Method and device for screening financial business operation logs

A business operation and business technology, applied in the field of financial technology, can solve problems such as failure to meet the verification requirements of mass business risk control compliance, effectiveness cannot be guaranteed, business model and rules are out of touch, and achieve reduction of verification and inspection time, and solution Timeliness issues, the effect of meeting performance requirements

Pending Publication Date: 2021-05-14
中国农业银行股份有限公司上海市分行
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, because the design process is separated from the actual operation data, the business model and rules are out of touch with the actual business, resulting in low efficiency and a waste
[0005] 2) When the rules need to be updated, the business personnel need to feed back to the programmers for coding, repackage and release. The update can only be updated through the scheduled release window, and the effectiveness cannot be guaranteed
[0006] 3) Existing risk control engines usually operate in a stand-alone mode. Due to the large amount of employee operation log data, a bank has accumulated hundreds of tons of historical operation data. The traditional rule verification method based on a stand-alone database has been unable to meet the needs of massive businesses. Risk Control Compliance Verification Requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for screening financial business operation logs
  • Method and device for screening financial business operation logs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] figure 1 Disclosed is a flow chart of a method for screening financial business operation logs according to an embodiment of the present invention. refer to figure 1 As shown, the screening method of the financial business operation log includes the following steps:

[0030] S1. The step of obtaining operation records. Obtain operation records from operation logs from multiple data sources, process and convert the operation records to obtain operation sequence files. Since the bank has many branches and business outlets, each branch and business outlet has a local operation log to record relevant local operation data. In the operation record obtaining step, respective operation records are obtained from the servers of each branch office and business network. In the internal compliance review, the sequence of operations is an important verification link, and the sequence of operations is mainly judged by recording the occurrence time of the operations. In order to a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for screening financial business operation logs. The method comprises the following steps: an operation record acquisition step, a rule definition step, a rule analysis and matching step, a rule verification step, a rule review step and a data screening step. The invention further provides a device for screening the financial service operation logs. The device comprises an operation record obtaining module, a rule defining module, a rule analyzing and matching module, a rule verifying module, a rule reviewing module and a data screening module. The method and device for screening the financial business operation logs are high in practicability and simple in operation, and the internal control rule verification and inspection time of business personnel can be greatly shortened.

Description

technical field [0001] The present invention relates to the field of financial science and technology, and more specifically, relates to the compliance inspection technology of the internal operation process of financial institutions. Background technique [0002] Risk control is the most concerned matter of financial institutions, and internal control compliance is an important part of risk control of financial institutions. Internal control compliance is mainly aimed at the internal operations of financial institutions, requiring each position to strictly follow the operating specifications and execute in sequence. If the operation is not carried out according to the operation specification, then the data record will be confused or wrong. Although it does not affect the final result from a practical point of view, wrong operations will cause errors in the data recorded in the database, which will bring hidden dangers to other subsequent businesses. Therefore, internal co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/10G06Q40/02G06Q40/04
CPCG06Q10/10G06Q40/02G06Q40/04
Inventor 姜赵晖臧其事
Owner 中国农业银行股份有限公司上海市分行
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products