CN107578331B - Method and system for monitoring risk after loan - Google Patents
Method and system for monitoring risk after loan Download PDFInfo
- Publication number
- CN107578331B CN107578331B CN201710848318.9A CN201710848318A CN107578331B CN 107578331 B CN107578331 B CN 107578331B CN 201710848318 A CN201710848318 A CN 201710848318A CN 107578331 B CN107578331 B CN 107578331B
- Authority
- CN
- China
- Prior art keywords
- loan
- address
- coordinate
- distance
- application information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000012544 monitoring process Methods 0.000 title claims abstract description 31
- 238000011835 investigation Methods 0.000 claims abstract description 21
- 238000004590 computer program Methods 0.000 claims description 9
- 238000007621 cluster analysis Methods 0.000 claims description 6
- 238000004458 analytical method Methods 0.000 abstract description 3
- 230000007246 mechanism Effects 0.000 abstract description 2
- 230000009286 beneficial effect Effects 0.000 abstract 1
- 238000011156 evaluation Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 241000209202 Bromus secalinus Species 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000000205 computational method Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The method for monitoring the risk after the loan comprises the steps of inquiring a map according to preset personal address information in loan application information to obtain coordinate data; calculating every two coordinate data to obtain coordinate distances, and performing clustering analysis on the loan contracts in a preset distance range of each coordinate distance to obtain fraud possibility values corresponding to the loan application information; and if the fraud possibility value is larger than the threshold value, applying for post-loan anti-fraud investigation corresponding to the loan application information. By the method, the address data can be directly processed to obtain corresponding coordinate data for subsequent evaluation, the post-credit risk monitoring efficiency is improved, and the existing risk early warning mechanism is strengthened. The application also provides a system for monitoring the risk after the loan, a computer readable storage medium and a server, which have the beneficial effects.
Description
Technical field
This application involves financial field, more particularly to method, system and one kind and computer of risk monitoring and control after a kind of loan
Readable storage medium storing program for executing and a kind of server.
Background technology
In financial industry, urged mostly with the electricity after loan about the method for risk monitoring and control after loan instantly, visiting abroad or core are protected.At present
The country has the individual for the credit record that can be used for reference to only have less than 400,000,000 people, and the reference record of wherein majority is also relatively more single
It is thin, the personal credit view with reference value cannot be formed.
Existing post-loan management is to make base with mass data, transitory efficient reparation debt-credit is lost by being directed to the debtor that breaks one's promise
Connection people breaks one's promise the information such as record and contact method, assists information change, the adjustment of lending institution dynamic monitoring borrower corresponding
Collection strategy, and then overdue debt is demanded, collection success rate is improved, platform bad debt risk is effectively reduced.But this method is simultaneously
The dynamics of anti-fraud monitoring cannot be effectively improved, it is palliative.
Also a kind of post-loan management method is to carry out corresponding calculate to loan by each better address of creditor
Information carries out risk monitoring and control.But this method require address information must enough in detail, such as by " province, city, area, town, road,
Street, number " defines, then the details that each address information must include above-mentioned each level can just be subject to profit
With.However not all address is all enough in detail, to be generally difficult to the risk monitoring and control after accordingly being borrowed in this way.
Invention content
The purpose of the application is to provide the method and relevant apparatus of risk monitoring and control after a kind of loan, and solving the prior art can not be into
The problem of capable effectively anti-fraud analysis.
In order to solve the above technical problems, the method that the application provides risk monitoring and control after a kind of loan, specific technical solution are as follows:
Coordinate data is obtained according to the predetermined personal address information inquiry map in loan application information;
Coordinate distance is calculated two-by-two to the coordinate data, within the scope of the pre-determined distance of each coordinate distance
Loan agreement carry out clustering, obtain the corresponding fraud possibility numerical value of the loan application information;
If the fraud possibility numerical value is more than threshold value, tune is instead cheated after applying for the corresponding loan of the loan application information
It looks into.
Wherein, the predetermined personal address information inquiry map in the information according to loan application obtains coordinate data packet
It includes:
Loan application information is inquired, predetermined personal address information is obtained;Wherein, the predetermined personal address information includes existing
Address, household register address and business address;
Address location is inquired according to the predetermined personal address information invocation map API, obtains GPS latitude and longitude coordinates.
Wherein, carrying out clustering to the loan agreement within the scope of the pre-determined distance of the coordinate distance includes:
The address, the household register address and the business address are chosen respectively as the center of circle, respectively with each
The center of circle is that radius obtains center circle to the corresponding coordinate distance of remaining address;
Loan agreement within the scope of the circumference pre-determined distance of each center circle of distance is classified as each center circle to correspond to
Loan agreement set;
Analyze the contact between loan agreement described in each loan agreement set.
Wherein, the method further includes:
When anti-the quantity of fraud investigation request slip is more than preset value after the loan in target loan agreement set, carry out
Anti- fraud investigation after the loan of all loan agreements in the target loan agreement set.
The system that the application also provides risk monitoring and control after a kind of loan, including:
Enquiry module, for obtaining number of coordinates according to the predetermined personal address information inquiry map in loan application information
According to;
Cluster Analysis module, for coordinate distance to be calculated two-by-two to the coordinate data, to each coordinate away from
From pre-determined distance within the scope of loan agreement carry out clustering, obtain the corresponding fraud possibility of the loan application information
Numerical value;
Inquiry module applies for that the loan application information corresponds to if being more than threshold value for the fraud possibility numerical value
Loan after anti-fraud investigation.
Wherein, the enquiry module includes:
Query unit obtains predetermined personal address information for inquiring loan application information;Wherein, the predetermined individual
Address information includes address, household register address and business address;
Coordinate acquiring unit is obtained for inquiring address location according to the predetermined personal address information invocation map API
GPS latitude and longitude coordinates.
Wherein, the Cluster Analysis module includes:
Circle unit is drawn, for choosing the address, the household register address and the business address respectively as circle
The heart obtains center circle to the corresponding coordinate distance of remaining address using each center of circle as radius respectively;
Sort out unit, for the loan agreement within the scope of the circumference pre-determined distance of each center circle of distance to be classified as often
The corresponding loan agreement set of a center circle;
Analytic unit, for analyzing the contact between loan agreement described in each loan agreement set.
Wherein, the system also includes:
Trigger element, for anti-the quantity of fraud investigation request slip to be more than after the loan in target loan agreement set
When preset value, anti-fraud investigation after the loan of all loan agreements in the target loan agreement set is carried out.
The application also provides a kind of computer readable storage medium, is stored thereon with computer program, and the key obtains
Program is performed realization following steps:
Coordinate data is obtained according to the predetermined personal address information inquiry map in loan application information;
Coordinate distance is calculated two-by-two to the coordinate data, within the scope of the pre-determined distance of each coordinate distance
Loan agreement carry out clustering, obtain the corresponding fraud possibility numerical value of the loan application information;
If the fraud possibility numerical value is more than threshold value, tune is instead cheated after applying for the corresponding loan of the loan application information
It looks into.
The application also provides a kind of server, including memory and processor, has computer program in the memory,
The processor realizes following steps when calling the computer program in the memory:
Coordinate data is obtained according to the predetermined personal address information inquiry map in loan application information;
Coordinate distance is calculated two-by-two to the coordinate data, within the scope of the pre-determined distance of each coordinate distance
Loan agreement carry out clustering, obtain the corresponding fraud possibility numerical value of the loan application information;
If the fraud possibility numerical value is more than threshold value, tune is instead cheated after applying for the corresponding loan of the loan application information
It looks into.
The method of risk monitoring and control after a kind of loan provided herein includes according to the predetermined individual in loan application information
Address information inquires map and obtains coordinate data;Coordinate distance is calculated two-by-two to the coordinate data, to each seat
Loan agreement within the scope of the pre-determined distance of subject distance carries out clustering, and obtaining the corresponding fraud of the loan application information can
It can property numerical value;If the fraud possibility numerical value is more than threshold value, apply for counter after the corresponding loan of the loan application information cheat
Investigation.By this method, it can directly handle address date and obtain the subsequent assessment of corresponding coordinate data progress, improve
The efficiency of risk monitoring and control after loan enhances existing Risk-warning mechanism.Present invention also provides risk monitoring and controls after a kind of loan
System, a kind of computer readable storage medium and a kind of server have above-mentioned advantageous effect, and details are not described herein again.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
The method flow diagram of risk monitoring and control after a kind of loan that Fig. 1 is provided by the embodiment of the present application;
Risk monitoring and control method uses schematic diagram after a kind of loan that Fig. 2 is provided by the embodiment of the present application;
The system structure diagram of risk monitoring and control after a kind of loan that Fig. 3 is provided by the embodiment of the present application.
Specific implementation mode
To keep the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, technical solutions in the embodiments of the present application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
The every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Referring to FIG. 1, after a kind of loan that Fig. 1 is provided by the embodiment of the present application risk monitoring and control method flow diagram, technology
Scheme is as follows:
S101:Coordinate data is obtained according to the predetermined personal address information inquiry map in loan application information;
Generally include many personal address informations in loan application information, such as address, once address, household register address and work
Office address etc..Therefore it needs to inquire loan application information, obtains the personal address information of setting.It can be according to different demands
Risk monitoring and control selects different address combinations to be analyzed, such as can utilize address, household register address and business address.
Corresponding coordinate data is obtained further according to corresponding address information, i.e., corresponding address is input in map and is obtained
Its coordinate data.Coordinate data type is not limited herein, can be latitude and longitude coordinates, can also be corresponding under setting rule
Coordinate data.It, can be according to setting corporally in addition, when personal address information fuzzy, such as when without street or without number
Location information invocation map API inquires address location, obtains GPS latitude and longitude coordinates, can solve to obscure band because of address information in this way
The problem for the character match accuracy deficiency come.
S102:Coordinate distance is calculated two-by-two to the coordinate data, to the pre-determined distance of each coordinate distance
Loan agreement in range carries out clustering, obtains the corresponding fraud possibility numerical value of the loan application information;
After obtaining coordinate data, the coordinate distance between corresponding two address informations is calculated two-by-two, then to doing
Loan in marking path preset range and same progress clustering.Here it how does not limit to making marks apart from preset range
Interior loan and with carrying out clustering, the distance between 2 points computational methods can there are many, according to business demand, Ke Yishi
Existing different algorithm.Preferably, it provides herein a kind of to loan and the same progress clustering in preset range of making marks
Method, technical solution is as follows:
Address, household register address and business address are chosen respectively as the center of circle, it is arrived with each center of circle respectively
The corresponding coordinate distance in leeway location is that radius obtains center circle;By the loan within the scope of the circumference pre-determined distance apart from each center circle
Money contract is classified as the corresponding loan agreement set of each center circle;Analyze the connection between loan agreement in each loan agreement set
System.
For example, with reference to Fig. 2, using address A as the center of circle, with the coordinate distance of address A to business address B (assuming that
For 5 kms) it is that radius obtains a center circle (in figure shown in dotted line), pre-determined distance is 2 kms, then the region obtained is with existing
Address is the center of circle, and radius distinguishes the circle ring area that two border circular areas of 3 kms to 7 kms are formed, that is, illustrates shadow part subregion
Domain.All loan agreements in the circle ring area are set as a loan agreement set, analyze the institute in the loan agreement set
There are loan agreement and the contact between them.The contact may include the aobvious of loan agreement, recessive character.So-called dominant spy
Levying on the contract for referring to client has identical work unit's title, WorkPhone, unit address, other addresses or identical contact
People's information, the identical intended use of the loan, these are all dominant characteristic attributes;Stealth characteristics refer to going out between different clients contract
Existing cross correlation network, for example, it is similar handle the time, other contact persons of first have appeared in the emergency contact roster of second
Upper, third WorkPhone is the home phone number etc. of fourth, these are the characteristic attributes of recessiveness.
According to the method, getable center circle quantity isM is personal number of addresses.Here personal number of addresses
Amount refers to actual quantity, such as once address may have multiple, and often there are one just meters one.For example, having address A, job note
Bit address B, household register address C, once address E and F, then corresponding personal number of addresses is 5, i.e. m=5, therefore is hadIt is a
Center circle.Because using A as the center of circle, the distance L between AB is radius and using B as the center of circle, and what distance L was that radius obtains is two differences
Center circle, it is same it is corresponding is two different loan agreement set.
The pre-determined distance can be manual setting, can also be to be arranged according to actual conditions experience, herein not
It is construed as limiting.Certainly there can also be other clustering methods, not limit herein.
After clustering, the corresponding fraud possibility numerical value of the loan application information can be obtained.
If it is worth noting that, when analyzing some loan agreement set, find have quantity super in the set
Cross it is counter after the loan of preset value cheat the application of investigation, including the application investigated and investigated, then can consider should
Collection is combined into a target loan agreement set, and all loan agreements are taken advantage of in the corresponding region of target loan agreement set
It cheats that possibility is higher, and then carries out anti-fraud investigation after the loan of all loan agreements in the target loan agreement set.Certainly,
Include obtaining the loan application of individual's address information among these.
S103:If the fraud possibility numerical value is more than threshold value, apply anti-after the corresponding loan of the loan application information
Fraud investigation.
When cheating possibility numerical value and being more than threshold value, anti-fraud investigation after application is borrowed, including electricity is urged, visiting abroad etc., tries hard to drop
The risk cheated after low loan.The method of the threshold value is obtained do not limit herein described in, it usually can be by those skilled in the art
It analyzes to obtain according to objective law or industry experience.
The method that the embodiment of the present application provides risk monitoring and control after a kind of loan, can be realized by the above method and be based on
Risk monitoring and control after the loan of geographical location information, by being acquired, being converted into the personal address information in loan application information
Coordinate data and comprehensive analysis, obtain the fraud possibility numerical value of the loan application, and then by the fraud possibility numerical value and threshold
Value is made comparisons decide whether to be borrowed after anti-fraud investigation.
Below to system, computer readable storage medium and the service of risk monitoring and control after loan provided by the embodiments of the present application
Device is introduced, after loan described below the system of risk monitoring and control, computer readable storage medium and server with retouch above
The method of risk monitoring and control can correspond reference after the loan stated.
Referring to Fig. 3, the system that the application also provides risk monitoring and control after a kind of loan, including:
Enquiry module 100, for obtaining coordinate according to the predetermined personal address information inquiry map in loan application information
Data;
Cluster Analysis module 200, for coordinate distance to be calculated two-by-two to the coordinate data, to each coordinate
Loan agreement within the scope of the pre-determined distance of distance carries out clustering, and obtaining the corresponding fraud of the loan application information may
Property numerical value;
Inquiry module 300 applies for the loan application information pair if being more than threshold value for the fraud possibility numerical value
Anti- fraud investigation after the loan answered.
Based on above-described embodiment, as preferred embodiment, the enquiry module 100 may include:
Query unit obtains predetermined personal address information for inquiring loan application information;Wherein, the predetermined individual
Address information includes address, household register address and business address;
Coordinate acquiring unit is obtained for inquiring address location according to the predetermined personal address information invocation map API
GPS latitude and longitude coordinates.
Based on above-described embodiment, as preferred embodiment, the Cluster Analysis module 200 may include:
Circle unit is drawn, for choosing the address, the household register address and the business address respectively as circle
The heart obtains center circle to the corresponding coordinate distance of remaining address using each center of circle as radius respectively;
Sort out unit, for the loan agreement within the scope of the circumference pre-determined distance of each center circle of distance to be classified as often
The corresponding loan agreement set of a center circle;
Analytic unit, for analyzing the contact between loan agreement described in each loan agreement set.
Based on above-described embodiment, as preferred embodiment, the system can also include:
Trigger element, for anti-the quantity of fraud investigation request slip to be more than after the loan in target loan agreement set
When preset value, anti-fraud investigation after the loan of all loan agreements in the target loan agreement set is carried out.
Present invention also provides a kind of computer readable storage mediums, have computer program thereon, the computer program
It is performed and the step of above-described embodiment is provided may be implemented.The storage medium may include:USB flash disk, read-only is deposited mobile hard disk
Reservoir (Read-Only Memory, ROM), random access memory (RandomAccess Memory, RAM), magnetic disc or light
The various media that can store program code such as disk.
Present invention also provides a kind of servers, may include memory and processor, have calculating in the memory
Machine program, the processor call the computer sechron in the memory, and the step that above-described embodiment is provided may be implemented
Suddenly.Certain server can also include various network interfaces, the components such as power supply.
Each embodiment is described by the way of progressive in specification, the highlights of each of the examples are with other realities
Apply the difference of example, just to refer each other for identical similar portion between each embodiment.For embodiment provide system and
Speech, since it is corresponding with the method that embodiment provides, so description is fairly simple, related place is referring to method part illustration
.
Above to method, system and the computer readable storage medium of risk monitoring and control after a kind of loan provided herein,
Server is described in detail.Specific examples are used herein to illustrate the principle and implementation manner of the present application,
The description of the example is only used to help understand the method for the present application and its core ideas.It should be pointed out that for this technology
For the those of ordinary skill in field, under the premise of not departing from the application principle, several improvement can also be carried out to the application
And modification, these improvement and modification are also fallen into the application scope of the claims.
It should also be noted that, in the present specification, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that the process, method, article or equipment including a series of elements includes not only that
A little elements, but also include other elements that are not explicitly listed, or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except there is also other identical elements in the process, method, article or apparatus that includes the element.
Claims (10)
1. a kind of method of risk monitoring and control after loan, which is characterized in that including:
Coordinate data is obtained according to the predetermined personal address information inquiry map in loan application information;The predetermined personal address
Information includes at least two address informations;
Coordinate distance is calculated two-by-two to the coordinate data, to the loan within the scope of the pre-determined distance of each coordinate distance
Money contract carries out clustering, obtains the corresponding fraud possibility numerical value of the loan application information;
If the fraud possibility numerical value is more than threshold value, apply for anti-fraud investigation after the corresponding loan of the loan application information.
2. according to the method described in claim 1, it is characterized in that, predetermined personal address in the information according to loan application
Information inquiry map obtains coordinate data:
Loan application information is inquired, predetermined personal address information is obtained;Wherein, the predetermined personal address information includes now living
Location, household register address and business address;
Address location is inquired according to the predetermined personal address information invocation map API, obtains GPS latitude and longitude coordinates.
3. according to the method described in claim 2, it is characterized in that, to the loan within the scope of the pre-determined distance of the coordinate distance
Contract carries out clustering:
The address, the household register address and the business address are chosen respectively as the center of circle, respectively with each described
The center of circle is that radius obtains center circle to the corresponding coordinate distance of remaining address;
Loan agreement within the scope of the circumference pre-determined distance of each center circle of distance is classified as the corresponding loan of each center circle
Money contract set;
Analyze the contact between loan agreement described in each loan agreement set.
4. according to the method described in claim 3, it is characterized in that, further including:
When anti-the quantity of fraud investigation request slip is more than preset value after the loan in target loan agreement set, described in progress
Anti- fraud investigation after the loan of all loan agreements in target loan agreement set.
5. the system of risk monitoring and control after a kind of loan, which is characterized in that including:
Enquiry module, for obtaining coordinate data according to the predetermined personal address information inquiry map in loan application information;Institute
It states predetermined personal address information and includes at least two address informations;
Cluster Analysis module, for coordinate distance to be calculated two-by-two to the coordinate data, to each coordinate distance
Loan agreement within the scope of pre-determined distance carries out clustering, obtains the corresponding fraud possibility number of the loan application information
Value;
Inquiry module applies for the corresponding loan of the loan application information if being more than threshold value for the fraud possibility numerical value
Anti- fraud investigation afterwards.
6. system according to claim 5, which is characterized in that the enquiry module includes:
Query unit obtains predetermined personal address information for inquiring loan application information;Wherein, the predetermined personal address
Information includes address, household register address and business address;
Coordinate acquiring unit obtains GPS for inquiring address location according to the predetermined personal address information invocation map API
Latitude and longitude coordinates.
7. system according to claim 6, which is characterized in that the Cluster Analysis module includes:
Circle unit is drawn, for choosing the address, the household register address and the business address respectively as the center of circle, is divided
Center circle is not obtained as radius to the corresponding coordinate distance of remaining address using each center of circle;
Sort out unit, for by the loan agreement within the scope of the circumference pre-determined distance of each center circle of distance be classified as it is each in
The heart justifies corresponding loan agreement set;
Analytic unit, for analyzing the contact between loan agreement described in each loan agreement set.
8. system according to claim 7, which is characterized in that further include:
Trigger element, for anti-the quantity of fraud investigation request slip to be more than to preset after the loan in target loan agreement set
When value, anti-fraud investigation after the loan of all loan agreements in the target loan agreement set is carried out.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt
Method according to any one of claims 1-4 is realized when execution.
10. a kind of server, which is characterized in that including memory and processor, have computer program, institute in the memory
It states when processor calls the computer program in the memory and realizes method according to any one of claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710848318.9A CN107578331B (en) | 2017-09-19 | 2017-09-19 | Method and system for monitoring risk after loan |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710848318.9A CN107578331B (en) | 2017-09-19 | 2017-09-19 | Method and system for monitoring risk after loan |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107578331A CN107578331A (en) | 2018-01-12 |
CN107578331B true CN107578331B (en) | 2018-08-24 |
Family
ID=61033093
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710848318.9A Active CN107578331B (en) | 2017-09-19 | 2017-09-19 | Method and system for monitoring risk after loan |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107578331B (en) |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109325657A (en) * | 2018-08-17 | 2019-02-12 | 平安普惠企业管理有限公司 | A kind of measures and procedures for the examination and approval of credit operation, storage medium and server |
CN109636568A (en) * | 2018-10-25 | 2019-04-16 | 深圳壹账通智能科技有限公司 | Risk checking method, device, equipment and the storage medium of telephone number |
CN109636571A (en) * | 2018-10-25 | 2019-04-16 | 深圳壹账通智能科技有限公司 | Risk analysis method, device, equipment and readable storage medium storing program for executing |
CN109636573A (en) * | 2018-10-25 | 2019-04-16 | 深圳壹账通智能科技有限公司 | Credit analysis method, device, equipment and readable storage medium storing program for executing |
CN109584041A (en) * | 2018-10-25 | 2019-04-05 | 深圳壹账通智能科技有限公司 | Credit fraud analysis method, apparatus, equipment and computer readable storage medium |
CN109657900B (en) * | 2018-10-25 | 2023-05-23 | 平安科技(深圳)有限公司 | Method, device, equipment and storage medium for detecting risk of work unit information |
CN111311041B (en) * | 2018-12-12 | 2024-02-20 | 马上消费金融股份有限公司 | Data extraction method and device and related device |
CN109685643A (en) * | 2018-12-13 | 2019-04-26 | 平安科技(深圳)有限公司 | Loan audit risk grade determines method, apparatus, equipment and storage medium |
CN110033168B (en) * | 2019-03-12 | 2024-05-14 | 珠海名家色彩创意设计有限公司 | Order distribution method based on data processing and related equipment |
CN111724007B (en) * | 2019-03-18 | 2022-12-06 | 马上消费金融股份有限公司 | Risk evaluation method, evaluation device, intelligent system and storage device |
CN110111202A (en) * | 2019-05-09 | 2019-08-09 | 深圳美美网络科技有限公司 | The method and system of risk monitoring and control after a kind of loan |
CN110503563B (en) * | 2019-07-05 | 2023-07-21 | 中国平安人寿保险股份有限公司 | Risk control method and system |
CN110503546A (en) * | 2019-07-15 | 2019-11-26 | 平安普惠企业管理有限公司 | Location information antifraud method and relevant device based on information security |
CN112508589A (en) * | 2019-08-26 | 2021-03-16 | 珠海格力电器股份有限公司 | Individual credit assessment method and computer-readable storage medium |
CN110659999A (en) * | 2019-08-30 | 2020-01-07 | 中国人民财产保险股份有限公司 | Data processing method and device and electronic equipment |
CN111986020A (en) * | 2020-06-05 | 2020-11-24 | 深圳市卡牛科技有限公司 | Financial loan risk assessment method, device, equipment and storage medium |
CN111861733B (en) * | 2020-07-31 | 2023-09-15 | 重庆富民银行股份有限公司 | Fraud prevention and control system and method based on address fuzzy matching |
CN113409139B (en) * | 2021-07-27 | 2024-05-28 | 深圳前海微众银行股份有限公司 | Credit risk identification method, apparatus, device and program |
CN114282988A (en) * | 2021-12-27 | 2022-04-05 | 深圳前海微众银行股份有限公司 | Abnormal application identification method and equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106157132A (en) * | 2016-06-20 | 2016-11-23 | 中国工商银行股份有限公司 | Credit risk monitoring system and method |
CN106384326A (en) * | 2016-09-30 | 2017-02-08 | 青岛智车品信息科技有限公司 | Loan vehicle fraud aggregation early warning system and method |
-
2017
- 2017-09-19 CN CN201710848318.9A patent/CN107578331B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106157132A (en) * | 2016-06-20 | 2016-11-23 | 中国工商银行股份有限公司 | Credit risk monitoring system and method |
CN106384326A (en) * | 2016-09-30 | 2017-02-08 | 青岛智车品信息科技有限公司 | Loan vehicle fraud aggregation early warning system and method |
Also Published As
Publication number | Publication date |
---|---|
CN107578331A (en) | 2018-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107578331B (en) | Method and system for monitoring risk after loan | |
CA3102678C (en) | Information processing device, information processing method, and computer program background | |
US8417561B2 (en) | Market dynamics | |
US20170186085A1 (en) | System and method for dynamic monitoring of credit parameters | |
Nguyen et al. | An empirical analysis of credit accessibilty of small and medium sized enterprises in Vietnam | |
CN105160173B (en) | Safety evaluation method and device | |
CN108256993A (en) | A kind of credit score appraisal procedure and credit score Evaluation Platform | |
CN111708883A (en) | Credit credit limit determination method and device based on machine learning and equipment fingerprint | |
CN108932649A (en) | A kind of digital asset method of commerce, system and storage medium based on block chain | |
CN110807699B (en) | Overdue event payment collection method and device and computer readable storage medium | |
CN110619065A (en) | Resource scheduling service processing method and device, computer equipment and storage medium | |
CN107767261A (en) | The implementation method and device of loan financing | |
CN112950357A (en) | Transaction abnormal group partner identification method and device | |
CN114266640A (en) | Auditing method and device, computer equipment and storage medium | |
CN113658007B (en) | Investment and financing matching method and device, electronic equipment and storage medium | |
CN111429271A (en) | Service management method and system based on block chain | |
CN107423982A (en) | Service implementation method and device based on account | |
CN109886808A (en) | A kind of property transaction system based on block chain technology | |
CN108256990A (en) | Server, the method for indicating risk and computer readable storage medium | |
CN112967131A (en) | Loan collection scheme pushing method and device | |
KR20190140374A (en) | Method for Evaluating Prospects for Cryptocurrency Treading | |
CN112116356B (en) | Asset characteristic information processing method and device | |
CN113034157B (en) | Group member identification method and device and computing equipment | |
KR102086944B1 (en) | Method for loan finance service based offline interworking and apparatus thereof | |
CN113935657A (en) | Resource management method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |