CN109816510A - Risk control method and device, storage medium, computer equipment - Google Patents
Risk control method and device, storage medium, computer equipment Download PDFInfo
- Publication number
- CN109816510A CN109816510A CN201811534286.6A CN201811534286A CN109816510A CN 109816510 A CN109816510 A CN 109816510A CN 201811534286 A CN201811534286 A CN 201811534286A CN 109816510 A CN109816510 A CN 109816510A
- Authority
- CN
- China
- Prior art keywords
- information
- user
- scoring
- assets
- default
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
This application discloses a kind of risk control method and device, storage medium, computer equipments, this method comprises: receiving user's application information, user's application information includes user basic information and user credit information;According to default essential information proof rule, user basic information is verified;If user basic information scores to user credit information according to credit information code of points by verifying;If the credit information scoring of user is greater than or equal to default credit scoring threshold value, the reference information of user is inquired according to user basic information;According to reference information code of points, score reference information;If the reference information scoring of user is greater than or equal to default reference scoring threshold value, user passes through risk control and audits.The application realizes the multistage risk prevention system in business application review process, can greatly reduce business risk, improves the efficiency of audit, reduces the interference from human factor of business application process, and standardize review process.
Description
Technical field
This application involves technical field of risk control, are situated between particularly with regard to a kind of risk control method and device, storage
Matter, computer equipment.
Background technique
Debt-credit is very big in today that market economy continues to develop as a kind of resourceful, flexible operation financing means
The contradiction for alleviating insufficient funds, promote expanding economy.During debt-credit, the control to risk is that debt-credit is able to
The key factor of sound development.
Currently, being directed to lender, that is, the risk control audit of loan applicant mainly passes through artificial mode or half
Artificial mode carries out.During risk audit, the excessive artificial reasonability for participating in effectively ensureing debt-credit, and
And debt-credit Review Cycle is too long.
Summary of the invention
In view of this, this application provides a kind of risk control method and device, storage medium, computer equipment, according to
The application information of user is borrowed or lent money, risk audit is carried out to user automatically, review efficiency and accuracy is improved, helps to reduce bad
Account risk.
According to the one aspect of the application, a kind of risk control method is provided characterized by comprising
User's application information is received, user's application information includes user basic information and user's assets information;
According to default essential information proof rule, the user basic information is verified;
If the user basic information believes user's assets according to assets information code of points is preset by verifying
Breath scores;
If the assets information scoring of the user is greater than or equal to default assets scoring threshold value, basic according to the user
Information inquires the reference information of the user;
According to default reference information code of points, score the reference information;
If the reference information scoring of the user is greater than or equal to default reference scoring threshold value, the user passes through risk
Control audit.
According to the another aspect of the application, a kind of risk control device is provided characterized by comprising
Application information receiving unit, for receiving user's application information, user's application information includes that user believes substantially
Breath and user's assets information;
Essential information authentication unit, for being carried out to the user basic information according to essential information proof rule is preset
Verifying;
Assets information scoring unit, if being commented by verifying according to default assets information for the user basic information
Divider then scores to user's assets information;
Reference information query unit, if the assets information scoring for the user is greater than or equal to default assets scoring threshold
Value, then inquire the reference information of the user according to the user basic information;
Reference information scoring unit, for scoring the reference information according to reference information code of points;
Risk control unit, if the reference information scoring for the user is greater than or equal to default reference scoring threshold value,
Then the user is audited by risk control.
According to the application another aspect, a kind of storage medium is provided, computer program, described program are stored thereon with
Above-mentioned risk control method is realized when being executed by processor.
According to the application another aspect, a kind of computer equipment is provided, including storage medium, processor and be stored in
On storage medium and the computer program that can run on a processor, the processor realize above-mentioned risk when executing described program
Control method.
By above-mentioned technical proposal, a kind of risk control method and device, storage medium, computer provided by the present application are set
It is standby, technical solution by applying this embodiment, firstly, the essential information of verifying user, it is ensured that the essential information that user provides
With its practical identities match;Secondly, being analyzed according to repaying ability of user's assets information to user, it is ensured that user is to its Shen
Please business have repaying ability;Finally, the reference information of calling and obtaining user, analyzes the repayment risk of user.The application realizes industry
Multistage risk prevention system in business application review process, can greatly reduce business risk, and with the risk control of automation
Audit improves the efficiency of audit, reduces the human factor of business application process instead of manual examination and verification in the prior art
Interference, makes business application review process more standardize.
Above description is only the general introduction of technical scheme, in order to better understand the technological means of the application,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects, features and advantages of the application can
It is clearer and more comprehensible, below the special specific embodiment for lifting the application.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 shows a kind of flow diagram of risk control method provided by the embodiments of the present application;
Fig. 2 shows the flow diagrams of another risk control method provided by the embodiments of the present application;
Fig. 3 shows a kind of structural schematic diagram of risk control device provided by the embodiments of the present application;
Fig. 4 shows the structural schematic diagram of another risk control device provided by the embodiments of the present application.
Specific embodiment
The application is described in detail below with reference to attached drawing and in conjunction with the embodiments.It should be noted that not conflicting
In the case of, the features in the embodiments and the embodiments of the present application can be combined with each other.
A kind of risk control method is provided in the present embodiment, as shown in Figure 1, this method comprises:
Step 101, user's application information is received, user's application information includes user basic information and user's assets letter
Breath.
It is illustrated for borrowing or lending money risk control in embodiments herein, includes basic letter in the application information of user
Breath and assets information, wherein essential information mainly includes the customer-furnished information for being able to demonstrate that user identity, and assets are believed
Breath then mainly includes the customer-furnished information for being able to demonstrate that itself repaying ability.
Step 102, according to default essential information proof rule, user basic information is verified.
Whether, according to preset essential information proof rule, whether the essential information for verifying user's offer is correct, and full
Foot application business corresponding default essential information proof rule, if alternative one judging result be no, then direct refusal user
Business application, such as the two judging result is to be, then the user passes through essential information and verifies, and guarantees safety of making loans.
It should be noted that different business can correspond to different application proof rules, therefore, user's application information is also
It may include application service code;Before being verified to user basic information, this method further include: according to application business generation
Code determines that user applies for the corresponding default essential information proof rule of business.In addition, presetting assets letter in following steps
Code of points, default reference information code of points etc. are ceased, can be determined by application service code, to take different business
Differentiation proof rule improves the accuracy of risk control.
Step 103, if user basic information believes user's assets according to assets information code of points is preset by verifying
Breath scores.
After user basic information is by verifying, according to preset assets information code of points, according to the assets of user
Information scores the repaying ability of user to obtain the scoring of user's assets information, so that people of the confirmation not to have not the ability to repay mentions
For loan transaction service, safety of making loans is ensured, reduce bad credit probability.
Step 104, basic according to user if the assets information scoring of user is greater than or equal to default assets scoring threshold value
The reference information of information inquiry user.
If the assets information scoring of user is greater than or equal to default assets scoring threshold value, illustrate what the user applied for it
Loan transaction has repaying ability, then inquires the reference information of the user, so that the credit situation of user is analyzed;And if
The assets information scoring of user is less than default assets scoring threshold value, illustrates that the loan transaction that the user applies for it does not have repayment
Ability then refuses the business application of the user, avoids generating bad credit, reduces enterprises' loss.
Step 105, it according to default reference information code of points, scores reference information.
According to preset reference information code of points, according to the history credit of the reference information analysis user of the user, example
Such as user and the violations in the business contact of other companies are analyzed, to show that the reference information of the user is commented
Point.
Step 106, if the reference information scoring of user is greater than or equal to default reference scoring threshold value, user passes through risk
Control audit.
If the reference information scoring of user is greater than or equal to default reference and scores threshold value, illustrate the history credit of user compared with
It is good, meet the standard of application business, then the user is audited by risk control, can be made loans to the user.
Technical solution by applying this embodiment, firstly, the essential information of verifying user, it is ensured that user provides basic
Information and its practical identities match;Secondly, being analyzed according to repaying ability of user's assets information to user, it is ensured that user couple
Its application business has repaying ability;Finally, the reference information of calling and obtaining user, analyzes the repayment risk of user.The application realizes
Multistage risk prevention system in business application review process, can greatly reduce business risk, and with the risk of automation
Control audit improves the efficiency of audit, reduces the artificial of business application process instead of manual examination and verification in the prior art
Factor interference, makes business application review process more standardize.
Further, as the refinement and extension of above-described embodiment specific embodiment, in order to completely illustrate the present embodiment
Specific implementation process, provide another risk control method, as shown in Fig. 2, this method comprises:
Step 201, user's application information is received, user's application information includes user basic information and user credit letter
Breath.
In the above-described embodiments, specifically, user basic information include age of user, name, ID card No. and
Phone number.
Step 202, whether the verifying age is in default the range of age.
Because application loan user must have certain revenue source, have the ability refunded in full amount on time, and not at
The income that year is not fixed, loan repayment capacity cause anxiety, and in order to ensure the smooth recycling of loan, enterprise will not usually give teenage human hair
Lending money.Determine since the judgement for the age belongs to cost free rule, and as not being inconsistent and normally directly can refuse user
Therefore business application is without, first verifying that the age of user in conjunction with other decision conditions in risk control review process
Whether in default the range of age, review efficiency is improved, reduces audit cost.
Step 203, if the age is in default the range of age, the corresponding surname of ID card No. is obtained from public security system
Name, and whether verify the name for including from the name and user basic information obtained in public security system consistent.
If the age of user is in default the range of age, whether quasi- the identity information that user provides further is verified
Really, specifically, whether the name that the corresponding name of ID card No. and user provided using public security system inquiry user is provided
Unanimously, if it is inconsistent, illustrate that user applies for that there are identity imitation behaviors in business procedure, then directly refuse the application of user.
Since the identity information verification to user need to only obtain corresponding name according to ID card No. from public security system
Information can be completed, and if not by the business application of identity information verification directly refusal user, without the information to acquisition
Secondary operation is carried out, needs to carry out the rule of secondary operation or bout compared to other, identity information verification belongs to low performance and disappears
Consumption rule verification, therefore, the step of identity information is verified, is placed on position more forward in risk control audit, improves audit
While efficiency, audit cost is also reduced.
Step 204, if unanimously, the corresponding ID card No. of phone number is obtained from communication common carrier system, and verify
Whether the ID card No. for including from the ID card No. and user basic information obtained in communication common carrier system is consistent.
If subscriber identity information by verification, further verifies whether the phone number that user provides is demonstrate,proved with user identity
Number matches, and specifically, the corresponding ID card No. of phone number is obtained from communication common carrier system, compares the identification card number
Whether code and the ID card No. that user provides are consistent, if inconsistent, illustrating user, there are communication mode imitation behaviors, then directly
Connect the business application of refusal user.Similar to the proof of identity rule of step 203, the verification rule of phone number also belongs to low property
Rule can be consumed, and the rule that can not refused an application directly by verification, the sequencing of step 203 and step 204 can be adjusted
It changes.
Step 205, if whether unanimously, being verified in blacklist library according to ID card No. includes user, if not including,
User basic information passes through verifying.
Specifically, blacklist library includes local blacklist library and main strategies blacklist library;Step 205 is specifically wrapped
Include: whether according to ID card No., successively verifying in local blacklist library and main strategies blacklist library includes user, if
User is not included in local blacklist library and main strategies blacklist library, then user basic information passes through verifying.
If user further inquires whether the user has been cited as blacklist use by the verification of above-mentioned each step
The black of user is specifically successively inquired according to ID card No. in family in local blacklist library and main strategies blacklist library
List information directly refuses the use if can get the black list information of the user in any one blacklist library
The business application at family, and if all blacklists not comprising the user are believed in local blacklist library and main strategies blacklist library
Breath, then the user is verified by essential information.
It should be noted that the inquiry in local blacklist library does not need payment inquiry expense, and in main strategies
Blacklist inquires black list information in library, if hit (inquiring the corresponding black list information of ID card No.) needs to pay
Therefore inquiry expense first inquires local blacklist library, rear to inquire main strategies blacklist library.
In any of the above-described embodiment, specifically, user's assets information includes the intrinsic assets information and income of user
Information.
The assets information of user includes intrinsic assets information and income information two parts, and intrinsic assets information may include using
The house property at family, deposit, insurance, stock etc., income information mainly includes the fixed income of user monthly or every year.
Step 206, it according to intrinsic assets information code of points is preset, scores intrinsic assets information.
It according to intrinsic assets information code of points is preset, scores the intrinsic assets information of user, guarantees user such as
Fruit cannot repay the loan on time, can also recall a loan in such a way that the assets to the user are disposed, and reduce bad credit.Example
If user applies for loan 200,000, the intrinsic assets value of user is 900,000, and code of points is that intrinsic assets value is greater than or equal to
Apply for that then scoring is 10 points to the amount of the loan 5 again, intrinsic assets value is greater than or equal to the application amount of the loan 4, and then scoring is 8 points again,
The intrinsic assets information scoring of so user is 8 points.
Step 207, it according to default income information code of points, scores income information.
After calculating intrinsic assets information scoring, carried out according to income information of the default income information code of points to the user
Analysis obtains income information scoring, further increases lending safety.Such as apply for that business is obtained and should monthly be refunded according to user
5000 yuan, the monthly income of user is 8000 yuan, and code of points is that monthly income is greater than or equal to amount of monthly repayment 2 then scoring is 10 again
Point, monthly income is greater than or equal to amount of monthly repayment 1.5, and then scoring is 7 points again, then the income information scoring of the user is 7 points.
Step 208, the assets information scoring that information scoring calculates user is scored and taken according to intrinsic assets information.
Whether user, which has the ability, is repaid the loan, and is determined by the intrinsic assets of user and the two aspect factor of income of user
, therefore score and take in information scoring according to intrinsic assets information and score to calculate the assets information of user, it specifically, can be with
The average value of intrinsic assets information scoring with income information scoring is calculated, or the scoring of this two parts is assigned according to actual needs
Power for example, the unemployment rate of this area is higher, then can increase intrinsic assets information so that weighted sum show that assets information scores
Score weight, reduces income information scoring weight, for another example this area's brain drain situation is more serious, permanent resident population is year by year
It reduces, then reduces intrinsic assets information scoring weight, increase income information scoring weight.If assets information scoring is less than default
Assets scoring threshold value, then directly refuse the business application of user, to improve safety of making loans;And if assets information scoring be greater than or
Equal to default assets scoring threshold value, then passes through assets information and audit.
It should be noted that assets information audit is audited compared to essential information, need to carry out user information secondary add
Work and converge, then the total value converged judged, thus assets information audit step should after essential information audits step,
To provide review efficiency.
Step 209, basic according to user if the assets information scoring of user is greater than or equal to default assets scoring threshold value
The reference information of information inquiry user.
If the assets information scoring of user is greater than or equal to default assets scoring threshold value, illustrate that user is believed by assets
Breath audit, then further the reference report of inquiry user reinforces safety of making loans so that the reference information to user is audited
Property.Since reference report need to be obtained from main strategies system, and query formulation road-toll principle is usually taken in main strategies system,
Therefore inquiry expense is saved in the audit Ying Hou set to reference information.
Step 210, it according to reference information code of points, scores reference information.
After essential information audit and assets information audit, in order to further ensure that later period refund safety, avoid to letter
It is made loans with High risk group (such as " Lao Lai " user), it is also necessary to the reference information of user be audited, specially according to reference
Information code of points gives a mark to reference information.
Step 211, if the reference information scoring of user is greater than or equal to default reference scoring threshold value, user passes through risk
Control audit.
If the scoring of user's reference information is greater than or equal to default reference scoring threshold value, illustrate essential information, the assets of user
Information and reference information all meet loan transaction condition, then the user is audited by risk control, can be to user and work people
Member's output provides a user financial service by prompt information.
Step 212, if the scoring of reference information is less than default reference scoring threshold value and is greater than or equal to default review reference
Score threshold value, then exports review prompt information.
If the scoring of user's reference information is scored between threshold value and default reference scoring threshold value in default review reference, export
Review prompt information increases risk control to prompt staff that can carry out artificial or other modes reviews to the user
The fault-tolerance of system reduces business turnover rate.
Step 213, if the scoring of reference information is less than default review reference scoring threshold value, refuse the business application of user.
If the reference information scoring of user is less than default review reference scoring threshold value, illustrate that user is unsatisfactory for business application slip
Part is also unsatisfactory for review condition, then directly refuses the business application of user, it is ensured that lending service security.
It should be noted that in the step of above-mentioned essential information audit, assets information audit and reference signal auditing, this
Field technical staff can according to actual needs increase audit project, reduce or change sequence, such as increase to user
The audit of " sesame credit " scoring, phone number are using audit etc. of time, but adjustment should meet following principle: the
One, the audit of cost free or low cost is prior to high-cost audit, such as to the audit of user's assets information prior to reference
The audit of information;Second, it is preferential prior to the audit of external rules, such as own local blacklist library from well-regulated audit
It is audited in external blacklist library;Third, the audit that the audit of low performance consumption is consumed prior to high-performance, such as to user year
Audit of the audit in age prior to ID card No..
Step 214, if user is by the way that there are violations after risk control audit, according to user's application information and sign
Letter information updates essential information proof rule, credit information code of points and reference information code of points.
In the post-loan management to user, there are the user informations of violations (being predominantly late for refunding) for collection, and
These users are analyzed, in the characteristic of this certain customers, such as promise breaking user 80% subscriber phone number use is concluded
Time is no more than 6 months, then can increase the audit for using phone number the time, in air control audit to improve business
Safety.
Technical solution by applying this embodiment, in the review process of business application, by user basic information,
The multistage auditing of assets information and reference information, greatly reduces business risk, reduces human intervention, improves audit
Efficiency, and the relevant information of promise breaking user is collected and is analyzed, to optimize risk auditing system, facilitates risk and examine
The gradual perfection of core.
Further, the specific implementation as Fig. 1 method, the embodiment of the present application provide a kind of risk control device, such as
Shown in Fig. 3, the device include: application information receiving unit 31, essential information authentication unit 32, assets information scoring unit 33,
Reference information query unit 34, reference information scoring unit 35, risk control unit 36.
Application information receiving unit 31, for receiving user's application information, user's application information includes user basic information
And user's assets information;
Essential information authentication unit 32, for testing user basic information according to essential information proof rule is preset
Card;
Assets information scoring unit 33, if for user basic information by verifying, according to default assets information scoring
Rule scores to user credit assets;
Reference information query unit 34, if the assets information scoring for user is greater than or equal to default assets scoring threshold
Value then inquires the reference information of user according to user basic information;
Reference information scoring unit 35, for scoring reference information according to reference information code of points is preset;
Risk control unit 36, if the reference information scoring for user is greater than or equal to default reference scoring threshold value,
User is audited by risk control.
In the above-described embodiments, specifically, user basic information include age of user, name, ID card No. and
Phone number.
In specific application scenarios, as shown in figure 4, essential information authentication unit 32, specifically includes: age verification unit
321, identity authenticating unit 322, authentication unit 323, blacklist authentication unit 324.
Age verification unit 321, for verifying whether the age is in default the range of age;
Identity authenticating unit 322 obtains identity card if being in default the range of age for the age from public security system
The corresponding name of number, and verify include from the name and user basic information obtained in public security system name whether one
It causes;
Authentication unit 323, if obtaining the corresponding identity card of phone number from communication common carrier system for consistent
Number, and the ID card No. that verification includes from the ID card No. and user basic information obtained in communication common carrier system is
It is no consistent;
Blacklist authentication unit 324, if whether being verified in blacklist library according to ID card No. comprising using for consistent
Family, if not including, user basic information passes through verifying.
In the above-described embodiments, specifically, blacklist library includes local blacklist library and main strategies blacklist library;
Blacklist authentication unit 324 is specifically used for according to ID card No., successively verifies local blacklist library and main strategies are black
It whether include user in list library, if not including user, user in local blacklist library and main strategies blacklist library
Essential information passes through verifying.
In the above-described embodiments, specifically, user's assets information includes the intrinsic assets information and income information of user.
In specific application scenarios, the unit 33 as shown in figure 4, assets information scores is specifically included: intrinsic assets information
Score unit 331, income information scoring unit 332, assets information scoring subelement 333.
Intrinsic assets information scoring unit 331, for believing intrinsic assets according to intrinsic assets information code of points is preset
Breath scores;
Information scoring unit 332 is taken in, for scoring information is taken according to default income information code of points;
Credit information scoring subelement 333 is used for information scoring calculating to be scored and taken according to intrinsic assets information
The assets at family score.
In specific application scenarios, as shown in figure 4, risk control unit 36, is less than if being also used to the scoring of reference information
It presets reference scoring threshold value and is greater than or equal to default review reference scoring, then export review prompt information;If reference information
Scoring is less than default review reference scoring, then refuses the business application of user.
In specific application scenarios, as shown in figure 4, the device further include: Policy Updates unit 37.
Policy Updates unit 37, if there are violations after being audited for user by risk control, according to user Shen
Please information and reference information, update essential information proof rule, credit information code of points and reference information code of points.
It should be noted that other of each functional unit involved by a kind of risk control device provided by the embodiments of the present application
Corresponding description, can be with reference to the corresponding description in Fig. 1 and Fig. 2, and details are not described herein.
Based on above-mentioned method as depicted in figs. 1 and 2, correspondingly, the embodiment of the present application also provides a kind of storage medium,
On be stored with computer program, which realizes above-mentioned risk control method as depicted in figs. 1 and 2 when being executed by processor.
Based on this understanding, the technical solution of the application can be embodied in the form of software products, which produces
Product can store in a non-volatile memory medium (can be CD-ROM, USB flash disk, mobile hard disk etc.), including some instructions
With so that computer equipment (can be personal computer, server or the network equipment an etc.) execution the application is each
Method described in implement scene.
Based on above-mentioned method as shown in Figure 1 and Figure 2 and Fig. 3, virtual bench embodiment shown in Fig. 4, in order to realize
Above-mentioned purpose, the embodiment of the present application also provides a kind of computer equipments, are specifically as follows personal computer, server, network
Equipment etc., the computer equipment include storage medium and processor;Storage medium, for storing computer program;Processor is used
In execution computer program to realize above-mentioned risk control method as depicted in figs. 1 and 2.
Optionally, which can also include user interface, network interface, camera, radio frequency (Radio
Frequency, RF) circuit, sensor, voicefrequency circuit, WI-FI module etc..User interface may include display screen
(Display), input unit such as keyboard (Keyboard) etc., optional user interface can also connect including USB interface, card reader
Mouthful etc..Network interface optionally may include standard wireline interface and wireless interface (such as blue tooth interface, WI-FI interface).
It will be understood by those skilled in the art that a kind of computer equipment structure provided in this embodiment is not constituted to the meter
The restriction for calculating machine equipment, may include more or fewer components, perhaps combine certain components or different component layouts.
It can also include operating system, network communication module in storage medium.Operating system is management and preservation computer
The program of device hardware and software resource supports the operation of message handling program and other softwares and/or program.Network communication
Module is for realizing the communication between each component in storage medium inside, and between other hardware and softwares in the entity device
Communication.
Through the above description of the embodiments, those skilled in the art can be understood that the application can borrow
Help software that the mode of necessary general hardware platform is added to realize, it can also be by hardware realization firstly, verifying user's is basic
Information, it is ensured that the essential information and its practical identities match that user provides;Secondly, the repayment according to user's assets information to user
Ability is analyzed, it is ensured that user applies for that business has repaying ability to it;Finally, the reference information of calling and obtaining user, analysis is used
The repayment risk at family.The application realizes the multistage risk prevention system in business application review process, can greatly reduce business
Risk, and audited with the risk control of automation instead of manual examination and verification in the prior art, the efficiency of audit is improved, is subtracted
The interference from human factor for having lacked business application process makes business application review process more standardize.
It will be appreciated by those skilled in the art that the accompanying drawings are only schematic diagrams of a preferred implementation scenario, module in attached drawing or
Process is not necessarily implemented necessary to the application.It will be appreciated by those skilled in the art that the mould in device in implement scene
Block can according to implement scene describe be distributed in the device of implement scene, can also carry out corresponding change be located at be different from
In one or more devices of this implement scene.The module of above-mentioned implement scene can be merged into a module, can also be into one
Step splits into multiple submodule.
Above-mentioned the application serial number is for illustration only, does not represent the superiority and inferiority of implement scene.Disclosed above is only the application
Several specific implementation scenes, still, the application is not limited to this, and the changes that any person skilled in the art can think of is all
The protection scope of the application should be fallen into.
Claims (10)
1. a kind of risk control method characterized by comprising
User's application information is received, user's application information includes user basic information and user's assets information;
According to default essential information proof rule, the user basic information is verified;
If the user basic information by verifying, according to preset assets information code of points to user's assets information into
Row scoring;
If the assets information scoring of the user is greater than or equal to default assets scoring threshold value, according to the user basic information
Inquire the reference information of the user;
According to default reference information code of points, score the reference information;
If the reference information scoring of the user is greater than or equal to default reference scoring threshold value, the user passes through risk control
Audit.
2. the method according to claim 1, wherein the user basic information include the user age,
Name, ID card No. and phone number;
The basis presets essential information proof rule, verifies, specifically includes to the user basic information:
Verify whether the age is in default the range of age;
If the age is in described default the range of age, the corresponding surname of the ID card No. is obtained from public security system
Name, and verify include from the name that is obtained in the public security system and the user basic information the name whether
Unanimously;
If consistent, the corresponding ID card No. of the phone number is obtained from communication common carrier system, and is verified from described logical
Whether the ID card No. for including in the ID card No. and the user basic information obtained in letter Corporation system
Unanimously;
If consistent, whether include the user, described if not including if being verified in blacklist library according to the ID card No.
User basic information passes through verifying.
3. according to the method described in claim 2, it is characterized in that, the blacklist library includes local blacklist library and third
Fang Zhengxin blacklist library;
It is described the user is verified according to the ID card No. to whether there is in blacklist library, if it does not exist, then the use
Family essential information is specifically included by verifying:
According to the ID card No., successively verifying in the local blacklist library and main strategies blacklist library is
No includes the user, if not including the user in the local blacklist library and main strategies blacklist library,
Then the user basic information passes through verifying.
4. the method according to claim 1, wherein user's assets information includes the intrinsic assets letter of user
Breath and income information;
The basis presets assets information code of points and scores user's assets information, specifically includes:
According to intrinsic assets information code of points is preset, score the intrinsic assets information;
According to default income information code of points, score the income information;
The assets information scoring of the user is calculated according to the intrinsic assets information scoring and the income information scoring.
5. method according to claim 1 to 4, which is characterized in that the basis presets the scoring of reference information
Rule, after scoring the reference information, the method also includes:
If the reference information scoring is less than the default reference scoring threshold value and is greater than or equal to default review reference scoring
Threshold value then exports review prompt information;
If the reference information scoring is less than the default review reference scoring threshold value, refuse the business application of the user.
6. the method according to claim 1, wherein the method also includes:
If after the user is audited by risk control, there are violations, according to user's application information and the sign
Letter information updates the essential information proof rule, the credit information code of points and the reference information code of points.
7. a kind of risk control device characterized by comprising
Application information receiving unit, for receiving user's application information, user's application information include user basic information with
And user's assets information;
Essential information authentication unit, for being verified to the user basic information according to essential information proof rule is preset;
Assets information scoring unit, if for the user basic information by verifying, according to default assets information scoring rule
Then score user's assets information;
Reference information query unit, if the assets information scoring for the user is greater than or equal to default assets scoring threshold value,
The reference information of the user is then inquired according to the user basic information;
Reference information scoring unit, for scoring the reference information according to reference information code of points;
Risk control unit, if the reference information scoring for the user is greater than or equal to default reference scoring threshold value, institute
User is stated to audit by risk control.
8. device according to claim 7, which is characterized in that the user basic information include the user age,
Name, ID card No. and phone number;
Essential information authentication unit, specifically includes:
Age verification unit, for verifying whether the age is in default the range of age;
Identity authenticating unit, if being in described default the range of age for the age, from public security system described in acquisition
The corresponding name of ID card No., and verify from the name and the user basic information obtained in the public security system
Whether the name for including is consistent;
Authentication unit, if obtaining the corresponding identification card number of the phone number from communication common carrier system for consistent
Code, and verify the institute for including from the ID card No. and the user basic information obtained in the communication common carrier system
Whether consistent state ID card No.;
Blacklist authentication unit, if whether being verified in blacklist library according to the ID card No. comprising described for consistent
User, if not including, the user basic information passes through verifying.
9. a kind of storage medium, is stored thereon with computer program, which is characterized in that realization when described program is executed by processor
Risk control method described in any one of claims 1 to 6.
10. a kind of computer equipment, including storage medium, processor and storage can be run on a storage medium and on a processor
Computer program, which is characterized in that the processor is realized described in any one of claims 1 to 6 when executing described program
Risk control method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811534286.6A CN109816510A (en) | 2018-12-14 | 2018-12-14 | Risk control method and device, storage medium, computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811534286.6A CN109816510A (en) | 2018-12-14 | 2018-12-14 | Risk control method and device, storage medium, computer equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109816510A true CN109816510A (en) | 2019-05-28 |
Family
ID=66602009
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811534286.6A Pending CN109816510A (en) | 2018-12-14 | 2018-12-14 | Risk control method and device, storage medium, computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109816510A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110555762A (en) * | 2019-08-27 | 2019-12-10 | 上海易点时空网络有限公司 | Blacklist data processing method and device and big data loan platform optimization method |
CN110766275A (en) * | 2019-09-18 | 2020-02-07 | 平安银行股份有限公司 | Data verification method and device, computer equipment and storage medium |
CN111242773A (en) * | 2020-01-16 | 2020-06-05 | 深圳壹账通智能科技有限公司 | Virtual resource application docking method and device, computer equipment and storage medium |
CN111709709A (en) * | 2020-06-11 | 2020-09-25 | 深圳联横合纵科技有限公司 | Information processing method, system and computer equipment based on warranty service |
CN111861732A (en) * | 2020-07-31 | 2020-10-30 | 重庆富民银行股份有限公司 | Risk assessment system and method |
CN112446706A (en) * | 2020-11-09 | 2021-03-05 | 宿州职业技术学院 | Electronic commerce linkage payment method for old users |
CN112686036A (en) * | 2020-08-18 | 2021-04-20 | 平安国际智慧城市科技股份有限公司 | Risk text recognition method and device, computer equipment and storage medium |
CN113077272A (en) * | 2020-01-03 | 2021-07-06 | 中国移动通信集团广东有限公司 | Communication service marketing plan optimization method and device |
CN113743914A (en) * | 2020-05-27 | 2021-12-03 | 北京金山云网络技术有限公司 | Client identity authentication method, device, equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105956919A (en) * | 2016-04-28 | 2016-09-21 | 中国建设银行股份有限公司 | Business data application evaluation method and device |
CN106056445A (en) * | 2016-05-27 | 2016-10-26 | 上海优走信息科技有限公司 | Loan system, loan information display method and system, and loan information processing method and system |
CN107392451A (en) * | 2017-07-11 | 2017-11-24 | 重庆卡西匚匚科技有限公司 | A kind of risk control system |
CN107437223A (en) * | 2017-08-17 | 2017-12-05 | 重庆小雨点小额贷款有限公司 | Credit information checking method, device and equipment |
CN107748952A (en) * | 2017-10-09 | 2018-03-02 | 深圳广联赛讯有限公司 | Prestige checking method, device and storage medium based on consumer's risk control |
-
2018
- 2018-12-14 CN CN201811534286.6A patent/CN109816510A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105956919A (en) * | 2016-04-28 | 2016-09-21 | 中国建设银行股份有限公司 | Business data application evaluation method and device |
CN106056445A (en) * | 2016-05-27 | 2016-10-26 | 上海优走信息科技有限公司 | Loan system, loan information display method and system, and loan information processing method and system |
CN107392451A (en) * | 2017-07-11 | 2017-11-24 | 重庆卡西匚匚科技有限公司 | A kind of risk control system |
CN107437223A (en) * | 2017-08-17 | 2017-12-05 | 重庆小雨点小额贷款有限公司 | Credit information checking method, device and equipment |
CN107748952A (en) * | 2017-10-09 | 2018-03-02 | 深圳广联赛讯有限公司 | Prestige checking method, device and storage medium based on consumer's risk control |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110555762A (en) * | 2019-08-27 | 2019-12-10 | 上海易点时空网络有限公司 | Blacklist data processing method and device and big data loan platform optimization method |
CN110766275A (en) * | 2019-09-18 | 2020-02-07 | 平安银行股份有限公司 | Data verification method and device, computer equipment and storage medium |
CN113077272A (en) * | 2020-01-03 | 2021-07-06 | 中国移动通信集团广东有限公司 | Communication service marketing plan optimization method and device |
CN113077272B (en) * | 2020-01-03 | 2023-07-21 | 中国移动通信集团广东有限公司 | Communication business marketing scheme optimization method and device |
CN111242773A (en) * | 2020-01-16 | 2020-06-05 | 深圳壹账通智能科技有限公司 | Virtual resource application docking method and device, computer equipment and storage medium |
CN113743914A (en) * | 2020-05-27 | 2021-12-03 | 北京金山云网络技术有限公司 | Client identity authentication method, device, equipment and storage medium |
CN111709709A (en) * | 2020-06-11 | 2020-09-25 | 深圳联横合纵科技有限公司 | Information processing method, system and computer equipment based on warranty service |
CN111861732A (en) * | 2020-07-31 | 2020-10-30 | 重庆富民银行股份有限公司 | Risk assessment system and method |
CN112686036A (en) * | 2020-08-18 | 2021-04-20 | 平安国际智慧城市科技股份有限公司 | Risk text recognition method and device, computer equipment and storage medium |
CN112686036B (en) * | 2020-08-18 | 2022-04-01 | 平安国际智慧城市科技股份有限公司 | Risk text recognition method and device, computer equipment and storage medium |
CN112446706A (en) * | 2020-11-09 | 2021-03-05 | 宿州职业技术学院 | Electronic commerce linkage payment method for old users |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109816510A (en) | Risk control method and device, storage medium, computer equipment | |
US11321783B2 (en) | Method and device for data processing based on blockchain | |
Miller et al. | Complementary components and returns from coordination within ecosystems via standard setting | |
CN107317672A (en) | A kind of light weight terminating machine block catenary system | |
CN104966229A (en) | Information processing method and credit platform | |
CN109783581A (en) | Right management method, device, electronic equipment and storage medium | |
CN104680361A (en) | Enchashment method and system based on third-party platform | |
US9460430B1 (en) | System, method and apparatus for conducting secure transaction over a call | |
CN105787794A (en) | System and method based on consumption load service management mode | |
CN111461857A (en) | Personal online credit method, device, system, equipment and medium for small and medium-sized banks | |
US20120089404A1 (en) | Global pricing for content distribution | |
CN107748952A (en) | Prestige checking method, device and storage medium based on consumer's risk control | |
CN109670968A (en) | Processing method, device, equipment and the computer storage medium of insurance data | |
CN107967607A (en) | A kind of processing method, device, server and the storage medium of transaction credit amount | |
CN110533521A (en) | Method for early warning, device, equipment and readable storage medium storing program for executing after dynamic is borrowed | |
US20020035479A1 (en) | Access contract changing method for automatically changing an access contract between a prepaid contract and a postpaid contract | |
CN110363644A (en) | Exception information recognition methods, device, computer equipment and storage medium | |
CN107798536A (en) | Credit line treating method and apparatus | |
CN108510386A (en) | A kind of network loan system, method, terminal and medium | |
CN112150145A (en) | Game account transaction method, system and equipment | |
CN109785107B (en) | Method for flexibly configuring fund duty ratio and related products | |
CN108416662A (en) | A kind of data verification method and device | |
CN115983985A (en) | Refined credit line management method | |
CN111882323B (en) | User financing risk control method and device based on cloud service lease | |
CN109636576A (en) | Processing method, device, equipment and the storage medium of credit data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |