Implementing Four-Eyes in Cheque Processing Systems
Problem: Manual cheque workflows create avoidable errors, delays, and fragmented controls. Business impact: Teams lose cashflow visibility, reconciliation speed, and audit confidence when this process stays manual. Outcome: This guide shows how to implement cheque processing software patterns that improve throughput and control quality. Who this is for: developers and platform teams.
Implementation Example: Manual Approval Workflows in Cheque Processing
The four-eyes principle manifests with particular sophistication in modern cheque processing systems, where automated fraud detection algorithms must seamlessly integrate with human oversight mechanisms. ChequeDB exemplifies this architectural pattern through its implementation of tiered risk scoring with mandatory manual review queues, ensuring that no single automated decision—or human operator—can unilaterally approve high-risk transactions.
The Automated Decision Layer and Exception Routing
Cheque processing begins with the ingestion of cheque images through multiple channels: branch scanners, mobile deposit applications, or batch file uploads. The automated processing pipeline performs several operations in parallel:
- Image Quality Analysis: Deskewing, denoising, and validation that the cheque image meets minimum quality thresholds
- OCR/ICR Extraction: Optical Character Recognition for printed text and Intelligent Character Recognition for handwritten fields
- MICR Line Reading: Magnetic Ink Character Recognition for routing number, account number, and cheque number
- Fraud Detection Scoring: Multi-layered AI analysis examining signature patterns, writing pressure, font consistency, and historical transaction patterns
The system generates a composite risk score from 0.0 to 1.0:
Risk Score < 0.3: Auto-Accept (Straight-through processing)
Risk Score 0.3 - 0.7: Queue for Manual Review (Exception queue)
Risk Score > 0.7: Auto-Reject (Immediate hold)
This risk-based routing is the first application of the four-eyes principle: high-risk items cannot proceed without human verification.
Fraud Detection Engine Architecture
Modern systems employ layered fraud detection that complements the four-eyes principle:
Rule-Based Layer (Deterministic):
- Duplicate presentment detection (same MICR + amount + date)
- Velocity checks (unusual deposit patterns)
- High-risk routing number lists
- Amount threshold flags
ML Scoring Layer (Probabilistic):
- Supervised models trained on historical fraud labels
- Unsupervised anomaly detection for novel patterns
- Image forensics (alteration detection, splicing)
Decision Fusion:
Risk Score = Σ(rule_hits * weights) + ML_score
if Risk Score < Threshold_Low: Auto-accept
if Risk Score < Threshold_High: Queue for review
if Risk Score >= Threshold_High: Auto-reject + alert
The Manual Review Queue: Implementing Maker-Checker
When a cheque is routed to the manual review queue, it enters a formal workflow that enforces four-eyes oversight over the automated system's initial assessment.
Phase 1: Initial Review (Maker)
A fraud investigator (the Maker) retrieves the item from the review queue. The system presents:
- Front and rear cheque images with zoom and enhancement capabilities
- Side-by-side comparison with reference signatures
- AI-generated risk factors (e.g., "Signature confidence: 62%")
- Historical transaction patterns and velocity checks
The investigator makes an initial determination:
- Approve: Override the system's risk flag
- Reject: Confirm the system's suspicion
- Escalate: Request secondary review for complex cases
Phase 2: Secondary Authorization (Checker)
Critically, the system programmatically prevents the initial reviewer from executing their decision. Instead, the determination is logged as "pending approval" and routed to a second investigator (Checker) with authorization authority for that risk tier.
The Checker independently evaluates evidence and either:
- Concur: Approve the Maker's recommendation
- Override: Reject the Maker's recommendation
- Escalate Further: Route to senior management
Immutable Audit Capture
Every action within this workflow is captured in the immutable audit trail with cryptographic signatures:
{
"event_id": "uuid-v4",
"event_type": "MANUAL_REVIEW_INITIATED",
"timestamp": "2024-02-14T14:32:18.247Z",
"trace_id": "trace-cheque-abc123",
"actor": {
"user_id": "investigator-001",
"role": "FRAUD_INVESTIGATOR_L1",
"mfa_method": "HARDWARE_TOKEN"
},
"resource": {
"cheque_id": "chq-2024-001234",
"amount": 12500.00
},
"context": {
"ai_risk_score": 0.58,
"ai_flags": ["SIGNATURE_MISMATCH", "UNUSUAL_AMOUNT"]
},
"hash": "sha256:a1b2c3d4...",
"previous_hash": "sha256:e5f6g7h8..."
}
Oversight of Automatic System Decisions
Human reviewers serve as a check on algorithmic bias, false positives, and emerging fraud patterns. The audit trail captures AI overrides:
{
"event_type": "AI_OVERRIDE_APPROVED",
"ai_recommendation": "REJECT",
"ai_risk_score": 0.72,
"human_decision": "APPROVE",
"override_justification": "Customer contacted branch; signature variation due to recent hand injury",
"reviewer_id": "investigator-002",
"secondary_reviewer_id": "supervisor-001"
}
These override events are subject to periodic audit sampling to:
- Identify AI model drift requiring retraining
- Detect potential collusion
- Measure effectiveness of human oversight
- Document edge cases for model improvements
Four-Eyes in System Configuration
Changes to these parameters require dual authorization:
- Risk score thresholds
- Signature verification sensitivity
- Model deployment and versions
- Whitelist/blacklist modifications
- Audit log retention policies
RBAC Structure:
- Analysts: Propose configuration changes
- Senior Investigators: Review and comment
- Risk Managers: Approve changes
DevOps, CI/CD, and the Infrastructure Four-Eyes Principle
The four-eyes principle is equally critical in engineering workflows. Deploying flawed algorithms or misconfiguring databases can cause catastrophic losses.
Code Review and Pull Request Approvals
- Developer (Maker) proposes code change
- CI/CD system prevents direct merge to production
- Peer or senior developer (Checker) reviews and approves
Role-Based Access Control
- Clear differentiation between proposers and approvers
- Risk-based approval requirements:
- Low-risk changes (UI text): Single peer review
- High-risk changes (transaction engines): Strict four-eyes review
CI/CD Audit Trail
Every phase is logged with timestamps:
- Who proposed the change
- Who reviewed and approved
- What was the business justification
- When did each action occur
This ensures the same protocol is followed for 2 AM hotfixes as for planned releases.
Real-World Implementation Results
A regional bank implementing these principles achieved remarkable results:
| Metric | Before | After | Improvement |
|---|---|---|---|
| Annual Fraud Losses | $3.3M | $891K | 73% reduction |
| Detection Rate | 71% | 96% | +25 percentage points |
| False Positive Rate | 12% | 7% | 42% reduction |
| Average Alert Review Time | 45 min | 12 min | 73% faster |
| Payback Period | — | 4.2 months | Under 5 months |
The key success factor was the combination of AI-driven detection with mandatory human oversight through the four-eyes workflow, ensuring that high-risk decisions received appropriate scrutiny while maintaining operational efficiency.
This is Part 2 of a 3-part series. Read Part 1: Foundations of Financial Governance for the basics, or continue to Part 3: Compliance and Future Trends for regulatory frameworks and AI-driven auditing.
Ready to operationalize this workflow? Explore Cheque Processing Software.