Back to Blog
Article

Implementing Four-Eyes in Cheque Processing Systems

Implementing four-eyes cheque processing systems with tiered risk scoring, mandatory manual review queues, and dual-control approval design.

PublishedUpdated6 min readChequedb Team

Implementing Four-Eyes in Cheque Processing Systems

Problem: Manual cheque workflows create avoidable errors, delays, and fragmented controls. Business impact: Teams lose cashflow visibility, reconciliation speed, and audit confidence when this process stays manual. Outcome: This guide shows how to implement cheque processing software patterns that improve throughput and control quality. Who this is for: developers and platform teams.

Implementation Example: Manual Approval Workflows in Cheque Processing

The four-eyes principle manifests with particular sophistication in modern cheque processing systems, where automated fraud detection algorithms must seamlessly integrate with human oversight mechanisms. ChequeDB exemplifies this architectural pattern through its implementation of tiered risk scoring with mandatory manual review queues, ensuring that no single automated decision—or human operator—can unilaterally approve high-risk transactions.

The Automated Decision Layer and Exception Routing

Cheque processing begins with the ingestion of cheque images through multiple channels: branch scanners, mobile deposit applications, or batch file uploads. The automated processing pipeline performs several operations in parallel:

  1. Image Quality Analysis: Deskewing, denoising, and validation that the cheque image meets minimum quality thresholds
  2. OCR/ICR Extraction: Optical Character Recognition for printed text and Intelligent Character Recognition for handwritten fields
  3. MICR Line Reading: Magnetic Ink Character Recognition for routing number, account number, and cheque number
  4. Fraud Detection Scoring: Multi-layered AI analysis examining signature patterns, writing pressure, font consistency, and historical transaction patterns

The system generates a composite risk score from 0.0 to 1.0:

Risk Score < 0.3:        Auto-Accept (Straight-through processing)
Risk Score 0.3 - 0.7:    Queue for Manual Review (Exception queue)
Risk Score > 0.7:        Auto-Reject (Immediate hold)

This risk-based routing is the first application of the four-eyes principle: high-risk items cannot proceed without human verification.

Fraud Detection Engine Architecture

Modern systems employ layered fraud detection that complements the four-eyes principle:

Rule-Based Layer (Deterministic):

  • Duplicate presentment detection (same MICR + amount + date)
  • Velocity checks (unusual deposit patterns)
  • High-risk routing number lists
  • Amount threshold flags

ML Scoring Layer (Probabilistic):

  • Supervised models trained on historical fraud labels
  • Unsupervised anomaly detection for novel patterns
  • Image forensics (alteration detection, splicing)

Decision Fusion:

Risk Score = Σ(rule_hits * weights) + ML_score
           
if Risk Score < Threshold_Low:    Auto-accept
if Risk Score < Threshold_High:   Queue for review
if Risk Score >= Threshold_High:  Auto-reject + alert

The Manual Review Queue: Implementing Maker-Checker

When a cheque is routed to the manual review queue, it enters a formal workflow that enforces four-eyes oversight over the automated system's initial assessment.

Phase 1: Initial Review (Maker)

A fraud investigator (the Maker) retrieves the item from the review queue. The system presents:

  • Front and rear cheque images with zoom and enhancement capabilities
  • Side-by-side comparison with reference signatures
  • AI-generated risk factors (e.g., "Signature confidence: 62%")
  • Historical transaction patterns and velocity checks

The investigator makes an initial determination:

  • Approve: Override the system's risk flag
  • Reject: Confirm the system's suspicion
  • Escalate: Request secondary review for complex cases

Phase 2: Secondary Authorization (Checker)

Critically, the system programmatically prevents the initial reviewer from executing their decision. Instead, the determination is logged as "pending approval" and routed to a second investigator (Checker) with authorization authority for that risk tier.

The Checker independently evaluates evidence and either:

  • Concur: Approve the Maker's recommendation
  • Override: Reject the Maker's recommendation
  • Escalate Further: Route to senior management

Immutable Audit Capture

Every action within this workflow is captured in the immutable audit trail with cryptographic signatures:

{
  "event_id": "uuid-v4",
  "event_type": "MANUAL_REVIEW_INITIATED",
  "timestamp": "2024-02-14T14:32:18.247Z",
  "trace_id": "trace-cheque-abc123",
  "actor": {
    "user_id": "investigator-001",
    "role": "FRAUD_INVESTIGATOR_L1",
    "mfa_method": "HARDWARE_TOKEN"
  },
  "resource": {
    "cheque_id": "chq-2024-001234",
    "amount": 12500.00
  },
  "context": {
    "ai_risk_score": 0.58,
    "ai_flags": ["SIGNATURE_MISMATCH", "UNUSUAL_AMOUNT"]
  },
  "hash": "sha256:a1b2c3d4...",
  "previous_hash": "sha256:e5f6g7h8..."
}

Oversight of Automatic System Decisions

Human reviewers serve as a check on algorithmic bias, false positives, and emerging fraud patterns. The audit trail captures AI overrides:

{
  "event_type": "AI_OVERRIDE_APPROVED",
  "ai_recommendation": "REJECT",
  "ai_risk_score": 0.72,
  "human_decision": "APPROVE",
  "override_justification": "Customer contacted branch; signature variation due to recent hand injury",
  "reviewer_id": "investigator-002",
  "secondary_reviewer_id": "supervisor-001"
}

These override events are subject to periodic audit sampling to:

  • Identify AI model drift requiring retraining
  • Detect potential collusion
  • Measure effectiveness of human oversight
  • Document edge cases for model improvements

Four-Eyes in System Configuration

Changes to these parameters require dual authorization:

  • Risk score thresholds
  • Signature verification sensitivity
  • Model deployment and versions
  • Whitelist/blacklist modifications
  • Audit log retention policies

RBAC Structure:

  • Analysts: Propose configuration changes
  • Senior Investigators: Review and comment
  • Risk Managers: Approve changes

DevOps, CI/CD, and the Infrastructure Four-Eyes Principle

The four-eyes principle is equally critical in engineering workflows. Deploying flawed algorithms or misconfiguring databases can cause catastrophic losses.

Code Review and Pull Request Approvals

  • Developer (Maker) proposes code change
  • CI/CD system prevents direct merge to production
  • Peer or senior developer (Checker) reviews and approves

Role-Based Access Control

  • Clear differentiation between proposers and approvers
  • Risk-based approval requirements:
    • Low-risk changes (UI text): Single peer review
    • High-risk changes (transaction engines): Strict four-eyes review

CI/CD Audit Trail

Every phase is logged with timestamps:

  • Who proposed the change
  • Who reviewed and approved
  • What was the business justification
  • When did each action occur

This ensures the same protocol is followed for 2 AM hotfixes as for planned releases.

Real-World Implementation Results

A regional bank implementing these principles achieved remarkable results:

MetricBeforeAfterImprovement
Annual Fraud Losses$3.3M$891K73% reduction
Detection Rate71%96%+25 percentage points
False Positive Rate12%7%42% reduction
Average Alert Review Time45 min12 min73% faster
Payback Period4.2 monthsUnder 5 months

The key success factor was the combination of AI-driven detection with mandatory human oversight through the four-eyes workflow, ensuring that high-risk decisions received appropriate scrutiny while maintaining operational efficiency.


This is Part 2 of a 3-part series. Read Part 1: Foundations of Financial Governance for the basics, or continue to Part 3: Compliance and Future Trends for regulatory frameworks and AI-driven auditing.

Ready to operationalize this workflow? Explore Cheque Processing Software.

Operationalize Four-Eyes Approval Controls

Translate segregation-of-duties policy into approval queues, escalation paths, and audit evidence inside a cheque workflow.

Share this article

Help others discover this content

Related Articles

Ready to Modernize Your Cheque Processing?

Discover how Chequedb can help you automate cheque processing, prevent fraud, and ensure compliance.