08-10 CN CN202210955029.XA patent/CN115239396A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200047334A1 (en) | Event processing using robotic entities | |
US10574539B2 (en) | System compliance assessment utilizing service tiers | |
CN109102145B (en) | Process orchestration | |
US20150135305A1 (en) | Method and system for dynamically and automatically managing resource access permissions | |
US20200226519A1 (en) | System and method for managing resources in a worksite | |
US20210158174A1 (en) | Equipment maintenance assistant training based on digital twin resources | |
US20130031176A1 (en) | Identification of rogue social media assets | |
CN108874638B (en) | Intelligent cloud management based on portrait information | |
KR101991881B1 (en) | Labor management solution system and method | |
US10009227B2 (en) | Network service provisioning tool and method | |
CN111897587B (en) | Internet of things application configuration method, device, computer equipment and storage medium | |
US20140108073A1 (en) | System and method for populating assets to a maintenance management system | |
CN110135815B (en) | Travel order monitoring method and device, computer equipment and storage medium | |
US20160098800A1 (en) | System for dynamically customizing product configurations | |
US20220004660A1 (en) | Unsubscribe and delete automation | |
US11196693B2 (en) | Unsubscribe automation | |
US9734486B2 (en) | Integrated temporary labor provisioning and monitoring | |
US9819683B2 (en) | Automated control of technology resources | |
CN111737080A (en) | Abnormal transaction suspicion monitoring method and device, computer equipment and storage medium | |
CN112633619A (en) | Risk assessment method and device | |
CN115239396A (en) | Order-escaping monitoring method and system | |
KR20190076930A (en) | Labor management solution system and method | |
US11301930B1 (en) | Systems and methods for integrating, aggregating and utilizing data from a plurality of data sources | |
US11354733B2 (en) | External entity cross-relational dynamic matching system | |
US20200097870A1 (en) | Work task commitment manager |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |