CN117576826B - Financial self-service terminal and credit giving processing method based on same - Google Patents
Financial self-service terminal and credit giving processing method based on same Download PDFInfo
- Publication number
- CN117576826B CN117576826B CN202410066177.5A CN202410066177A CN117576826B CN 117576826 B CN117576826 B CN 117576826B CN 202410066177 A CN202410066177 A CN 202410066177A CN 117576826 B CN117576826 B CN 117576826B
- Authority
- CN
- China
- Prior art keywords
- application information
- user
- credibility
- items
- filling
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 14
- 238000012795 verification Methods 0.000 claims abstract description 42
- 238000011156 evaluation Methods 0.000 claims abstract description 34
- 238000012545 processing Methods 0.000 claims abstract description 18
- 238000000034 method Methods 0.000 claims description 28
- 230000015572 biosynthetic process Effects 0.000 claims description 9
- 238000010276 construction Methods 0.000 claims description 2
- 238000012216 screening Methods 0.000 description 7
- 230000000153 supplemental effect Effects 0.000 description 3
- 230000007547 defect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000009825 accumulation Methods 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005242 forging Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 210000001747 pupil Anatomy 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/209—Monitoring, auditing or diagnose of functioning of ATMs
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention provides a credit processing method based on a financial self-service terminal and the financial self-service terminal, which belong to the technical field of financial self-service terminals and specifically comprise the following steps: the credibility evaluation module is responsible for evaluating the integrity through empty items and unmatched items of the credibility application information, and determining whether the comprehensive credibility meets the requirement according to the integrity; the application information evaluation module is responsible for determining whether the comprehensive credibility meets the requirement or not through the application information credibility; the identity verification output module is responsible for taking a user identified as fraudulent use identity information in a preset time as a problem user, and determining a supplementary identity verification mode of the user according to the similarity of the credit application information of the problem user and the credit application information of the user, the credibility, the integrity and the comprehensive credibility of the application information, so that the reliability of identity recognition and the processing efficiency of the credit application are improved.
Description
Technical Field
The invention belongs to the technical field of financial self-service terminals, and particularly relates to a credit-giving processing method based on a financial self-service terminal and the financial self-service terminal.
Background
The financial trust enterprise needs to process more trust applications, so if the trust applications with doubtful identity information cannot be identified and intercepted at the beginning, the processing efficiency and the processing accuracy of the trust applications are likely to be difficult to meet the requirements, so on the basis of ensuring the verification efficiency, ensuring the reliability of the trust application information of the user becomes a technical problem to be solved urgently.
Aiming at the technical problems, the invention provides a credit giving processing method based on a financial self-service terminal and the financial self-service terminal.
Disclosure of Invention
In order to achieve the purpose of the invention, the invention adopts the following technical scheme:
according to one aspect of the invention, a credit processing method based on a financial self-service terminal is provided.
A credit processing method based on a financial self-service terminal is characterized by comprising the following steps:
determining comprehensive credibility of an identity based on an existing identity verification mode of a user credit application received by a financial self-service terminal, evaluating the integrity through an empty item and a non-matching item of credit application information, and entering a next step when the comprehensive credibility meets the requirement according to the integrity;
evaluating the application information similarity of the user's credit application information and the historical credit application information, evaluating the application information credibility by combining the formation time of the user's historical credit application information, determining whether the comprehensive credibility meets the requirement or not according to the application information credibility, if so, performing the user's credit application processing by the user's credit application information, and if not, entering the next step;
and taking the user identified as the fraudulent use identity information in the preset time as a problem user, and determining the supplementary identity authentication mode of the user according to the similarity of the credit application information of the problem user and the credit application information of the user, the credibility, the integrity and the comprehensive credibility of the application information.
The invention has the beneficial effects that:
the comprehensive judgment of the credibility of the identity of the user from the angle of the existing identity verification mode of the user is realized through the determination of the comprehensive credibility of the identity of the user, and the user is distinguished through the comprehensive credibility of the identity, so that the basis is laid for the determination of the differentiated identity verification.
The integrity evaluation is carried out through the empty open item and the unmatched item of the user's credit application information, so that the screening of the user with larger defects on the application information is realized, the identification efficiency of the user who cannot accurately and completely fill in the application information due to identity impersonation is improved, and a foundation is laid for further realizing differentiated identity verification.
The credibility of the application information is evaluated according to the credibility application information of the user and the historical credibility application information, so that the screening of the users with doubtful identities is realized, the screening of the users with problems in the credibility application information caused by fraudulent use of identities is realized, and the reliability of the identity information of the users is ensured.
The method has the advantages that the problem user and the credit application information of the user are comprehensively considered to determine the supplementary identity verification mode, the situation similar to the problem user is considered, the integrity and the credibility of the credit application information of the user are considered, and the safety of the identity of the user is guaranteed on the basis of guaranteeing the processing efficiency of the credit application.
The further technical scheme is that the method for determining the comprehensive credibility comprises the following steps:
s21, acquiring the existing identity verification mode of the user, determining whether a specific identity verification mode exists according to the existing identity verification mode of the user, if so, entering a step S22, and if not, entering a step S24;
s22, judging whether the number of the specific identity verification modes of the user is larger than a preset number, if so, constructing the comprehensive credibility according to the preset credibility, and if not, entering the next step;
s23, evaluating the credibility of the specific identity authentication mode, judging whether the sum of the credibility of the specific identity authentication mode of the user is larger than a preset amount, if so, constructing the comprehensive credibility according to the preset credibility, and if not, entering the next step;
s24, determining the credibility of the user authentication mode according to the existing user authentication mode, and determining the comprehensive credibility of the user by combining the number of the existing user authentication modes.
In a second aspect, the present invention provides a financial self-service terminal, and the credit authorization processing method based on the financial self-service terminal specifically includes:
the system comprises a credibility evaluation module, an application information evaluation module and an identity verification output module;
the credibility evaluation module is responsible for determining the comprehensive credibility of the identity based on the existing identity verification mode of the credibility application of the user received by the financial self-service terminal, evaluating the integrity through the empty items and the unmatched items of the credibility application information, and determining whether the comprehensive credibility meets the requirements or not according to the integrity;
the application information evaluation module is responsible for evaluating the application information similarity of the trusted application information and the historical trusted application information of the user, evaluating the application information credibility by combining the formation time of the historical trusted application information of the user, and determining whether the comprehensive credibility meets the requirement or not according to the application information credibility;
the identity verification output module is responsible for taking a user identified as fraudulent use identity information in a preset time as a problem user, and determining a supplementary identity verification mode of the user according to the similarity of the credit application information of the problem user and the credit application information of the user, the credibility, the integrity and the comprehensive credibility of the application information.
Additional features and advantages will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and drawings.
In order to make the above objects, features and advantages of the present invention more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
The above and other features and advantages of the present invention will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings;
FIG. 1 is a flow chart of a trust processing method based on a financial self-service terminal;
FIG. 2 is a flow chart of a method of integrated reliability determination;
FIG. 3 is a flow chart of a method of integrity assessment;
FIG. 4 is a flow chart of a method of determining a supplemental authentication mode of a user;
fig. 5 is a frame diagram of a financial self-service terminal.
Detailed Description
In order to make the technical solutions in the present specification better understood by those skilled in the art, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only some embodiments of the present specification, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present disclosure.
The applicant finds that when the user's credit application is processed through the financial self-service terminal, if the user's identification card or login information is stolen, the user's real working condition, income condition, home real address and the like cannot be accurately known, and the credit application information is often filled out through forging, missing filling or using the information used in the history, so that if the differential identity verification mode is determined without considering the above factors, the user's fund safety cannot be ensured, and meanwhile, a certain fund loss risk exists in banks.
In order to solve the technical problems, the applicant determines the integrity of the credit application information of the user, the similarity of the credit application information and the historical credit application information of the user and the similarity of the credit application information of the user with the problem of suspected forgery so as to evaluate the reliability of the whole credit application, and specifically adopts the following technical scheme:
firstly, judging the comprehensive reliability according to the existing identity verification mode of a user, for example, carrying out identity verification on certain users simultaneously by adopting a plurality of modes such as face recognition, fingerprint recognition and the like, wherein the comprehensive reliability is higher, the analysis of the information of the credit application is not needed, the processing of the credit application is directly carried out, and the next step is carried out for the users with the comprehensive reliability which does not reach the standard;
identifying filling items with gaps in the credit application information of the user and unmatched items with unmatched filling content and filling item requirements, evaluating the integrity, directly requiring the user to perform identity verification in a mode of identifying at least more than two biological characteristics if the integrity is not satisfactory, and entering the next step if the integrity is satisfactory;
evaluating the similarity of the credit application information and the historical credit application information of the user, directly carrying out credit application processing if the similarity is higher, and entering the next step if the similarity is not higher;
and extracting the credit application information of the user identified as the fraudulent identity information in the history, and determining the supplementary identity verification mode according to the similarity of the credit application information of the user and the problem user, the integrity of the credit application information of the user and the similarity with the history credit application information.
The following will exemplarily illustrate from two perspectives, a method class embodiment and a terminal class embodiment, respectively.
Method class embodiment
In order to solve the above-mentioned problems, according to one aspect of the present invention, as shown in fig. 1, there is provided a credit processing method based on a financial self-service terminal, which is characterized in that the method specifically includes:
s11, determining comprehensive credibility of an identity based on an existing identity verification mode of a credit application of a user received by a financial self-service terminal, evaluating completeness through an empty item and a non-matching item of credit application information, and entering a next step when the comprehensive credibility meets requirements according to the completeness;
specifically, the integrated credibility is determined according to the existing authentication mode of the user, specifically, the credibility of the existing authentication mode of the user and the number of the existing authentication modes.
In one possible embodiment, as shown in fig. 2, the method for determining the integrated reliability in the step S11 is as follows:
s21, acquiring the existing identity verification mode of the user, determining whether a specific identity verification mode exists according to the existing identity verification mode of the user, if so, entering a step S22, and if not, entering a step S24;
s22, judging whether the number of the specific identity verification modes of the user is larger than a preset number, if so, constructing the comprehensive credibility according to the preset credibility, and if not, entering the next step;
it should be noted that the specific authentication method includes, but is not limited to, face recognition, fingerprint recognition, pupil recognition, and palm print recognition.
S23, evaluating the credibility of the specific identity authentication mode, judging whether the sum of the credibility of the specific identity authentication mode of the user is larger than a preset amount, if so, constructing the comprehensive credibility according to the preset credibility, and if not, entering the next step;
s24, determining the credibility of the user authentication mode according to the existing user authentication mode, and determining the comprehensive credibility of the user by combining the number of the existing user authentication modes.
In this embodiment, the efficiency of the construction of the comprehensive credibility of the user is further improved by screening in a specific authentication mode, so that the processing efficiency of the system is ensured.
In another possible embodiment, the determination of the overall trustworthiness of the user is achieved by the number of specific authentication means of the user and the number of other authentication means other than the specific authentication means.
In this embodiment, the integrity is constructed mainly to identify that the integrity is not high due to unfamiliarity of the user who imposes identity, and when the integrity is not high, a specific supplementary identity authentication mode is directly output.
In one possible embodiment, as shown in fig. 3, the method for evaluating the integrity in the above steps is:
s31, determining a blank item evaluation value of the user 'S credit application information according to the number and the type of the blank items of the user' S credit application information;
it should be noted that the blank item evaluation value mainly reflects the blank item condition of the trusted application information, and is divided into two types according to the type of the blank item and the difficulty of being stolen, and the determination of the blank item evaluation value is performed according to the number of the blank items in each type.
S32, determining a mismatching item of the credit application information of the user according to the filling content of the filling item of the credit application information of the user and the type of the filling item, judging that the proportion of the mismatching item of the credit application information of the user in the necessary filling item of the credit application information of the user meets the requirement, if yes, entering the next step, if not, determining a mismatching item evaluation value of the credit application information of the user according to the proportion of the mismatching item of the credit application information of the user in the necessary filling item of the credit application information of the user, and entering the step S34;
specifically, determining that the integrated credibility meets the requirement according to the integrity includes:
and determining the credibility limit value of the user according to the integrity, and determining whether the comprehensive credibility meets the requirement according to the credibility limit value.
S33, determining the unmatched items of the credit application information of the user according to the filling content of the filling items of the credit application information of the user and the types of the filling items, and determining the unmatched item evaluation value of the credit application information of the user according to the number and the types of the unmatched items of the credit application information of the user and the proportion of the unmatched items in the necessary filling items of the credit application information of the user;
s34, evaluating the integrity according to the unmatched item evaluation value and the blank item evaluation value of the credit application information of the user, the blank item and the proportion of the unmatched item in the filling item.
In another possible embodiment, determining a mismatch item of the credit application information of the user according to the filling content of the filling item of the credit application information of the user and the type of the filling item; the determination of the integrity is made by the proportion of non-matching items in the filling item, non-matching items and the proportion of empty items in the filling item.
In this embodiment, the integrity is evaluated through the empty term and the unmatched term of the trusted application information of the user, so that the screening of the user with a large defect on the application information is realized, the identification efficiency of the user who cannot accurately and completely fill in the application information due to identity impersonation is improved, and a foundation is laid for further realizing differentiated identity verification.
S12, evaluating the application information similarity of the user 'S credit application information and the historical credit application information, evaluating the application information credibility by combining the formation time of the user' S historical credit application information, determining whether the comprehensive credibility meets the requirement or not according to the application information credibility, if so, performing the user 'S credit application processing by the user' S credit application information, and if not, entering the next step;
in the step S12, the application information similarity is determined according to the number and types of filling items of which the contents of the user' S trusted application information and the contents of the history trusted application information are inconsistent, and the specific steps of constructing the application information similarity are as follows:
taking filling items with inconsistent filling contents of the user's credit application information and the historical credit application information as inconsistent filling items, judging whether the quantity and the type of the inconsistent filling items meet the requirements, if so, entering the next step, and if not, determining the similarity of the application information through the quantity and the type of the inconsistent filling items;
it should be noted that, when the number of inconsistent filling items is large, or some specific filling items exist in the types of inconsistent filling items, such as income, company name, and accumulation, etc., the inconsistent filling items are determined to be inconsistent at this time.
Judging whether the proportion of the inconsistent filling item in the necessary filling item of the user's credit application information meets the requirement, if so, entering the next step, and if not, determining the similarity of the application information through the proportion of the inconsistent filling item in the necessary filling item of the user's credit application information;
removing unmatched items and filling items of blank items from credit application information of the user to serve as normal filling items, judging whether the proportion of the unmatched filling items in the normal filling items meets requirements or not, if yes, entering the next step, and if not, determining the similarity of the application information according to the proportion of the unmatched filling items in the normal filling items;
and determining the similarity of the application information according to the quantity and the type of the inconsistent filling items of the user, the proportion of the inconsistent filling items in the necessary filling items of the credit application information of the user and the proportion of the inconsistent filling items in the normal filling items.
Specifically, the determining of the similarity of the application information according to the number and the type of the inconsistent filling items specifically includes:
determining the similarity of the inconsistent quantity according to the proportion of the quantity of the inconsistent filling items in the filling items of the credit application information of the user;
determining the number of core inconsistent items in the inconsistent filling items according to the types of the inconsistent filling items, and determining the similarity of the number of core inconsistent items according to the number of the core inconsistent items;
and determining the application information similarity according to the core inconsistent quantity similarity and the inconsistent quantity similarity.
Specifically, the method for evaluating the credibility of the application information comprises the following steps:
dividing the historical credit application information into similar application information and dissimilar application information according to the application information similarity of the credit application information of the user and the historical credit application information;
evaluating the application information credibility of the similar application information of the user according to the number of the similar application information of the user, the forming time and the number of the consistent filling items of the similar application information; evaluating the application information credibility of the dissimilar application information of the user according to the quantity and the formation time of the dissimilar application information of the user;
and evaluating the credibility of the application information according to the credibility of the application information of the similar application information and the credibility of the application information of the dissimilar application information of the user.
In another possible embodiment, the method for evaluating the credibility of the application information is as follows:
dividing the historical credit application information into similar application information and dissimilar application information according to the application information similarity of the credit application information and the historical credit application information of the user, judging whether the user has the similar application information, if so, entering the next step, and if not, evaluating the application information reliability of the user according to the quantity of the dissimilar application information;
acquiring the similar application information of the user, judging whether the number of the similar application information of the user is larger than a similar number limiting value, if so, evaluating the credibility of the application information of the user according to the number of the similar application information of the user, the forming time and the number of the consistent filling items of the similar application information, and if not, entering the next step;
determining whether the historical credit application information of the user is similar or not according to the number of the consistent filling items of the similar application information of the user, if so, evaluating the credibility of the application information of the user according to the number of the similar application information of the user, the forming time and the number of the consistent filling items of the similar application information, and if not, entering the next step;
evaluating the application information credibility of the similar application information of the user according to the number of the similar application information of the user, the forming time and the number of the consistent filling items of the similar application information; evaluating the application information credibility of the dissimilar application information of the user according to the quantity and the formation time of the dissimilar application information of the user;
and evaluating the credibility of the application information according to the credibility of the application information of the similar application information and the credibility of the application information of the dissimilar application information of the user.
It should be noted that, the identical filling item of the similar application information is determined according to the type of the filling item of the similar application information identical to the filling content of the credit application information of the user, and the filling item with the same type is used as the identical filling item.
Specifically, if there are a plurality of identical filling items in the similar application information, for example, the income is between 3000 and 5000, the identical filling items are used as one identical filling item.
In this embodiment, the reliability of the application information is evaluated according to the trust application information and the historical trust application information of the user, so that the screening of the users with doubtful identities is realized, the screening of the users with problems in trust application information caused by fraudulent use of identities is realized, and the reliability of the identity information of the users is ensured.
S13, the user identified as the fraudulent use identity information in the preset time is taken as the problem user, and the supplementary identity authentication mode of the user is determined according to the similarity of the credit application information of the problem user and the credit application information of the user, the credibility, the integrity and the comprehensive credibility of the application information.
As shown in fig. 4, the method for determining the supplemental authentication method of the user in step S13 includes:
determining the number of similar problem users and the similarity of the similar problem users according to the similarity of the credit application information of the problem users and the credit application information of the users, and determining the historical problem evaluation quantity of the users according to the number of the similar problem users and the similarity of the similar problem users;
it should be noted that, when there are a large number of similar problem users or similar problem users that are too similar, the historical problem evaluation value of the users is directly set to 1, and it is directly determined that the identity of the users needs to be verified in a specific manner.
In one possible embodiment, when there are not many similar problem users and there are not too many similar problem users, the compensation amount is constructed by the number of similar problem users, and the historical problem evaluation amount of the users is determined according to the product of the compensation amount and the similarity of the similar problem users.
And determining a credibility threshold of the credibility processing of the user according to the historical problem evaluation value of the user, the credibility and the integrity of the application information, and determining a supplementary identity authentication mode of the user according to the credibility threshold and the comprehensive credibility.
In another possible embodiment, the method for determining the supplemental authentication mode of the user in step S13 is as follows:
determining the number of similar problem users and the similarity of the similar problem users according to the similarity of the credit application information of the problem users and the credit application information of the users, and determining the historical problem evaluation quantity of the users according to the number of the similar problem users and the similarity of the similar problem users;
when the historical problem evaluation value of the user does not meet the requirement, the user is directly verified by a specific identity verification mode; when the historical problem evaluation quantity of the user meets the requirements, the reliability threshold value of the trust processing of the user is determined through the historical problem evaluation quantity of the user, the trust degree and the integrity of the application information, and the supplementary identity authentication mode of the user is determined according to the reliability threshold value and the comprehensive trust degree.
In this embodiment, the determination of the supplementary identity authentication mode is performed by comprehensively considering the problem user and the trusted application information of the user, so that not only is the similar situation of the problem user considered, but also the integrity and the trusted situation of the trusted application information of the user are considered, and the identity security of the user is ensured on the basis of ensuring the processing efficiency of the trusted application.
Terminal class embodiment
On the other hand, as shown in fig. 5, the invention provides a financial self-service terminal, and the credit-giving processing method based on the financial self-service terminal specifically comprises the following steps:
the system comprises a credibility evaluation module, an application information evaluation module and an identity verification output module;
the credibility evaluation module is responsible for determining the comprehensive credibility of the identity based on the existing identity verification mode of the credibility application of the user received by the financial self-service terminal, evaluating the integrity through the empty items and the unmatched items of the credibility application information, and determining whether the comprehensive credibility meets the requirements or not according to the integrity;
the application information evaluation module is responsible for evaluating the application information similarity of the trusted application information and the historical trusted application information of the user, evaluating the application information credibility by combining the formation time of the historical trusted application information of the user, and determining whether the comprehensive credibility meets the requirement or not according to the application information credibility;
the identity verification output module is responsible for taking a user identified as fraudulent use identity information in a preset time as a problem user, and determining a supplementary identity verification mode of the user according to the similarity of the credit application information of the problem user and the credit application information of the user, the credibility, the integrity and the comprehensive credibility of the application information.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for apparatus, devices, non-volatile computer storage medium embodiments, the description is relatively simple, as it is substantially similar to method embodiments, with reference to the section of the method embodiments being relevant.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The foregoing is merely one or more embodiments of the present description and is not intended to limit the present description. Various modifications and alterations to one or more embodiments of this description will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, or the like, which is within the spirit and principles of one or more embodiments of the present description, is intended to be included within the scope of the claims of the present description.
Claims (6)
1. A credit processing method based on a financial self-service terminal is characterized by comprising the following steps:
determining comprehensive credibility of an identity based on an existing identity verification mode of a user credit application received by a financial self-service terminal, evaluating the integrity through an empty item and a non-matching item of credit application information, and entering a next step when the comprehensive credibility meets the requirement according to the integrity;
evaluating the application information similarity of the user's credit application information and the historical credit application information, evaluating the application information credibility by combining the formation time of the user's historical credit application information, determining whether the comprehensive credibility meets the requirement or not according to the application information credibility, if so, performing the user's credit application processing by the user's credit application information, and if not, entering the next step;
the method comprises the steps that a user which is identified as fraudulent use identity information in preset time is taken as a problem user, and a supplementary identity authentication mode of the user is determined according to the similarity of the credit application information of the problem user and the credit application information of the user, the credibility, the integrity and the comprehensive credibility of the application information;
the method for determining the comprehensive credibility comprises the following steps:
s21, acquiring the existing identity verification mode of the user, determining whether a specific identity verification mode exists according to the existing identity verification mode of the user, if so, entering a step S22, and if not, entering a step S24;
s22, judging whether the number of the specific identity verification modes of the user is larger than a preset number, if so, constructing the comprehensive credibility according to the preset credibility, and if not, entering the next step;
s23, evaluating the credibility of the specific identity authentication mode, judging whether the sum of the credibility of the specific identity authentication mode of the user is larger than a preset amount, if so, constructing the comprehensive credibility according to the preset credibility, and if not, entering the next step;
s24, determining the credibility of the user authentication mode according to the existing user authentication mode, and determining the comprehensive credibility of the user by combining the number of the existing user authentication modes;
the method for evaluating the integrity comprises the following steps:
determining a mismatch item of the credit application information of the user according to the filling content of the filling item of the credit application information of the user and the type of the filling item;
determining the completeness through the proportion of the unmatched items in the filling items, the unmatched items and the proportion of the empty items in the filling items;
the application information similarity is determined according to the quantity and types of filling items, the filling contents of which are inconsistent, of the user's credit application information and the historical credit application information, and the specific steps of the application information similarity construction are as follows:
taking filling items with inconsistent filling contents of the user's credit application information and the historical credit application information as inconsistent filling items, judging whether the quantity and the type of the inconsistent filling items meet the requirements, if so, entering the next step, and if not, determining the similarity of the application information through the quantity and the type of the inconsistent filling items;
judging whether the proportion of the inconsistent filling item in the necessary filling item of the user's credit application information meets the requirement, if so, entering the next step, and if not, determining the similarity of the application information through the proportion of the inconsistent filling item in the necessary filling item of the user's credit application information;
removing unmatched items and filling items of blank items from credit application information of the user to serve as normal filling items, judging whether the proportion of the unmatched filling items in the normal filling items meets requirements or not, if yes, entering the next step, and if not, determining the similarity of the application information according to the proportion of the unmatched filling items in the normal filling items;
determining the similarity of the application information according to the quantity and the type of the inconsistent filling items of the user, the proportion of the inconsistent filling items in the necessary filling items of the credit application information of the user and the proportion of the inconsistent filling items in the normal filling items;
the method for evaluating the credibility of the application information comprises the following steps:
dividing the historical credit application information into similar application information and dissimilar application information according to the application information similarity of the credit application information of the user and the historical credit application information;
evaluating the application information credibility of the similar application information of the user according to the number of the similar application information of the user, the forming time and the number of the consistent filling items of the similar application information; evaluating the application information credibility of the dissimilar application information of the user according to the quantity and the formation time of the dissimilar application information of the user;
and evaluating the credibility of the application information according to the credibility of the application information of the similar application information and the credibility of the application information of the dissimilar application information of the user.
2. The method for processing credit based on a financial self-service terminal according to claim 1, wherein determining that the integrated credibility meets the requirement according to the integrity comprises:
and determining the credibility limit value of the user according to the integrity, and determining whether the comprehensive credibility meets the requirement according to the credibility limit value.
3. The method for processing trust based on self-service financial terminal according to claim 1, wherein the determining of the similarity of the application information is performed by the number and the type of the inconsistent filling items, specifically comprises:
determining the similarity of the inconsistent quantity according to the proportion of the quantity of the inconsistent filling items in the filling items of the credit application information of the user;
determining the number of core inconsistent items in the inconsistent filling items according to the types of the inconsistent filling items, and determining the similarity of the number of core inconsistent items according to the number of the core inconsistent items;
and determining the application information similarity according to the core inconsistent quantity similarity and the inconsistent quantity similarity.
4. The financial self-service terminal-based credit processing method according to claim 1, wherein the identical filling item of the similar application information is determined according to the type of filling item of the similar application information identical to the filling content of the credit application information of the user, and filling items with the same type are used as the same identical filling item.
5. The method for processing trust based on self-service financial terminal according to claim 1, wherein the method for determining the supplementary authentication mode of the user is as follows:
determining the number of similar problem users and the similarity of the similar problem users according to the similarity of the credit application information of the problem users and the credit application information of the users, and determining the historical problem evaluation quantity of the users according to the number of the similar problem users and the similarity of the similar problem users;
when the historical problem evaluation value of the user does not meet the requirement, the user is directly verified by a specific identity verification mode; when the historical problem evaluation quantity of the user meets the requirements, the reliability threshold value of the trust processing of the user is determined through the historical problem evaluation quantity of the user, the trust degree and the integrity of the application information, and the supplementary identity authentication mode of the user is determined according to the reliability threshold value and the comprehensive trust degree.
6. A financial self-service terminal, adopting the credit processing method based on the financial self-service terminal as claimed in any one of claims 1-5, which is characterized by comprising the following steps:
the system comprises a credibility evaluation module, an application information evaluation module and an identity verification output module;
the credibility evaluation module is responsible for determining the comprehensive credibility of the identity based on the existing identity verification mode of the credibility application of the user received by the financial self-service terminal, evaluating the integrity through the empty items and the unmatched items of the credibility application information, and determining whether the comprehensive credibility meets the requirements or not according to the integrity;
the application information evaluation module is responsible for evaluating the application information similarity of the trusted application information and the historical trusted application information of the user, evaluating the application information credibility by combining the formation time of the historical trusted application information of the user, and determining whether the comprehensive credibility meets the requirement or not according to the application information credibility;
the identity verification output module is responsible for taking a user identified as fraudulent use identity information in a preset time as a problem user, and determining a supplementary identity verification mode of the user according to the similarity of the credit application information of the problem user and the credit application information of the user, the credibility, the integrity and the comprehensive credibility of the application information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410066177.5A CN117576826B (en) | 2024-01-17 | 2024-01-17 | Financial self-service terminal and credit giving processing method based on same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410066177.5A CN117576826B (en) | 2024-01-17 | 2024-01-17 | Financial self-service terminal and credit giving processing method based on same |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117576826A CN117576826A (en) | 2024-02-20 |
CN117576826B true CN117576826B (en) | 2024-04-09 |
Family
ID=89862962
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410066177.5A Active CN117576826B (en) | 2024-01-17 | 2024-01-17 | Financial self-service terminal and credit giving processing method based on same |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117576826B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116308762A (en) * | 2023-05-19 | 2023-06-23 | 杭州钱袋数字科技有限公司 | Credibility evaluation and trust processing method based on artificial intelligence |
CN116630033A (en) * | 2023-07-20 | 2023-08-22 | 杭银消费金融股份有限公司 | Information auditing method, system and storage medium |
CN116797357A (en) * | 2023-08-24 | 2023-09-22 | 杭银消费金融股份有限公司 | Financial terminal-based credit authorization processing method and equipment |
CN116823274A (en) * | 2023-08-30 | 2023-09-29 | 杭银消费金融股份有限公司 | Fraud risk assessment method and device applied to financial terminal |
CN117132391A (en) * | 2023-10-16 | 2023-11-28 | 杭银消费金融股份有限公司 | Human-computer interaction-based trust approval method and system |
CN117275138A (en) * | 2023-11-21 | 2023-12-22 | 建信金融科技有限责任公司 | Identity authentication method, device, equipment and storage medium based on automatic teller machine |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020138351A1 (en) * | 1995-05-08 | 2002-09-26 | Image Data, Llc | Positive identification system and method |
US9858560B2 (en) * | 2012-06-28 | 2018-01-02 | Maxim Integrated Products, Inc. | Secure payments with untrusted devices |
CN108875327A (en) * | 2018-05-28 | 2018-11-23 | 阿里巴巴集团控股有限公司 | One seed nucleus body method and apparatus |
-
2024
- 2024-01-17 CN CN202410066177.5A patent/CN117576826B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116308762A (en) * | 2023-05-19 | 2023-06-23 | 杭州钱袋数字科技有限公司 | Credibility evaluation and trust processing method based on artificial intelligence |
CN116630033A (en) * | 2023-07-20 | 2023-08-22 | 杭银消费金融股份有限公司 | Information auditing method, system and storage medium |
CN116797357A (en) * | 2023-08-24 | 2023-09-22 | 杭银消费金融股份有限公司 | Financial terminal-based credit authorization processing method and equipment |
CN116823274A (en) * | 2023-08-30 | 2023-09-29 | 杭银消费金融股份有限公司 | Fraud risk assessment method and device applied to financial terminal |
CN117132391A (en) * | 2023-10-16 | 2023-11-28 | 杭银消费金融股份有限公司 | Human-computer interaction-based trust approval method and system |
CN117275138A (en) * | 2023-11-21 | 2023-12-22 | 建信金融科技有限责任公司 | Identity authentication method, device, equipment and storage medium based on automatic teller machine |
Non-Patent Citations (1)
Title |
---|
基于二代身份证的生物识别身份验证系统研究;杨德胜;范叶平;;大众用电;20171230(S1) * |
Also Published As
Publication number | Publication date |
---|---|
CN117576826A (en) | 2024-02-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108876133B (en) | Risk assessment processing method, device, server and medium based on business information | |
CN106803168B (en) | Abnormal transfer detection method and device | |
CN106875078B (en) | Transaction risk detection method, device and equipment | |
US20210264458A1 (en) | Preempting or resolving fraud disputes relating to introductory offer expirations | |
CN110287971B (en) | Data verification method, device, computer equipment and storage medium | |
CN116797357B (en) | Financial terminal-based credit authorization processing method and equipment | |
CN113011973B (en) | Method and equipment for financial transaction supervision model based on intelligent contract data lake | |
EP2329447A1 (en) | Evaluating loan access using online business transaction data | |
US20200143377A1 (en) | Systems and methods for user identity authentication | |
CN116630033B (en) | Information auditing method, system and storage medium | |
CN116823274B (en) | Fraud risk assessment method and device applied to financial terminal | |
CN108182627A (en) | A kind of system that user credit assessment is realized according to user behavior | |
CN111708883A (en) | Credit credit limit determination method and device based on machine learning and equipment fingerprint | |
CN110795574A (en) | Knowledge graph construction method based on finance anti-fraud | |
CN117314424B (en) | Block chain transaction system and method for big financial data | |
TW201528171A (en) | Method for detecting false card risk and transaction processing system for implementing same | |
CN110020939A (en) | Establish device, method and the storage medium of loss given default prediction model | |
CN117576826B (en) | Financial self-service terminal and credit giving processing method based on same | |
CN111861733A (en) | Fraud prevention and control system and method based on address fuzzy matching | |
CN116740866A (en) | Banknote loading and clearing system and method for self-service machine | |
EP1020817A1 (en) | Method and apparatus for authenticating ic card | |
CN115564591A (en) | Financing product determination method and related equipment | |
CN114140111A (en) | Account risk evaluation method based on geographic position | |
CN110046783B (en) | Method and device for identifying fraudulent account, electronic equipment and storage medium | |
Marakhtanov et al. | Detection of fictitious accounts registration |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |