CN109472439A - Credit estimation method, device, equipment and system - Google Patents

Credit estimation method, device, equipment and system Download PDF

Info

Publication number
CN109472439A
CN109472439A CN201811071428.XA CN201811071428A CN109472439A CN 109472439 A CN109472439 A CN 109472439A CN 201811071428 A CN201811071428 A CN 201811071428A CN 109472439 A CN109472439 A CN 109472439A
Authority
CN
China
Prior art keywords
application server
sent
user
credit
user data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811071428.XA
Other languages
Chinese (zh)
Inventor
谢宏运
唐微波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Maimaiti Mdt Infotech Ltd Shenzhen
Original Assignee
Maimaiti Mdt Infotech Ltd Shenzhen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Maimaiti Mdt Infotech Ltd Shenzhen filed Critical Maimaiti Mdt Infotech Ltd Shenzhen
Priority to CN201811071428.XA priority Critical patent/CN109472439A/en
Publication of CN109472439A publication Critical patent/CN109472439A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a kind of credit estimation methods, comprising: receive the first application server transmission request instructions after to first application server send chained address;The authorized order and authentication information that the corresponding client of first application server is sent based on the page are obtained, the page is the corresponding page in the chained address;Crawler service is called to crawl the corresponding user data of authentication information described in the third-party application of the authorized order authorization;The user data is stored, processing analyzes the user data and show that user credit scores;The user credit scoring is sent, so that the client is based on the page and exports the user credit scoring;The invention also discloses a kind of credit evaluation device, equipment and system, it is excessively high to solve outsourcing data cost, lacks customer data, the high problem of risk before borrowing.

Description

Credit estimation method, device, equipment and system
Technical field
The present invention relates to information technology field more particularly to a kind of credit estimation methods, apparatus and system.
Background technique
With the fast development of Internet industry, the internet gold of interconnection existence, service operation and promoting service is relied on Melting that number of the enterprise is more and more, internet payment, P2P network loan platform and many risk cases for raising financing happen occasionally, Assessing credit risks has important risk announcement effect to investor.Market economy deepen constantly and economical globalization tendency Aggravation, construct social credit system, it is horizontal to promote credit management, establish credit rewards and punishments mechanism, improve credit management system, from And optimize the order of the market economy, market transaction efficiency is improved, government agencies at all levels, main market players, employer's organization, letter are had become With professional institution and other social organizations common social responsibility and the market demand.
Lack the relevant information of client, it is difficult to understand because of outsourcing data higher cost in current audit, approval process The real background situation and practical loan repayment capacity of client, risk is larger before borrowing.
Summary of the invention
The present invention provides a kind of credit estimation method, apparatus and system, for solving outsourcing data higher cost, lacks visitor The relevant information at family, it is difficult to understand the real background situation and practical loan repayment capacity of client, the biggish technology of risk is asked before borrowing Topic.
In order to solve the above-mentioned technical problem, first aspect of the embodiment of the present invention discloses a kind of credit estimation method, comprising:
It is linked after receiving the request instructions of the first application server transmission to first application server transmission Address;
Obtain authorized order and authentication letter that the corresponding client of first application server is sent based on the page Breath, the page are the corresponding page in the chained address;
Crawler service is called to crawl authentication information described in the third-party application of the authorized order authorization corresponding User data;
The user data is stored, processing analyzes the user data and show that user credit scores;
The user credit scoring is sent, so that the client is based on the page and exports the user credit scoring.
Specifically, being based on should be in a first aspect, in one of the implementation manners, first application server that receives be sent out Chained address is sent to first application server after the request instructions sent, comprising:
Receive the encryption account that first application server is sent;
It is decrypted after the encryption account obtains decryption account by private key and verifies the decryption account, if being verified, Identity token is returned to first application server;
After the service request for receiving the carrying identity token that first application server is sent, send chain ground connection Location.
Specifically, being based on should be in a first aspect, in one of the implementation manners, the calling crawler service crawls described award Weigh the corresponding user data of authentication information described in the third-party application of authorization by instruction, comprising:
It is serviced by multiple server concurrent invocation crawlers, skips institute when the crawler system, which crawls, encounters failure connection Failure connection is stated, next is carried out and crawls.
Specifically, being based on should be in a first aspect, in one of the implementation manners, the calling crawler service crawls described award After the corresponding user data of authentication information described in the third-party application of power authorization by instruction, further includes:
The user data requests instruction that first application server is sent is received, is instructed according to the user data requests User data is sent to first application server.
Specifically, being based on should be in a first aspect, in one of the implementation manners, the processing be analyzed the user data and is obtained User credit scores out, comprising:
The user data, which is statisticallyd analyze, according to setting model formula show that user credit scores;
If receiving the manual examination and verification Shen that first application server is sent based on the corresponding page in the chained address It please request, then output manual examination and verification instruction message be requested according to the manual examination and verification application, the manual examination and verification instruction message is used Manual examination and verification scoring is carried out to the user data in instruction.
Specifically, being based on should be in a first aspect, in one of the implementation manners, the transmission user credit scores it Before further include:
When authorized user's amount reaches threshold value, wanted by any identity in the name, identity card and communications account that receive Element calls matched user data in database, and user data is obtained if successful match.
Second aspect of the embodiment of the present invention discloses a kind of credit estimation method, is applied to the first application server, comprising:
Receive the assessment triggering command of input;
After sending request instructions to the second application server according to the assessment triggering command, obtains described second and answer The chained address sent with server according to the request instructions;
The page corresponding with the chained address is embedded in the client corresponding to first application server, so that The authorized order and authentication information that are inputted based on the page are sent to second application server by the client.
Specifically, be based on the second aspect, in one of the implementation manners, it is described according to the assessment triggering command to After second application server sends request instructions, obtains second application server and sent out according to the request instructions The chained address sent, comprising:
Encryption account request authentication is sent to the second application server according to the assessment triggering command;
If the authentication passes through, the identity token that second application server is sent is received;
The request instruction for carrying the identity token is sent, obtains second application server according to the request instruction The chained address of transmission.
The third aspect of the embodiment of the present invention discloses a kind of credit evaluation device, including for executing in above-mentioned first aspect The unit of the method for any implementation.
Fourth aspect of the embodiment of the present invention discloses a kind of credit evaluation device, including for executing in above-mentioned first aspect The unit of the method for any implementation.
The aspect of the embodiment of the present invention the 5th discloses a kind of credit evaluation equipment, including processor, input equipment, output are set Standby, memory and communication equipment, the processor, input equipment, output equipment, memory and communication equipment are connected with each other, In, the memory is used to carry out information exchange with external equipment for storing application code, the communication equipment;It is described Processor is configured for calling said program code, executes the method as described in above-mentioned first aspect and above-mentioned second aspect.
The aspect of the embodiment of the present invention the 6th discloses a kind of credit evaluation system, including the first application server, second answers With server and terminal, first application server, the second application server and terminal are in communication with each other, wherein the terminal For carrying out information exchange with external equipment, second application server executes any implementation in above-mentioned first aspect Method, the method that first application server executes any implementation in above-mentioned second aspect.
Implement the embodiment of the present invention, will have the following beneficial effects:
For the embodiment of the present invention as method, apparatus, equipment and system, each functional module division of labor is clear, not only can be Intra-company provides service, can also externally provide service, free data can be externally provided for the purpose of collecting data early period Service is crawled, when authorized user's amount reaches million grades or more, collecting data, just huge scale has certain credit reference price Value can be provided customization service based on all kinds of authorization datas of collection, externally provide Various types of data query service.And When being crawled, storing and processing analysis data by the way of multiple server concurrent services, server is effectively reduced Coupling phenomenon improves efficiency.
It is authorized based on user, crawls people's row reference, learns the customer informations such as letter net, telecom operators and Jingdone district, be early period Audit, examination & approval and the anti-fraud in later period data are provided and are supported, be finally reached the purpose for reducing outsourcing data cost;Pass through number It according to crawling, excavates and obtains customers' credit scoring with modeling, divide customer grade, client battalion is carried out by vertical dimensions according to grade Pin, customers' credit and amount are combined closely, and reasonably avoiding borrows preceding risk, allow credit funds benefit.
Detailed description of the invention
In order to illustrate the embodiment of the present invention or technical solution in the prior art, embodiment or the prior art will be retouched below Attached drawing needed in stating is briefly described.
Fig. 1 is a kind of system architecture schematic diagram of credit estimation method provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram of the credit estimation method of embodiment provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of the credit estimation method of another embodiment provided in an embodiment of the present invention;
Fig. 4 is a kind of schematic diagram of the application scenarios of credit estimation method provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of credit evaluation device provided in an embodiment of the present invention;
Fig. 6 is the structural schematic diagram of another credit evaluation device provided in an embodiment of the present invention;
Fig. 7 is a kind of structural schematic diagram of credit evaluation equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention is described.
Term " first ", " second ", " third " and " the 4th " in the description and claims of this application and attached drawing Etc. being not use to describe a particular order for distinguishing different objects.In addition, term " includes " and " having " and they appoint What is deformed, it is intended that is covered and non-exclusive is included.Such as contain the process, method, system, production of a series of steps or units Product or equipment are not limited to listed step or unit, but optionally further comprising the step of not listing or unit, or Optionally further comprising the other step or units intrinsic for these process, methods, product or equipment.
It should be appreciated that the term "and/or" used in description of the invention and the appended claims refer to it is associated Any combination and all possible combinations of one or more of the item listed, and including these combinations.
A kind of credit estimation method, credit evaluation device and the credit that embodiment provides in order to better understand the present invention are commented Estimate system, first the system architecture of the credit estimation method of the embodiment of the present invention is described below.As shown in Figure 1, it is this Inventive embodiments provide a kind of credit estimation method system architecture schematic diagram, the system include the first application server 101, Second application server 102 and terminal 103.Wherein system architecture may include one or more terminals 103, and terminal 103 can be with It installs and has run one or more relevant clients.
First application server 101, can include but is not limited to background server, interface server, database server Deng server can be communicated by internet with multiple terminals 103.
Terminal 103 can include but is not limited to any hand-held electronic product based on intelligent operating system, can Human-computer interaction is carried out by input equipments such as keyboard, dummy keyboard, touch tablet, touch screen and voice-operated devices with user, it is all Such as smart phone, tablet computer, PC.Wherein, intelligent operating system includes but is not limited to any by mentioning to terminal The operating system of functions of the equipments, such as Android (Android are enriched for various client applicationsTM)、iOSTM、Windows PhoneTMDeng.
Specifically, client can include: the application program of local runtime runs on function on web browser (also known as For Web App) etc..For client, needing to run on server has corresponding server to provide corresponding service, Such as database service, data calculating, decision execution etc..In embodiments of the present invention, the first application server 101 is terminal The client run on 103 provides service.
Second application server 102, can include but is not limited to background server, interface server, database server Deng the second application server 102 can be communicated by internet with the first application server 101 and multiple terminals 103. In a kind of feasible embodiment, the second application server 102 can be cluster server and background management system.Cluster clothes Business device is exactly that multiple servers are got up by high-speed traffic link connection, is externally come, these servers take just as one Business device working, and internally for, outside come load be dynamically allocated into these Node stations by certain mechanism, from And reach high-performance, High Availabitity that superserver just has.
Background management system may be mounted on server, wherein can have system management function:
(1) Admin Administration, also referred to as rights management.It can be with adding new administrators and modification administrator's password;
(2) DB Backup, data safety this system to guarantee you use DB Backup function;
(3) file management is uploaded, you is managed and increases the picture and alternative document uploaded when product.
Background management system can be used to manage administrator's account in the configuration of each client, for according to the body of user The scoring of part element inquiry user credit, the identity element include address name, identity card, phone number or mailbox number etc. with The relevant information in family.
The system architecture schematic diagram of credit estimation method based on Fig. 1, in embodiments of the present invention, when user needs to carry out When credit evaluation, credit evaluation can be requested by the client run in terminal 103, the first application server 101 receives To after request, can come together to complete credit evaluation with the second application server 102.In the following, in conjunction with Fig. 2 shows the present invention mention The flow diagram of the credit estimation method of confession, illustrates how the embodiment of the present invention carries out from the second application server side Credit evaluation may comprise steps of:
Step S201: it receives after the request instructions of the first application server transmission to first application server Send chained address;
Specifically, the first application server sends request instructions, the request instructions to the second application server For hyperlink request address, the second application server is grounded after receiving request instructions to the first application server send chain Location.
In a kind of wherein embodiment, the first application server sends to the second application server and carries identity token Request instructions, the second application server verifies identity by identity token, after verifying identity passes through, the second application server Chained address is sent to the first application server, which is used for the first application server for the corresponding page in chained address The client being embedded in terminal.
Step S202: authorized order and body that the corresponding client of first application server is sent based on the page are obtained Part verification information, the page are the corresponding page in the chained address;
Specifically, user in the corresponding page starting authorization function in chained address and inputs authentication information, and identity is tested The user account information in third-party application that card information is authorized by user, the user account information can log into the third Fang Yingyong, the second application server obtain the authorized order and authentication by being embedded in the corresponding page in chained address of terminal Information.
Step S203: crawler service is called to crawl the letter of authentication described in the third-party application of the authorized order authorization Cease corresponding user data;
Specifically, after the second application server gets authorized order and authentication information, simultaneously by multiple servers Hair calls crawler service, crawls user data corresponding with authentication information in the third-party application that authorized order is authorized; Crawler be it is a kind of according to certain rules, automatically grab the program or script of the network information, encounter failure when crawler crawls The failure connection is skipped when connection, is carried out next and is crawled.It should be understood that other problems are encountered when crawler crawls, such as Situations such as crawling failure, can not crawling can also directly carry out next and crawl.Wherein, third-party application may include people's row sign Letter is learned and believes net, telecom operators and Jingdone district etc..
Step S204: storage user data, processing analyze the user data and show that user credit scores;
Specifically, the user data that the second application server for storage crawls analyzes institute according to setting model formula manipulation It states user data and show that user credit scores, scored according to user credit, user gradation can be marked off, determine loan limit.
In a kind of wherein embodiment, the second application server analyzes the number of users according to setting model formula manipulation According to user credit scoring is obtained, the user data that user credit is scored and crawled is stored.
Step S205: sending the user credit scoring, so that the client is based on the page and exports the user Credit scoring.
Specifically, the second application server is commented after obtaining user credit scoring to the page of client transmission user credit Point, client is based on page output user credit scoring.
In a kind of wherein embodiment, the second application server is obtained after user credit scoring to the first application server User credit scoring is sent, the first application server sends user credit scoring to the page of client, and client is based on described The page exports user credit scoring.
Implement the embodiment of the present invention, receive the request instructions of the first application server transmission, detects service Chained address is sent to the first application server after identity token in request instruction;Obtain the corresponding visitor of the first application server The authorized order and authentication information that family end group is sent in the page;Crawler clothes are called according to authorized order and authentication information Business crawls user data;User data is stored, processing analyzes the user data and show that user credit scores.It is climbed again by authorization The mode of access evidence realizes the purpose for collecting data, solves the problems, such as that outsourcing data cost is excessively high;Pass through setting model public affairs Formula handles user data to obtain user credit scoring, solves the problems, such as that debt-credit risk is big.
It is that the embodiment of the present invention provides a kind of letter referring to Fig. 3 based on the system architecture of credit estimation method shown in FIG. 1 With the flow diagram of appraisal procedure, the system in above-mentioned Fig. 1 can be applied to, from the first application server, the second application service Device and three side of terminal describe how the embodiment of the present invention carries out credit evaluation, the credit estimation method the following steps are included:
Step S301: assessment triggering command is sent to the first application server;
Specifically, when the client installed in user's starting terminal, and enter specific interface, click specific keys or operation Whens specific function etc., such as enter the debt-credit page, click credit evaluation button or open loan function etc., terminal is just answered to first Assessment triggering command is sent with server, the assessment triggering command is used to indicate the first application server to the second application service Device sends encryption account.
Step S302: encryption account is sent to the second application server;
Specifically, after the first application server receives assessment triggering command, encryption account is sent to the second application server Number, in the embodiment of the present invention, the second application server is supplied to first application server side's rsa encryption public key and account, and first The account that the offer of the second application server of rsa encryption public key encryption can be used in application server obtains encryption account.
Step S303: decrypting received encryption account, verifies identity;
Specifically, the second application server receives encryption account, decrypts to obtain decryption account by RSA private key, if should It is identical as account provided by the second application server to decrypt account, then is verified, continues subsequent step;If the decryption Account is different from account provided by the second application server, then verifies and do not pass through, no longer progress subsequent step.
Step S304: identity token is sent to the first application server;
Specifically, after authentication passes through, the second application server sends identity token, identity to the first application server Token has term of validity, and the first application server request other interfaces of the second application server require to take in term of validity Identity token is to verify identity.The safety of intercommunication, effectively prevention malicious attack have been ensured using identity token.It can be with Understand, identity token can be access token, dynamic token and any instruction with authentication.
Step S305: the request instructions for carrying identity token are sent;
Specifically, after the first application server receives identity token, the first application server, which is sent, carries identity token Request instructions to the second application server, which is to obtain corresponding chained address.
Step S306: chained address is sent to the first application server according to request instructions;
Specifically, the second application server receives request instructions, then parses to the request instructions Or identification sends the corresponding chained address of request instructions after the second application server recognizes the identity token To the first application server.
Step S307: by corresponding client in the corresponding page insertion terminal in chained address;
Specifically, the first application server receives chained address, will be right in the corresponding page insertion terminal in chained address The client answered, it is possible to understand that, page insertion does not have permanently, when user exits this client and reopens this visitor Family end, and start assessment triggering command when, need to re-execute above-mentioned steps S301 to S306.
Step S308: authorized order and authentication information are sent to the second application server;
Specifically, after the page starting authorization button of user on the client, it is illustrated in figure 4 offer of the embodiment of the present invention Authorization page schematic diagram, user selects user of the third-party application to be authorized simultaneously in the authorized third-party application of input The authentication information of account and password, after successfully logging in, terminal is sent by the corresponding page in the chained address in client Authorized order and the authentication information of input are to the second application server.
It will be appreciated that Fig. 4 is one of embodiment of the embodiment of the present invention, the present invention does not limit confirmation authorization Mode can also confirm authorization by pressing the other modes such as physical button, or input phonetic order.
Step S309: crawler service is called to crawl corresponding user data;
Specifically, after the second application server receives authorized order and authentication information, according to the authorized order and Authentication information, the second application server can be climbed by multiple server concurrent invocations (i.e. cluster server concurrent invocation) Worm service, crawls the corresponding user data of authentication information in the third-party application of authorized order authorization;Cluster server is simultaneously Hair service mode can effectively reduce Coupled processors, it is inefficient the problems such as, encounter mistake when the crawler service crawls Effect connection can skip failure connection, carry out next and crawl, and send notice to server, and advice method includes but not It is limited to send mail, send instruction etc..In this way, the feelings for crawling that midway stops or the waiting time is too long are avoided Condition improves and crawls efficiency.
Step S310: storing the user data, and processing analyzes the user data and show that user credit scores;
Specifically, the user data that the second application server for storage crawls is statisticallyd analyze according to setting model formula and is used User data show that user credit scores;
If the second application server receives the first application server based on the artificial of the corresponding page transmission in chained address Audit application request, then request to export manual examination and verification instruction message to background management system according to manual examination and verification application, this is artificial Audit instruction message is used to indicate background management system and carries out manual examination and verification scoring to user data.
In a kind of wherein embodiment, the second application server first can also statistically analyze institute according to setting model formula It states user data and show that user credit scores, then store user data and user credit scoring, if the second application server receives The manual examination and verification application request sent to the first application server based on the corresponding page in chained address, then according to manual examination and verification Shen It please request to export manual examination and verification instruction message to background management system, which is used to indicate back-stage management system System carries out manual examination and verification scoring to user data.
Step S311: the user credit scoring is sent;
Specifically, after the second application server obtains user credit scoring, user data is sent to the first application server It scores with user credit, the page of the first application server client in terminal sends user credit scoring;
In a kind of wherein embodiment, after the second application server obtains user credit scoring, to the first application service Device sends user data and user credit scoring, and the page of the second application server client in terminal sends user credit and comments Point.
It further, can also include: the threshold value in the case that authorized user's amount reaches threshold value before step S311 It can be million grades or more, the first application server, which passes through any identity such as name, identity card and the communications account received, to be wanted Element, the user data in matching database call the user data in database and user credit scoring, obtain if successful match Take user data and user credit scoring.Wherein communications account includes but is not limited to QQ account, wechat account, Email Accounts etc..
In the embodiment of the present invention, after the terminal of the first application server initiates assessment triggering command, the first application service Device sends request instructions to the second application server according to assessment triggering command, obtain second application server according to The chained address that the request instructions are sent, after the first application server receives chained address, by chained address phase The page answered is embedded into corresponding client in terminal.Second application server receives authorization by the page in client and refers to Order and authentication information call crawler service to crawl authentication information in the third-party application of authorized order authorization corresponding User data stores and handles analysis user data, solves outsourcing data higher cost in this way, lacks user's Relevant information, it is difficult to the problem of understanding the real background situation of user.First application server is counted according to setting model formula It analyzes the user data and show that user credit scores, and sending user credit scoring makes the page of client export user credit Scoring, by user credit scoring it will be seen that the specific credit line of user, greatly reduces debt-credit risk.
For the ease of better implementing the above scheme of the embodiment of the present invention, the present invention is also corresponding to be provided a kind of credit and comments Estimate device, be described in detail with reference to the accompanying drawing:
The structural schematic diagram of credit evaluation device provided in an embodiment of the present invention as shown in Figure 5, credit evaluation device 50 It may include: to receive transmission unit 501, acquiring unit 502, call unit 503, storage analytical unit 504, transmission unit 505, Wherein,
The request instructions that transmission unit 501 is used to receive the transmission of the first application server are received, Xiang Suoshu first is answered Chained address is sent with server;
Acquiring unit 502 be used to obtain authorized order that the corresponding client of the first application server is sent based on the page with Authentication information;
Call unit 503 is for calling crawler service to crawl authentication information in the third-party application of authorized order authorization Corresponding user data;
Storage analytical unit 504 show that user credit scores for storing user data, processing analysis user data;
Transmission unit 505 is for sending user credit scoring, so that client is based on page output user credit scoring.
It should be noted that the function of each functional unit can be found in device described in Fig. 5 in the embodiment of the present invention The associated description of step S201- step S205 in embodiment of the method described in Fig. 2 is stated, details are not described herein again.
Specifically, the structural schematic diagram of the credit evaluation device of another embodiment provided by the invention as shown in Figure 6, should Credit evaluation device 60 includes receiving unit 601, sends acquiring unit 602, embedded unit 603, wherein
The assessment triggering command for receiving input of receiving unit 601;
Acquiring unit 602 is sent to be used to send request instructions to the second application server according to assessment triggering command Afterwards, the chained address that the second application server is sent according to request instructions is obtained;
Specifically, sending acquiring unit 602 may include: the first transmission unit, the first receiving unit, the second transmission unit With the second receiving unit, wherein
First transmission unit, for sending encryption account request authentication to the second application server;Wherein second answer First application server side's rsa encryption public key is supplied to server and rsa encryption can be used in account, the first application server The account that the second application server of public key encryption provides obtains encryption account;
First receiving unit receives the identity token that the second application server is sent after being verified;
Second transmission unit, for sending the request instructions for carrying the identity token to the second application server, The request instructions are used for hyperlink request address;
Second receiving unit, the chained address sent for receiving the second application server according to request instructions.
In another embodiment, sending acquiring unit 602 may include: third transmission unit and third receiving unit, Wherein,
Third transmission unit, for sending request instructions to the second application server, which is used for Hyperlink request address;
Third receiving unit, the chained address sent for receiving the second application server according to request instructions.
Embedded unit 603 is for insertion page corresponding with chained address in the client corresponding to the first application server Face, so that the authorized order and authentication information that are inputted based on the page are sent to the second application server by client.
Optionally, device 60 can also include: that scoring obtains transmission unit, for obtaining the transmission of the second application server User data and user credit scoring, and user credit is scored and is sent to the page of client in terminal, so that client's end group In page output user credit scoring.
According to both the above device figure, referring to FIG. 7, the entity that Fig. 7 is a kind of simplification provided in an embodiment of the present invention is set Standby structural schematic diagram.It is convenient to be easy to understand and illustrate, and may include following one or more components: memory in Fig. 7 equipment 70 701, processor 702, communication equipment 703 and input-output apparatus 704.
Memory 701 may include one or more storage units, and each unit may include one or more memories, Memory can be used for storing program and various data, and can in 70 operational process high speed of device, be automatically completed program or number According to access.Information can be stored using the physical device of stable state there are two types of tools, described two stable states distinguish tables It is shown as " 0 " and " 1 ".When device 70 shown in Fig. 7, when being first application server of Fig. 3 the method, memory can be used to Store user data, user credit scoring and other related datas etc.;It is Fig. 3 the method when device 70 shown in Fig. 7 When the second application server, memory can be used to store user data, user credit scoring and other related datas etc..
Communication equipment 703 is referred to as transceiver or transceiver etc., wherein may include wireless, wired for carrying out Or the unit of other communication modes.Optionally, it is single that the device in 703 parts for realizing receive capabilities can be considered as to reception Member will be considered as transmission unit for realizing the device of sending function, i.e. 703 parts include receiving unit and transmission unit.
Processor 702, processor are referred to as processing unit, handle veneer, processing module, processing unit etc..Processing Device can be central processing unit (central processing unit, CPU), network processing unit (network processor, ) or the combination of CPU and NP NP.When device 70 shown in Fig. 7, when being first application server of Fig. 3 the method, the place Reason device 702 calls the data of the memory 701, executes following steps:
The assessment triggering command of input is received by communication equipment 703;
Request instructions are sent to the second application server by communication equipment 703 according to the assessment triggering command Afterwards, the chained address that second application server is sent according to the request instructions is obtained;
The page corresponding with the chained address is embedded in the client corresponding to first application server, so that The authorized order and authentication information that are inputted based on the page are sent to second application server by the client.
In a wherein embodiment, processor 702 be can also be performed:
Encryption account request body is sent to the second application server according to the assessment triggering command by communication equipment 703 Part verifying;
If the authentication passes through, the identity token that second application server is sent is received;
The request instruction for carrying the identity token is sent by communication equipment 703, obtains second application server The chained address sent according to the request instruction.
When device 70 shown in Fig. 7, when being second application server of Fig. 3 the method, the processor 603 calls institute The data of memory 601 are stated, following steps are executed:
It is applied after receiving the request instructions of the first application server transmission by communication equipment 703 to described first Server sends chained address;
Obtain authorized order and authentication letter that the corresponding client of first application server is sent based on the page Breath, the page are the corresponding page in the chained address;
Crawler service in memory 701 is called to crawl authentication described in the third-party application of the authorized order authorization The corresponding user data of information;
Memory 701 is called to store the user data, processing analyzes the user data and show that user credit scores;
The user credit scoring is sent by communication equipment 703, so that the client is based on the page and exports institute State user credit scoring.
In a wherein embodiment, processor 702 receives the request instructions of the first application server transmission Chained address is sent to first application server afterwards, comprising:
The encryption account that first application server is sent is received by communication equipment 703;
It is decrypted after the encryption account obtains decryption account by private key and verifies the decryption account, if being verified, Identity token is returned to first application server;
It is asked by the service that communication equipment 703 receives the carrying identity token that first application server is sent After asking, chained address is sent.
In a wherein embodiment, the calling crawler service of processor 702 crawls the third of the authorized order authorization The corresponding user data of authentication information described in Fang Yingyong, comprising:
It is serviced by the 701 concurrent invocation crawler of memory of multiple servers, encounters failure when the crawler system crawls The failure connection is skipped when connection, is carried out next and is crawled.
In a wherein embodiment, the calling crawler service of processor 702 crawls the third of the authorized order authorization After the corresponding user data of authentication information described in Fang Yingyong, can also include:
The user data requests instruction that first application server is sent is received by communication equipment 703, according to described User data requests instruct to first application server and send user data.
In a wherein embodiment, the processing of processor 702 analyzes the user data and show that user credit scores, packet It includes:
The user data, which is statisticallyd analyze, according to setting model formula in memory 701 show that user credit scores;
It is sent out if receiving first application server by communication equipment 703 and being based on the corresponding page in the chained address The manual examination and verification application request sent then requests output manual examination and verification instruction message according to the manual examination and verification application, described artificial Audit instruction message, which is used to indicate, carries out manual examination and verification scoring to the user data.
In a wherein embodiment, before processor 702 sends the user credit scoring, can also include:
When authorized user's amount reaches threshold value, wanted by any identity in the name, identity card and communications account that receive Element calls matched user data in the database in memory 701, and user data is obtained if successful match.
It should be noted that the execution step of processor can refer in credit evaluation equipment 70 in the embodiment of the present invention The specific implementation of credit evaluation system operation of the Fig. 1 into Fig. 6 embodiment in each method embodiment is stated, it is no longer superfluous here It states.
Input-output apparatus 704 can provide interface between 70 Peripheral component interface of device, and above-mentioned peripheral components can Think keyboard, mouse, display, button, similar installation etc..These buttons may include, but are not limited to: on/off button, lock Determine button and reset button etc..
In this application, the unit as illustrated by the separation member may or may not be physically separate , component shown as a unit may or may not be physical unit, it can and it is in one place, or can also To be distributed over a plurality of network elements.Some or all of unit therein can be selected to realize this hair according to the actual needs The purpose of bright example scheme.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, is also possible to two or more units and is integrated in one unit.It is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention Portion or part steps.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or replace It changes, these modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection scope subject to.
It should be understood that magnitude of the sequence numbers of the above procedures are not meant to execute suitable in the various embodiments of the application Sequence it is successive, the execution of each process sequence should be determined by its function and internal logic, the implementation without coping with the embodiment of the present invention Process constitutes any restriction.Although the application is described in conjunction with each embodiment herein, however, being protected required by embodiment During the application of shield, those skilled in the art are appreciated that and realize other variations of open embodiment.

Claims (12)

1. a kind of credit estimation method characterized by comprising
Receive the first application server transmission request instructions after to first application server send chained address;
Obtain the authorized order and authentication information that the corresponding client of first application server is sent based on the page, institute Stating the page is the corresponding page in the chained address;
Crawler service is called to crawl the corresponding user of authentication information described in the third-party application of the authorized order authorization Data;
The user data is stored, processing analyzes the user data and show that user credit scores;
The user credit scoring is sent, so that the client is based on the page and exports the user credit scoring.
2. the method according to claim 1, wherein the service for receiving the transmission of the first application server is asked It asks and sends chained address to first application server after instructing, comprising:
Receive the encryption account that first application server is sent;
It is decrypted after the encryption account obtains decryption account by private key and verifies the decryption account, if being verified, to institute It states the first application server and returns to identity token;
After the service request for receiving the carrying identity token that first application server is sent, chained address is sent.
3. the method according to claim 1, wherein the calling crawler service crawls the authorized order authorization Third-party application described in the corresponding user data of authentication information, comprising:
It is serviced by multiple server concurrent invocation crawlers, skips the mistake when the crawler system, which crawls, encounters failure connection Effect connection, carries out next and crawls.
4. according to the method described in claim 3, it is characterized in that, the calling crawler service crawls the authorized order authorization Third-party application described in after the corresponding user data of authentication information, further includes:
The user data requests instruction that first application server is sent is received, is instructed according to the user data requests to institute It states the first application server and sends user data.
5. the method according to claim 1, wherein the user data is analyzed in the processing obtains user credit Scoring, comprising:
The user data, which is statisticallyd analyze, according to setting model formula show that user credit scores;
If receiving the manual examination and verification application that first application server is sent based on the corresponding page in the chained address to ask It asks, then output manual examination and verification instruction message is requested according to the manual examination and verification application, the manual examination and verification instruction message is for referring to Show and manual examination and verification scoring is carried out to the user data.
6. method according to claim 1-5, which is characterized in that before the transmission user credit scoring Further include:
When authorized user's amount reaches threshold value, pass through any identity element tune in the name, identity card and communications account that receive With user data matched in database, user data is obtained if successful match.
7. a kind of credit estimation method, which is characterized in that be applied to the first application server, comprising:
Receive the assessment triggering command of input;
After sending request instructions to the second application server according to the assessment triggering command, the second application clothes are obtained The chained address that business device is sent according to the request instructions;
The page corresponding with the chained address is embedded in the client corresponding to first application server, so that described The authorized order and authentication information that are inputted based on the page are sent to second application server by client.
8. the method according to the description of claim 7 is characterized in that described take according to the assessment triggering command to the second application It is engaged in after device transmission request instructions, obtains second application server and be grounded according to the chain that the request instructions are sent Location, comprising:
Encryption account request authentication is sent to the second application server according to the assessment triggering command;
If the authentication passes through, the identity token that second application server is sent is received;
The request instruction for carrying the identity token is sent, second application server is obtained and is sent according to the request instruction Chained address.
9. a kind of credit evaluation device, which is characterized in that including for executing as the method according to claim 1 to 6 Unit.
10. a kind of credit evaluation device, which is characterized in that including for executing such as the described in any item methods of claim 7-8 Unit.
11. a kind of credit evaluation equipment, which is characterized in that including processor, input equipment, output equipment, memory and communication Equipment, the processor, input equipment, output equipment, memory and communication equipment are connected with each other, wherein the memory is used In storage application code, the communication equipment is used to carry out information exchange with external equipment;The processor is configured to use In calling said program code, the method according to claim 1 is executed.
12. a kind of credit evaluation system, which is characterized in that including the first application server, the second application server and terminal, institute It states the first application server, the second application server and terminal to be in communication with each other, wherein the terminal is used to carry out with external equipment Information exchange, second application server execute as the method according to claim 1 to 6, first application service Device executes such as the described in any item methods of claim 7-8.
CN201811071428.XA 2018-09-13 2018-09-13 Credit estimation method, device, equipment and system Withdrawn CN109472439A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811071428.XA CN109472439A (en) 2018-09-13 2018-09-13 Credit estimation method, device, equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811071428.XA CN109472439A (en) 2018-09-13 2018-09-13 Credit estimation method, device, equipment and system

Publications (1)

Publication Number Publication Date
CN109472439A true CN109472439A (en) 2019-03-15

Family

ID=65664307

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811071428.XA Withdrawn CN109472439A (en) 2018-09-13 2018-09-13 Credit estimation method, device, equipment and system

Country Status (1)

Country Link
CN (1) CN109472439A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110138743A (en) * 2019-04-17 2019-08-16 深圳壹账通智能科技有限公司 Acquisition methods, device, computer equipment and the storage medium of resource bid file
CN110223163A (en) * 2019-06-06 2019-09-10 杭州奕奕网络科技有限公司 Intermediary's management system and counter cheat data analysing method
CN110825762A (en) * 2019-11-14 2020-02-21 北京融易做科技有限公司 Data storage method, device and system
CN112181976A (en) * 2019-08-08 2021-01-05 北京天德博源科技有限公司 Small loan deposit certificate based on block chain
CN112507305A (en) * 2020-12-17 2021-03-16 平安银行股份有限公司 Risk identification method and device, computer equipment and readable storage medium
CN113793152A (en) * 2021-07-16 2021-12-14 数字驱动(福州)科技有限责任公司 Individual user risk assessment method and system based on Internet account
CN114240331A (en) * 2021-11-23 2022-03-25 蚂蚁智信(杭州)信息技术有限公司 Report generation method, report generation device, storage medium, and computer device
CN114745216A (en) * 2022-04-08 2022-07-12 中国银行股份有限公司 Dynamic access method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060235761A1 (en) * 2005-04-19 2006-10-19 Microsoft Corporation Method and apparatus for network transactions
CN102542503A (en) * 2010-12-09 2012-07-04 同方股份有限公司 System and method for realizing bank security transaction by mobile communication terminal
CN106355409A (en) * 2015-07-14 2017-01-25 三星电子株式会社 Payment system, electronic device and payment method thereof
CN107392755A (en) * 2017-07-07 2017-11-24 南京甄视智能科技有限公司 Credit risk merges appraisal procedure and system
CN107835247A (en) * 2017-11-08 2018-03-23 中国科学技术大学 A kind of credit accreditation, safeguards system and method
CN108446291A (en) * 2017-12-27 2018-08-24 深圳萨摩耶互联网金融服务有限公司 The real-time methods of marking and points-scoring system of user credit

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060235761A1 (en) * 2005-04-19 2006-10-19 Microsoft Corporation Method and apparatus for network transactions
CN102542503A (en) * 2010-12-09 2012-07-04 同方股份有限公司 System and method for realizing bank security transaction by mobile communication terminal
CN106355409A (en) * 2015-07-14 2017-01-25 三星电子株式会社 Payment system, electronic device and payment method thereof
CN107392755A (en) * 2017-07-07 2017-11-24 南京甄视智能科技有限公司 Credit risk merges appraisal procedure and system
CN107835247A (en) * 2017-11-08 2018-03-23 中国科学技术大学 A kind of credit accreditation, safeguards system and method
CN108446291A (en) * 2017-12-27 2018-08-24 深圳萨摩耶互联网金融服务有限公司 The real-time methods of marking and points-scoring system of user credit

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
崔久强 等: "移动互联网身份认证技术研究", 《信息安全与技术》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110138743A (en) * 2019-04-17 2019-08-16 深圳壹账通智能科技有限公司 Acquisition methods, device, computer equipment and the storage medium of resource bid file
CN110223163A (en) * 2019-06-06 2019-09-10 杭州奕奕网络科技有限公司 Intermediary's management system and counter cheat data analysing method
CN112181976A (en) * 2019-08-08 2021-01-05 北京天德博源科技有限公司 Small loan deposit certificate based on block chain
CN110825762A (en) * 2019-11-14 2020-02-21 北京融易做科技有限公司 Data storage method, device and system
CN112507305A (en) * 2020-12-17 2021-03-16 平安银行股份有限公司 Risk identification method and device, computer equipment and readable storage medium
CN113793152A (en) * 2021-07-16 2021-12-14 数字驱动(福州)科技有限责任公司 Individual user risk assessment method and system based on Internet account
CN114240331A (en) * 2021-11-23 2022-03-25 蚂蚁智信(杭州)信息技术有限公司 Report generation method, report generation device, storage medium, and computer device
CN114745216A (en) * 2022-04-08 2022-07-12 中国银行股份有限公司 Dynamic access method and device
CN114745216B (en) * 2022-04-08 2024-04-16 中国银行股份有限公司 Dynamic access method and device

Similar Documents

Publication Publication Date Title
CN109472439A (en) Credit estimation method, device, equipment and system
CN101675616A (en) methods and systems for delivering sponsored out-of-band passwords
CN109325848A (en) Debt collection method, equipment and computer readable storage medium based on block chain
CN109670968A (en) Processing method, device, equipment and the computer storage medium of insurance data
CN106688220A (en) Conditional access to services based on device claims
CN102460492A (en) Method for acquiring data from a user at the time of a card payment made using a payment terminal
Chiu et al. Privacy, security, infrastructure and cost issues in internet banking in the Philippines: initial trust formation
CN107918911A (en) System and method for performing safe web bank transaction
CN112036882A (en) Account login method and device and electronic equipment
CN115600230A (en) Personnel management system
WO2007143177A2 (en) Business portal
CN111198737A (en) Page display method based on user state characteristics, and device, system, server and storage medium thereof
CN103020824A (en) Mobile payment method and device
KR101342673B1 (en) Matching system for marry information in on-line and method thereof
US20230281653A1 (en) System and methods for soft credit approval using text redirect
CN102034178A (en) Cross-mechanism online payment method, system and device
CN106373012A (en) Financing product transaction control method and equipment
WO2021090311A1 (en) System and method for improving efficiency of communication sessions at a call center
CN112581075A (en) Insurance letter processing method and device for security company
KR20080040298A (en) System and method for planning perform by using popularity vote and recording medium
WO2021235224A1 (en) Information providing device and method, program, and information processing terminal
CN111105304A (en) Data processing method and device, storage medium and electronic terminal
CN106797390A (en) The system and method for authentication center
Taupit et al. The Planning Process of the Online Transaction Fraud Detection Using Backlogging on an E-Commerce Website
Seigneur e-Reputation and Online Reputation Management Survey

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A (located in Shenzhen Qianhai business secretary Co. Ltd.)

Applicant after: Shenzhen Rongyimai Information Technology Co., Ltd.

Address before: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A (located in Shenzhen Qianhai business secretary Co. Ltd.)

Applicant before: Maimaiti Mdt InfoTech Ltd, Shenzhen

WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190315