CN117576826B - Financial self-service terminal and credit giving processing method based on same - Google Patents

Financial self-service terminal and credit giving processing method based on same Download PDF

Info

Publication number
CN117576826B
CN117576826B CN202410066177.5A CN202410066177A CN117576826B CN 117576826 B CN117576826 B CN 117576826B CN 202410066177 A CN202410066177 A CN 202410066177A CN 117576826 B CN117576826 B CN 117576826B
Authority
CN
China
Prior art keywords
application information
user
credibility
items
filling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410066177.5A
Other languages
Chinese (zh)
Other versions
CN117576826A (en
Inventor
陶嘉驹
孙广锋
付世冉
张亮
石杰
张雪
陈煜�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangyin Consumer Finance Co ltd
Original Assignee
Hangyin Consumer Finance Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangyin Consumer Finance Co ltd filed Critical Hangyin Consumer Finance Co ltd
Priority to CN202410066177.5A priority Critical patent/CN117576826B/en
Publication of CN117576826A publication Critical patent/CN117576826A/en
Application granted granted Critical
Publication of CN117576826B publication Critical patent/CN117576826B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/209Monitoring, auditing or diagnose of functioning of ATMs

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a credit processing method based on a financial self-service terminal and the financial self-service terminal, which belong to the technical field of financial self-service terminals and specifically comprise the following steps: the credibility evaluation module is responsible for evaluating the integrity through empty items and unmatched items of the credibility application information, and determining whether the comprehensive credibility meets the requirement according to the integrity; the application information evaluation module is responsible for determining whether the comprehensive credibility meets the requirement or not through the application information credibility; the identity verification output module is responsible for taking a user identified as fraudulent use identity information in a preset time as a problem user, and determining a supplementary identity verification mode of the user according to the similarity of the credit application information of the problem user and the credit application information of the user, the credibility, the integrity and the comprehensive credibility of the application information, so that the reliability of identity recognition and the processing efficiency of the credit application are improved.

Description

Financial self-service terminal and credit giving processing method based on same
Technical Field
The invention belongs to the technical field of financial self-service terminals, and particularly relates to a credit-giving processing method based on a financial self-service terminal and the financial self-service terminal.
Background
The financial trust enterprise needs to process more trust applications, so if the trust applications with doubtful identity information cannot be identified and intercepted at the beginning, the processing efficiency and the processing accuracy of the trust applications are likely to be difficult to meet the requirements, so on the basis of ensuring the verification efficiency, ensuring the reliability of the trust application information of the user becomes a technical problem to be solved urgently.
Aiming at the technical problems, the invention provides a credit giving processing method based on a financial self-service terminal and the financial self-service terminal.
Disclosure of Invention
In order to achieve the purpose of the invention, the invention adopts the following technical scheme:
according to one aspect of the invention, a credit processing method based on a financial self-service terminal is provided.
A credit processing method based on a financial self-service terminal is characterized by comprising the following steps:
determining comprehensive credibility of an identity based on an existing identity verification mode of a user credit application received by a financial self-service terminal, evaluating the integrity through an empty item and a non-matching item of credit application information, and entering a next step when the comprehensive credibility meets the requirement according to the integrity;
evaluating the application information similarity of the user's credit application information and the historical credit application information, evaluating the application information credibility by combining the formation time of the user's historical credit application information, determining whether the comprehensive credibility meets the requirement or not according to the application information credibility, if so, performing the user's credit application processing by the user's credit application information, and if not, entering the next step;
and taking the user identified as the fraudulent use identity information in the preset time as a problem user, and determining the supplementary identity authentication mode of the user according to the similarity of the credit application information of the problem user and the credit application information of the user, the credibility, the integrity and the comprehensive credibility of the application information.
The invention has the beneficial effects that:
the comprehensive judgment of the credibility of the identity of the user from the angle of the existing identity verification mode of the user is realized through the determination of the comprehensive credibility of the identity of the user, and the user is distinguished through the comprehensive credibility of the identity, so that the basis is laid for the determination of the differentiated identity verification.
The integrity evaluation is carried out through the empty open item and the unmatched item of the user's credit application information, so that the screening of the user with larger defects on the application information is realized, the identification efficiency of the user who cannot accurately and completely fill in the application information due to identity impersonation is improved, and a foundation is laid for further realizing differentiated identity verification.
The credibility of the application information is evaluated according to the credibility application information of the user and the historical credibility application information, so that the screening of the users with doubtful identities is realized, the screening of the users with problems in the credibility application information caused by fraudulent use of identities is realized, and the reliability of the identity information of the users is ensured.
The method has the advantages that the problem user and the credit application information of the user are comprehensively considered to determine the supplementary identity verification mode, the situation similar to the problem user is considered, the integrity and the credibility of the credit application information of the user are considered, and the safety of the identity of the user is guaranteed on the basis of guaranteeing the processing efficiency of the credit application.
The further technical scheme is that the method for determining the comprehensive credibility comprises the following steps:
s21, acquiring the existing identity verification mode of the user, determining whether a specific identity verification mode exists according to the existing identity verification mode of the user, if so, entering a step S22, and if not, entering a step S24;
s22, judging whether the number of the specific identity verification modes of the user is larger than a preset number, if so, constructing the comprehensive credibility according to the preset credibility, and if not, entering the next step;
s23, evaluating the credibility of the specific identity authentication mode, judging whether the sum of the credibility of the specific identity authentication mode of the user is larger than a preset amount, if so, constructing the comprehensive credibility according to the preset credibility, and if not, entering the next step;
s24, determining the credibility of the user authentication mode according to the existing user authentication mode, and determining the comprehensive credibility of the user by combining the number of the existing user authentication modes.
In a second aspect, the present invention provides a financial self-service terminal, and the credit authorization processing method based on the financial self-service terminal specifically includes:
the system comprises a credibility evaluation module, an application information evaluation module and an identity verification output module;
the credibility evaluation module is responsible for determining the comprehensive credibility of the identity based on the existing identity verification mode of the credibility application of the user received by the financial self-service terminal, evaluating the integrity through the empty items and the unmatched items of the credibility application information, and determining whether the comprehensive credibility meets the requirements or not according to the integrity;
the application information evaluation module is responsible for evaluating the application information similarity of the trusted application information and the historical trusted application information of the user, evaluating the application information credibility by combining the formation time of the historical trusted application information of the user, and determining whether the comprehensive credibility meets the requirement or not according to the application information credibility;
the identity verification output module is responsible for taking a user identified as fraudulent use identity information in a preset time as a problem user, and determining a supplementary identity verification mode of the user according to the similarity of the credit application information of the problem user and the credit application information of the user, the credibility, the integrity and the comprehensive credibility of the application information.
Additional features and advantages will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and drawings.
In order to make the above objects, features and advantages of the present invention more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
The above and other features and advantages of the present invention will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings;
FIG. 1 is a flow chart of a trust processing method based on a financial self-service terminal;
FIG. 2 is a flow chart of a method of integrated reliability determination;
FIG. 3 is a flow chart of a method of integrity assessment;
FIG. 4 is a flow chart of a method of determining a supplemental authentication mode of a user;
fig. 5 is a frame diagram of a financial self-service terminal.
Detailed Description
In order to make the technical solutions in the present specification better understood by those skilled in the art, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only some embodiments of the present specification, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present disclosure.
The applicant finds that when the user's credit application is processed through the financial self-service terminal, if the user's identification card or login information is stolen, the user's real working condition, income condition, home real address and the like cannot be accurately known, and the credit application information is often filled out through forging, missing filling or using the information used in the history, so that if the differential identity verification mode is determined without considering the above factors, the user's fund safety cannot be ensured, and meanwhile, a certain fund loss risk exists in banks.
In order to solve the technical problems, the applicant determines the integrity of the credit application information of the user, the similarity of the credit application information and the historical credit application information of the user and the similarity of the credit application information of the user with the problem of suspected forgery so as to evaluate the reliability of the whole credit application, and specifically adopts the following technical scheme:
firstly, judging the comprehensive reliability according to the existing identity verification mode of a user, for example, carrying out identity verification on certain users simultaneously by adopting a plurality of modes such as face recognition, fingerprint recognition and the like, wherein the comprehensive reliability is higher, the analysis of the information of the credit application is not needed, the processing of the credit application is directly carried out, and the next step is carried out for the users with the comprehensive reliability which does not reach the standard;
identifying filling items with gaps in the credit application information of the user and unmatched items with unmatched filling content and filling item requirements, evaluating the integrity, directly requiring the user to perform identity verification in a mode of identifying at least more than two biological characteristics if the integrity is not satisfactory, and entering the next step if the integrity is satisfactory;
evaluating the similarity of the credit application information and the historical credit application information of the user, directly carrying out credit application processing if the similarity is higher, and entering the next step if the similarity is not higher;
and extracting the credit application information of the user identified as the fraudulent identity information in the history, and determining the supplementary identity verification mode according to the similarity of the credit application information of the user and the problem user, the integrity of the credit application information of the user and the similarity with the history credit application information.
The following will exemplarily illustrate from two perspectives, a method class embodiment and a terminal class embodiment, respectively.
Method class embodiment
In order to solve the above-mentioned problems, according to one aspect of the present invention, as shown in fig. 1, there is provided a credit processing method based on a financial self-service terminal, which is characterized in that the method specifically includes:
s11, determining comprehensive credibility of an identity based on an existing identity verification mode of a credit application of a user received by a financial self-service terminal, evaluating completeness through an empty item and a non-matching item of credit application information, and entering a next step when the comprehensive credibility meets requirements according to the completeness;
specifically, the integrated credibility is determined according to the existing authentication mode of the user, specifically, the credibility of the existing authentication mode of the user and the number of the existing authentication modes.
In one possible embodiment, as shown in fig. 2, the method for determining the integrated reliability in the step S11 is as follows:
s21, acquiring the existing identity verification mode of the user, determining whether a specific identity verification mode exists according to the existing identity verification mode of the user, if so, entering a step S22, and if not, entering a step S24;
s22, judging whether the number of the specific identity verification modes of the user is larger than a preset number, if so, constructing the comprehensive credibility according to the preset credibility, and if not, entering the next step;
it should be noted that the specific authentication method includes, but is not limited to, face recognition, fingerprint recognition, pupil recognition, and palm print recognition.
S23, evaluating the credibility of the specific identity authentication mode, judging whether the sum of the credibility of the specific identity authentication mode of the user is larger than a preset amount, if so, constructing the comprehensive credibility according to the preset credibility, and if not, entering the next step;
s24, determining the credibility of the user authentication mode according to the existing user authentication mode, and determining the comprehensive credibility of the user by combining the number of the existing user authentication modes.
In this embodiment, the efficiency of the construction of the comprehensive credibility of the user is further improved by screening in a specific authentication mode, so that the processing efficiency of the system is ensured.
In another possible embodiment, the determination of the overall trustworthiness of the user is achieved by the number of specific authentication means of the user and the number of other authentication means other than the specific authentication means.
In this embodiment, the integrity is constructed mainly to identify that the integrity is not high due to unfamiliarity of the user who imposes identity, and when the integrity is not high, a specific supplementary identity authentication mode is directly output.
In one possible embodiment, as shown in fig. 3, the method for evaluating the integrity in the above steps is:
s31, determining a blank item evaluation value of the user 'S credit application information according to the number and the type of the blank items of the user' S credit application information;
it should be noted that the blank item evaluation value mainly reflects the blank item condition of the trusted application information, and is divided into two types according to the type of the blank item and the difficulty of being stolen, and the determination of the blank item evaluation value is performed according to the number of the blank items in each type.
S32, determining a mismatching item of the credit application information of the user according to the filling content of the filling item of the credit application information of the user and the type of the filling item, judging that the proportion of the mismatching item of the credit application information of the user in the necessary filling item of the credit application information of the user meets the requirement, if yes, entering the next step, if not, determining a mismatching item evaluation value of the credit application information of the user according to the proportion of the mismatching item of the credit application information of the user in the necessary filling item of the credit application information of the user, and entering the step S34;
specifically, determining that the integrated credibility meets the requirement according to the integrity includes:
and determining the credibility limit value of the user according to the integrity, and determining whether the comprehensive credibility meets the requirement according to the credibility limit value.
S33, determining the unmatched items of the credit application information of the user according to the filling content of the filling items of the credit application information of the user and the types of the filling items, and determining the unmatched item evaluation value of the credit application information of the user according to the number and the types of the unmatched items of the credit application information of the user and the proportion of the unmatched items in the necessary filling items of the credit application information of the user;
s34, evaluating the integrity according to the unmatched item evaluation value and the blank item evaluation value of the credit application information of the user, the blank item and the proportion of the unmatched item in the filling item.
In another possible embodiment, determining a mismatch item of the credit application information of the user according to the filling content of the filling item of the credit application information of the user and the type of the filling item; the determination of the integrity is made by the proportion of non-matching items in the filling item, non-matching items and the proportion of empty items in the filling item.
In this embodiment, the integrity is evaluated through the empty term and the unmatched term of the trusted application information of the user, so that the screening of the user with a large defect on the application information is realized, the identification efficiency of the user who cannot accurately and completely fill in the application information due to identity impersonation is improved, and a foundation is laid for further realizing differentiated identity verification.
S12, evaluating the application information similarity of the user 'S credit application information and the historical credit application information, evaluating the application information credibility by combining the formation time of the user' S historical credit application information, determining whether the comprehensive credibility meets the requirement or not according to the application information credibility, if so, performing the user 'S credit application processing by the user' S credit application information, and if not, entering the next step;
in the step S12, the application information similarity is determined according to the number and types of filling items of which the contents of the user' S trusted application information and the contents of the history trusted application information are inconsistent, and the specific steps of constructing the application information similarity are as follows:
taking filling items with inconsistent filling contents of the user's credit application information and the historical credit application information as inconsistent filling items, judging whether the quantity and the type of the inconsistent filling items meet the requirements, if so, entering the next step, and if not, determining the similarity of the application information through the quantity and the type of the inconsistent filling items;
it should be noted that, when the number of inconsistent filling items is large, or some specific filling items exist in the types of inconsistent filling items, such as income, company name, and accumulation, etc., the inconsistent filling items are determined to be inconsistent at this time.
Judging whether the proportion of the inconsistent filling item in the necessary filling item of the user's credit application information meets the requirement, if so, entering the next step, and if not, determining the similarity of the application information through the proportion of the inconsistent filling item in the necessary filling item of the user's credit application information;
removing unmatched items and filling items of blank items from credit application information of the user to serve as normal filling items, judging whether the proportion of the unmatched filling items in the normal filling items meets requirements or not, if yes, entering the next step, and if not, determining the similarity of the application information according to the proportion of the unmatched filling items in the normal filling items;
and determining the similarity of the application information according to the quantity and the type of the inconsistent filling items of the user, the proportion of the inconsistent filling items in the necessary filling items of the credit application information of the user and the proportion of the inconsistent filling items in the normal filling items.
Specifically, the determining of the similarity of the application information according to the number and the type of the inconsistent filling items specifically includes:
determining the similarity of the inconsistent quantity according to the proportion of the quantity of the inconsistent filling items in the filling items of the credit application information of the user;
determining the number of core inconsistent items in the inconsistent filling items according to the types of the inconsistent filling items, and determining the similarity of the number of core inconsistent items according to the number of the core inconsistent items;
and determining the application information similarity according to the core inconsistent quantity similarity and the inconsistent quantity similarity.
Specifically, the method for evaluating the credibility of the application information comprises the following steps:
dividing the historical credit application information into similar application information and dissimilar application information according to the application information similarity of the credit application information of the user and the historical credit application information;
evaluating the application information credibility of the similar application information of the user according to the number of the similar application information of the user, the forming time and the number of the consistent filling items of the similar application information; evaluating the application information credibility of the dissimilar application information of the user according to the quantity and the formation time of the dissimilar application information of the user;
and evaluating the credibility of the application information according to the credibility of the application information of the similar application information and the credibility of the application information of the dissimilar application information of the user.
In another possible embodiment, the method for evaluating the credibility of the application information is as follows:
dividing the historical credit application information into similar application information and dissimilar application information according to the application information similarity of the credit application information and the historical credit application information of the user, judging whether the user has the similar application information, if so, entering the next step, and if not, evaluating the application information reliability of the user according to the quantity of the dissimilar application information;
acquiring the similar application information of the user, judging whether the number of the similar application information of the user is larger than a similar number limiting value, if so, evaluating the credibility of the application information of the user according to the number of the similar application information of the user, the forming time and the number of the consistent filling items of the similar application information, and if not, entering the next step;
determining whether the historical credit application information of the user is similar or not according to the number of the consistent filling items of the similar application information of the user, if so, evaluating the credibility of the application information of the user according to the number of the similar application information of the user, the forming time and the number of the consistent filling items of the similar application information, and if not, entering the next step;
evaluating the application information credibility of the similar application information of the user according to the number of the similar application information of the user, the forming time and the number of the consistent filling items of the similar application information; evaluating the application information credibility of the dissimilar application information of the user according to the quantity and the formation time of the dissimilar application information of the user;
and evaluating the credibility of the application information according to the credibility of the application information of the similar application information and the credibility of the application information of the dissimilar application information of the user.
It should be noted that, the identical filling item of the similar application information is determined according to the type of the filling item of the similar application information identical to the filling content of the credit application information of the user, and the filling item with the same type is used as the identical filling item.
Specifically, if there are a plurality of identical filling items in the similar application information, for example, the income is between 3000 and 5000, the identical filling items are used as one identical filling item.
In this embodiment, the reliability of the application information is evaluated according to the trust application information and the historical trust application information of the user, so that the screening of the users with doubtful identities is realized, the screening of the users with problems in trust application information caused by fraudulent use of identities is realized, and the reliability of the identity information of the users is ensured.
S13, the user identified as the fraudulent use identity information in the preset time is taken as the problem user, and the supplementary identity authentication mode of the user is determined according to the similarity of the credit application information of the problem user and the credit application information of the user, the credibility, the integrity and the comprehensive credibility of the application information.
As shown in fig. 4, the method for determining the supplemental authentication method of the user in step S13 includes:
determining the number of similar problem users and the similarity of the similar problem users according to the similarity of the credit application information of the problem users and the credit application information of the users, and determining the historical problem evaluation quantity of the users according to the number of the similar problem users and the similarity of the similar problem users;
it should be noted that, when there are a large number of similar problem users or similar problem users that are too similar, the historical problem evaluation value of the users is directly set to 1, and it is directly determined that the identity of the users needs to be verified in a specific manner.
In one possible embodiment, when there are not many similar problem users and there are not too many similar problem users, the compensation amount is constructed by the number of similar problem users, and the historical problem evaluation amount of the users is determined according to the product of the compensation amount and the similarity of the similar problem users.
And determining a credibility threshold of the credibility processing of the user according to the historical problem evaluation value of the user, the credibility and the integrity of the application information, and determining a supplementary identity authentication mode of the user according to the credibility threshold and the comprehensive credibility.
In another possible embodiment, the method for determining the supplemental authentication mode of the user in step S13 is as follows:
determining the number of similar problem users and the similarity of the similar problem users according to the similarity of the credit application information of the problem users and the credit application information of the users, and determining the historical problem evaluation quantity of the users according to the number of the similar problem users and the similarity of the similar problem users;
when the historical problem evaluation value of the user does not meet the requirement, the user is directly verified by a specific identity verification mode; when the historical problem evaluation quantity of the user meets the requirements, the reliability threshold value of the trust processing of the user is determined through the historical problem evaluation quantity of the user, the trust degree and the integrity of the application information, and the supplementary identity authentication mode of the user is determined according to the reliability threshold value and the comprehensive trust degree.
In this embodiment, the determination of the supplementary identity authentication mode is performed by comprehensively considering the problem user and the trusted application information of the user, so that not only is the similar situation of the problem user considered, but also the integrity and the trusted situation of the trusted application information of the user are considered, and the identity security of the user is ensured on the basis of ensuring the processing efficiency of the trusted application.
Terminal class embodiment
On the other hand, as shown in fig. 5, the invention provides a financial self-service terminal, and the credit-giving processing method based on the financial self-service terminal specifically comprises the following steps:
the system comprises a credibility evaluation module, an application information evaluation module and an identity verification output module;
the credibility evaluation module is responsible for determining the comprehensive credibility of the identity based on the existing identity verification mode of the credibility application of the user received by the financial self-service terminal, evaluating the integrity through the empty items and the unmatched items of the credibility application information, and determining whether the comprehensive credibility meets the requirements or not according to the integrity;
the application information evaluation module is responsible for evaluating the application information similarity of the trusted application information and the historical trusted application information of the user, evaluating the application information credibility by combining the formation time of the historical trusted application information of the user, and determining whether the comprehensive credibility meets the requirement or not according to the application information credibility;
the identity verification output module is responsible for taking a user identified as fraudulent use identity information in a preset time as a problem user, and determining a supplementary identity verification mode of the user according to the similarity of the credit application information of the problem user and the credit application information of the user, the credibility, the integrity and the comprehensive credibility of the application information.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for apparatus, devices, non-volatile computer storage medium embodiments, the description is relatively simple, as it is substantially similar to method embodiments, with reference to the section of the method embodiments being relevant.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The foregoing is merely one or more embodiments of the present description and is not intended to limit the present description. Various modifications and alterations to one or more embodiments of this description will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, or the like, which is within the spirit and principles of one or more embodiments of the present description, is intended to be included within the scope of the claims of the present description.

Claims (6)

1. A credit processing method based on a financial self-service terminal is characterized by comprising the following steps:
determining comprehensive credibility of an identity based on an existing identity verification mode of a user credit application received by a financial self-service terminal, evaluating the integrity through an empty item and a non-matching item of credit application information, and entering a next step when the comprehensive credibility meets the requirement according to the integrity;
evaluating the application information similarity of the user's credit application information and the historical credit application information, evaluating the application information credibility by combining the formation time of the user's historical credit application information, determining whether the comprehensive credibility meets the requirement or not according to the application information credibility, if so, performing the user's credit application processing by the user's credit application information, and if not, entering the next step;
the method comprises the steps that a user which is identified as fraudulent use identity information in preset time is taken as a problem user, and a supplementary identity authentication mode of the user is determined according to the similarity of the credit application information of the problem user and the credit application information of the user, the credibility, the integrity and the comprehensive credibility of the application information;
the method for determining the comprehensive credibility comprises the following steps:
s21, acquiring the existing identity verification mode of the user, determining whether a specific identity verification mode exists according to the existing identity verification mode of the user, if so, entering a step S22, and if not, entering a step S24;
s22, judging whether the number of the specific identity verification modes of the user is larger than a preset number, if so, constructing the comprehensive credibility according to the preset credibility, and if not, entering the next step;
s23, evaluating the credibility of the specific identity authentication mode, judging whether the sum of the credibility of the specific identity authentication mode of the user is larger than a preset amount, if so, constructing the comprehensive credibility according to the preset credibility, and if not, entering the next step;
s24, determining the credibility of the user authentication mode according to the existing user authentication mode, and determining the comprehensive credibility of the user by combining the number of the existing user authentication modes;
the method for evaluating the integrity comprises the following steps:
determining a mismatch item of the credit application information of the user according to the filling content of the filling item of the credit application information of the user and the type of the filling item;
determining the completeness through the proportion of the unmatched items in the filling items, the unmatched items and the proportion of the empty items in the filling items;
the application information similarity is determined according to the quantity and types of filling items, the filling contents of which are inconsistent, of the user's credit application information and the historical credit application information, and the specific steps of the application information similarity construction are as follows:
taking filling items with inconsistent filling contents of the user's credit application information and the historical credit application information as inconsistent filling items, judging whether the quantity and the type of the inconsistent filling items meet the requirements, if so, entering the next step, and if not, determining the similarity of the application information through the quantity and the type of the inconsistent filling items;
judging whether the proportion of the inconsistent filling item in the necessary filling item of the user's credit application information meets the requirement, if so, entering the next step, and if not, determining the similarity of the application information through the proportion of the inconsistent filling item in the necessary filling item of the user's credit application information;
removing unmatched items and filling items of blank items from credit application information of the user to serve as normal filling items, judging whether the proportion of the unmatched filling items in the normal filling items meets requirements or not, if yes, entering the next step, and if not, determining the similarity of the application information according to the proportion of the unmatched filling items in the normal filling items;
determining the similarity of the application information according to the quantity and the type of the inconsistent filling items of the user, the proportion of the inconsistent filling items in the necessary filling items of the credit application information of the user and the proportion of the inconsistent filling items in the normal filling items;
the method for evaluating the credibility of the application information comprises the following steps:
dividing the historical credit application information into similar application information and dissimilar application information according to the application information similarity of the credit application information of the user and the historical credit application information;
evaluating the application information credibility of the similar application information of the user according to the number of the similar application information of the user, the forming time and the number of the consistent filling items of the similar application information; evaluating the application information credibility of the dissimilar application information of the user according to the quantity and the formation time of the dissimilar application information of the user;
and evaluating the credibility of the application information according to the credibility of the application information of the similar application information and the credibility of the application information of the dissimilar application information of the user.
2. The method for processing credit based on a financial self-service terminal according to claim 1, wherein determining that the integrated credibility meets the requirement according to the integrity comprises:
and determining the credibility limit value of the user according to the integrity, and determining whether the comprehensive credibility meets the requirement according to the credibility limit value.
3. The method for processing trust based on self-service financial terminal according to claim 1, wherein the determining of the similarity of the application information is performed by the number and the type of the inconsistent filling items, specifically comprises:
determining the similarity of the inconsistent quantity according to the proportion of the quantity of the inconsistent filling items in the filling items of the credit application information of the user;
determining the number of core inconsistent items in the inconsistent filling items according to the types of the inconsistent filling items, and determining the similarity of the number of core inconsistent items according to the number of the core inconsistent items;
and determining the application information similarity according to the core inconsistent quantity similarity and the inconsistent quantity similarity.
4. The financial self-service terminal-based credit processing method according to claim 1, wherein the identical filling item of the similar application information is determined according to the type of filling item of the similar application information identical to the filling content of the credit application information of the user, and filling items with the same type are used as the same identical filling item.
5. The method for processing trust based on self-service financial terminal according to claim 1, wherein the method for determining the supplementary authentication mode of the user is as follows:
determining the number of similar problem users and the similarity of the similar problem users according to the similarity of the credit application information of the problem users and the credit application information of the users, and determining the historical problem evaluation quantity of the users according to the number of the similar problem users and the similarity of the similar problem users;
when the historical problem evaluation value of the user does not meet the requirement, the user is directly verified by a specific identity verification mode; when the historical problem evaluation quantity of the user meets the requirements, the reliability threshold value of the trust processing of the user is determined through the historical problem evaluation quantity of the user, the trust degree and the integrity of the application information, and the supplementary identity authentication mode of the user is determined according to the reliability threshold value and the comprehensive trust degree.
6. A financial self-service terminal, adopting the credit processing method based on the financial self-service terminal as claimed in any one of claims 1-5, which is characterized by comprising the following steps:
the system comprises a credibility evaluation module, an application information evaluation module and an identity verification output module;
the credibility evaluation module is responsible for determining the comprehensive credibility of the identity based on the existing identity verification mode of the credibility application of the user received by the financial self-service terminal, evaluating the integrity through the empty items and the unmatched items of the credibility application information, and determining whether the comprehensive credibility meets the requirements or not according to the integrity;
the application information evaluation module is responsible for evaluating the application information similarity of the trusted application information and the historical trusted application information of the user, evaluating the application information credibility by combining the formation time of the historical trusted application information of the user, and determining whether the comprehensive credibility meets the requirement or not according to the application information credibility;
the identity verification output module is responsible for taking a user identified as fraudulent use identity information in a preset time as a problem user, and determining a supplementary identity verification mode of the user according to the similarity of the credit application information of the problem user and the credit application information of the user, the credibility, the integrity and the comprehensive credibility of the application information.
CN202410066177.5A 2024-01-17 2024-01-17 Financial self-service terminal and credit giving processing method based on same Active CN117576826B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410066177.5A CN117576826B (en) 2024-01-17 2024-01-17 Financial self-service terminal and credit giving processing method based on same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410066177.5A CN117576826B (en) 2024-01-17 2024-01-17 Financial self-service terminal and credit giving processing method based on same

Publications (2)

Publication Number Publication Date
CN117576826A CN117576826A (en) 2024-02-20
CN117576826B true CN117576826B (en) 2024-04-09

Family

ID=89862962

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410066177.5A Active CN117576826B (en) 2024-01-17 2024-01-17 Financial self-service terminal and credit giving processing method based on same

Country Status (1)

Country Link
CN (1) CN117576826B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116308762A (en) * 2023-05-19 2023-06-23 杭州钱袋数字科技有限公司 Credibility evaluation and trust processing method based on artificial intelligence
CN116630033A (en) * 2023-07-20 2023-08-22 杭银消费金融股份有限公司 Information auditing method, system and storage medium
CN116797357A (en) * 2023-08-24 2023-09-22 杭银消费金融股份有限公司 Financial terminal-based credit authorization processing method and equipment
CN116823274A (en) * 2023-08-30 2023-09-29 杭银消费金融股份有限公司 Fraud risk assessment method and device applied to financial terminal
CN117132391A (en) * 2023-10-16 2023-11-28 杭银消费金融股份有限公司 Human-computer interaction-based trust approval method and system
CN117275138A (en) * 2023-11-21 2023-12-22 建信金融科技有限责任公司 Identity authentication method, device, equipment and storage medium based on automatic teller machine

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020138351A1 (en) * 1995-05-08 2002-09-26 Image Data, Llc Positive identification system and method
US9858560B2 (en) * 2012-06-28 2018-01-02 Maxim Integrated Products, Inc. Secure payments with untrusted devices
CN108875327A (en) * 2018-05-28 2018-11-23 阿里巴巴集团控股有限公司 One seed nucleus body method and apparatus

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116308762A (en) * 2023-05-19 2023-06-23 杭州钱袋数字科技有限公司 Credibility evaluation and trust processing method based on artificial intelligence
CN116630033A (en) * 2023-07-20 2023-08-22 杭银消费金融股份有限公司 Information auditing method, system and storage medium
CN116797357A (en) * 2023-08-24 2023-09-22 杭银消费金融股份有限公司 Financial terminal-based credit authorization processing method and equipment
CN116823274A (en) * 2023-08-30 2023-09-29 杭银消费金融股份有限公司 Fraud risk assessment method and device applied to financial terminal
CN117132391A (en) * 2023-10-16 2023-11-28 杭银消费金融股份有限公司 Human-computer interaction-based trust approval method and system
CN117275138A (en) * 2023-11-21 2023-12-22 建信金融科技有限责任公司 Identity authentication method, device, equipment and storage medium based on automatic teller machine

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于二代身份证的生物识别身份验证系统研究;杨德胜;范叶平;;大众用电;20171230(S1) *

Also Published As

Publication number Publication date
CN117576826A (en) 2024-02-20

Similar Documents

Publication Publication Date Title
CN108876133B (en) Risk assessment processing method, device, server and medium based on business information
CN106803168B (en) Abnormal transfer detection method and device
CN106875078B (en) Transaction risk detection method, device and equipment
US20210264458A1 (en) Preempting or resolving fraud disputes relating to introductory offer expirations
CN110287971B (en) Data verification method, device, computer equipment and storage medium
CN116797357B (en) Financial terminal-based credit authorization processing method and equipment
CN113011973B (en) Method and equipment for financial transaction supervision model based on intelligent contract data lake
EP2329447A1 (en) Evaluating loan access using online business transaction data
US20200143377A1 (en) Systems and methods for user identity authentication
CN116630033B (en) Information auditing method, system and storage medium
CN116823274B (en) Fraud risk assessment method and device applied to financial terminal
CN108182627A (en) A kind of system that user credit assessment is realized according to user behavior
CN111708883A (en) Credit credit limit determination method and device based on machine learning and equipment fingerprint
CN110795574A (en) Knowledge graph construction method based on finance anti-fraud
CN117314424B (en) Block chain transaction system and method for big financial data
TW201528171A (en) Method for detecting false card risk and transaction processing system for implementing same
CN110020939A (en) Establish device, method and the storage medium of loss given default prediction model
CN117576826B (en) Financial self-service terminal and credit giving processing method based on same
CN111861733A (en) Fraud prevention and control system and method based on address fuzzy matching
CN116740866A (en) Banknote loading and clearing system and method for self-service machine
EP1020817A1 (en) Method and apparatus for authenticating ic card
CN115564591A (en) Financing product determination method and related equipment
CN114140111A (en) Account risk evaluation method based on geographic position
CN110046783B (en) Method and device for identifying fraudulent account, electronic equipment and storage medium
Marakhtanov et al. Detection of fictitious accounts registration

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant