CN109816510A - Risk control method and device, storage medium, computer equipment - Google Patents

Risk control method and device, storage medium, computer equipment Download PDF

Info

Publication number
CN109816510A
CN109816510A CN201811534286.6A CN201811534286A CN109816510A CN 109816510 A CN109816510 A CN 109816510A CN 201811534286 A CN201811534286 A CN 201811534286A CN 109816510 A CN109816510 A CN 109816510A
Authority
CN
China
Prior art keywords
information
user
scoring
assets
default
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811534286.6A
Other languages
Chinese (zh)
Inventor
王俊涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201811534286.6A priority Critical patent/CN109816510A/en
Publication of CN109816510A publication Critical patent/CN109816510A/en
Pending legal-status Critical Current

Links

Abstract

This application discloses a kind of risk control method and device, storage medium, computer equipments, this method comprises: receiving user's application information, user's application information includes user basic information and user credit information;According to default essential information proof rule, user basic information is verified;If user basic information scores to user credit information according to credit information code of points by verifying;If the credit information scoring of user is greater than or equal to default credit scoring threshold value, the reference information of user is inquired according to user basic information;According to reference information code of points, score reference information;If the reference information scoring of user is greater than or equal to default reference scoring threshold value, user passes through risk control and audits.The application realizes the multistage risk prevention system in business application review process, can greatly reduce business risk, improves the efficiency of audit, reduces the interference from human factor of business application process, and standardize review process.

Description

Risk control method and device, storage medium, computer equipment
Technical field
This application involves technical field of risk control, are situated between particularly with regard to a kind of risk control method and device, storage Matter, computer equipment.
Background technique
Debt-credit is very big in today that market economy continues to develop as a kind of resourceful, flexible operation financing means The contradiction for alleviating insufficient funds, promote expanding economy.During debt-credit, the control to risk is that debt-credit is able to The key factor of sound development.
Currently, being directed to lender, that is, the risk control audit of loan applicant mainly passes through artificial mode or half Artificial mode carries out.During risk audit, the excessive artificial reasonability for participating in effectively ensureing debt-credit, and And debt-credit Review Cycle is too long.
Summary of the invention
In view of this, this application provides a kind of risk control method and device, storage medium, computer equipment, according to The application information of user is borrowed or lent money, risk audit is carried out to user automatically, review efficiency and accuracy is improved, helps to reduce bad Account risk.
According to the one aspect of the application, a kind of risk control method is provided characterized by comprising
User's application information is received, user's application information includes user basic information and user's assets information;
According to default essential information proof rule, the user basic information is verified;
If the user basic information believes user's assets according to assets information code of points is preset by verifying Breath scores;
If the assets information scoring of the user is greater than or equal to default assets scoring threshold value, basic according to the user Information inquires the reference information of the user;
According to default reference information code of points, score the reference information;
If the reference information scoring of the user is greater than or equal to default reference scoring threshold value, the user passes through risk Control audit.
According to the another aspect of the application, a kind of risk control device is provided characterized by comprising
Application information receiving unit, for receiving user's application information, user's application information includes that user believes substantially Breath and user's assets information;
Essential information authentication unit, for being carried out to the user basic information according to essential information proof rule is preset Verifying;
Assets information scoring unit, if being commented by verifying according to default assets information for the user basic information Divider then scores to user's assets information;
Reference information query unit, if the assets information scoring for the user is greater than or equal to default assets scoring threshold Value, then inquire the reference information of the user according to the user basic information;
Reference information scoring unit, for scoring the reference information according to reference information code of points;
Risk control unit, if the reference information scoring for the user is greater than or equal to default reference scoring threshold value, Then the user is audited by risk control.
According to the application another aspect, a kind of storage medium is provided, computer program, described program are stored thereon with Above-mentioned risk control method is realized when being executed by processor.
According to the application another aspect, a kind of computer equipment is provided, including storage medium, processor and be stored in On storage medium and the computer program that can run on a processor, the processor realize above-mentioned risk when executing described program Control method.
By above-mentioned technical proposal, a kind of risk control method and device, storage medium, computer provided by the present application are set It is standby, technical solution by applying this embodiment, firstly, the essential information of verifying user, it is ensured that the essential information that user provides With its practical identities match;Secondly, being analyzed according to repaying ability of user's assets information to user, it is ensured that user is to its Shen Please business have repaying ability;Finally, the reference information of calling and obtaining user, analyzes the repayment risk of user.The application realizes industry Multistage risk prevention system in business application review process, can greatly reduce business risk, and with the risk control of automation Audit improves the efficiency of audit, reduces the human factor of business application process instead of manual examination and verification in the prior art Interference, makes business application review process more standardize.
Above description is only the general introduction of technical scheme, in order to better understand the technological means of the application, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects, features and advantages of the application can It is clearer and more comprehensible, below the special specific embodiment for lifting the application.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 shows a kind of flow diagram of risk control method provided by the embodiments of the present application;
Fig. 2 shows the flow diagrams of another risk control method provided by the embodiments of the present application;
Fig. 3 shows a kind of structural schematic diagram of risk control device provided by the embodiments of the present application;
Fig. 4 shows the structural schematic diagram of another risk control device provided by the embodiments of the present application.
Specific embodiment
The application is described in detail below with reference to attached drawing and in conjunction with the embodiments.It should be noted that not conflicting In the case of, the features in the embodiments and the embodiments of the present application can be combined with each other.
A kind of risk control method is provided in the present embodiment, as shown in Figure 1, this method comprises:
Step 101, user's application information is received, user's application information includes user basic information and user's assets letter Breath.
It is illustrated for borrowing or lending money risk control in embodiments herein, includes basic letter in the application information of user Breath and assets information, wherein essential information mainly includes the customer-furnished information for being able to demonstrate that user identity, and assets are believed Breath then mainly includes the customer-furnished information for being able to demonstrate that itself repaying ability.
Step 102, according to default essential information proof rule, user basic information is verified.
Whether, according to preset essential information proof rule, whether the essential information for verifying user's offer is correct, and full Foot application business corresponding default essential information proof rule, if alternative one judging result be no, then direct refusal user Business application, such as the two judging result is to be, then the user passes through essential information and verifies, and guarantees safety of making loans.
It should be noted that different business can correspond to different application proof rules, therefore, user's application information is also It may include application service code;Before being verified to user basic information, this method further include: according to application business generation Code determines that user applies for the corresponding default essential information proof rule of business.In addition, presetting assets letter in following steps Code of points, default reference information code of points etc. are ceased, can be determined by application service code, to take different business Differentiation proof rule improves the accuracy of risk control.
Step 103, if user basic information believes user's assets according to assets information code of points is preset by verifying Breath scores.
After user basic information is by verifying, according to preset assets information code of points, according to the assets of user Information scores the repaying ability of user to obtain the scoring of user's assets information, so that people of the confirmation not to have not the ability to repay mentions For loan transaction service, safety of making loans is ensured, reduce bad credit probability.
Step 104, basic according to user if the assets information scoring of user is greater than or equal to default assets scoring threshold value The reference information of information inquiry user.
If the assets information scoring of user is greater than or equal to default assets scoring threshold value, illustrate what the user applied for it Loan transaction has repaying ability, then inquires the reference information of the user, so that the credit situation of user is analyzed;And if The assets information scoring of user is less than default assets scoring threshold value, illustrates that the loan transaction that the user applies for it does not have repayment Ability then refuses the business application of the user, avoids generating bad credit, reduces enterprises' loss.
Step 105, it according to default reference information code of points, scores reference information.
According to preset reference information code of points, according to the history credit of the reference information analysis user of the user, example Such as user and the violations in the business contact of other companies are analyzed, to show that the reference information of the user is commented Point.
Step 106, if the reference information scoring of user is greater than or equal to default reference scoring threshold value, user passes through risk Control audit.
If the reference information scoring of user is greater than or equal to default reference and scores threshold value, illustrate the history credit of user compared with It is good, meet the standard of application business, then the user is audited by risk control, can be made loans to the user.
Technical solution by applying this embodiment, firstly, the essential information of verifying user, it is ensured that user provides basic Information and its practical identities match;Secondly, being analyzed according to repaying ability of user's assets information to user, it is ensured that user couple Its application business has repaying ability;Finally, the reference information of calling and obtaining user, analyzes the repayment risk of user.The application realizes Multistage risk prevention system in business application review process, can greatly reduce business risk, and with the risk of automation Control audit improves the efficiency of audit, reduces the artificial of business application process instead of manual examination and verification in the prior art Factor interference, makes business application review process more standardize.
Further, as the refinement and extension of above-described embodiment specific embodiment, in order to completely illustrate the present embodiment Specific implementation process, provide another risk control method, as shown in Fig. 2, this method comprises:
Step 201, user's application information is received, user's application information includes user basic information and user credit letter Breath.
In the above-described embodiments, specifically, user basic information include age of user, name, ID card No. and Phone number.
Step 202, whether the verifying age is in default the range of age.
Because application loan user must have certain revenue source, have the ability refunded in full amount on time, and not at The income that year is not fixed, loan repayment capacity cause anxiety, and in order to ensure the smooth recycling of loan, enterprise will not usually give teenage human hair Lending money.Determine since the judgement for the age belongs to cost free rule, and as not being inconsistent and normally directly can refuse user Therefore business application is without, first verifying that the age of user in conjunction with other decision conditions in risk control review process Whether in default the range of age, review efficiency is improved, reduces audit cost.
Step 203, if the age is in default the range of age, the corresponding surname of ID card No. is obtained from public security system Name, and whether verify the name for including from the name and user basic information obtained in public security system consistent.
If the age of user is in default the range of age, whether quasi- the identity information that user provides further is verified Really, specifically, whether the name that the corresponding name of ID card No. and user provided using public security system inquiry user is provided Unanimously, if it is inconsistent, illustrate that user applies for that there are identity imitation behaviors in business procedure, then directly refuse the application of user.
Since the identity information verification to user need to only obtain corresponding name according to ID card No. from public security system Information can be completed, and if not by the business application of identity information verification directly refusal user, without the information to acquisition Secondary operation is carried out, needs to carry out the rule of secondary operation or bout compared to other, identity information verification belongs to low performance and disappears Consumption rule verification, therefore, the step of identity information is verified, is placed on position more forward in risk control audit, improves audit While efficiency, audit cost is also reduced.
Step 204, if unanimously, the corresponding ID card No. of phone number is obtained from communication common carrier system, and verify Whether the ID card No. for including from the ID card No. and user basic information obtained in communication common carrier system is consistent.
If subscriber identity information by verification, further verifies whether the phone number that user provides is demonstrate,proved with user identity Number matches, and specifically, the corresponding ID card No. of phone number is obtained from communication common carrier system, compares the identification card number Whether code and the ID card No. that user provides are consistent, if inconsistent, illustrating user, there are communication mode imitation behaviors, then directly Connect the business application of refusal user.Similar to the proof of identity rule of step 203, the verification rule of phone number also belongs to low property Rule can be consumed, and the rule that can not refused an application directly by verification, the sequencing of step 203 and step 204 can be adjusted It changes.
Step 205, if whether unanimously, being verified in blacklist library according to ID card No. includes user, if not including, User basic information passes through verifying.
Specifically, blacklist library includes local blacklist library and main strategies blacklist library;Step 205 is specifically wrapped Include: whether according to ID card No., successively verifying in local blacklist library and main strategies blacklist library includes user, if User is not included in local blacklist library and main strategies blacklist library, then user basic information passes through verifying.
If user further inquires whether the user has been cited as blacklist use by the verification of above-mentioned each step The black of user is specifically successively inquired according to ID card No. in family in local blacklist library and main strategies blacklist library List information directly refuses the use if can get the black list information of the user in any one blacklist library The business application at family, and if all blacklists not comprising the user are believed in local blacklist library and main strategies blacklist library Breath, then the user is verified by essential information.
It should be noted that the inquiry in local blacklist library does not need payment inquiry expense, and in main strategies Blacklist inquires black list information in library, if hit (inquiring the corresponding black list information of ID card No.) needs to pay Therefore inquiry expense first inquires local blacklist library, rear to inquire main strategies blacklist library.
In any of the above-described embodiment, specifically, user's assets information includes the intrinsic assets information and income of user Information.
The assets information of user includes intrinsic assets information and income information two parts, and intrinsic assets information may include using The house property at family, deposit, insurance, stock etc., income information mainly includes the fixed income of user monthly or every year.
Step 206, it according to intrinsic assets information code of points is preset, scores intrinsic assets information.
It according to intrinsic assets information code of points is preset, scores the intrinsic assets information of user, guarantees user such as Fruit cannot repay the loan on time, can also recall a loan in such a way that the assets to the user are disposed, and reduce bad credit.Example If user applies for loan 200,000, the intrinsic assets value of user is 900,000, and code of points is that intrinsic assets value is greater than or equal to Apply for that then scoring is 10 points to the amount of the loan 5 again, intrinsic assets value is greater than or equal to the application amount of the loan 4, and then scoring is 8 points again, The intrinsic assets information scoring of so user is 8 points.
Step 207, it according to default income information code of points, scores income information.
After calculating intrinsic assets information scoring, carried out according to income information of the default income information code of points to the user Analysis obtains income information scoring, further increases lending safety.Such as apply for that business is obtained and should monthly be refunded according to user 5000 yuan, the monthly income of user is 8000 yuan, and code of points is that monthly income is greater than or equal to amount of monthly repayment 2 then scoring is 10 again Point, monthly income is greater than or equal to amount of monthly repayment 1.5, and then scoring is 7 points again, then the income information scoring of the user is 7 points.
Step 208, the assets information scoring that information scoring calculates user is scored and taken according to intrinsic assets information.
Whether user, which has the ability, is repaid the loan, and is determined by the intrinsic assets of user and the two aspect factor of income of user , therefore score and take in information scoring according to intrinsic assets information and score to calculate the assets information of user, it specifically, can be with The average value of intrinsic assets information scoring with income information scoring is calculated, or the scoring of this two parts is assigned according to actual needs Power for example, the unemployment rate of this area is higher, then can increase intrinsic assets information so that weighted sum show that assets information scores Score weight, reduces income information scoring weight, for another example this area's brain drain situation is more serious, permanent resident population is year by year It reduces, then reduces intrinsic assets information scoring weight, increase income information scoring weight.If assets information scoring is less than default Assets scoring threshold value, then directly refuse the business application of user, to improve safety of making loans;And if assets information scoring be greater than or Equal to default assets scoring threshold value, then passes through assets information and audit.
It should be noted that assets information audit is audited compared to essential information, need to carry out user information secondary add Work and converge, then the total value converged judged, thus assets information audit step should after essential information audits step, To provide review efficiency.
Step 209, basic according to user if the assets information scoring of user is greater than or equal to default assets scoring threshold value The reference information of information inquiry user.
If the assets information scoring of user is greater than or equal to default assets scoring threshold value, illustrate that user is believed by assets Breath audit, then further the reference report of inquiry user reinforces safety of making loans so that the reference information to user is audited Property.Since reference report need to be obtained from main strategies system, and query formulation road-toll principle is usually taken in main strategies system, Therefore inquiry expense is saved in the audit Ying Hou set to reference information.
Step 210, it according to reference information code of points, scores reference information.
After essential information audit and assets information audit, in order to further ensure that later period refund safety, avoid to letter It is made loans with High risk group (such as " Lao Lai " user), it is also necessary to the reference information of user be audited, specially according to reference Information code of points gives a mark to reference information.
Step 211, if the reference information scoring of user is greater than or equal to default reference scoring threshold value, user passes through risk Control audit.
If the scoring of user's reference information is greater than or equal to default reference scoring threshold value, illustrate essential information, the assets of user Information and reference information all meet loan transaction condition, then the user is audited by risk control, can be to user and work people Member's output provides a user financial service by prompt information.
Step 212, if the scoring of reference information is less than default reference scoring threshold value and is greater than or equal to default review reference Score threshold value, then exports review prompt information.
If the scoring of user's reference information is scored between threshold value and default reference scoring threshold value in default review reference, export Review prompt information increases risk control to prompt staff that can carry out artificial or other modes reviews to the user The fault-tolerance of system reduces business turnover rate.
Step 213, if the scoring of reference information is less than default review reference scoring threshold value, refuse the business application of user.
If the reference information scoring of user is less than default review reference scoring threshold value, illustrate that user is unsatisfactory for business application slip Part is also unsatisfactory for review condition, then directly refuses the business application of user, it is ensured that lending service security.
It should be noted that in the step of above-mentioned essential information audit, assets information audit and reference signal auditing, this Field technical staff can according to actual needs increase audit project, reduce or change sequence, such as increase to user The audit of " sesame credit " scoring, phone number are using audit etc. of time, but adjustment should meet following principle: the One, the audit of cost free or low cost is prior to high-cost audit, such as to the audit of user's assets information prior to reference The audit of information;Second, it is preferential prior to the audit of external rules, such as own local blacklist library from well-regulated audit It is audited in external blacklist library;Third, the audit that the audit of low performance consumption is consumed prior to high-performance, such as to user year Audit of the audit in age prior to ID card No..
Step 214, if user is by the way that there are violations after risk control audit, according to user's application information and sign Letter information updates essential information proof rule, credit information code of points and reference information code of points.
In the post-loan management to user, there are the user informations of violations (being predominantly late for refunding) for collection, and These users are analyzed, in the characteristic of this certain customers, such as promise breaking user 80% subscriber phone number use is concluded Time is no more than 6 months, then can increase the audit for using phone number the time, in air control audit to improve business Safety.
Technical solution by applying this embodiment, in the review process of business application, by user basic information, The multistage auditing of assets information and reference information, greatly reduces business risk, reduces human intervention, improves audit Efficiency, and the relevant information of promise breaking user is collected and is analyzed, to optimize risk auditing system, facilitates risk and examine The gradual perfection of core.
Further, the specific implementation as Fig. 1 method, the embodiment of the present application provide a kind of risk control device, such as Shown in Fig. 3, the device include: application information receiving unit 31, essential information authentication unit 32, assets information scoring unit 33, Reference information query unit 34, reference information scoring unit 35, risk control unit 36.
Application information receiving unit 31, for receiving user's application information, user's application information includes user basic information And user's assets information;
Essential information authentication unit 32, for testing user basic information according to essential information proof rule is preset Card;
Assets information scoring unit 33, if for user basic information by verifying, according to default assets information scoring Rule scores to user credit assets;
Reference information query unit 34, if the assets information scoring for user is greater than or equal to default assets scoring threshold Value then inquires the reference information of user according to user basic information;
Reference information scoring unit 35, for scoring reference information according to reference information code of points is preset;
Risk control unit 36, if the reference information scoring for user is greater than or equal to default reference scoring threshold value, User is audited by risk control.
In the above-described embodiments, specifically, user basic information include age of user, name, ID card No. and Phone number.
In specific application scenarios, as shown in figure 4, essential information authentication unit 32, specifically includes: age verification unit 321, identity authenticating unit 322, authentication unit 323, blacklist authentication unit 324.
Age verification unit 321, for verifying whether the age is in default the range of age;
Identity authenticating unit 322 obtains identity card if being in default the range of age for the age from public security system The corresponding name of number, and verify include from the name and user basic information obtained in public security system name whether one It causes;
Authentication unit 323, if obtaining the corresponding identity card of phone number from communication common carrier system for consistent Number, and the ID card No. that verification includes from the ID card No. and user basic information obtained in communication common carrier system is It is no consistent;
Blacklist authentication unit 324, if whether being verified in blacklist library according to ID card No. comprising using for consistent Family, if not including, user basic information passes through verifying.
In the above-described embodiments, specifically, blacklist library includes local blacklist library and main strategies blacklist library; Blacklist authentication unit 324 is specifically used for according to ID card No., successively verifies local blacklist library and main strategies are black It whether include user in list library, if not including user, user in local blacklist library and main strategies blacklist library Essential information passes through verifying.
In the above-described embodiments, specifically, user's assets information includes the intrinsic assets information and income information of user.
In specific application scenarios, the unit 33 as shown in figure 4, assets information scores is specifically included: intrinsic assets information Score unit 331, income information scoring unit 332, assets information scoring subelement 333.
Intrinsic assets information scoring unit 331, for believing intrinsic assets according to intrinsic assets information code of points is preset Breath scores;
Information scoring unit 332 is taken in, for scoring information is taken according to default income information code of points;
Credit information scoring subelement 333 is used for information scoring calculating to be scored and taken according to intrinsic assets information The assets at family score.
In specific application scenarios, as shown in figure 4, risk control unit 36, is less than if being also used to the scoring of reference information It presets reference scoring threshold value and is greater than or equal to default review reference scoring, then export review prompt information;If reference information Scoring is less than default review reference scoring, then refuses the business application of user.
In specific application scenarios, as shown in figure 4, the device further include: Policy Updates unit 37.
Policy Updates unit 37, if there are violations after being audited for user by risk control, according to user Shen Please information and reference information, update essential information proof rule, credit information code of points and reference information code of points.
It should be noted that other of each functional unit involved by a kind of risk control device provided by the embodiments of the present application Corresponding description, can be with reference to the corresponding description in Fig. 1 and Fig. 2, and details are not described herein.
Based on above-mentioned method as depicted in figs. 1 and 2, correspondingly, the embodiment of the present application also provides a kind of storage medium, On be stored with computer program, which realizes above-mentioned risk control method as depicted in figs. 1 and 2 when being executed by processor.
Based on this understanding, the technical solution of the application can be embodied in the form of software products, which produces Product can store in a non-volatile memory medium (can be CD-ROM, USB flash disk, mobile hard disk etc.), including some instructions With so that computer equipment (can be personal computer, server or the network equipment an etc.) execution the application is each Method described in implement scene.
Based on above-mentioned method as shown in Figure 1 and Figure 2 and Fig. 3, virtual bench embodiment shown in Fig. 4, in order to realize Above-mentioned purpose, the embodiment of the present application also provides a kind of computer equipments, are specifically as follows personal computer, server, network Equipment etc., the computer equipment include storage medium and processor;Storage medium, for storing computer program;Processor is used In execution computer program to realize above-mentioned risk control method as depicted in figs. 1 and 2.
Optionally, which can also include user interface, network interface, camera, radio frequency (Radio Frequency, RF) circuit, sensor, voicefrequency circuit, WI-FI module etc..User interface may include display screen (Display), input unit such as keyboard (Keyboard) etc., optional user interface can also connect including USB interface, card reader Mouthful etc..Network interface optionally may include standard wireline interface and wireless interface (such as blue tooth interface, WI-FI interface).
It will be understood by those skilled in the art that a kind of computer equipment structure provided in this embodiment is not constituted to the meter The restriction for calculating machine equipment, may include more or fewer components, perhaps combine certain components or different component layouts.
It can also include operating system, network communication module in storage medium.Operating system is management and preservation computer The program of device hardware and software resource supports the operation of message handling program and other softwares and/or program.Network communication Module is for realizing the communication between each component in storage medium inside, and between other hardware and softwares in the entity device Communication.
Through the above description of the embodiments, those skilled in the art can be understood that the application can borrow Help software that the mode of necessary general hardware platform is added to realize, it can also be by hardware realization firstly, verifying user's is basic Information, it is ensured that the essential information and its practical identities match that user provides;Secondly, the repayment according to user's assets information to user Ability is analyzed, it is ensured that user applies for that business has repaying ability to it;Finally, the reference information of calling and obtaining user, analysis is used The repayment risk at family.The application realizes the multistage risk prevention system in business application review process, can greatly reduce business Risk, and audited with the risk control of automation instead of manual examination and verification in the prior art, the efficiency of audit is improved, is subtracted The interference from human factor for having lacked business application process makes business application review process more standardize.
It will be appreciated by those skilled in the art that the accompanying drawings are only schematic diagrams of a preferred implementation scenario, module in attached drawing or Process is not necessarily implemented necessary to the application.It will be appreciated by those skilled in the art that the mould in device in implement scene Block can according to implement scene describe be distributed in the device of implement scene, can also carry out corresponding change be located at be different from In one or more devices of this implement scene.The module of above-mentioned implement scene can be merged into a module, can also be into one Step splits into multiple submodule.
Above-mentioned the application serial number is for illustration only, does not represent the superiority and inferiority of implement scene.Disclosed above is only the application Several specific implementation scenes, still, the application is not limited to this, and the changes that any person skilled in the art can think of is all The protection scope of the application should be fallen into.

Claims (10)

1. a kind of risk control method characterized by comprising
User's application information is received, user's application information includes user basic information and user's assets information;
According to default essential information proof rule, the user basic information is verified;
If the user basic information by verifying, according to preset assets information code of points to user's assets information into Row scoring;
If the assets information scoring of the user is greater than or equal to default assets scoring threshold value, according to the user basic information Inquire the reference information of the user;
According to default reference information code of points, score the reference information;
If the reference information scoring of the user is greater than or equal to default reference scoring threshold value, the user passes through risk control Audit.
2. the method according to claim 1, wherein the user basic information include the user age, Name, ID card No. and phone number;
The basis presets essential information proof rule, verifies, specifically includes to the user basic information:
Verify whether the age is in default the range of age;
If the age is in described default the range of age, the corresponding surname of the ID card No. is obtained from public security system Name, and verify include from the name that is obtained in the public security system and the user basic information the name whether Unanimously;
If consistent, the corresponding ID card No. of the phone number is obtained from communication common carrier system, and is verified from described logical Whether the ID card No. for including in the ID card No. and the user basic information obtained in letter Corporation system Unanimously;
If consistent, whether include the user, described if not including if being verified in blacklist library according to the ID card No. User basic information passes through verifying.
3. according to the method described in claim 2, it is characterized in that, the blacklist library includes local blacklist library and third Fang Zhengxin blacklist library;
It is described the user is verified according to the ID card No. to whether there is in blacklist library, if it does not exist, then the use Family essential information is specifically included by verifying:
According to the ID card No., successively verifying in the local blacklist library and main strategies blacklist library is No includes the user, if not including the user in the local blacklist library and main strategies blacklist library, Then the user basic information passes through verifying.
4. the method according to claim 1, wherein user's assets information includes the intrinsic assets letter of user Breath and income information;
The basis presets assets information code of points and scores user's assets information, specifically includes:
According to intrinsic assets information code of points is preset, score the intrinsic assets information;
According to default income information code of points, score the income information;
The assets information scoring of the user is calculated according to the intrinsic assets information scoring and the income information scoring.
5. method according to claim 1 to 4, which is characterized in that the basis presets the scoring of reference information Rule, after scoring the reference information, the method also includes:
If the reference information scoring is less than the default reference scoring threshold value and is greater than or equal to default review reference scoring Threshold value then exports review prompt information;
If the reference information scoring is less than the default review reference scoring threshold value, refuse the business application of the user.
6. the method according to claim 1, wherein the method also includes:
If after the user is audited by risk control, there are violations, according to user's application information and the sign Letter information updates the essential information proof rule, the credit information code of points and the reference information code of points.
7. a kind of risk control device characterized by comprising
Application information receiving unit, for receiving user's application information, user's application information include user basic information with And user's assets information;
Essential information authentication unit, for being verified to the user basic information according to essential information proof rule is preset;
Assets information scoring unit, if for the user basic information by verifying, according to default assets information scoring rule Then score user's assets information;
Reference information query unit, if the assets information scoring for the user is greater than or equal to default assets scoring threshold value, The reference information of the user is then inquired according to the user basic information;
Reference information scoring unit, for scoring the reference information according to reference information code of points;
Risk control unit, if the reference information scoring for the user is greater than or equal to default reference scoring threshold value, institute User is stated to audit by risk control.
8. device according to claim 7, which is characterized in that the user basic information include the user age, Name, ID card No. and phone number;
Essential information authentication unit, specifically includes:
Age verification unit, for verifying whether the age is in default the range of age;
Identity authenticating unit, if being in described default the range of age for the age, from public security system described in acquisition The corresponding name of ID card No., and verify from the name and the user basic information obtained in the public security system Whether the name for including is consistent;
Authentication unit, if obtaining the corresponding identification card number of the phone number from communication common carrier system for consistent Code, and verify the institute for including from the ID card No. and the user basic information obtained in the communication common carrier system Whether consistent state ID card No.;
Blacklist authentication unit, if whether being verified in blacklist library according to the ID card No. comprising described for consistent User, if not including, the user basic information passes through verifying.
9. a kind of storage medium, is stored thereon with computer program, which is characterized in that realization when described program is executed by processor Risk control method described in any one of claims 1 to 6.
10. a kind of computer equipment, including storage medium, processor and storage can be run on a storage medium and on a processor Computer program, which is characterized in that the processor is realized described in any one of claims 1 to 6 when executing described program Risk control method.
CN201811534286.6A 2018-12-14 2018-12-14 Risk control method and device, storage medium, computer equipment Pending CN109816510A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811534286.6A CN109816510A (en) 2018-12-14 2018-12-14 Risk control method and device, storage medium, computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811534286.6A CN109816510A (en) 2018-12-14 2018-12-14 Risk control method and device, storage medium, computer equipment

Publications (1)

Publication Number Publication Date
CN109816510A true CN109816510A (en) 2019-05-28

Family

ID=66602009

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811534286.6A Pending CN109816510A (en) 2018-12-14 2018-12-14 Risk control method and device, storage medium, computer equipment

Country Status (1)

Country Link
CN (1) CN109816510A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110555762A (en) * 2019-08-27 2019-12-10 上海易点时空网络有限公司 Blacklist data processing method and device and big data loan platform optimization method
CN110766275A (en) * 2019-09-18 2020-02-07 平安银行股份有限公司 Data verification method and device, computer equipment and storage medium
CN111242773A (en) * 2020-01-16 2020-06-05 深圳壹账通智能科技有限公司 Virtual resource application docking method and device, computer equipment and storage medium
CN111709709A (en) * 2020-06-11 2020-09-25 深圳联横合纵科技有限公司 Information processing method, system and computer equipment based on warranty service
CN111861732A (en) * 2020-07-31 2020-10-30 重庆富民银行股份有限公司 Risk assessment system and method
CN112446706A (en) * 2020-11-09 2021-03-05 宿州职业技术学院 Electronic commerce linkage payment method for old users
CN112686036A (en) * 2020-08-18 2021-04-20 平安国际智慧城市科技股份有限公司 Risk text recognition method and device, computer equipment and storage medium
CN113077272A (en) * 2020-01-03 2021-07-06 中国移动通信集团广东有限公司 Communication service marketing plan optimization method and device
CN113743914A (en) * 2020-05-27 2021-12-03 北京金山云网络技术有限公司 Client identity authentication method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105956919A (en) * 2016-04-28 2016-09-21 中国建设银行股份有限公司 Business data application evaluation method and device
CN106056445A (en) * 2016-05-27 2016-10-26 上海优走信息科技有限公司 Loan system, loan information display method and system, and loan information processing method and system
CN107392451A (en) * 2017-07-11 2017-11-24 重庆卡西匚匚科技有限公司 A kind of risk control system
CN107437223A (en) * 2017-08-17 2017-12-05 重庆小雨点小额贷款有限公司 Credit information checking method, device and equipment
CN107748952A (en) * 2017-10-09 2018-03-02 深圳广联赛讯有限公司 Prestige checking method, device and storage medium based on consumer's risk control

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105956919A (en) * 2016-04-28 2016-09-21 中国建设银行股份有限公司 Business data application evaluation method and device
CN106056445A (en) * 2016-05-27 2016-10-26 上海优走信息科技有限公司 Loan system, loan information display method and system, and loan information processing method and system
CN107392451A (en) * 2017-07-11 2017-11-24 重庆卡西匚匚科技有限公司 A kind of risk control system
CN107437223A (en) * 2017-08-17 2017-12-05 重庆小雨点小额贷款有限公司 Credit information checking method, device and equipment
CN107748952A (en) * 2017-10-09 2018-03-02 深圳广联赛讯有限公司 Prestige checking method, device and storage medium based on consumer's risk control

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110555762A (en) * 2019-08-27 2019-12-10 上海易点时空网络有限公司 Blacklist data processing method and device and big data loan platform optimization method
CN110766275A (en) * 2019-09-18 2020-02-07 平安银行股份有限公司 Data verification method and device, computer equipment and storage medium
CN113077272A (en) * 2020-01-03 2021-07-06 中国移动通信集团广东有限公司 Communication service marketing plan optimization method and device
CN113077272B (en) * 2020-01-03 2023-07-21 中国移动通信集团广东有限公司 Communication business marketing scheme optimization method and device
CN111242773A (en) * 2020-01-16 2020-06-05 深圳壹账通智能科技有限公司 Virtual resource application docking method and device, computer equipment and storage medium
CN113743914A (en) * 2020-05-27 2021-12-03 北京金山云网络技术有限公司 Client identity authentication method, device, equipment and storage medium
CN111709709A (en) * 2020-06-11 2020-09-25 深圳联横合纵科技有限公司 Information processing method, system and computer equipment based on warranty service
CN111861732A (en) * 2020-07-31 2020-10-30 重庆富民银行股份有限公司 Risk assessment system and method
CN112686036A (en) * 2020-08-18 2021-04-20 平安国际智慧城市科技股份有限公司 Risk text recognition method and device, computer equipment and storage medium
CN112686036B (en) * 2020-08-18 2022-04-01 平安国际智慧城市科技股份有限公司 Risk text recognition method and device, computer equipment and storage medium
CN112446706A (en) * 2020-11-09 2021-03-05 宿州职业技术学院 Electronic commerce linkage payment method for old users

Similar Documents

Publication Publication Date Title
CN109816510A (en) Risk control method and device, storage medium, computer equipment
US11321783B2 (en) Method and device for data processing based on blockchain
Miller et al. Complementary components and returns from coordination within ecosystems via standard setting
CN107317672A (en) A kind of light weight terminating machine block catenary system
CN104966229A (en) Information processing method and credit platform
CN109783581A (en) Right management method, device, electronic equipment and storage medium
CN104680361A (en) Enchashment method and system based on third-party platform
US9460430B1 (en) System, method and apparatus for conducting secure transaction over a call
CN105787794A (en) System and method based on consumption load service management mode
CN111461857A (en) Personal online credit method, device, system, equipment and medium for small and medium-sized banks
US20120089404A1 (en) Global pricing for content distribution
CN107748952A (en) Prestige checking method, device and storage medium based on consumer's risk control
CN109670968A (en) Processing method, device, equipment and the computer storage medium of insurance data
CN107967607A (en) A kind of processing method, device, server and the storage medium of transaction credit amount
CN110533521A (en) Method for early warning, device, equipment and readable storage medium storing program for executing after dynamic is borrowed
US20020035479A1 (en) Access contract changing method for automatically changing an access contract between a prepaid contract and a postpaid contract
CN110363644A (en) Exception information recognition methods, device, computer equipment and storage medium
CN107798536A (en) Credit line treating method and apparatus
CN108510386A (en) A kind of network loan system, method, terminal and medium
CN112150145A (en) Game account transaction method, system and equipment
CN109785107B (en) Method for flexibly configuring fund duty ratio and related products
CN108416662A (en) A kind of data verification method and device
CN115983985A (en) Refined credit line management method
CN111882323B (en) User financing risk control method and device based on cloud service lease
CN109636576A (en) Processing method, device, equipment and the storage medium of credit data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination