CN109785116A - Standing checking method, device, computer equipment and storage medium - Google Patents
Standing checking method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109785116A CN109785116A CN201811536984.XA CN201811536984A CN109785116A CN 109785116 A CN109785116 A CN 109785116A CN 201811536984 A CN201811536984 A CN 201811536984A CN 109785116 A CN109785116 A CN 109785116A
- Authority
- CN
- China
- Prior art keywords
- user
- standing
- threshold value
- audit
- user identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000003860 storage Methods 0.000 title claims abstract description 17
- 238000012550 audit Methods 0.000 claims abstract description 167
- 230000002159 abnormal effect Effects 0.000 claims description 28
- 238000004590 computer program Methods 0.000 claims description 16
- 238000010586 diagram Methods 0.000 description 9
- 238000012795 verification Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000001965 increasing effect Effects 0.000 description 3
- 239000000203 mixture Substances 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a kind of standing checking method, device, computer equipment and storage mediums, first acquisition standing audit request, and standing audit request includes user identifier and application time;Corresponding user's standing data are obtained from preset grey black list data library according to user identifier, user's standing data include credit information and the credit information corresponding renewal time;Whether the time interval for judging application time and renewal time is more than preset time threshold;If time interval is more than preset time threshold, the user's history verify data in preset time is obtained according to user identifier, wherein preset time is determined according to the application time;Preset audit threshold set is obtained, user's history verify data is verified according to audit threshold set, obtains the update credit information of user identifier;Update credit information is determined as to the standing msu message of user identifier, guarantees the real-time of grey black list data library data, it is ensured that the accuracy of standing audit.
Description
Technical field
The present invention relates to data analysis field more particularly to a kind of standing checking method, device, computer equipment and storages
Medium.
Background technique
With the increase of social demand, loan transaction has been spread to gradually in the life of broad masses of the people, all kinds of loans
Money company also gradually appears in the sight of people.During loan, the audit crew of finance company is needed according to borrower
Credit situation and loan repayment capacity title examination and evaluation are carried out to creditor, Credit risk level is evaluated and tested, as the case may be
Lending decision and amount setting are carried out, to reduce credit risk.Wherein in loan audit, including a standing audits the stage,
For singly taking precautions against certain user's malice brush.However, standing auditing flow is relatively complicated at present, and the accuracy audited
It is to be improved.
Summary of the invention
The embodiment of the present invention provides a kind of standing checking method, device, computer equipment and storage medium, to solve standing
The not high problem of the accuracy of audit.
A kind of standing checking method, comprising:
Standing audit request is obtained, the standing audit request includes user identifier and application time;
Corresponding user's standing data, the use are obtained from preset grey black list data library according to the user identifier
Family standing data include credit information and the credit information corresponding renewal time;
Whether the time interval for judging the application time and the renewal time is more than preset time threshold;
If the time interval is more than the preset time threshold, obtained in preset time according to the user identifier
User's history verify data;
Preset audit threshold set is obtained, the user's history verify data is tested according to the audit threshold set
Card, obtains the update credit information of the user identifier;
The update credit information is determined as to the standing msu message of the user identifier.
A kind of standing audit device, comprising:
Standing audits request module, and for obtaining standing audit request, the standing audit request includes that user marks
Knowledge and application time;
User's standing data acquisition module, for being obtained from preset grey black list data library according to the user identifier
Corresponding user's standing data, user's standing data include credit information and the credit information corresponding renewal time;
Time judgment module, for judging whether the time interval of the application time and the renewal time are more than default
Time threshold;
User's history verify data obtains module, if being more than the preset time threshold, root for the time interval
The user's history verify data in preset time is obtained according to the user identifier;
User's history verify data authentication module, for obtaining preset audit threshold set, according to the audit threshold set
The user's history verify data is verified, the update credit information of the user identifier is obtained;
Standing msu message determining module, the standing for the update credit information to be determined as the user identifier are examined
Nuclear information.
A kind of computer equipment, including memory, processor and storage are in the memory and can be in the processing
The computer program run on device, the processor realize the step of above-mentioned standing checking method when executing the computer program
Suddenly.
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the meter
The step of calculation machine program realizes above-mentioned standing checking method when being executed by processor.
In above-mentioned standing checking method, device, computer equipment and storage medium, acquisition standing audit request first, money
Letter audit request includes user identifier and application time;Correspondence is obtained from preset grey black list data library according to user identifier
User's standing data, user's standing data include credit information and the credit information corresponding renewal time;Judgement application
Whether the time interval of time and renewal time are more than preset time threshold;If time interval is more than preset time threshold, root
The user's history verify data in preset time is obtained according to user identifier, wherein preset time is determined according to the application time;It obtains
Preset audit threshold set verifies user's history verify data according to audit threshold set, obtains the update of user identifier
Credit information;Update credit information is determined as to the standing msu message of user identifier.By default grey black list data library come
Standing audit is carried out, and by the judgement to application time and renewal time, guarantees the real-time of grey black list data library data
Property, it is ensured that the accuracy of standing audit.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention
Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings
Obtain other attached drawings.
Fig. 1 is an application environment schematic diagram of standing checking method in one embodiment of the invention;
Fig. 2 is an exemplary diagram of standing checking method in one embodiment of the invention;
Fig. 3 is another exemplary diagram of standing checking method in one embodiment of the invention;
Fig. 4 is another exemplary diagram of standing checking method in one embodiment of the invention;
Fig. 5 is another exemplary diagram of standing checking method in one embodiment of the invention;
Fig. 6 is another exemplary diagram of standing checking method in one embodiment of the invention;
Fig. 7 is another exemplary diagram of standing checking method in one embodiment of the invention;
Fig. 8 is a functional block diagram of standing audit device in one embodiment of the invention;
Fig. 9 is a schematic diagram of computer equipment in one embodiment of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
Standing checking method provided in an embodiment of the present invention, can be applicable in the application environment such as Fig. 1, wherein client
(computer equipment) is communicated by network with server-side.Client sends standing audit request to server-side, and server-side obtains
Standing audit request is taken, standing audit request includes user identifier and application time;According to user identifier from preset grey black name
Corresponding user's standing data are obtained in single database, user's standing data include credit information and the corresponding update of credit information
Time;Whether the time interval for judging application time and renewal time is more than preset time threshold;If time interval is more than default
Time threshold then obtains the user's history verify data in preset time, wherein preset time is according to application according to user identifier
Time determines;Preset audit threshold set is obtained, user's history verify data is verified according to audit threshold set, is used
The update credit information of family mark;Update credit information is determined as to the standing msu message of user identifier.Wherein, client
(computer equipment) can be, but not limited to various personal computers, laptop, smart phone, tablet computer and it is portable can
Wearable device.Server can be realized with the server cluster of the either multiple server compositions of independent server.
In one embodiment, as shown in Fig. 2, providing a kind of standing checking method, the service in Fig. 1 is applied in this way
It is illustrated, includes the following steps: for end
S10: standing audit request is obtained, standing audit request includes user identifier and application time.
Wherein, standing audit request is the trigger request of client triggering audited to the standing of user.Specifically,
User inputs corresponding instruction or information by client to trigger standing audit request or user at the scene or sales counter
It files an application, standing audit request is initiated by client by contact staff.Standing audit request is sent to clothes by client
Business end, server-side get loan audit request.Wherein, standing audit request packet user identifier and application time.User
Mark refers to the information that can go out different user with unique identification.In one embodiment, user identifier can be certificate number, hand
Machine number or user number.User number is the identiflication number that a platform, application program or system are user's distribution, a user couple
Answer a unique member number.Application time is the time that standing audit request proposes, specifically, client can be provided generating
Client current system time is obtained when letter audit request as the application time.
S20: corresponding user's standing data, Yong Huzi are obtained from preset grey black list data library according to user identifier
Letter data includes credit information and credit information corresponding renewal time.
Wherein, grey black list data library is for storing the letter for leading to the undesirable user of standing data there are abnormal conditions
The database of breath.User's standing data are stored in grey black list data library, user's standing data are for indicating different user
Credit position data, user's standing data include credit information and credit information corresponding renewal time.Credit information is
For identifying the information of corresponding user's credit position, such as: black list user, gray list user and normal users.Renewal time
For the renewal time of the credit information, it is possible to understand that ground may become without the credit information of user with the variation of time
Change, it is therefore desirable to periodically the credit information in grey black list data library is updated, which is corresponding standing
The newest renewal time of information.
In this step, it is got in preset grey black list data library by the user identifier in standing audit request
The corresponding user's standing data of the user identifier, to carry out subsequent standing audit.
Further, it if the corresponding user's standing data of the user identifier are not present in grey black list data library, sends out
Prompt information out.Specifically, which can be text information or voice messaging.
S30: whether the time interval for judging application time and renewal time is more than preset time threshold.
Wherein, preset time threshold is a preset time value, for measuring whether user's standing data need
It is updated.Optionally, which is two weeks, one month, three months or half a year etc., specifically can be according to reality
Business needs in border are configured.In this step, by judging whether the time interval of application time and renewal time are more than pre-
If time threshold is to determine whether user's standing data can directly use.
S40: if time interval is more than preset time threshold, the user's history in preset time is obtained according to user identifier
Verify data.
User's history verify data is the related data that different user is audited in previous verifying or standing.And when default
Between be a preset time value.Optionally, which is two weeks, one month, three months or half a year etc., tool
Body can be configured according to actual business requirement.
In this step, if time interval is more than preset time threshold, illustrate user's standing data that step S20 is obtained
It may be due to not timely updating and there are deviations.Therefore, obtain the user's according to the user identifier in standing audit request
User's history verify data, to be updated to user's standing data.
S50: obtaining preset audit threshold set, is verified, is obtained to user's history verify data according to audit threshold set
To the update credit information of user identifier.
Wherein, the threshold value set that audit threshold set is made of different audit threshold values, i.e. the audit threshold set packet
A plurality of audit threshold values are included.Specifically, audit threshold set in audit threshold value can according to different conditions or rule into
Row classification.After obtaining audit threshold set, the user's history verify data in preset time is carried out according to audit threshold set
Verifying, can be obtained the update credit information of user identifier.
S60: update credit information is determined as to the standing msu message of user identifier.
After obtaining updating credit information, update credit information is determined as to the standing msu message of user identifier.Its
In, updating credit information also includes black list user, gray list user and normal users.It is used when updating credit information for blacklist
When family, then show that the user is particularly likely that the user for once possessing bad standing data record, such as: malice brush it is single or
Collage-credit data is poor etc..And when updating credit information is gray list user, then showing that the user has certain probability is once to gather around
There is the user of bad standing data record.So, it is ensured that there are the poor user of malice brush list or collage-credit data into
Server-side or related personnel can be allowed to know in time when the audit request of row standing, be disliked with being better protected from the certain customers
Meaning brushes behavior that is single or applying extremely.
In a specific embodiment, if the standing msu message of the user identifier is black list user, police is issued
Show information, to prompt corresponding personnel.Further, if the standing msu message of the user identifier is black list user,
Then directly refuse standing audit request.In a specific embodiment, if the standing msu message of the user identifier is ash
Name single user, then issue prompting message, to prompt corresponding personnel, further to be confirmed or secondary audit.
Further, it if the standing msu message of the user identifier is normal users, by standing audit request, carries out corresponding
Follow-up checks or application link.
In a specific embodiment, after obtaining updating credit information, using update credit information to the use
Credit information in the standing data of family is updated, and updates corresponding renewal time.
In a specific embodiment, after step S30, the standing checking method further include: if time interval does not have
Preset time threshold is had more than, then using credit information as the standing msu message of user identifier.
In the present embodiment, standing audit request is obtained first, and standing audit request includes user identifier and application time;
Corresponding user's standing data are obtained from preset grey black list data library according to user identifier, user's standing data include money
Letter information and the credit information corresponding renewal time;Whether the time interval for judging application time and renewal time is more than pre-
If time threshold;If time interval is more than preset time threshold, the user's history in preset time is obtained according to user identifier
Verify data, wherein preset time is determined according to the application time;Preset audit threshold set is obtained, according to audit threshold set pair
User's history verify data is verified, and the update credit information of user identifier is obtained;Credit information will be updated and be determined as user
The standing msu message of mark.Carry out standing audit by default grey black list data library, and by the application time and
The judgement of renewal time guarantees the real-time of grey black list data library data, it is ensured that the accuracy of standing audit.
In one embodiment, user's history verify data includes Authentication-Type and the corresponding continuous verifying of each Authentication-Type
The frequency of failure.
Wherein, Authentication-Type is the type for being characterized in verification mode employed in history verifying.It is to be appreciated that user
It can be verified by different verification modes, such as: living body verifying, face verification or account information verifying etc..And connect
Continuous authentication failed number refers to that same Authentication-Type carries out repeated authentication and verification result is all the number of authentication failed.It should
Continuous authentication failed number is more, shows the case where verifying there is more likely to be malice.
In the present embodiment, it as shown in figure 3, being verified according to audit threshold set to user's history verify data, obtains
The update credit information of user identifier, specifically comprises the following steps:
S51: corresponding audit threshold value is obtained from audit threshold set according to each Authentication-Type, by each Authentication-Type pair
The continuous authentication failed number and corresponding audit threshold value answered are matched, and matching result is obtained.
It is provided with different audit threshold values for different Authentication-Types in advance in audit threshold set, therefore in the step
In, corresponding audit threshold value is got from audit threshold set by Authentication-Type.In turn by the corresponding company of each Authentication-Type
Continuous authentication failed number and corresponding audit threshold value are matched, and matching result is obtained.Specifically, each Authentication-Type is corresponding
Audit threshold value can be divided into different numerical intervals, and each numerical intervals can correspond to a matching result.If Authentication-Type
A numerical intervals successful match in corresponding continuous authentication failed number and audit threshold value, then can be according to successful match
Numerical intervals obtain corresponding matching result.The matching result can be an area to numerical intervals different in audit threshold value
Point, it can specifically be embodied with number, symbol or text information.
S52: the match information of each Authentication-Type is obtained according to matching result.
In this step, it can be obtained by by matching result of each Authentication-Type in corresponding audit threshold value each
The match information of Authentication-Type.The match information is specially by the embodiment of one of matching result information-based conversion.For example, if
With result be and numerical intervals A successful match, then corresponding match information can be doubtful high risk;If matching result is sum number
It is worth interval B successful match, then corresponding match information can be doubtful risk;If matching result is and numerical intervals C is matched
Success, then corresponding match information can be doubtful low-risk;If matching result is no successful match, corresponding matching letter
Breath can be safety.
S53: selecting the corresponding credit information of match information of highest priority from the match information of each Authentication-Type,
Update credit information as user identifier.
In different match informations, different priority is pre-set.For example, in the example of step S52, it is corresponding
Sequence of the match information according to priority from high to low are as follows: doubtful high risk, doubtful risk, doubtful low-risk and safety.
According to preset priority, so that it may select the matching letter an of highest priority from the match information of different Authentication-Types
Breath, and obtain update credit information of the corresponding credit information of the match information as user identifier.Such as: doubtful high risk pair
The credit information answered is black list user, and doubtful risk and the corresponding credit information of doubtful low-risk are gray list user.
In the present embodiment, corresponding audit threshold value is obtained from audit threshold set according to each Authentication-Type, it will be each
The corresponding continuous authentication failed number of Authentication-Type and corresponding audit threshold value are matched, and matching result is obtained;According to matching
As a result the match information of each Authentication-Type is obtained;The matching of highest priority is selected from the match information of each Authentication-Type
The corresponding credit information of information, the update credit information as user identifier.By the audit that each Authentication-Type is rationally arranged
Threshold value, and reasonably converted according to matching result, to obtain updating credit information, it ensure that updating credit information obtains
Accuracy.
In one embodiment, as shown in figure 4, obtaining corresponding audit threshold from audit threshold set according to each Authentication-Type
Value, the corresponding continuous authentication failed number of each Authentication-Type and corresponding audit threshold value are matched, matching result is obtained,
Specifically comprise the following steps:
S511: corresponding risk class is determined according to Authentication-Type, and is obtained from audit threshold set according to risk class
Corresponding audit threshold value audits threshold value as target.
S512: the corresponding continuous authentication failed number of each Authentication-Type and target audit threshold value are matched, obtained
Matching result.
In this embodiment, set different risk class for different Authentication-Types in advance, then by risk class come
Corresponding audit threshold value is obtained, so there is no need to different audit threshold values is arranged for each Authentication-Type, it is only necessary to be every
The pre-configured corresponding audit threshold value of one risk class.It can quickly be obtained by the corresponding risk class of each Authentication-Type again
Audit threshold value is got, audits threshold value as target.In turn by the corresponding continuous authentication failed number of each Authentication-Type and target
Audit threshold value is matched, and matching result is obtained.
In the present embodiment, by the setting of risk class, it can simplify the cumbersome of audit threshold value setting, improve whole match
Set efficiency.
In one embodiment, target audit threshold value includes blacklist threshold value and gray list threshold value.
Specifically, blacklist threshold value is a preset numerical intervals, for black to being labeled as in grey black list data library
Name single user carries out embodiment numerically.And gray list threshold value is also a preset numerical intervals, for grey black name odd number
Embodiment numerically is carried out according to gray list user is labeled as in library.It is to be appreciated that blacklist threshold value and gray list threshold value are not
Same numerical value or different numerical intervals.
In the present embodiment, as shown in figure 5, the corresponding continuous authentication failed number of each Authentication-Type and target are audited
Threshold value is matched, and matching result is obtained, and is specifically comprised the following steps:
S5121: if the corresponding continuous authentication failed number of any Authentication-Type meets corresponding blacklist threshold value, this is tested
The matching result for demonstrate,proving type is doubtful blacklist.
In this step, after acquiring blacklist threshold value, by the corresponding continuous authentication failed of each Authentication-Type
Number and corresponding blacklist threshold value are matched, if the corresponding continuous authentication failed number of any Authentication-Type meet it is corresponding
Blacklist threshold value, then the matching result of the Authentication-Type is doubtful blacklist.Specifically, continuous authentication failed number meets correspondence
Blacklist threshold value can refer to number of continuous authentication failed number in the range of blacklist threshold value or in blacklist threshold value
It is worth in section.
S5122: if the corresponding continuous authentication failed number of any Authentication-Type meets corresponding gray list threshold value, this is tested
The matching result for demonstrate,proving type is doubtful gray list.
In this step, after acquiring gray list threshold value, by the corresponding continuous authentication failed of each Authentication-Type
Number and corresponding gray list threshold value are matched, if the corresponding continuous authentication failed number of any Authentication-Type meet it is corresponding
Gray list threshold value, then the matching result of the Authentication-Type is doubtful gray list.Specifically, continuous authentication failed number meets correspondence
Gray list threshold value can refer to number of continuous authentication failed number in the range of gray list threshold value or in gray list threshold value
It is worth in section.
In the present embodiment, blacklist threshold value and gray list threshold value, and each verifying are set by auditing threshold value for target
Continuous authentication failed number and corresponding blacklist threshold value and gray list threshold value in type are compared, after better ensuring that
The accuracy of continuous credit information.
In one embodiment, as shown in fig. 6, obtaining corresponding user from grey black list data library according to user identifier
Standing data, user's standing data include the steps that credit information and before credit information corresponding renewal times, which examines
Kernel method further includes following steps:
S21: identification exception record is obtained from history identification record, wherein each identification exception record includes historical user
Mark, Exception Type and the corresponding continuous abnormal number of each Exception Type.
Wherein, history identification record refers to identification record of the user in previous verification process, the history identification record
Including identification normal recordings and identification exception record.In a specific embodiment, the history identification record can with it is above-mentioned
User's history verify data in embodiment is identical, i.e., the two is identical data.In this step, from history identification record
Obtain identification exception record.And each identification exception record includes historical user's mark, Exception Type and each exception class
The corresponding continuous abnormal number of type.Historical user's mark refers to the corresponding user of user identified in history identification record
Mark.Exception Type refers to the concrete reason occurred in identification exception, can specifically include: vivo identification exception, recognition of face
Exception or account identification are abnormal etc..And continuous abnormal number refers in each Exception Type abnormal time of identification continuously occur
Number.
S22: corresponding target is obtained according to Exception Type and audits threshold value, it includes blacklist threshold value and ash that target, which audits threshold value,
Name single threshold.
Different targets is configured for different Exception Types in advance and audits threshold value, can be obtained according to Exception Type corresponding
Target audits threshold value, and it includes blacklist threshold value and gray list threshold value that target, which audits threshold value,.
S23: it if any continuous abnormal number in identification exception record meets corresponding blacklist threshold value, will identify different
Often historical user's mark in record is determined as black list user's mark.
In this step, after acquiring blacklist threshold value, by the continuous abnormal in each identification exception record
Several and corresponding blacklist threshold value is matched, if the continuous abnormal number in any identification exception record meets corresponding black name
The historical user's mark identified in exception record is then determined as black list user's mark by single threshold.Specifically, continuous abnormal
Number, which meets corresponding blacklist threshold value, can refer to continuous abnormal number in the range of blacklist threshold value or in blacklist threshold value
In numerical intervals in.
S24: if any continuous abnormal number in identification exception record meets corresponding gray list threshold value and others even
Continuous frequency of abnormity does not meet corresponding blacklist threshold value, then the historical user's mark identified in exception record is determined as grey name
Single user mark.
In this step, after acquiring gray list threshold value, by the continuous abnormal in each identification exception record
Several and corresponding gray list threshold value is matched, if the continuous abnormal number in any identification exception record meets corresponding grey name
Other continuous abnormal numbers do not meet corresponding blacklist threshold value in single threshold and the identification exception record, then by the identification
Historical user's mark in exception record is determined as gray list user identifier.Specifically, continuous abnormal number meets corresponding ash
Name single threshold can refer to continuous abnormal number in the range of gray list threshold value or in the numerical intervals in gray list threshold value.
S25: grey black list data library is constructed according to black list user's mark and gray list user identifier.
After obtaining black list user's mark and gray list user identifier, used according to black list user's mark and gray list
Family mark building grey black list data library.Specifically, black list user can be identified and gray list user identifier is put into grey black
In list data library, and saved respectively.It further, can also be related by other and correspondence user of corresponding user identifier
Information be also stored in grey black list data library.
In the present embodiment, identification exception record is obtained from history identification record, wherein each identification exception record packet
Include historical user's mark, Exception Type and the corresponding continuous abnormal number of each Exception Type;It is obtained and is corresponded to according to Exception Type
Target audit threshold value, target audit threshold value include blacklist threshold value and gray list threshold value;If identifying any in exception record
Continuous abnormal number meets corresponding blacklist threshold value, then the historical user's mark identified in exception record is determined as blacklist
User identifier;If any continuous abnormal number in identification exception record meets corresponding gray list threshold value and others are continuous different
Normal number does not meet corresponding blacklist threshold value, then the historical user's mark identified in exception record is determined as gray list and used
Family mark;Grey black list data library is constructed according to black list user's mark and gray list user identifier.Remembered by being identified to history
The processing of record constructs grey black list data library, ensure that the efficiency of standing audit.
In one embodiment, as shown in fig. 7, constructing grey black according to black list user's mark and gray list user identifier
After the step of list data library, standing checking method further includes following steps:
S61: obtaining target user's mark and each target user identifies corresponding user basic information.
Wherein, target user's mark is the corresponding user identifier of predeterminated target group, which can be different enterprises
The registration user of industry or platform.User basic information includes the need that may relate in loan audit or standing review process
The information relevant with user to be audited.Optionally, user basic information includes the identity information, assets information, income of user
Information, reference information, loan information, handheld device information, social account information, third-party platform consumption information or loan application
At least one of behavioural information etc..
S62: scoring to user basic information using preset rules, obtains the user base of each target user's mark
Scoring.
Wherein, preset rules are a pre-set standards of grading, which can be according to the need of actual product
It is configured, can also be counted to obtain according to historical data, can specifically set according to actual needs, herein no longer
It repeats.After being previously-completed the configuration of preset rules, which is stored in server-side.According to preset rules to
Family essential information scores to score to get to user base.It is alternatively possible to set one for each single item user basic information
Preset rules, to obtain more accurate user base scoring.
It illustratively, can be identity information if user basic information includes the identity information and assets information of user
Different preset rules are respectively set with assets information.For example, if identity information includes gender, occupation, age and physical condition.
It then can be respectively that different genders, occupation, age bracket and physical condition preset different score values, be marked further according to the user
Know corresponding identity information obtain corresponding score value and be overlapped to get arrive identity information score value.And assets are believed
Breath, then can preset different assets sections, the different corresponding score values in assets section is also different, then according to the user
The assets information of mark finds corresponding assets section, that is, gets the corresponding score value of assets information.Finally by identity information pair
The score value answered and assets information are directly or indirectly added one score value and are scored to get to user base.Among it
Ground connection, which is added, can be presented as in advance be that differently different weights is arranged in user basic information, by each user basic information
Score value is overlapped again later multiplied by corresponding weight.
S63: obtaining preset scoring threshold value, and scoring threshold value includes blacklist scoring threshold value and gray list scoring threshold value.
Scoring threshold value is preset score value, which can be numberical range or numerical intervals.Score threshold
Value includes blacklist scoring threshold value and gray list scoring threshold value.The threshold it is to be appreciated that blacklist scoring threshold value and gray list score
Value is different numerical value or different numerical intervals.
S64: if user base scoring meets blacklist scoring threshold value, corresponding user identifier is determined as to increase black name newly
Single user mark.
After step S62 obtains the user base scoring of each target user mark, by the scoring of each user base and
Blacklist scoring threshold value is compared, if user base scoring meets blacklist scoring threshold value, corresponding user identifier is true
It is set to newly-increased black list user's mark.Wherein, user base scoring meets blacklist scoring threshold value and refers to that user base scoring exists
In the range of blacklist scoring threshold value or in the numerical intervals of blacklist scoring threshold value.
S65: if user base scoring meets gray list scoring threshold value, corresponding user identifier is determined as newly-increased grey name
Single user mark.
After step S62 obtains the user base scoring of each target user mark, by the scoring of each user base and
Gray list scoring threshold value is compared, if user base scoring meets gray list scoring threshold value, corresponding user identifier is true
It is set to newly-increased gray list user identifier.Wherein, user base scoring meets gray list scoring threshold value and refers to that user base scoring exists
In the range of gray list scoring threshold value or in the numerical intervals of gray list scoring threshold value.
S66: grey black list data library is updated according to newly-increased black list user mark and newly-increased gray list user identifier.
After obtaining newly-increased black list user's mark and newly-increased gray list user identifier, marked according to newly-increased black list user
Know and newly-increased gray list user identifier updates grey black list data library.Black list user's mark will be increased newly and newly-increased gray list is used
Family mark is added in grey black list data library.
In the present embodiment, it identifies corresponding user by obtaining target user's mark and each target user and believes substantially
Breath;It is scored using preset rules user basic information, obtains the user base scoring of each target user's mark;It obtains
Preset scoring threshold value, scoring threshold value include blacklist scoring threshold value and gray list scoring threshold value;If user base scoring meets
Corresponding target user mark is then determined as newly-increased black list user's mark by blacklist scoring threshold value;If user base scores
Meet gray list scoring threshold value, then corresponding target user mark is determined as newly-increased gray list user identifier;It is black according to increasing newly
List user identifier and newly-increased gray list user identifier update grey black list data library.By user basic information come to grey black name
Single database is updated, and further enriches the data rich in grey black list data library, ensure that subsequent standing audit
Accuracy.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
In one embodiment, a kind of standing audit device is provided, which audits standing in device and above-described embodiment and examine
Kernel method corresponds.As shown in figure 8, standing audit device includes standing audit request module 10, user's standing number
According to obtaining, module 20, time judgment module 30, user's history verify data obtain module 40, user's history verify data verifies mould
Block 50 and standing msu message determining module 60.
Detailed description are as follows for each functional module:
Standing audits request module 10, and for obtaining standing audit request, standing audit request includes user identifier
And the application time;
User's standing data acquisition module 20, for being obtained from preset grey black list data library according to user identifier pair
The user's standing data answered, user's standing data include credit information and credit information corresponding renewal time;
Time judgment module 30, for judging whether the time interval of application time and renewal time are more than preset time threshold
Value;
User's history verify data obtains module 40, if being more than preset time threshold for time interval, according to user
Mark obtains the user's history verify data in preset time;
User's history verify data authentication module 50, for obtaining preset audit threshold set, according to audit threshold set pair
User's history verify data is verified, and the update credit information of user identifier is obtained;
Standing msu message determining module 60, the standing audit letter for being determined as user identifier for credit information will to be updated
Breath.
Preferably, user's history verify data includes Authentication-Type and the corresponding continuous authentication failed time of each Authentication-Type
Number;User's history verify data authentication module 50 includes Authentication-Type matched sub-block 51,52 and of match information acquisition submodule
It updates credit information and determines submodule 53.
Authentication-Type matched sub-block 51, for being obtained from the audit threshold set according to each Authentication-Type pair
The audit threshold value answered carries out each corresponding continuous authentication failed number of Authentication-Type and the corresponding audit threshold value
Matching, obtains matching result;
Match information acquisition submodule 52, the matching for obtaining each Authentication-Type according to the matching result are believed
Breath;
It updates credit information and determines submodule 53, for selecting priority from the match information of each Authentication-Type
The corresponding credit information of highest match information, the update credit information as the user identifier.
Preferably, Authentication-Type matched sub-block 51 includes that target audit threshold value determination unit and matching result obtain list
Member.
Target audits threshold value determination unit, for determining corresponding risk class according to Authentication-Type, and according to risk etc.
Grade obtains corresponding audit threshold value from audit threshold set, audits threshold value as target.
Matching result acquiring unit, for the corresponding continuous authentication failed number of each Authentication-Type and target to be audited threshold
Value is matched, and matching result is obtained.
Preferably, target audit threshold value includes blacklist threshold value and gray list threshold value.If matching result acquiring unit is used for
The corresponding continuous authentication failed number of any Authentication-Type meets corresponding blacklist threshold value, then the matching result of the Authentication-Type
For doubtful blacklist;If the corresponding continuous authentication failed number of any Authentication-Type meets corresponding gray list threshold value, this is tested
The matching result for demonstrate,proving type is doubtful gray list.
Preferably, standing audit device is also used to obtain identification exception record from history identification record, wherein each
Identification exception record includes historical user's mark, Exception Type and the corresponding continuous abnormal number of each Exception Type;According to different
Normal type obtains corresponding target and audits threshold value, and it includes blacklist threshold value and gray list threshold value that target, which audits threshold value,;If identifying different
Often any continuous abnormal number in record meets corresponding blacklist threshold value, then will identify that the historical user in exception record marks
Knowledge is determined as black list user's mark;If any continuous abnormal number in identification exception record meets corresponding gray list threshold value
And other continuous abnormal numbers do not meet corresponding blacklist threshold value, then will identify that the historical user in exception record identifies
It is determined as gray list user identifier;Grey black list data library is constructed according to black list user's mark and gray list user identifier.
Preferably, standing audit device is also used to obtain target user's mark and each target user identifies corresponding use
Family essential information;It is scored using preset rules user basic information, obtains the user base of each target user's mark
Scoring;Preset scoring threshold value is obtained, scoring threshold value includes blacklist scoring threshold value and gray list scoring threshold value;If user base
Scoring meets blacklist scoring threshold value, then corresponding user identifier is determined as newly-increased black list user's mark;If user base
Scoring meets gray list scoring threshold value, then corresponding user identifier is determined as newly-increased gray list user identifier;It is black according to increasing newly
List user identifier and newly-increased gray list user identifier update grey black list data library.
Preferably, standing audit device is also used to when the standing msu message of user identifier is black list user, then
Issue information warning.
Specific about standing audit device limits the restriction that may refer to above for standing checking method, herein not
It repeats again.Modules in above-mentioned standing audit device can be realized fully or partially through software, hardware and combinations thereof.On
Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 9.The computer equipment include by system bus connect processor, memory, network interface and
Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment
Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data
Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The database of machine equipment is for storing the data used in above-mentioned standing checking method.The network interface of the computer equipment is used
It is communicated in passing through network connection with external terminal.To realize a kind of standing audit side when the computer program is executed by processor
Method.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, processor perform the steps of when executing computer program
Standing audit request is obtained, the standing audit request includes user identifier and application time;
Corresponding user's standing data, the use are obtained from preset grey black list data library according to the user identifier
Family standing data include credit information and the credit information corresponding renewal time;
Whether the time interval for judging the application time and the renewal time is more than preset time threshold;
If the time interval is more than the preset time threshold, obtained in preset time according to the user identifier
User's history verify data;
Preset audit threshold set is obtained, the user's history verify data is tested according to the audit threshold set
Card, obtains the update credit information of the user identifier;
The update credit information is determined as to the standing msu message of the user identifier.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of when being executed by processor
Standing audit request is obtained, the standing audit request includes user identifier and application time;
Corresponding user's standing data, the use are obtained from preset grey black list data library according to the user identifier
Family standing data include credit information and the credit information corresponding renewal time;
Whether the time interval for judging the application time and the renewal time is more than preset time threshold;
If the time interval is more than the preset time threshold, obtained in preset time according to the user identifier
User's history verify data;
Preset audit threshold set is obtained, the user's history verify data is tested according to the audit threshold set
Card, obtains the update credit information of the user identifier;
The update credit information is determined as to the standing msu message of the user identifier.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (10)
1. a kind of standing checking method characterized by comprising
Standing audit request is obtained, the standing audit request includes user identifier and application time;
Corresponding user's standing data, user's money are obtained from preset grey black list data library according to the user identifier
Letter data includes credit information and the credit information corresponding renewal time;
Whether the time interval for judging the application time and the renewal time is more than preset time threshold;
If the time interval is more than the preset time threshold, the user in preset time is obtained according to the user identifier
History verify data;
Preset audit threshold set is obtained, the user's history verify data is verified according to the audit threshold set, is obtained
To the update credit information of the user identifier;
The update credit information is determined as to the standing msu message of the user identifier.
2. standing checking method as described in claim 1, which is characterized in that the user's history verify data includes verifying class
Type and the corresponding continuous authentication failed number of each Authentication-Type;
It is described that the user's history verify data is verified according to the audit threshold set, obtain the user identifier more
New credit information, specifically comprises the following steps:
Corresponding audit threshold value is obtained from the audit threshold set according to each Authentication-Type, by each verifying class
The corresponding continuous authentication failed number of type and the corresponding audit threshold value are matched, and matching result is obtained;
The match information of each Authentication-Type is obtained according to the matching result;
The corresponding credit information of match information that highest priority is selected from the match information of each Authentication-Type, as
The update credit information of the user identifier.
3. standing checking method as claimed in claim 2, which is characterized in that it is described according to each Authentication-Type from described
Corresponding audit threshold value is obtained in audit threshold set, by the corresponding continuous authentication failed number of each Authentication-Type and correspondence
The audit threshold value matched, obtain matching result, specifically comprise the following steps:
Corresponding risk class is determined according to the Authentication-Type, and is obtained from the audit threshold set according to the risk class
Corresponding audit threshold value is taken, audits threshold value as target;
Each corresponding continuous authentication failed number of Authentication-Type and target audit threshold value are matched, obtained
With result.
4. standing checking method as claimed in claim 3, which is characterized in that the target audit threshold value includes blacklist threshold value
With gray list threshold value;
It is described to match each corresponding continuous authentication failed number of Authentication-Type and target audit threshold value, it obtains
To matching result, specifically comprise the following steps:
If the corresponding continuous authentication failed number of any Authentication-Type meets the corresponding blacklist threshold value, described to test
The matching result for demonstrate,proving type is doubtful blacklist;
If the corresponding continuous authentication failed number of any Authentication-Type meets the corresponding gray list threshold value, described to test
The matching result for demonstrate,proving type is doubtful gray list.
5. standing checking method as described in claim 1, which is characterized in that it is described according to the user identifier from grey black name
Corresponding user's standing data are obtained in single database, user's standing data include credit information and the credit information pair
Before the step of renewal time answered, the standing checking method further includes following steps:
Identification exception record is obtained from history identification record, wherein each identification exception record includes historical user's mark
Knowledge, Exception Type and the corresponding continuous abnormal number of each Exception Type;
Corresponding target is obtained according to the Exception Type and audits threshold value, and the target audit threshold value includes blacklist threshold value and ash
Name single threshold;
If any continuous abnormal number in the identification exception record meets the corresponding blacklist threshold value, by institute
The historical user's mark stated in identification exception record is determined as black list user's mark;
If it is described identification exception record in any continuous abnormal number meet the corresponding gray list threshold value and other
Continuous abnormal number do not meet the corresponding blacklist threshold value, then by it is described identification exception record in historical user mark
Knowledge is determined as gray list user identifier;
Grey black list data library is constructed according to black list user mark and the gray list user identifier.
6. standing checking method as claimed in claim 5, which is characterized in that it is described according to the black list user mark and
After the step of gray list user identifier building grey black list data library, the standing checking method further includes walking as follows
It is rapid:
It obtains target user's mark and each target user identifies corresponding user basic information;
It is scored using preset rules the user basic information, obtains the user base of each target user's mark
Scoring;
Preset scoring threshold value is obtained, the scoring threshold value includes blacklist scoring threshold value and gray list scoring threshold value;
If the user base scoring meets the blacklist scoring threshold value, corresponding target user's mark is determined as
Newly-increased black list user's mark;
If the user base scoring meets the gray list scoring threshold value, corresponding target user's mark is determined as
The newly-increased gray list user identifier;
Grey black list data library is updated according to newly-increased black list user's mark and the newly-increased gray list user identifier.
7. standing checking method as described in claim 1, which is characterized in that be determined as the update credit information described
After the standing msu message of the user identifier, the standing checking method further include:
If the standing msu message of the user identifier is black list user, information warning is issued.
8. a kind of standing audits device characterized by comprising
Standing audits request module, for obtaining standing audit request, standing audit request include user identifier and
Application time;
User's standing data acquisition module, for obtaining correspondence from preset grey black list data library according to the user identifier
User's standing data, user's standing data include credit information and the credit information corresponding renewal time;
Time judgment module, for judging whether the time interval of the application time and the renewal time are more than preset time
Threshold value;
User's history verify data obtains module, if being more than the preset time threshold for the time interval, according to institute
State the user's history verify data in user identifier acquisition preset time;
User's history verify data authentication module, for obtaining preset audit threshold set, according to the audit threshold set to institute
It states user's history verify data to be verified, obtains the update credit information of the user identifier;
Standing msu message determining module, for the update credit information to be determined as to the standing audit letter of the user identifier
Breath.
9. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor
The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to
The step of any one of 7 standing checking method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In the step of realization standing checking method as described in any one of claim 1 to 7 when the computer program is executed by processor
Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811536984.XA CN109785116A (en) | 2018-12-14 | 2018-12-14 | Standing checking method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811536984.XA CN109785116A (en) | 2018-12-14 | 2018-12-14 | Standing checking method, device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109785116A true CN109785116A (en) | 2019-05-21 |
Family
ID=66497104
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811536984.XA Pending CN109785116A (en) | 2018-12-14 | 2018-12-14 | Standing checking method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109785116A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110288483A (en) * | 2019-05-22 | 2019-09-27 | 平安证券股份有限公司 | Account activating method, device, equipment and computer readable storage medium |
CN110673855A (en) * | 2019-09-29 | 2020-01-10 | 深圳无域科技技术有限公司 | Method and device for initiating credit worthiness request |
CN110796553A (en) * | 2019-08-22 | 2020-02-14 | 中国平安财产保险股份有限公司 | Service request processing method, device, terminal and storage medium |
CN111459961A (en) * | 2020-03-31 | 2020-07-28 | 深圳前海微众银行股份有限公司 | Method, device and equipment for updating service data and storage medium |
CN111586448A (en) * | 2020-01-20 | 2020-08-25 | 全息空间(深圳)智能科技有限公司 | Live broadcast platform anchor pre-screening method and device and storage medium |
CN111831953A (en) * | 2020-07-20 | 2020-10-27 | 汉海信息技术(上海)有限公司 | Data processing method, device, equipment and storage medium |
CN112581144A (en) * | 2020-12-16 | 2021-03-30 | 中国建设银行股份有限公司 | Credit certification data processing method, device and system |
CN113839962A (en) * | 2021-11-25 | 2021-12-24 | 阿里云计算有限公司 | User attribute determination method, apparatus, storage medium, and program product |
CN117874311A (en) * | 2024-01-31 | 2024-04-12 | 北京轻松怡康信息技术有限公司 | Blacklist management method, blacklist management device, electronic equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003054821A2 (en) * | 2001-09-18 | 2003-07-03 | General Electric Capital Corporation | Remote-on-the-spot credit processing |
KR20070028721A (en) * | 2005-09-07 | 2007-03-13 | 주식회사 이페이젠 | Credit card terminal including black list file therein and method for credit card settlement in the aircraft using the same |
CN108269186A (en) * | 2018-01-23 | 2018-07-10 | 平安好房(上海)电子商务有限公司 | User information verification method, device, equipment and readable storage medium storing program for executing |
WO2018214716A1 (en) * | 2017-05-25 | 2018-11-29 | 重庆小雨点小额贷款有限公司 | Method and apparatus for determining line of credit, server and readable storage medium |
-
2018
- 2018-12-14 CN CN201811536984.XA patent/CN109785116A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003054821A2 (en) * | 2001-09-18 | 2003-07-03 | General Electric Capital Corporation | Remote-on-the-spot credit processing |
KR20070028721A (en) * | 2005-09-07 | 2007-03-13 | 주식회사 이페이젠 | Credit card terminal including black list file therein and method for credit card settlement in the aircraft using the same |
WO2018214716A1 (en) * | 2017-05-25 | 2018-11-29 | 重庆小雨点小额贷款有限公司 | Method and apparatus for determining line of credit, server and readable storage medium |
CN108269186A (en) * | 2018-01-23 | 2018-07-10 | 平安好房(上海)电子商务有限公司 | User information verification method, device, equipment and readable storage medium storing program for executing |
Non-Patent Citations (2)
Title |
---|
聂规划, 过文骏: "我国中小企业的客户资信管理探讨", 武汉理工大学学报(信息与管理工程版), no. 04, 28 August 2003 (2003-08-28), pages 64 - 67 * |
齐春莹;张效严;: "企业及个人资信系统的技术实现", 科协论坛(下半月), no. 08, 25 August 2007 (2007-08-25), pages 3 - 5 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110288483A (en) * | 2019-05-22 | 2019-09-27 | 平安证券股份有限公司 | Account activating method, device, equipment and computer readable storage medium |
CN110288483B (en) * | 2019-05-22 | 2024-07-02 | 平安证券股份有限公司 | Account opening method, account opening device, account opening equipment and computer readable storage medium |
CN110796553A (en) * | 2019-08-22 | 2020-02-14 | 中国平安财产保险股份有限公司 | Service request processing method, device, terminal and storage medium |
CN110673855A (en) * | 2019-09-29 | 2020-01-10 | 深圳无域科技技术有限公司 | Method and device for initiating credit worthiness request |
CN110673855B (en) * | 2019-09-29 | 2023-05-12 | 深圳无域科技技术有限公司 | Method and device for initiating credit worthiness request |
CN111586448A (en) * | 2020-01-20 | 2020-08-25 | 全息空间(深圳)智能科技有限公司 | Live broadcast platform anchor pre-screening method and device and storage medium |
CN111459961A (en) * | 2020-03-31 | 2020-07-28 | 深圳前海微众银行股份有限公司 | Method, device and equipment for updating service data and storage medium |
CN111831953A (en) * | 2020-07-20 | 2020-10-27 | 汉海信息技术(上海)有限公司 | Data processing method, device, equipment and storage medium |
CN111831953B (en) * | 2020-07-20 | 2024-03-15 | 汉海信息技术(上海)有限公司 | Data processing method, device, equipment and storage medium |
CN112581144A (en) * | 2020-12-16 | 2021-03-30 | 中国建设银行股份有限公司 | Credit certification data processing method, device and system |
CN113839962A (en) * | 2021-11-25 | 2021-12-24 | 阿里云计算有限公司 | User attribute determination method, apparatus, storage medium, and program product |
CN117874311A (en) * | 2024-01-31 | 2024-04-12 | 北京轻松怡康信息技术有限公司 | Blacklist management method, blacklist management device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109785116A (en) | Standing checking method, device, computer equipment and storage medium | |
CN109829776B (en) | Merchant risk assessment method, device, computer equipment and storage medium | |
Hamill et al. | Evaluating information assurance strategies | |
US7761379B2 (en) | Mass compromise/point of compromise analytic detection and compromised card portfolio management system | |
US7620596B2 (en) | Systems and methods for evaluating financial transaction risk | |
CN109409641A (en) | Risk evaluating method, device, computer equipment and storage medium | |
US20070112667A1 (en) | System and method for providing a fraud risk score | |
CN109146662A (en) | A kind of risk control method and device | |
CN109508903B (en) | Risk assessment method, risk assessment device, computer equipment and storage medium | |
CN109522400B (en) | Nuclear protection method, device, computer equipment and storage medium | |
CN110348188B (en) | Core body checking method and device | |
CN110474871A (en) | A kind of exception account detection method, device, computer equipment and storage medium | |
CN109685643A (en) | Loan audit risk grade determines method, apparatus, equipment and storage medium | |
CN109615280A (en) | Employee's data processing method, device, computer equipment and storage medium | |
Lütkepohl et al. | Choosing between different time‐varying volatility models for structural vector autoregressive analysis | |
CN109509087A (en) | Intelligentized loan checking method, device, equipment and medium | |
US8515783B1 (en) | Risk assessment method | |
CN112419041A (en) | Risk monitoring method and device, storage medium and computer equipment | |
CN110728301A (en) | Credit scoring method, device, terminal and storage medium for individual user | |
Urunkar et al. | Fraud detection and analysis for insurance claim using machine learning | |
EP2693379A1 (en) | Risk-management device | |
Esakkiraj et al. | A predictive approach for fraud detection using hidden Markov model | |
US20210089979A1 (en) | Analytics system and method for a competitive vulnerability and customer and employee retention | |
KR102249028B1 (en) | System for Debt Repayment Capability Evaluation Of Corporation | |
Perry III et al. | Evaluating the systems engineering problem management process for industrial manufacturing problems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |