CN108629694B - Risk control system and method, and computer-readable storage medium - Google Patents

Risk control system and method, and computer-readable storage medium Download PDF

Info

Publication number
CN108629694B
CN108629694B CN201810464529.7A CN201810464529A CN108629694B CN 108629694 B CN108629694 B CN 108629694B CN 201810464529 A CN201810464529 A CN 201810464529A CN 108629694 B CN108629694 B CN 108629694B
Authority
CN
China
Prior art keywords
financial institution
user
risk
risk evaluation
topic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810464529.7A
Other languages
Chinese (zh)
Other versions
CN108629694A (en
Inventor
袁猛冲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201810464529.7A priority Critical patent/CN108629694B/en
Publication of CN108629694A publication Critical patent/CN108629694A/en
Application granted granted Critical
Publication of CN108629694B publication Critical patent/CN108629694B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis

Abstract

The disclosure provides a risk control system and method and a computer readable storage medium, and relates to the field of risk control. The risk control system comprises an alliance block chain consisting of a plurality of block chain link points, each block chain link point corresponds to one financial institution, and any first block chain node in the alliance block chain is configured to: responding to a request of a user to purchase a financial product of a corresponding first financial institution through the first block link point; acquiring a risk evaluation question of a second financial institution and an answer thereof, which are done by a user, from the alliance block chain; and evaluating the risk bearing capacity of the first financial institution for the user according to the risk evaluation question and the answer of the second financial institution which are once done by the user, wherein the evaluation result is used as a reference for judging whether the user is suitable for purchasing the financial products of the first financial institution. Therefore, some repetitive operations and time of the user are saved in the evaluation process, and the evaluation efficiency of the risk tolerance of the user is improved.

Description

Risk control system and method, and computer-readable storage medium
Technical Field
The present disclosure relates to the field of risk control, and in particular, to a risk control system and method and a computer-readable storage medium.
Background
In the financial business, a financial institution provides a risk evaluation topic for a user, the user submits an answer of the risk evaluation topic to the financial institution, and the financial institution evaluates the risk bearing capacity of the user according to the answer of the user to the risk evaluation topic to determine the risk bearing grade of the user. The user may purchase a financial product having an investment risk that is compatible with the level of risk tolerance.
Disclosure of Invention
The inventor finds that if a user purchases financial products of different financial institutions, multiple risk bearing capacity evaluations need to be performed on multiple risk evaluation questions of the financial institutions, so that the efficiency is low, and the user experience is not good.
One of the technical problems to be solved by the present disclosure is: the problem mentioned above that the evaluation of the risk tolerance of the user is inefficient.
According to an aspect of the present disclosure, a risk control system is provided, including a federation blockchain composed of a plurality of blockchain nodes, each blockchain node corresponding to one financial institution, any first blockchain node in the federation blockchain configured to:
responding to a user's request to purchase a financial product of a corresponding first financial institution through the first block link point;
acquiring a risk evaluation question of a second financial institution and an answer thereof, which are made by the user, from the alliance blockchain;
and evaluating the risk bearing capacity of the first financial institution for the user according to the risk evaluation question and the answer of the second financial institution which are once done by the user, wherein the evaluation result is used as a reference for judging whether the user is suitable for purchasing the financial products of the first financial institution.
In some embodiments, the first blockchain node, in obtaining the risk assessment topic of the second financial institution that the user has done and the answer thereof, is further configured to perform at least one of the following:
screening out risk evaluation questions acceptable to a first financial institution from risk evaluation questions of a second financial institution, which are made by the user once, and acquiring answers made by the user to the risk evaluation questions acceptable to the first financial institution once;
after the authorization of a second financial institution to which the risk evaluation question belongs is obtained, the answer of the user to the risk evaluation question of the second financial institution is obtained;
and sending the risk evaluation question of the second financial institution and the answer thereof which are once done by the user to the user for confirmation, and acquiring the risk evaluation question and the answer thereof confirmed by the user.
In some embodiments, according to the weight of the risk evaluation topic and the weight of the second financial institution to which the risk evaluation topic belongs, the risk evaluation topic acceptable by the first financial institution is screened out from the risk evaluation topics of the second financial institution which have been done by the user.
In some embodiments, the weight of the risk evaluation topic is determined according to the number of times the risk evaluation topic is cited and the credit rating of the second financial institution to which the risk evaluation topic belongs.
In some embodiments, the weight of the second financial institution to which the risk evaluation topic belongs is determined according to the base weight of the second financial institution determined by the federation blockchain and the evaluation weight of each blockchain link point to the second financial institution.
In some embodiments, the second financial institution makes an authorization decision based on the information of the first financial institution to be authorized and the calling ability of the first financial institution to the risk assessment topic.
In some embodiments, the answer to the risk assessment topic sent to the user is encrypted by the public key of the user, and the decrypted key is the private key of the user.
In some embodiments, the answers to the risk assessment questions confirmed by the user include answers to the risk assessment questions that the user modifies as needed.
According to still another aspect of the present disclosure, a risk control method is provided, including:
responding to a request of a user for purchasing a financial product of a corresponding first financial institution through any first block link point in the block chain of the alliance based on the constructed block chain of the alliance, wherein the block chain of the alliance comprises a plurality of block chain nodes, and each block link point corresponds to one financial institution;
acquiring a risk evaluation question of a second financial institution and an answer thereof, which are made by the user, from the alliance blockchain;
and evaluating the risk bearing capacity of the first financial institution for the user according to the risk evaluation question and the answer of the second financial institution which are once done by the user, wherein the evaluation result is used as a reference for judging whether the user is suitable for purchasing the financial products of the first financial institution.
In some embodiments, obtaining the risk assessment topic and the answer thereof from the federation blockchain for the second financial institution that the user has done comprises at least one of:
screening out risk evaluation questions acceptable to a first financial institution from risk evaluation questions of a second financial institution, which are made by the user once, and acquiring answers made by the user to the risk evaluation questions acceptable to the first financial institution once;
after the authorization of a second financial institution to which the risk evaluation question belongs is obtained, the answer of the user to the risk evaluation question of the second financial institution is obtained;
and sending the risk evaluation question of the second financial institution and the answer thereof which are once done by the user to the user for confirmation, and acquiring the risk evaluation question and the answer thereof confirmed by the user.
In some embodiments, according to the weight of the risk evaluation topic and the weight of the second financial institution to which the risk evaluation topic belongs, the risk evaluation topic acceptable by the first financial institution is screened out from the risk evaluation topics of the second financial institution which have been done by the user.
In some embodiments, the weight of the risk evaluation topic is determined according to the number of times the risk evaluation topic is cited and the credit rating of the second financial institution to which the risk evaluation topic belongs.
In some embodiments, the weight of the second financial institution to which the risk evaluation topic belongs is determined according to the base weight of the second financial institution determined by the federation blockchain and the evaluation weight of each blockchain link point to the second financial institution.
In some embodiments, the second financial institution makes an authorization decision based on the information of the first financial institution to be authorized and the calling ability of the first financial institution to the risk assessment topic.
In some embodiments, the answer to the risk assessment topic sent to the user is encrypted by the public key of the user, and the decrypted key is the private key of the user.
In some embodiments, the answers to the risk assessment questions confirmed by the user include answers to the risk assessment questions that the user modifies as needed.
According to yet another aspect of the present disclosure, a risk control system is provided, comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform the risk control method of any of the preceding embodiments based on instructions stored in the memory.
According to yet another aspect of the present disclosure, a computer-readable storage medium is proposed, on which a computer program is stored, which when executed by a processor implements the risk control method of any of the preceding embodiments.
According to the block chain technology of the alliance, each block chain node corresponds to one financial mechanism, the block chain nodes can respond to a request of a user for purchasing financial products of the financial mechanism corresponding to the block chain, risk evaluation questions and answers of other financial mechanisms which the user has done are obtained from the block chain of the alliance, the risk bearing capacity of the user is evaluated according to the obtained information, repeated operation and time of the user can be saved in the evaluation process, and the evaluation efficiency of the risk bearing capacity of the user is improved.
Drawings
The drawings that will be used in the description of the embodiments or the related art will be briefly described below. The present disclosure will be more clearly understood from the following detailed description, which proceeds with reference to the accompanying drawings,
it is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without undue inventive faculty.
Fig. 1 is a schematic diagram of some embodiments of the disclosed risk control system.
Fig. 2 is a schematic flow chart diagram of some embodiments of the disclosed risk control method.
FIG. 3 is a schematic flow chart diagram illustrating additional embodiments of a risk control method according to the present disclosure.
Fig. 4 is a schematic diagram of some embodiments of the disclosed risk control system.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure.
Fig. 1 is a schematic diagram of some embodiments of the disclosed risk control system.
As shown in fig. 1, the risk control system of this embodiment includes: and the block chain is formed by a plurality of block chain link points, and each block chain link point corresponds to one financial institution. Financial institutions include, for example, but are not limited to, banks, funding companies, insurance companies, trust companies, and the like. In a federation blockchain, the consensus formation process is controlled by a preset number of nodes in the federation blockchain. For example, a federation blockchain formed of 15 financial institutions, each financial institution controlling a blockchain node, when a new financial institution applies for joining, all financial institutions in the blockchain vote, and if a financial institution specifying over 2/3 agrees to permit joining, at least 10 financial institutions agree to permit the new financial institution to join the blockchain.
In some embodiments, the data in the federation blockchain includes public data and private data. Block link points in the federation block chain are free to access and use common data. The private data adopts an authorization system, and after being authorized by the block chain node which enjoys the private data control right, the authorized block chain node can access and use the private data.
In some embodiments, the public data may include, for example, identification information of the user, a risk assessment topic, and the like. The private data may include, for example, answers made by the user to risk assessment topics, financial products purchased by the user and their profitability, etc. The block link nodes that have the control right of the private data can determine whether the private data is added to the block link node and what kind of private data is added to the block link node.
Assume that the first block link point corresponds to a first financial institution and the second block link point corresponds to a second financial institution.
In some embodiments, any first blockchain node in the federation blockchain is configured to: responding to a request of a user to purchase a financial product of a corresponding first financial institution through the first block link point; acquiring a risk evaluation question of a second financial institution and an answer thereof, which are done by a user, from the alliance block chain; and evaluating the risk bearing capacity of the first financial institution for the user according to the risk evaluation question and the answer of the second financial institution which are once done by the user, wherein the evaluation result is used as a reference for judging whether the user is suitable for purchasing the financial products of the first financial institution. If the estimated user risk tolerance level is appropriate for the risk level of the financial product of the first financial institution that the user wants to purchase, for example, the user risk tolerance level is equal to or higher than the risk level of the financial product, the user is allowed to purchase the financial product of the first financial institution.
Therefore, some repetitive operations and time of the user are saved in the evaluation process, and the evaluation efficiency of the risk tolerance of the user is improved. And by means of the tamper-proof characteristic of the block chain technology, the risk assessment related data in the block chain of the alliance is not easy to tamper.
In some embodiments, the first blockchain node, in obtaining the risk assessment topic of the second financial institution that the user has done and the answer thereof, is further configured to: screening out the risk evaluation questions acceptable to the first financial institution from the risk evaluation questions of the second financial institution, which are made by the user once, and acquiring answers made by the user to the risk evaluation questions acceptable to the first financial institution once.
In some embodiments, according to the weight of the risk evaluation topic and the weight of the second financial institution to which the risk evaluation topic belongs, the risk evaluation topic acceptable by the first financial institution is screened out from the risk evaluation topics of the second financial institution which are done by the user. For example, according to the weight of the risk evaluation topic and the weight of the second financial institution to which the risk evaluation topic belongs, for example, a weighted summation method is adopted to calculate the comprehensive weight of the risk evaluation topic, and the larger the comprehensive weight is, the more authoritative the risk evaluation topic is, the larger the reference value is.
The weight of the risk evaluation topic can be determined according to the number of times the risk evaluation topic is cited and the credit degree of a second financial institution to which the risk evaluation topic belongs, for example. The more times the risk evaluation topic is quoted, the greater the weight of the risk evaluation topic is; the higher the credit degree of the second financial institution to which the risk evaluation topic belongs, the higher the weight of the risk evaluation topic is.
And the weight of the second financial institution to which the risk evaluation topic belongs is determined according to the basic weight of the second financial institution determined by the alliance block chain and the evaluation weight of each block link point to the second financial institution. For example, the result of the summation or weighted summation of the base weight and each evaluation weight is used as the weight of the second financial institution. The federation blockchain may determine the base weight of a second financial institution based on its business nature, size, business conditions, etc. For example, the basis weight of a well-operated financial institution of the nature of a large national enterprise is large. The financial institution of each blockchain node may determine the evaluation weight of the second financial institution according to the enterprise property, the business scale, the business situation, the cooperation situation with the financial institution, and the like of the second financial institution.
In some embodiments, the first blockchain node, in obtaining the risk assessment topic of the second financial institution that the user has done and the answer thereof, is further configured to: and after the authorization of the second financial institution to which the risk evaluation topic belongs is obtained, the answer of the user to the risk evaluation topic of the second financial institution is obtained.
The user shares the answer to the risk evaluation question of the second financial institution with the user, and other financial institutions can obtain the answer of the user after the second financial institution authorizes the user, so that the privacy information of the user can be protected.
The second financial institution can make an authorization decision according to the information of the first financial institution to be authorized and the calling capacity of the first financial institution to the risk evaluation topic. For example, the second financial institution specifies: the answers to the risk assessment questions are only allowed to be obtained by a portion of the financial institutions, and if the first financial institution belongs to the allowed financial institutions, the first financial institution may obtain authorization from the second financial institution. The second financial institution may also specify: and if the calling amount of the financial institution applying for authorization to the risk evaluation topic does not exceed the set maximum calling amount, authorizing the first financial institution to obtain the answer of the user, otherwise, authorizing the first financial institution or conditionally authorizing the first financial institution. Conditional authorization, such as payment of a fee by the first financial institution, authorizes the first financial institution to obtain the user's answer.
In some embodiments, the first blockchain node, in obtaining the risk assessment topic of the second financial institution that the user has done and the answer thereof, is further configured to: and sending the risk evaluation question of the second financial institution and the answer thereof which are once done by the user to the user for confirmation, and acquiring the risk evaluation question and the answer thereof confirmed by the user.
The user shares the answer to the risk evaluation topic of the second financial institution with the user, and other financial institutions can obtain the answer of the user after the user authorizes the user, so that the privacy information of the user can be protected.
Optionally, the answer of the risk evaluation topic sent to the user is encrypted by the public key of the user, and the decrypted key is the private key of the user, so that the private information of the user can be further protected.
The way for the user to confirm the risk evaluation topic and the answer thereof is, for example: if the answer is not changed, the user may not modify the answer and directly use the answer once made, and if the answer is changed, for example, the user's income changes, the answer may be modified. The answers of the risk evaluation questions confirmed by the user comprise the answers of the risk evaluation questions modified by the user according to needs and the answers of the risk evaluation questions which are not modified.
Fig. 2 is a schematic flow chart diagram of some embodiments of the disclosed risk control method.
As shown in fig. 2, the method of this embodiment includes: step 210-230.
At step 210, based on the constructed alliance blockchain, any first block link point in the alliance blockchain responds to a user request to purchase a financial product of the corresponding first financial institution through the first block link point.
In step 220, the first blockchain node obtains the risk evaluation topic of the second financial institution that the user has done and the answer thereof from the federation blockchain. There may be one or more of such second financial institutions.
Optionally, the first blockchain node obtains a risk evaluation topic of the second financial institution that the user has done and an answer thereof from the federation blockchain, where the risk evaluation topic includes at least one of the following:
screening out the risk evaluation questions acceptable to the first financial institution from the risk evaluation questions of the second financial institution once done by the user, and acquiring answers once made by the user to the risk evaluation questions acceptable to the first financial institution.
And secondly, after obtaining the authorization of the second financial institution to which the risk evaluation topic belongs, obtaining the answer of the user to the risk evaluation topic of the second financial institution.
And thirdly, sending the risk evaluation question of the second financial institution and the answer thereof which are once done by the user to the user for confirmation, and obtaining the risk evaluation question and the answer thereof confirmed by the user.
In step 230, the first block link point evaluates the risk tolerance of the first financial institution for the user according to the risk evaluation question and the answer of the second financial institution that the user has done, and the evaluation result is used as a reference for judging whether the user is suitable for purchasing financial products of the first financial institution.
Therefore, some repetitive operations and time of the user are saved in the evaluation process, and the evaluation efficiency of the risk tolerance of the user is improved. And by means of the tamper-proof characteristic of the block chain technology, the risk assessment related data in the block chain of the alliance is not easy to tamper.
FIG. 3 is a schematic flow chart diagram illustrating additional embodiments of a risk control method according to the present disclosure.
As shown in fig. 3, the method of this embodiment includes: 310 to 3130.
At step 310, the user issues a request for purchase of a financial product of the first financial institution corresponding to the first block link point through the first block link point.
In step 320, the first block chain node responds to the purchase request of the user, and determines whether the user has purchased financial products of other financial institutions, if the user has purchased financial products of other financial institutions, the user has done risk evaluation questions of the other financial institutions, and obtains the risk evaluation questions the user has done.
If the user has done a risk assessment topic, step 330 can be performed, and if the user has not done a risk assessment topic, step 3110 can be performed.
In step 330, the first blockchain node screens out risk evaluation questions acceptable to the first financial institution from the risk evaluation questions that the user has done once.
The screening method is as described above. The screening operation is optional, that is, the risk evaluation questions that the user has done are directly used as the risk evaluation questions that the first financial institution can accept without screening.
In step 340, the first blockchain node applies for authorization to a blockchain link point (set as a second blockchain node) corresponding to the financial institution (set as a second financial institution) to which the screened acceptable risk evaluation topic belongs.
The authorization process of the second financial institution may be selectively performed according to the requirement of information security. It is advantageous to protect the user's private information if an authorization process of the second financial institution is performed.
The number of financial institutions to which an acceptable risk assessment topic belongs may be one or more. The present embodiment is described by taking the second financial institution as an example.
In step 350, the second block link point determines whether to authorize according to an authorization policy preset by the second financial institution. Steps 360a or 360b are then performed according to the different choices of authorization decisions.
The authorization decision method refers to the above.
In step 360a, if the first blockchain link point does not obtain authorization of the second blockchain node, the unauthorized risk evaluation topic is deleted from the acceptable risk evaluation topics.
In step 360b, if the first blockchain node is authorized by the second blockchain node, the answer that the user made to the risk assessment topic of the second financial institution may be obtained. Step 370 may then be performed.
In step 370, the first blockchain node encrypts the answer of the risk evaluation topic that the user has done, where the encryption key may be the public key of the user, and then sends the answer of the risk evaluation topic that the user has done to the user in a linked form to confirm.
The encryption measure can protect the privacy information of the user, the user can look up the answers of the risk evaluation questions which the user has done, and other people cannot look up the answers.
In step 380, the user can look up the answers to the risk evaluation questions that have been made by the user using his own private key, and submit the answers to the first blockchain node after confirmation.
The user refers to the above-mentioned manner of confirming the risk evaluation question and its answer.
In step 390, after the user submits, the first block link point may obtain the risk evaluation topic of the second financial institution that the user has done and the latest answer thereof, and accordingly, the risk tolerance of the first financial institution is evaluated for the user, and the evaluation result is used as a reference for determining whether the user is suitable for purchasing financial products of the first financial institution.
In step 3100, if the number of times the risk evaluation topic is cited changes, the federation blockchain updates the weight of the risk evaluation topic and the weight of the second financial institution to which the risk evaluation topic belongs. The method for updating the weight can be implemented by referring to the aforementioned weight determination method. The flow ends.
In step 3110, following the step 320, if the user has not performed a risk evaluation topic, the first blockchain node sends the risk evaluation topic of the first financial institution (or sends a risk evaluation topic disclosed by the federation blockchain) to the user, so as to evaluate the risk of the user.
In step 3120, the first block link point receives answers to the risk assessment questions filled and submitted by the user, and accordingly evaluates the risk tolerance of the first financial institution to the user, with the evaluation result as a reference for determining whether the user is suitable for purchasing financial products of the first financial institution. The first block chain link point uses the public key of the user to encrypt and store the answer of the risk evaluation question, and sends the private key of the user to the user. Step 3130 is then performed.
In step 3130, if the number of times the risk evaluation topic is referenced changes, the federation blockchain updates the weight of the risk evaluation topic and the weight of the first financial institution or federation blockchain to which the risk evaluation topic belongs. The method for updating the weight can be implemented by referring to the aforementioned weight determination method. The flow ends.
According to the embodiment, the risk evaluation questions and the answers which are once done by the user are used for evaluating the risk bearing capacity of the user, so that some repetitive operations and time of the user can be saved in the evaluation process, and the evaluation efficiency of the risk bearing capacity of the user is improved. And by means of the tamper-proof characteristic of the block chain technology, the risk assessment related data in the block chain of the alliance is not easy to tamper. In addition, the financial institution authorization mechanism, the user confirmation mechanism and the private data encryption mechanism are all favorable for protecting the private information of the user and improving the information security.
Fig. 4 is a schematic diagram of some embodiments of the disclosed risk control system.
As shown in fig. 4, the risk control system 400 of this embodiment includes: a memory 410 and a processor 420 coupled to the memory 410, the processor 420 configured to perform the risk control method of any of the foregoing embodiments based on instructions stored in the memory 410.
Memory 410 may include, for example, system memory, fixed non-volatile storage media, and the like. The system memory stores, for example, an operating system, an application program, a Boot Loader (Boot Loader), and other programs.
The risk control system 400 may also include an input output interface 430, a network interface 440, a storage interface 450, and the like. These interfaces 430, 440, 450 and the connection between the memory 410 and the processor 420 may be, for example, via a bus 460. The input/output interface 430 provides a connection interface for input/output devices such as a display, a mouse, a keyboard, and a touch screen. The network interface 440 provides a connection interface for various networking devices. The storage interface 450 provides a connection interface for external storage devices such as an SD card and a usb disk.
The present disclosure also proposes a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the risk control method of any of the preceding embodiments.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only exemplary of the present disclosure and is not intended to limit the present disclosure, so that any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (16)

1. A risk control system comprising a federation blockchain of block-link points, each block-link point corresponding to a financial institution, any first blockchain node in the federation blockchain configured to:
responding to a user request for purchasing a financial product of a first financial institution corresponding to the first block link point through the first block link point;
acquiring a risk evaluation topic and an answer of a second financial institution corresponding to the second block link point which is done by the user from the alliance block chain;
screening out risk evaluation questions acceptable by a first financial institution from the risk evaluation questions of a second financial institution which are made by the user;
and evaluating the risk bearing capacity of the first financial institution for the user according to the risk evaluation questions and answers of the second financial institution and the first financial institution accepted by the user, wherein the evaluation results are used as references for judging whether the user is suitable for purchasing financial products of the first financial institution.
2. The risk control system of claim 1, wherein the first blockchain node, in obtaining a risk assessment topic and its answer for a second financial institution that the user has done, is further configured to perform at least one of:
after the authorization of a second financial institution to which the risk evaluation question belongs is obtained, the answer of the user to the risk evaluation question of the second financial institution is obtained;
and sending the risk evaluation question of the second financial institution and the answer thereof which are once done by the user to the user for confirmation, and acquiring the risk evaluation question and the answer thereof confirmed by the user.
3. The risk control system according to claim 2, wherein the risk evaluation topic acceptable to the first financial institution is screened out from the risk evaluation topics of the second financial institution that the user has done according to the weight of the risk evaluation topic and the weight of the second financial institution to which the risk evaluation topic belongs.
4. The risk control system of claim 3,
the weight of the risk evaluation question is determined according to the quoted times of the risk evaluation question and the credit degree of a second financial institution to which the risk evaluation question belongs;
alternatively, the first and second electrodes may be,
and determining the weight of the second financial institution to which the risk evaluation topic belongs according to the base weight of the second financial institution determined by the alliance block chain and the evaluation weight of each block link point to the second financial institution.
5. The risk control system of claim 2, wherein the second financial institution makes the authorization decision based on information of the first financial institution to be authorized and the first financial institution's ability to invoke the risk assessment topic.
6. The risk control system of claim 2, wherein the answer to the risk assessment topic sent to the user is encrypted via the user's public key, the decrypted key being the user's private key.
7. The risk control system of claim 2, wherein the user-confirmed answers to the risk assessment questions comprise answers to the risk assessment questions that the user modifies as needed.
8. A risk control method, comprising:
responding to a request of a user for purchasing financial products of a first financial institution corresponding to a first block link point through any first block link point in the block chain of the alliance based on the constructed block chain of the alliance, wherein the block chain of the alliance comprises a plurality of block chain nodes, and each block link point corresponds to one financial institution;
acquiring a risk evaluation topic and an answer of a second financial institution corresponding to the second block link point which is done by the user from the alliance block chain;
screening out risk evaluation questions acceptable by a first financial institution from the risk evaluation questions of a second financial institution which are made by the user;
and evaluating the risk bearing capacity of the first financial institution for the user according to the risk evaluation questions and answers of the second financial institution and the first financial institution accepted by the user, wherein the evaluation results are used as references for judging whether the user is suitable for purchasing financial products of the first financial institution.
9. The risk control method of claim 8,
the risk evaluation questions and answers of the second financial institution which are made by the user from the alliance blockchain comprise at least one of the following items:
after the authorization of a second financial institution to which the risk evaluation question belongs is obtained, the answer of the user to the risk evaluation question of the second financial institution is obtained;
and sending the risk evaluation question of the second financial institution and the answer thereof which are once done by the user to the user for confirmation, and acquiring the risk evaluation question and the answer thereof confirmed by the user.
10. The risk control method according to claim 9, wherein the risk evaluation topic acceptable to the first financial institution is screened out from the risk evaluation topics of the second financial institution that the user has done according to the weight of the risk evaluation topic and the weight of the second financial institution to which the risk evaluation topic belongs.
11. The risk control method of claim 10,
the weight of the risk evaluation question is determined according to the quoted times of the risk evaluation question and the credit degree of a second financial institution to which the risk evaluation question belongs;
alternatively, the first and second electrodes may be,
and determining the weight of the second financial institution to which the risk evaluation topic belongs according to the base weight of the second financial institution determined by the alliance block chain and the evaluation weight of each block link point to the second financial institution.
12. The risk control method according to claim 9, wherein the second financial institution makes the authorization decision based on information of the first financial institution to be authorized and the first financial institution's ability to invoke the risk assessment topic.
13. The risk control method according to claim 9, wherein the answer to the risk assessment topic sent to the user is encrypted by the public key of the user, and the decrypted key is the private key of the user.
14. The risk control method according to claim 9, wherein the answers to the risk assessment questions confirmed by the user include answers to the risk assessment questions that the user modifies as needed.
15. A risk control system, comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform the risk control method of any of claims 8-14 based on instructions stored in the memory.
16. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the risk control method according to any one of claims 8-14.
CN201810464529.7A 2018-05-16 2018-05-16 Risk control system and method, and computer-readable storage medium Active CN108629694B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810464529.7A CN108629694B (en) 2018-05-16 2018-05-16 Risk control system and method, and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810464529.7A CN108629694B (en) 2018-05-16 2018-05-16 Risk control system and method, and computer-readable storage medium

Publications (2)

Publication Number Publication Date
CN108629694A CN108629694A (en) 2018-10-09
CN108629694B true CN108629694B (en) 2021-04-30

Family

ID=63693586

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810464529.7A Active CN108629694B (en) 2018-05-16 2018-05-16 Risk control system and method, and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN108629694B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109559130A (en) * 2018-10-26 2019-04-02 阿里巴巴集团控股有限公司 A kind of processing method of insurance business, device and equipment
CN109636144B (en) * 2018-11-28 2021-07-06 优钱付(浙江)信息科技有限公司 Block chain risk assessment supply chain financial method, device, equipment and storage medium
CN109754311A (en) * 2018-12-12 2019-05-14 北京世纪互联宽带数据中心有限公司 Information processing method and its device, electronic equipment, computer-readable medium
CN109872026A (en) * 2018-12-14 2019-06-11 深圳壹账通智能科技有限公司 Evaluation result generation method, device, equipment and computer readable storage medium
CN110163005B (en) * 2019-04-10 2023-06-06 创新先进技术有限公司 Block chain-based service processing method, system, computing device and storage medium
CN111126797B (en) * 2019-12-09 2021-11-30 支付宝(杭州)信息技术有限公司 Business risk control method, device, platform and system for private data protection
CN111369245A (en) * 2020-02-28 2020-07-03 杭州云象网络技术有限公司 Alliance chain system for financial product sales
CN112102070A (en) * 2020-09-22 2020-12-18 支付宝(杭州)信息技术有限公司 Risk assessment method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105761143A (en) * 2016-02-01 2016-07-13 上海凭安网络科技有限公司 Multi-party co-construction credit record method based on block chains
CN106485167A (en) * 2016-09-22 2017-03-08 中金云金融(北京)大数据科技股份有限公司 Credit record system and method based on block chain
CN106651346A (en) * 2016-11-28 2017-05-10 上海凯岸信息科技有限公司 Block chain-based credit investigation data sharing and trading system
CN107679981A (en) * 2017-09-27 2018-02-09 阳光保险集团股份有限公司 Lending method based on block chain data verification service
CN107979585A (en) * 2017-02-08 2018-05-01 腾讯科技(深圳)有限公司 A kind of data processing method, applications client and system
CN108022167A (en) * 2017-11-22 2018-05-11 阿里巴巴集团控股有限公司 The implementation method and device of risk test and appraisal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170364936A1 (en) * 2016-06-15 2017-12-21 CouponCo Ltd. Computer-implemented electronic coupon system and methods using a blockchain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105761143A (en) * 2016-02-01 2016-07-13 上海凭安网络科技有限公司 Multi-party co-construction credit record method based on block chains
CN106485167A (en) * 2016-09-22 2017-03-08 中金云金融(北京)大数据科技股份有限公司 Credit record system and method based on block chain
CN106651346A (en) * 2016-11-28 2017-05-10 上海凯岸信息科技有限公司 Block chain-based credit investigation data sharing and trading system
CN107979585A (en) * 2017-02-08 2018-05-01 腾讯科技(深圳)有限公司 A kind of data processing method, applications client and system
CN107679981A (en) * 2017-09-27 2018-02-09 阳光保险集团股份有限公司 Lending method based on block chain data verification service
CN108022167A (en) * 2017-11-22 2018-05-11 阿里巴巴集团控股有限公司 The implementation method and device of risk test and appraisal

Also Published As

Publication number Publication date
CN108629694A (en) 2018-10-09

Similar Documents

Publication Publication Date Title
CN108629694B (en) Risk control system and method, and computer-readable storage medium
US11810080B2 (en) Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
US11803660B2 (en) Secure permissioning of access to user accounts, including secure distribution of aggregated user account data
US20220029810A1 (en) Identity and electronic signature verification in blockchain
CN106559211B (en) Privacy protection intelligent contract method in block chain
US11475453B2 (en) System and techniques for utilizing a smart contracts library
CA2948230C (en) Systems and method for tracking subdivided ownership of connected devices using block-chain ledgers
EP3963487A1 (en) Execution of application in a container within a scope of user-granted permission
CN109388957B (en) Block chain-based information transfer method, device, medium and electronic equipment
CN101093562A (en) Electronic authentication method and electronic authentication system
CN111292174A (en) Tax payment information processing method and device and computer readable storage medium
CN112613956A (en) Bidding processing method and device
TW201913529A (en) Confirmation system based on blockchain smart contract and method thereof
CN115147224A (en) Transaction data sharing method and device based on alliance chain
TW201643789A (en) Security for electronic transactions and user authentication
CN112308238A (en) Analytical model training method and device, electronic equipment and storage medium
CA2948229C (en) Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
CN112528335B (en) Data open sharing method, system, storage medium and equipment based on block chain
CN115114642A (en) Financing lease verification method, device and equipment based on under-chain trusted computing
GB2592024A (en) Methods and apparatus for controlling access to personal data
CN111402037A (en) User data processing method and device
CN113595724B (en) Block chain-based accounting method, device, equipment and readable storage medium
Magendanz Data Sharing and Traceability: Improving User Trust in Data Management within Open Banking and Beyond
US20200402047A1 (en) Registry maintaining processed user requests
CN117437028A (en) Multi-head debt-sharing risk identification method and device for clients, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant