CN109785116A - Standing checking method, device, computer equipment and storage medium - Google Patents

Standing checking method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109785116A
CN109785116A CN201811536984.XA CN201811536984A CN109785116A CN 109785116 A CN109785116 A CN 109785116A CN 201811536984 A CN201811536984 A CN 201811536984A CN 109785116 A CN109785116 A CN 109785116A
Authority
CN
China
Prior art keywords
user
standing
threshold value
audit
user identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811536984.XA
Other languages
Chinese (zh)
Inventor
郑如刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201811536984.XA priority Critical patent/CN109785116A/en
Publication of CN109785116A publication Critical patent/CN109785116A/en
Pending legal-status Critical Current

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a kind of standing checking method, device, computer equipment and storage mediums, first acquisition standing audit request, and standing audit request includes user identifier and application time;Corresponding user's standing data are obtained from preset grey black list data library according to user identifier, user's standing data include credit information and the credit information corresponding renewal time;Whether the time interval for judging application time and renewal time is more than preset time threshold;If time interval is more than preset time threshold, the user's history verify data in preset time is obtained according to user identifier, wherein preset time is determined according to the application time;Preset audit threshold set is obtained, user's history verify data is verified according to audit threshold set, obtains the update credit information of user identifier;Update credit information is determined as to the standing msu message of user identifier, guarantees the real-time of grey black list data library data, it is ensured that the accuracy of standing audit.

Description

Standing checking method, device, computer equipment and storage medium
Technical field
The present invention relates to data analysis field more particularly to a kind of standing checking method, device, computer equipment and storages Medium.
Background technique
With the increase of social demand, loan transaction has been spread to gradually in the life of broad masses of the people, all kinds of loans Money company also gradually appears in the sight of people.During loan, the audit crew of finance company is needed according to borrower Credit situation and loan repayment capacity title examination and evaluation are carried out to creditor, Credit risk level is evaluated and tested, as the case may be Lending decision and amount setting are carried out, to reduce credit risk.Wherein in loan audit, including a standing audits the stage, For singly taking precautions against certain user's malice brush.However, standing auditing flow is relatively complicated at present, and the accuracy audited It is to be improved.
Summary of the invention
The embodiment of the present invention provides a kind of standing checking method, device, computer equipment and storage medium, to solve standing The not high problem of the accuracy of audit.
A kind of standing checking method, comprising:
Standing audit request is obtained, the standing audit request includes user identifier and application time;
Corresponding user's standing data, the use are obtained from preset grey black list data library according to the user identifier Family standing data include credit information and the credit information corresponding renewal time;
Whether the time interval for judging the application time and the renewal time is more than preset time threshold;
If the time interval is more than the preset time threshold, obtained in preset time according to the user identifier User's history verify data;
Preset audit threshold set is obtained, the user's history verify data is tested according to the audit threshold set Card, obtains the update credit information of the user identifier;
The update credit information is determined as to the standing msu message of the user identifier.
A kind of standing audit device, comprising:
Standing audits request module, and for obtaining standing audit request, the standing audit request includes that user marks Knowledge and application time;
User's standing data acquisition module, for being obtained from preset grey black list data library according to the user identifier Corresponding user's standing data, user's standing data include credit information and the credit information corresponding renewal time;
Time judgment module, for judging whether the time interval of the application time and the renewal time are more than default Time threshold;
User's history verify data obtains module, if being more than the preset time threshold, root for the time interval The user's history verify data in preset time is obtained according to the user identifier;
User's history verify data authentication module, for obtaining preset audit threshold set, according to the audit threshold set The user's history verify data is verified, the update credit information of the user identifier is obtained;
Standing msu message determining module, the standing for the update credit information to be determined as the user identifier are examined Nuclear information.
A kind of computer equipment, including memory, processor and storage are in the memory and can be in the processing The computer program run on device, the processor realize the step of above-mentioned standing checking method when executing the computer program Suddenly.
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the meter The step of calculation machine program realizes above-mentioned standing checking method when being executed by processor.
In above-mentioned standing checking method, device, computer equipment and storage medium, acquisition standing audit request first, money Letter audit request includes user identifier and application time;Correspondence is obtained from preset grey black list data library according to user identifier User's standing data, user's standing data include credit information and the credit information corresponding renewal time;Judgement application Whether the time interval of time and renewal time are more than preset time threshold;If time interval is more than preset time threshold, root The user's history verify data in preset time is obtained according to user identifier, wherein preset time is determined according to the application time;It obtains Preset audit threshold set verifies user's history verify data according to audit threshold set, obtains the update of user identifier Credit information;Update credit information is determined as to the standing msu message of user identifier.By default grey black list data library come Standing audit is carried out, and by the judgement to application time and renewal time, guarantees the real-time of grey black list data library data Property, it is ensured that the accuracy of standing audit.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is an application environment schematic diagram of standing checking method in one embodiment of the invention;
Fig. 2 is an exemplary diagram of standing checking method in one embodiment of the invention;
Fig. 3 is another exemplary diagram of standing checking method in one embodiment of the invention;
Fig. 4 is another exemplary diagram of standing checking method in one embodiment of the invention;
Fig. 5 is another exemplary diagram of standing checking method in one embodiment of the invention;
Fig. 6 is another exemplary diagram of standing checking method in one embodiment of the invention;
Fig. 7 is another exemplary diagram of standing checking method in one embodiment of the invention;
Fig. 8 is a functional block diagram of standing audit device in one embodiment of the invention;
Fig. 9 is a schematic diagram of computer equipment in one embodiment of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Standing checking method provided in an embodiment of the present invention, can be applicable in the application environment such as Fig. 1, wherein client (computer equipment) is communicated by network with server-side.Client sends standing audit request to server-side, and server-side obtains Standing audit request is taken, standing audit request includes user identifier and application time;According to user identifier from preset grey black name Corresponding user's standing data are obtained in single database, user's standing data include credit information and the corresponding update of credit information Time;Whether the time interval for judging application time and renewal time is more than preset time threshold;If time interval is more than default Time threshold then obtains the user's history verify data in preset time, wherein preset time is according to application according to user identifier Time determines;Preset audit threshold set is obtained, user's history verify data is verified according to audit threshold set, is used The update credit information of family mark;Update credit information is determined as to the standing msu message of user identifier.Wherein, client (computer equipment) can be, but not limited to various personal computers, laptop, smart phone, tablet computer and it is portable can Wearable device.Server can be realized with the server cluster of the either multiple server compositions of independent server.
In one embodiment, as shown in Fig. 2, providing a kind of standing checking method, the service in Fig. 1 is applied in this way It is illustrated, includes the following steps: for end
S10: standing audit request is obtained, standing audit request includes user identifier and application time.
Wherein, standing audit request is the trigger request of client triggering audited to the standing of user.Specifically, User inputs corresponding instruction or information by client to trigger standing audit request or user at the scene or sales counter It files an application, standing audit request is initiated by client by contact staff.Standing audit request is sent to clothes by client Business end, server-side get loan audit request.Wherein, standing audit request packet user identifier and application time.User Mark refers to the information that can go out different user with unique identification.In one embodiment, user identifier can be certificate number, hand Machine number or user number.User number is the identiflication number that a platform, application program or system are user's distribution, a user couple Answer a unique member number.Application time is the time that standing audit request proposes, specifically, client can be provided generating Client current system time is obtained when letter audit request as the application time.
S20: corresponding user's standing data, Yong Huzi are obtained from preset grey black list data library according to user identifier Letter data includes credit information and credit information corresponding renewal time.
Wherein, grey black list data library is for storing the letter for leading to the undesirable user of standing data there are abnormal conditions The database of breath.User's standing data are stored in grey black list data library, user's standing data are for indicating different user Credit position data, user's standing data include credit information and credit information corresponding renewal time.Credit information is For identifying the information of corresponding user's credit position, such as: black list user, gray list user and normal users.Renewal time For the renewal time of the credit information, it is possible to understand that ground may become without the credit information of user with the variation of time Change, it is therefore desirable to periodically the credit information in grey black list data library is updated, which is corresponding standing The newest renewal time of information.
In this step, it is got in preset grey black list data library by the user identifier in standing audit request The corresponding user's standing data of the user identifier, to carry out subsequent standing audit.
Further, it if the corresponding user's standing data of the user identifier are not present in grey black list data library, sends out Prompt information out.Specifically, which can be text information or voice messaging.
S30: whether the time interval for judging application time and renewal time is more than preset time threshold.
Wherein, preset time threshold is a preset time value, for measuring whether user's standing data need It is updated.Optionally, which is two weeks, one month, three months or half a year etc., specifically can be according to reality Business needs in border are configured.In this step, by judging whether the time interval of application time and renewal time are more than pre- If time threshold is to determine whether user's standing data can directly use.
S40: if time interval is more than preset time threshold, the user's history in preset time is obtained according to user identifier Verify data.
User's history verify data is the related data that different user is audited in previous verifying or standing.And when default Between be a preset time value.Optionally, which is two weeks, one month, three months or half a year etc., tool Body can be configured according to actual business requirement.
In this step, if time interval is more than preset time threshold, illustrate user's standing data that step S20 is obtained It may be due to not timely updating and there are deviations.Therefore, obtain the user's according to the user identifier in standing audit request User's history verify data, to be updated to user's standing data.
S50: obtaining preset audit threshold set, is verified, is obtained to user's history verify data according to audit threshold set To the update credit information of user identifier.
Wherein, the threshold value set that audit threshold set is made of different audit threshold values, i.e. the audit threshold set packet A plurality of audit threshold values are included.Specifically, audit threshold set in audit threshold value can according to different conditions or rule into Row classification.After obtaining audit threshold set, the user's history verify data in preset time is carried out according to audit threshold set Verifying, can be obtained the update credit information of user identifier.
S60: update credit information is determined as to the standing msu message of user identifier.
After obtaining updating credit information, update credit information is determined as to the standing msu message of user identifier.Its In, updating credit information also includes black list user, gray list user and normal users.It is used when updating credit information for blacklist When family, then show that the user is particularly likely that the user for once possessing bad standing data record, such as: malice brush it is single or Collage-credit data is poor etc..And when updating credit information is gray list user, then showing that the user has certain probability is once to gather around There is the user of bad standing data record.So, it is ensured that there are the poor user of malice brush list or collage-credit data into Server-side or related personnel can be allowed to know in time when the audit request of row standing, be disliked with being better protected from the certain customers Meaning brushes behavior that is single or applying extremely.
In a specific embodiment, if the standing msu message of the user identifier is black list user, police is issued Show information, to prompt corresponding personnel.Further, if the standing msu message of the user identifier is black list user, Then directly refuse standing audit request.In a specific embodiment, if the standing msu message of the user identifier is ash Name single user, then issue prompting message, to prompt corresponding personnel, further to be confirmed or secondary audit. Further, it if the standing msu message of the user identifier is normal users, by standing audit request, carries out corresponding Follow-up checks or application link.
In a specific embodiment, after obtaining updating credit information, using update credit information to the use Credit information in the standing data of family is updated, and updates corresponding renewal time.
In a specific embodiment, after step S30, the standing checking method further include: if time interval does not have Preset time threshold is had more than, then using credit information as the standing msu message of user identifier.
In the present embodiment, standing audit request is obtained first, and standing audit request includes user identifier and application time; Corresponding user's standing data are obtained from preset grey black list data library according to user identifier, user's standing data include money Letter information and the credit information corresponding renewal time;Whether the time interval for judging application time and renewal time is more than pre- If time threshold;If time interval is more than preset time threshold, the user's history in preset time is obtained according to user identifier Verify data, wherein preset time is determined according to the application time;Preset audit threshold set is obtained, according to audit threshold set pair User's history verify data is verified, and the update credit information of user identifier is obtained;Credit information will be updated and be determined as user The standing msu message of mark.Carry out standing audit by default grey black list data library, and by the application time and The judgement of renewal time guarantees the real-time of grey black list data library data, it is ensured that the accuracy of standing audit.
In one embodiment, user's history verify data includes Authentication-Type and the corresponding continuous verifying of each Authentication-Type The frequency of failure.
Wherein, Authentication-Type is the type for being characterized in verification mode employed in history verifying.It is to be appreciated that user It can be verified by different verification modes, such as: living body verifying, face verification or account information verifying etc..And connect Continuous authentication failed number refers to that same Authentication-Type carries out repeated authentication and verification result is all the number of authentication failed.It should Continuous authentication failed number is more, shows the case where verifying there is more likely to be malice.
In the present embodiment, it as shown in figure 3, being verified according to audit threshold set to user's history verify data, obtains The update credit information of user identifier, specifically comprises the following steps:
S51: corresponding audit threshold value is obtained from audit threshold set according to each Authentication-Type, by each Authentication-Type pair The continuous authentication failed number and corresponding audit threshold value answered are matched, and matching result is obtained.
It is provided with different audit threshold values for different Authentication-Types in advance in audit threshold set, therefore in the step In, corresponding audit threshold value is got from audit threshold set by Authentication-Type.In turn by the corresponding company of each Authentication-Type Continuous authentication failed number and corresponding audit threshold value are matched, and matching result is obtained.Specifically, each Authentication-Type is corresponding Audit threshold value can be divided into different numerical intervals, and each numerical intervals can correspond to a matching result.If Authentication-Type A numerical intervals successful match in corresponding continuous authentication failed number and audit threshold value, then can be according to successful match Numerical intervals obtain corresponding matching result.The matching result can be an area to numerical intervals different in audit threshold value Point, it can specifically be embodied with number, symbol or text information.
S52: the match information of each Authentication-Type is obtained according to matching result.
In this step, it can be obtained by by matching result of each Authentication-Type in corresponding audit threshold value each The match information of Authentication-Type.The match information is specially by the embodiment of one of matching result information-based conversion.For example, if With result be and numerical intervals A successful match, then corresponding match information can be doubtful high risk;If matching result is sum number It is worth interval B successful match, then corresponding match information can be doubtful risk;If matching result is and numerical intervals C is matched Success, then corresponding match information can be doubtful low-risk;If matching result is no successful match, corresponding matching letter Breath can be safety.
S53: selecting the corresponding credit information of match information of highest priority from the match information of each Authentication-Type, Update credit information as user identifier.
In different match informations, different priority is pre-set.For example, in the example of step S52, it is corresponding Sequence of the match information according to priority from high to low are as follows: doubtful high risk, doubtful risk, doubtful low-risk and safety. According to preset priority, so that it may select the matching letter an of highest priority from the match information of different Authentication-Types Breath, and obtain update credit information of the corresponding credit information of the match information as user identifier.Such as: doubtful high risk pair The credit information answered is black list user, and doubtful risk and the corresponding credit information of doubtful low-risk are gray list user.
In the present embodiment, corresponding audit threshold value is obtained from audit threshold set according to each Authentication-Type, it will be each The corresponding continuous authentication failed number of Authentication-Type and corresponding audit threshold value are matched, and matching result is obtained;According to matching As a result the match information of each Authentication-Type is obtained;The matching of highest priority is selected from the match information of each Authentication-Type The corresponding credit information of information, the update credit information as user identifier.By the audit that each Authentication-Type is rationally arranged Threshold value, and reasonably converted according to matching result, to obtain updating credit information, it ensure that updating credit information obtains Accuracy.
In one embodiment, as shown in figure 4, obtaining corresponding audit threshold from audit threshold set according to each Authentication-Type Value, the corresponding continuous authentication failed number of each Authentication-Type and corresponding audit threshold value are matched, matching result is obtained, Specifically comprise the following steps:
S511: corresponding risk class is determined according to Authentication-Type, and is obtained from audit threshold set according to risk class Corresponding audit threshold value audits threshold value as target.
S512: the corresponding continuous authentication failed number of each Authentication-Type and target audit threshold value are matched, obtained Matching result.
In this embodiment, set different risk class for different Authentication-Types in advance, then by risk class come Corresponding audit threshold value is obtained, so there is no need to different audit threshold values is arranged for each Authentication-Type, it is only necessary to be every The pre-configured corresponding audit threshold value of one risk class.It can quickly be obtained by the corresponding risk class of each Authentication-Type again Audit threshold value is got, audits threshold value as target.In turn by the corresponding continuous authentication failed number of each Authentication-Type and target Audit threshold value is matched, and matching result is obtained.
In the present embodiment, by the setting of risk class, it can simplify the cumbersome of audit threshold value setting, improve whole match Set efficiency.
In one embodiment, target audit threshold value includes blacklist threshold value and gray list threshold value.
Specifically, blacklist threshold value is a preset numerical intervals, for black to being labeled as in grey black list data library Name single user carries out embodiment numerically.And gray list threshold value is also a preset numerical intervals, for grey black name odd number Embodiment numerically is carried out according to gray list user is labeled as in library.It is to be appreciated that blacklist threshold value and gray list threshold value are not Same numerical value or different numerical intervals.
In the present embodiment, as shown in figure 5, the corresponding continuous authentication failed number of each Authentication-Type and target are audited Threshold value is matched, and matching result is obtained, and is specifically comprised the following steps:
S5121: if the corresponding continuous authentication failed number of any Authentication-Type meets corresponding blacklist threshold value, this is tested The matching result for demonstrate,proving type is doubtful blacklist.
In this step, after acquiring blacklist threshold value, by the corresponding continuous authentication failed of each Authentication-Type Number and corresponding blacklist threshold value are matched, if the corresponding continuous authentication failed number of any Authentication-Type meet it is corresponding Blacklist threshold value, then the matching result of the Authentication-Type is doubtful blacklist.Specifically, continuous authentication failed number meets correspondence Blacklist threshold value can refer to number of continuous authentication failed number in the range of blacklist threshold value or in blacklist threshold value It is worth in section.
S5122: if the corresponding continuous authentication failed number of any Authentication-Type meets corresponding gray list threshold value, this is tested The matching result for demonstrate,proving type is doubtful gray list.
In this step, after acquiring gray list threshold value, by the corresponding continuous authentication failed of each Authentication-Type Number and corresponding gray list threshold value are matched, if the corresponding continuous authentication failed number of any Authentication-Type meet it is corresponding Gray list threshold value, then the matching result of the Authentication-Type is doubtful gray list.Specifically, continuous authentication failed number meets correspondence Gray list threshold value can refer to number of continuous authentication failed number in the range of gray list threshold value or in gray list threshold value It is worth in section.
In the present embodiment, blacklist threshold value and gray list threshold value, and each verifying are set by auditing threshold value for target Continuous authentication failed number and corresponding blacklist threshold value and gray list threshold value in type are compared, after better ensuring that The accuracy of continuous credit information.
In one embodiment, as shown in fig. 6, obtaining corresponding user from grey black list data library according to user identifier Standing data, user's standing data include the steps that credit information and before credit information corresponding renewal times, which examines Kernel method further includes following steps:
S21: identification exception record is obtained from history identification record, wherein each identification exception record includes historical user Mark, Exception Type and the corresponding continuous abnormal number of each Exception Type.
Wherein, history identification record refers to identification record of the user in previous verification process, the history identification record Including identification normal recordings and identification exception record.In a specific embodiment, the history identification record can with it is above-mentioned User's history verify data in embodiment is identical, i.e., the two is identical data.In this step, from history identification record Obtain identification exception record.And each identification exception record includes historical user's mark, Exception Type and each exception class The corresponding continuous abnormal number of type.Historical user's mark refers to the corresponding user of user identified in history identification record Mark.Exception Type refers to the concrete reason occurred in identification exception, can specifically include: vivo identification exception, recognition of face Exception or account identification are abnormal etc..And continuous abnormal number refers in each Exception Type abnormal time of identification continuously occur Number.
S22: corresponding target is obtained according to Exception Type and audits threshold value, it includes blacklist threshold value and ash that target, which audits threshold value, Name single threshold.
Different targets is configured for different Exception Types in advance and audits threshold value, can be obtained according to Exception Type corresponding Target audits threshold value, and it includes blacklist threshold value and gray list threshold value that target, which audits threshold value,.
S23: it if any continuous abnormal number in identification exception record meets corresponding blacklist threshold value, will identify different Often historical user's mark in record is determined as black list user's mark.
In this step, after acquiring blacklist threshold value, by the continuous abnormal in each identification exception record Several and corresponding blacklist threshold value is matched, if the continuous abnormal number in any identification exception record meets corresponding black name The historical user's mark identified in exception record is then determined as black list user's mark by single threshold.Specifically, continuous abnormal Number, which meets corresponding blacklist threshold value, can refer to continuous abnormal number in the range of blacklist threshold value or in blacklist threshold value In numerical intervals in.
S24: if any continuous abnormal number in identification exception record meets corresponding gray list threshold value and others even Continuous frequency of abnormity does not meet corresponding blacklist threshold value, then the historical user's mark identified in exception record is determined as grey name Single user mark.
In this step, after acquiring gray list threshold value, by the continuous abnormal in each identification exception record Several and corresponding gray list threshold value is matched, if the continuous abnormal number in any identification exception record meets corresponding grey name Other continuous abnormal numbers do not meet corresponding blacklist threshold value in single threshold and the identification exception record, then by the identification Historical user's mark in exception record is determined as gray list user identifier.Specifically, continuous abnormal number meets corresponding ash Name single threshold can refer to continuous abnormal number in the range of gray list threshold value or in the numerical intervals in gray list threshold value.
S25: grey black list data library is constructed according to black list user's mark and gray list user identifier.
After obtaining black list user's mark and gray list user identifier, used according to black list user's mark and gray list Family mark building grey black list data library.Specifically, black list user can be identified and gray list user identifier is put into grey black In list data library, and saved respectively.It further, can also be related by other and correspondence user of corresponding user identifier Information be also stored in grey black list data library.
In the present embodiment, identification exception record is obtained from history identification record, wherein each identification exception record packet Include historical user's mark, Exception Type and the corresponding continuous abnormal number of each Exception Type;It is obtained and is corresponded to according to Exception Type Target audit threshold value, target audit threshold value include blacklist threshold value and gray list threshold value;If identifying any in exception record Continuous abnormal number meets corresponding blacklist threshold value, then the historical user's mark identified in exception record is determined as blacklist User identifier;If any continuous abnormal number in identification exception record meets corresponding gray list threshold value and others are continuous different Normal number does not meet corresponding blacklist threshold value, then the historical user's mark identified in exception record is determined as gray list and used Family mark;Grey black list data library is constructed according to black list user's mark and gray list user identifier.Remembered by being identified to history The processing of record constructs grey black list data library, ensure that the efficiency of standing audit.
In one embodiment, as shown in fig. 7, constructing grey black according to black list user's mark and gray list user identifier After the step of list data library, standing checking method further includes following steps:
S61: obtaining target user's mark and each target user identifies corresponding user basic information.
Wherein, target user's mark is the corresponding user identifier of predeterminated target group, which can be different enterprises The registration user of industry or platform.User basic information includes the need that may relate in loan audit or standing review process The information relevant with user to be audited.Optionally, user basic information includes the identity information, assets information, income of user Information, reference information, loan information, handheld device information, social account information, third-party platform consumption information or loan application At least one of behavioural information etc..
S62: scoring to user basic information using preset rules, obtains the user base of each target user's mark Scoring.
Wherein, preset rules are a pre-set standards of grading, which can be according to the need of actual product It is configured, can also be counted to obtain according to historical data, can specifically set according to actual needs, herein no longer It repeats.After being previously-completed the configuration of preset rules, which is stored in server-side.According to preset rules to Family essential information scores to score to get to user base.It is alternatively possible to set one for each single item user basic information Preset rules, to obtain more accurate user base scoring.
It illustratively, can be identity information if user basic information includes the identity information and assets information of user Different preset rules are respectively set with assets information.For example, if identity information includes gender, occupation, age and physical condition. It then can be respectively that different genders, occupation, age bracket and physical condition preset different score values, be marked further according to the user Know corresponding identity information obtain corresponding score value and be overlapped to get arrive identity information score value.And assets are believed Breath, then can preset different assets sections, the different corresponding score values in assets section is also different, then according to the user The assets information of mark finds corresponding assets section, that is, gets the corresponding score value of assets information.Finally by identity information pair The score value answered and assets information are directly or indirectly added one score value and are scored to get to user base.Among it Ground connection, which is added, can be presented as in advance be that differently different weights is arranged in user basic information, by each user basic information Score value is overlapped again later multiplied by corresponding weight.
S63: obtaining preset scoring threshold value, and scoring threshold value includes blacklist scoring threshold value and gray list scoring threshold value.
Scoring threshold value is preset score value, which can be numberical range or numerical intervals.Score threshold Value includes blacklist scoring threshold value and gray list scoring threshold value.The threshold it is to be appreciated that blacklist scoring threshold value and gray list score Value is different numerical value or different numerical intervals.
S64: if user base scoring meets blacklist scoring threshold value, corresponding user identifier is determined as to increase black name newly Single user mark.
After step S62 obtains the user base scoring of each target user mark, by the scoring of each user base and Blacklist scoring threshold value is compared, if user base scoring meets blacklist scoring threshold value, corresponding user identifier is true It is set to newly-increased black list user's mark.Wherein, user base scoring meets blacklist scoring threshold value and refers to that user base scoring exists In the range of blacklist scoring threshold value or in the numerical intervals of blacklist scoring threshold value.
S65: if user base scoring meets gray list scoring threshold value, corresponding user identifier is determined as newly-increased grey name Single user mark.
After step S62 obtains the user base scoring of each target user mark, by the scoring of each user base and Gray list scoring threshold value is compared, if user base scoring meets gray list scoring threshold value, corresponding user identifier is true It is set to newly-increased gray list user identifier.Wherein, user base scoring meets gray list scoring threshold value and refers to that user base scoring exists In the range of gray list scoring threshold value or in the numerical intervals of gray list scoring threshold value.
S66: grey black list data library is updated according to newly-increased black list user mark and newly-increased gray list user identifier.
After obtaining newly-increased black list user's mark and newly-increased gray list user identifier, marked according to newly-increased black list user Know and newly-increased gray list user identifier updates grey black list data library.Black list user's mark will be increased newly and newly-increased gray list is used Family mark is added in grey black list data library.
In the present embodiment, it identifies corresponding user by obtaining target user's mark and each target user and believes substantially Breath;It is scored using preset rules user basic information, obtains the user base scoring of each target user's mark;It obtains Preset scoring threshold value, scoring threshold value include blacklist scoring threshold value and gray list scoring threshold value;If user base scoring meets Corresponding target user mark is then determined as newly-increased black list user's mark by blacklist scoring threshold value;If user base scores Meet gray list scoring threshold value, then corresponding target user mark is determined as newly-increased gray list user identifier;It is black according to increasing newly List user identifier and newly-increased gray list user identifier update grey black list data library.By user basic information come to grey black name Single database is updated, and further enriches the data rich in grey black list data library, ensure that subsequent standing audit Accuracy.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
In one embodiment, a kind of standing audit device is provided, which audits standing in device and above-described embodiment and examine Kernel method corresponds.As shown in figure 8, standing audit device includes standing audit request module 10, user's standing number According to obtaining, module 20, time judgment module 30, user's history verify data obtain module 40, user's history verify data verifies mould Block 50 and standing msu message determining module 60.
Detailed description are as follows for each functional module:
Standing audits request module 10, and for obtaining standing audit request, standing audit request includes user identifier And the application time;
User's standing data acquisition module 20, for being obtained from preset grey black list data library according to user identifier pair The user's standing data answered, user's standing data include credit information and credit information corresponding renewal time;
Time judgment module 30, for judging whether the time interval of application time and renewal time are more than preset time threshold Value;
User's history verify data obtains module 40, if being more than preset time threshold for time interval, according to user Mark obtains the user's history verify data in preset time;
User's history verify data authentication module 50, for obtaining preset audit threshold set, according to audit threshold set pair User's history verify data is verified, and the update credit information of user identifier is obtained;
Standing msu message determining module 60, the standing audit letter for being determined as user identifier for credit information will to be updated Breath.
Preferably, user's history verify data includes Authentication-Type and the corresponding continuous authentication failed time of each Authentication-Type Number;User's history verify data authentication module 50 includes Authentication-Type matched sub-block 51,52 and of match information acquisition submodule It updates credit information and determines submodule 53.
Authentication-Type matched sub-block 51, for being obtained from the audit threshold set according to each Authentication-Type pair The audit threshold value answered carries out each corresponding continuous authentication failed number of Authentication-Type and the corresponding audit threshold value Matching, obtains matching result;
Match information acquisition submodule 52, the matching for obtaining each Authentication-Type according to the matching result are believed Breath;
It updates credit information and determines submodule 53, for selecting priority from the match information of each Authentication-Type The corresponding credit information of highest match information, the update credit information as the user identifier.
Preferably, Authentication-Type matched sub-block 51 includes that target audit threshold value determination unit and matching result obtain list Member.
Target audits threshold value determination unit, for determining corresponding risk class according to Authentication-Type, and according to risk etc. Grade obtains corresponding audit threshold value from audit threshold set, audits threshold value as target.
Matching result acquiring unit, for the corresponding continuous authentication failed number of each Authentication-Type and target to be audited threshold Value is matched, and matching result is obtained.
Preferably, target audit threshold value includes blacklist threshold value and gray list threshold value.If matching result acquiring unit is used for The corresponding continuous authentication failed number of any Authentication-Type meets corresponding blacklist threshold value, then the matching result of the Authentication-Type For doubtful blacklist;If the corresponding continuous authentication failed number of any Authentication-Type meets corresponding gray list threshold value, this is tested The matching result for demonstrate,proving type is doubtful gray list.
Preferably, standing audit device is also used to obtain identification exception record from history identification record, wherein each Identification exception record includes historical user's mark, Exception Type and the corresponding continuous abnormal number of each Exception Type;According to different Normal type obtains corresponding target and audits threshold value, and it includes blacklist threshold value and gray list threshold value that target, which audits threshold value,;If identifying different Often any continuous abnormal number in record meets corresponding blacklist threshold value, then will identify that the historical user in exception record marks Knowledge is determined as black list user's mark;If any continuous abnormal number in identification exception record meets corresponding gray list threshold value And other continuous abnormal numbers do not meet corresponding blacklist threshold value, then will identify that the historical user in exception record identifies It is determined as gray list user identifier;Grey black list data library is constructed according to black list user's mark and gray list user identifier.
Preferably, standing audit device is also used to obtain target user's mark and each target user identifies corresponding use Family essential information;It is scored using preset rules user basic information, obtains the user base of each target user's mark Scoring;Preset scoring threshold value is obtained, scoring threshold value includes blacklist scoring threshold value and gray list scoring threshold value;If user base Scoring meets blacklist scoring threshold value, then corresponding user identifier is determined as newly-increased black list user's mark;If user base Scoring meets gray list scoring threshold value, then corresponding user identifier is determined as newly-increased gray list user identifier;It is black according to increasing newly List user identifier and newly-increased gray list user identifier update grey black list data library.
Preferably, standing audit device is also used to when the standing msu message of user identifier is black list user, then Issue information warning.
Specific about standing audit device limits the restriction that may refer to above for standing checking method, herein not It repeats again.Modules in above-mentioned standing audit device can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 9.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is for storing the data used in above-mentioned standing checking method.The network interface of the computer equipment is used It is communicated in passing through network connection with external terminal.To realize a kind of standing audit side when the computer program is executed by processor Method.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory And the computer program that can be run on a processor, processor perform the steps of when executing computer program
Standing audit request is obtained, the standing audit request includes user identifier and application time;
Corresponding user's standing data, the use are obtained from preset grey black list data library according to the user identifier Family standing data include credit information and the credit information corresponding renewal time;
Whether the time interval for judging the application time and the renewal time is more than preset time threshold;
If the time interval is more than the preset time threshold, obtained in preset time according to the user identifier User's history verify data;
Preset audit threshold set is obtained, the user's history verify data is tested according to the audit threshold set Card, obtains the update credit information of the user identifier;
The update credit information is determined as to the standing msu message of the user identifier.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor
Standing audit request is obtained, the standing audit request includes user identifier and application time;
Corresponding user's standing data, the use are obtained from preset grey black list data library according to the user identifier Family standing data include credit information and the credit information corresponding renewal time;
Whether the time interval for judging the application time and the renewal time is more than preset time threshold;
If the time interval is more than the preset time threshold, obtained in preset time according to the user identifier User's history verify data;
Preset audit threshold set is obtained, the user's history verify data is tested according to the audit threshold set Card, obtains the update credit information of the user identifier;
The update credit information is determined as to the standing msu message of the user identifier.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of standing checking method characterized by comprising
Standing audit request is obtained, the standing audit request includes user identifier and application time;
Corresponding user's standing data, user's money are obtained from preset grey black list data library according to the user identifier Letter data includes credit information and the credit information corresponding renewal time;
Whether the time interval for judging the application time and the renewal time is more than preset time threshold;
If the time interval is more than the preset time threshold, the user in preset time is obtained according to the user identifier History verify data;
Preset audit threshold set is obtained, the user's history verify data is verified according to the audit threshold set, is obtained To the update credit information of the user identifier;
The update credit information is determined as to the standing msu message of the user identifier.
2. standing checking method as described in claim 1, which is characterized in that the user's history verify data includes verifying class Type and the corresponding continuous authentication failed number of each Authentication-Type;
It is described that the user's history verify data is verified according to the audit threshold set, obtain the user identifier more New credit information, specifically comprises the following steps:
Corresponding audit threshold value is obtained from the audit threshold set according to each Authentication-Type, by each verifying class The corresponding continuous authentication failed number of type and the corresponding audit threshold value are matched, and matching result is obtained;
The match information of each Authentication-Type is obtained according to the matching result;
The corresponding credit information of match information that highest priority is selected from the match information of each Authentication-Type, as The update credit information of the user identifier.
3. standing checking method as claimed in claim 2, which is characterized in that it is described according to each Authentication-Type from described Corresponding audit threshold value is obtained in audit threshold set, by the corresponding continuous authentication failed number of each Authentication-Type and correspondence The audit threshold value matched, obtain matching result, specifically comprise the following steps:
Corresponding risk class is determined according to the Authentication-Type, and is obtained from the audit threshold set according to the risk class Corresponding audit threshold value is taken, audits threshold value as target;
Each corresponding continuous authentication failed number of Authentication-Type and target audit threshold value are matched, obtained With result.
4. standing checking method as claimed in claim 3, which is characterized in that the target audit threshold value includes blacklist threshold value With gray list threshold value;
It is described to match each corresponding continuous authentication failed number of Authentication-Type and target audit threshold value, it obtains To matching result, specifically comprise the following steps:
If the corresponding continuous authentication failed number of any Authentication-Type meets the corresponding blacklist threshold value, described to test The matching result for demonstrate,proving type is doubtful blacklist;
If the corresponding continuous authentication failed number of any Authentication-Type meets the corresponding gray list threshold value, described to test The matching result for demonstrate,proving type is doubtful gray list.
5. standing checking method as described in claim 1, which is characterized in that it is described according to the user identifier from grey black name Corresponding user's standing data are obtained in single database, user's standing data include credit information and the credit information pair Before the step of renewal time answered, the standing checking method further includes following steps:
Identification exception record is obtained from history identification record, wherein each identification exception record includes historical user's mark Knowledge, Exception Type and the corresponding continuous abnormal number of each Exception Type;
Corresponding target is obtained according to the Exception Type and audits threshold value, and the target audit threshold value includes blacklist threshold value and ash Name single threshold;
If any continuous abnormal number in the identification exception record meets the corresponding blacklist threshold value, by institute The historical user's mark stated in identification exception record is determined as black list user's mark;
If it is described identification exception record in any continuous abnormal number meet the corresponding gray list threshold value and other Continuous abnormal number do not meet the corresponding blacklist threshold value, then by it is described identification exception record in historical user mark Knowledge is determined as gray list user identifier;
Grey black list data library is constructed according to black list user mark and the gray list user identifier.
6. standing checking method as claimed in claim 5, which is characterized in that it is described according to the black list user mark and After the step of gray list user identifier building grey black list data library, the standing checking method further includes walking as follows It is rapid:
It obtains target user's mark and each target user identifies corresponding user basic information;
It is scored using preset rules the user basic information, obtains the user base of each target user's mark Scoring;
Preset scoring threshold value is obtained, the scoring threshold value includes blacklist scoring threshold value and gray list scoring threshold value;
If the user base scoring meets the blacklist scoring threshold value, corresponding target user's mark is determined as Newly-increased black list user's mark;
If the user base scoring meets the gray list scoring threshold value, corresponding target user's mark is determined as The newly-increased gray list user identifier;
Grey black list data library is updated according to newly-increased black list user's mark and the newly-increased gray list user identifier.
7. standing checking method as described in claim 1, which is characterized in that be determined as the update credit information described After the standing msu message of the user identifier, the standing checking method further include:
If the standing msu message of the user identifier is black list user, information warning is issued.
8. a kind of standing audits device characterized by comprising
Standing audits request module, for obtaining standing audit request, standing audit request include user identifier and Application time;
User's standing data acquisition module, for obtaining correspondence from preset grey black list data library according to the user identifier User's standing data, user's standing data include credit information and the credit information corresponding renewal time;
Time judgment module, for judging whether the time interval of the application time and the renewal time are more than preset time Threshold value;
User's history verify data obtains module, if being more than the preset time threshold for the time interval, according to institute State the user's history verify data in user identifier acquisition preset time;
User's history verify data authentication module, for obtaining preset audit threshold set, according to the audit threshold set to institute It states user's history verify data to be verified, obtains the update credit information of the user identifier;
Standing msu message determining module, for the update credit information to be determined as to the standing audit letter of the user identifier Breath.
9. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to The step of any one of 7 standing checking method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In the step of realization standing checking method as described in any one of claim 1 to 7 when the computer program is executed by processor Suddenly.
CN201811536984.XA 2018-12-14 2018-12-14 Standing checking method, device, computer equipment and storage medium Pending CN109785116A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811536984.XA CN109785116A (en) 2018-12-14 2018-12-14 Standing checking method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811536984.XA CN109785116A (en) 2018-12-14 2018-12-14 Standing checking method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109785116A true CN109785116A (en) 2019-05-21

Family

ID=66497104

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811536984.XA Pending CN109785116A (en) 2018-12-14 2018-12-14 Standing checking method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109785116A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110288483A (en) * 2019-05-22 2019-09-27 平安证券股份有限公司 Account activating method, device, equipment and computer readable storage medium
CN110673855A (en) * 2019-09-29 2020-01-10 深圳无域科技技术有限公司 Method and device for initiating credit worthiness request
CN110796553A (en) * 2019-08-22 2020-02-14 中国平安财产保险股份有限公司 Service request processing method, device, terminal and storage medium
CN111459961A (en) * 2020-03-31 2020-07-28 深圳前海微众银行股份有限公司 Method, device and equipment for updating service data and storage medium
CN111586448A (en) * 2020-01-20 2020-08-25 全息空间(深圳)智能科技有限公司 Live broadcast platform anchor pre-screening method and device and storage medium
CN111831953A (en) * 2020-07-20 2020-10-27 汉海信息技术(上海)有限公司 Data processing method, device, equipment and storage medium
CN112581144A (en) * 2020-12-16 2021-03-30 中国建设银行股份有限公司 Credit certification data processing method, device and system
CN113839962A (en) * 2021-11-25 2021-12-24 阿里云计算有限公司 User attribute determination method, apparatus, storage medium, and program product
CN117874311A (en) * 2024-01-31 2024-04-12 北京轻松怡康信息技术有限公司 Blacklist management method, blacklist management device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003054821A2 (en) * 2001-09-18 2003-07-03 General Electric Capital Corporation Remote-on-the-spot credit processing
KR20070028721A (en) * 2005-09-07 2007-03-13 주식회사 이페이젠 Credit card terminal including black list file therein and method for credit card settlement in the aircraft using the same
CN108269186A (en) * 2018-01-23 2018-07-10 平安好房(上海)电子商务有限公司 User information verification method, device, equipment and readable storage medium storing program for executing
WO2018214716A1 (en) * 2017-05-25 2018-11-29 重庆小雨点小额贷款有限公司 Method and apparatus for determining line of credit, server and readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003054821A2 (en) * 2001-09-18 2003-07-03 General Electric Capital Corporation Remote-on-the-spot credit processing
KR20070028721A (en) * 2005-09-07 2007-03-13 주식회사 이페이젠 Credit card terminal including black list file therein and method for credit card settlement in the aircraft using the same
WO2018214716A1 (en) * 2017-05-25 2018-11-29 重庆小雨点小额贷款有限公司 Method and apparatus for determining line of credit, server and readable storage medium
CN108269186A (en) * 2018-01-23 2018-07-10 平安好房(上海)电子商务有限公司 User information verification method, device, equipment and readable storage medium storing program for executing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
聂规划, 过文骏: "我国中小企业的客户资信管理探讨", 武汉理工大学学报(信息与管理工程版), no. 04, 28 August 2003 (2003-08-28), pages 64 - 67 *
齐春莹;张效严;: "企业及个人资信系统的技术实现", 科协论坛(下半月), no. 08, 25 August 2007 (2007-08-25), pages 3 - 5 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110288483A (en) * 2019-05-22 2019-09-27 平安证券股份有限公司 Account activating method, device, equipment and computer readable storage medium
CN110288483B (en) * 2019-05-22 2024-07-02 平安证券股份有限公司 Account opening method, account opening device, account opening equipment and computer readable storage medium
CN110796553A (en) * 2019-08-22 2020-02-14 中国平安财产保险股份有限公司 Service request processing method, device, terminal and storage medium
CN110673855A (en) * 2019-09-29 2020-01-10 深圳无域科技技术有限公司 Method and device for initiating credit worthiness request
CN110673855B (en) * 2019-09-29 2023-05-12 深圳无域科技技术有限公司 Method and device for initiating credit worthiness request
CN111586448A (en) * 2020-01-20 2020-08-25 全息空间(深圳)智能科技有限公司 Live broadcast platform anchor pre-screening method and device and storage medium
CN111459961A (en) * 2020-03-31 2020-07-28 深圳前海微众银行股份有限公司 Method, device and equipment for updating service data and storage medium
CN111831953A (en) * 2020-07-20 2020-10-27 汉海信息技术(上海)有限公司 Data processing method, device, equipment and storage medium
CN111831953B (en) * 2020-07-20 2024-03-15 汉海信息技术(上海)有限公司 Data processing method, device, equipment and storage medium
CN112581144A (en) * 2020-12-16 2021-03-30 中国建设银行股份有限公司 Credit certification data processing method, device and system
CN113839962A (en) * 2021-11-25 2021-12-24 阿里云计算有限公司 User attribute determination method, apparatus, storage medium, and program product
CN117874311A (en) * 2024-01-31 2024-04-12 北京轻松怡康信息技术有限公司 Blacklist management method, blacklist management device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109785116A (en) Standing checking method, device, computer equipment and storage medium
CN109829776B (en) Merchant risk assessment method, device, computer equipment and storage medium
Hamill et al. Evaluating information assurance strategies
US7761379B2 (en) Mass compromise/point of compromise analytic detection and compromised card portfolio management system
US7620596B2 (en) Systems and methods for evaluating financial transaction risk
CN109409641A (en) Risk evaluating method, device, computer equipment and storage medium
US20070112667A1 (en) System and method for providing a fraud risk score
CN109146662A (en) A kind of risk control method and device
CN109508903B (en) Risk assessment method, risk assessment device, computer equipment and storage medium
CN109522400B (en) Nuclear protection method, device, computer equipment and storage medium
CN110348188B (en) Core body checking method and device
CN110474871A (en) A kind of exception account detection method, device, computer equipment and storage medium
CN109685643A (en) Loan audit risk grade determines method, apparatus, equipment and storage medium
CN109615280A (en) Employee's data processing method, device, computer equipment and storage medium
Lütkepohl et al. Choosing between different time‐varying volatility models for structural vector autoregressive analysis
CN109509087A (en) Intelligentized loan checking method, device, equipment and medium
US8515783B1 (en) Risk assessment method
CN112419041A (en) Risk monitoring method and device, storage medium and computer equipment
CN110728301A (en) Credit scoring method, device, terminal and storage medium for individual user
Urunkar et al. Fraud detection and analysis for insurance claim using machine learning
EP2693379A1 (en) Risk-management device
Esakkiraj et al. A predictive approach for fraud detection using hidden Markov model
US20210089979A1 (en) Analytics system and method for a competitive vulnerability and customer and employee retention
KR102249028B1 (en) System for Debt Repayment Capability Evaluation Of Corporation
Perry III et al. Evaluating the systems engineering problem management process for industrial manufacturing problems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination