CN110197315A - Methods of risk assessment, device and its storage medium - Google Patents
Methods of risk assessment, device and its storage medium Download PDFInfo
- Publication number
- CN110197315A CN110197315A CN201810305580.3A CN201810305580A CN110197315A CN 110197315 A CN110197315 A CN 110197315A CN 201810305580 A CN201810305580 A CN 201810305580A CN 110197315 A CN110197315 A CN 110197315A
- Authority
- CN
- China
- Prior art keywords
- information
- risk assessment
- application program
- identification code
- classification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012502 risk assessment Methods 0.000 title claims abstract description 124
- 238000000034 method Methods 0.000 title claims abstract description 64
- 238000009434 installation Methods 0.000 claims description 29
- 238000013145 classification model Methods 0.000 claims description 22
- 238000013210 evaluation model Methods 0.000 claims description 22
- 238000012545 processing Methods 0.000 claims description 17
- 238000012549 training Methods 0.000 claims description 10
- 230000005540 biological transmission Effects 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 2
- 238000011156 evaluation Methods 0.000 abstract description 6
- 238000010586 diagram Methods 0.000 description 20
- 230000006399 behavior Effects 0.000 description 13
- 244000309464 bull Species 0.000 description 7
- 238000004364 calculation method Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 238000001514 detection method Methods 0.000 description 5
- 238000012423 maintenance Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 241000254158 Lampyridae Species 0.000 description 2
- 210000004027 cell Anatomy 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 229940048662 kwai Drugs 0.000 description 2
- 238000010801 machine learning Methods 0.000 description 2
- 230000005291 magnetic effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000012954 risk control Methods 0.000 description 2
- 208000001613 Gambling Diseases 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000012512 characterization method Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000000047 product Substances 0.000 description 1
- 230000002040 relaxant effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 210000000352 storage cell Anatomy 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Abstract
The disclosure proposes methods of risk assessment, device and its storage medium, wherein this method comprises: receiving the identification code of the mobile device from terminal device;Obtain the classification information of application program corresponding with identification code installed and used information and generate application program;Information and classification information generation risk assessment rank corresponding with identification code are installed and used based on application program, and sends risk assessment rank to terminal device.Disclosed method carries out category division and portrait based on application program of the above- mentioned information to the user for carrying out credit applications, and various dimensions portrait is carried out based on the financial consumption for the user for carrying out credit applications habit, it can obtain the accurate evaluation result of the credit and risk of fraud that carry out the user of credit applications.
Description
Technical field
This disclosure relates to information evaluation field, and in particular, to a kind of methods of risk assessment, device and its storage medium.
Background technique
With relaxing for credit policy, petty cash borrows the quantity of crowd and the scale of demand for loan is growing.Due to
Lack and the history of the detailed reference of credit applications user record investigated, credit agency be difficult to the credit of credit applications user and
Risk of fraud makes effective assessment, so that the risk control to credit funds brings difficulty.
Bull debt-credit user is primarily present in cash loan crowd, which cannot be suitable in bank and other financial mechanism
Financial product and service.But due to credit policy relax and numerous little Dai companies, net borrow platform appearance, cash borrow
Crowd mainly carries out small amount debt-credit by borrowing in the lower net of application threshold on platform.Since net borrows the sign that information does not charge to Central Bank
Letter system, and the information sharing degree netted between loan platform is lower, and partial cash, which borrows crowd, can develop into normal loan crowd,
A variety of nets, which are borrowed on platform, small amount creditor-debtor entry and overdue repaying record, therefore these normal loan crowds are referred to as bull debt-credit and use
Family.
Financing class to user installation and the detection of debt-credit class mobile phone application are based primarily upon to the identification of bull debt-credit user.
The technology show that the list of manage money matters class and debt-credit class mobile phone application as reference listing, is answered by user mobile phone by manual sorting
Installation list compares matching with known reference list, when what is applied in the mobile phone application hit reference listing of user installation
When number reaches given threshold, the user is just determined as bull debt-credit user.
But manual sorting is based on to financing class and the maintenance for borrowing or lending money class mobile phone list of application, do not only result in reference listing
Lag, and expend huge human cost.In addition, the class that will manage money matters is borrowed with the installation number for borrowing or lending money the application of class mobile phone as bull
The unique judging characteristic for borrowing user, will lead to higher False Rate, for example, the more financing class mobile phone of credit applications user installation is answered
With with more debt-credit class mobile phone application is installed, corresponding user's property is differentiated.
Accordingly, there exist carry out the demand that methods of risk assessment and device improve to credit applications user.
Summary of the invention
Aiming to overcome that for the disclosure uses credit applications using the installation list of financing class and debt-credit class mobile phone application
Family carries out that information delay, cost caused by risk assessment be huge and the higher problem of False Rate, improves wind with lower cost
The accuracy and efficiency nearly assessed.
According to the one side of the disclosure, a kind of methods of risk assessment is proposed, which includes:
Receive the identification code of the mobile device from terminal device;
Obtain the class of application program corresponding with the identification code installed and used information and generate the application program
Other information;
Information and classification information generation risk assessment grade corresponding with the identification code are installed and used based on described
Not;
The risk assessment rank is sent to the terminal device.
In accordance with an embodiment of the present disclosure, the information of installing and using includes at least one following: being installed in mobile device
Application program title and quantity, during specific time the installation record of application program, answer during specific time
With the safety records of the usage record, application program of program, there are the title for installing associated application program and the degree of correlation, has use
The title and the degree of correlation of associated application program.
In accordance with an embodiment of the present disclosure, obtain application program corresponding with the identification code installs and uses information and life
Classification information at the application program includes: to inquire the identification code in the identification code data library;If the identification
Code is present in the identification code data library, then mark sheet is installed and used to inquiry application, to obtain and the identification code
The corresponding description information for installing and using information and application program;Information and the description are installed and used based on described
Information generates the classification information.
In accordance with an embodiment of the present disclosure, information is installed and used based on described, generating the classification information includes: to be based on moving
The title and quantity of the application program installed in dynamic equipment have the title for installing associated application program and the degree of correlation, have use
The title and the degree of correlation and the description information of associated application program, generate the classification information.
In accordance with an embodiment of the present disclosure, the classification information is generated by category classification model, wherein the category division
Model installs and uses information and description information progress text-processing and based on classification similarity judgement generation institute for described
State classification information.
In accordance with an embodiment of the present disclosure, based on the more new data for installing and using information and the description information, instruction
Practice the category classification model to identify the classification of new application program.
In accordance with an embodiment of the present disclosure, information and classification information generation and the identification are installed and used based on described
The corresponding risk assessment rank of code includes: to generate risk assessment rank corresponding with the identification code by risk evaluation model,
The risk evaluation model installs and uses information and the classification information is classified to generate the risk assessment to described
Rank.
In accordance with an embodiment of the present disclosure, methods of risk assessment further include: when the application of the reception from mobile device
When installing and using information and description information of program updates the identification code data library and application program installation and using special
Levy table.
In accordance with an embodiment of the present disclosure, methods of risk assessment further include: obtain the wind from the terminal device
The feedback of dangerous level of evaluation is to update the risk evaluation model.
In accordance with an embodiment of the present disclosure, the identification code is IMEI code.
According to another aspect of the present disclosure, a kind of methods of risk assessment is proposed, which includes:
The identification code for sending mobile device to server is made with the installation for obtaining application program corresponding with the identification code
With information and classification information;
Receive from the server based on it is described it is installing and using that information and the classification information generate with it is described
The corresponding risk assessment rank of identification code.
In accordance with an embodiment of the present disclosure, the information of installing and using includes at least one following: being installed in mobile device
Application program title and quantity, during specific time the installation record of application program, answer during specific time
With the safety records of the usage record, application program of program, there are the title for installing associated application program and the degree of correlation, has use
The title and the degree of correlation of associated application program.
In accordance with an embodiment of the present disclosure, methods of risk assessment further include: Xiang Suoshu server sends the risk assessment
The feedback of rank.
In accordance with an embodiment of the present disclosure, the identification code is IMEI code.
According to the another aspect of the disclosure, a kind of risk assessment device is proposed, comprising:
Acquiring unit is set as receiving the identification code of the mobile device from terminal device;
Feature generation unit, be set as acquisition application program corresponding with the identification code installs and uses information and life
At the classification information of the application program;
Risk assessment unit is set as installing and using information and classification information generation and the identification based on described
The corresponding risk assessment rank of code;
Transmission unit is set as sending the risk assessment rank to the terminal device.
In accordance with an embodiment of the present disclosure, the information of installing and using includes at least one following: being installed in mobile device
Application program title and quantity, during specific time the installation record of application program, answer during specific time
With the safety records of the usage record, application program of program, there are the title for installing associated application program and the degree of correlation, has use
The title and the degree of correlation of associated application program.
In accordance with an embodiment of the present disclosure, the feature generation unit is also configured to: in identification code data library described in inquiry
Identification code;If the identification code is present in the identification code data library, mark sheet is installed and used to inquiry application,
To obtain the description information for installing and using information and application program corresponding with the identification code;Made based on the installation
With information and the description information, the classification information is generated.
In accordance with an embodiment of the present disclosure, the feature generation unit includes category classification model, the category classification model
Be set as title and quantity based on the application program installed in mobile device, have the title for installing associated application program and
The degree of correlation has using the title and the degree of correlation of associated application program and the description information, installs and uses information for described
And the description information carries out text-processing and generates the classification information based on the judgement of classification similarity.
In accordance with an embodiment of the present disclosure, the feature generation unit is also configured to based on from described in the mobile device
Install and use information more new data and the description information, the training category classification model is to identify new application program
Classification.
In accordance with an embodiment of the present disclosure, the risk assessment unit includes risk evaluation model, the risk evaluation model
It is set as installing and using information and the classification information is classified to generate and the risk assessment rank to described.
In accordance with an embodiment of the present disclosure, the feature generation unit is also configured to: when reception is from described in mobile device
When installing and using information and description information of application program updates the identification code data library and application program installation and makes
Use mark sheet.
In accordance with an embodiment of the present disclosure, the risk assessment unit is also configured to: obtaining the institute from the terminal device
The feedback of risk assessment rank is stated to update the risk evaluation model.
In accordance with an embodiment of the present disclosure, the identification code is IMEI code.
According to the another further aspect of the disclosure, a kind of risk assessment terminal device is proposed, comprising:
Transmission unit is set as sending the identification code of mobile device to server to obtain answer corresponding with the identification code
Information and classification information are installed and used with program;
Receiving unit is set as receiving and installs and uses information and classification letter based on described from the server
Cease the risk assessment rank corresponding with the identification code generated.
In accordance with an embodiment of the present disclosure, the information of installing and using includes at least one following: being installed in mobile device
Application program title and quantity, during specific time the installation record of application program, answer during specific time
With the safety records of the usage record, application program of program, there are the title for installing associated application program and the degree of correlation, has use
The title and the degree of correlation of associated application program.
In accordance with an embodiment of the present disclosure, the transmission unit is also configured to: Xiang Suoshu server sends the risk assessment
The feedback of rank.
In accordance with an embodiment of the present disclosure, the identification code is IMEI code.
According to the another aspect of the disclosure, a kind of computer readable storage medium is proposed, be stored thereon with including executable
The computer program of instruction when the executable instruction is executed by processor, is implemented according to methods of risk assessment as described above.
According to the another further aspect of the disclosure, a kind of electronic equipment is proposed, comprising:
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to execute risk assessment side as described above via the executable instruction is executed
The step of method.
By methods of risk assessment, device provided by the disclosure and its storage medium, the identification code of mobile device is used
Obtain corresponding application program installs and uses information and classification information, and based on above- mentioned information to the use for carrying out credit applications
The application program at family carries out category division and portrait, in combination with the installation behavior of the application program for the user for carrying out credit applications
It is further analyzed with usage behavior, the financial consumption habit based on the user for carrying out credit applications carries out various dimensions portrait, obtains
The credit of user and the accurate evaluation of risk of fraud for carrying out credit applications are as a result, reducing cost and can effectively improve risk and comment
The efficiency estimated.
Detailed description of the invention
Its exemplary embodiment is described in detail by referring to accompanying drawing, the above and other feature and advantage of the disclosure will become
It is more obvious.
Figure 1A is the application scenarios schematic diagram according to the risk assessment scheme of the embodiment of the present disclosure;
Figure 1B is the query interface schematic diagram according to the risk evaluating system of the embodiment of the present disclosure;
Fig. 2 is the illustrative logical block diagram according to the risk evaluating system of the embodiment of the present disclosure;
Fig. 3 is the illustrative logical block diagram according to the category classification model of the risk evaluating system of the embodiment of the present disclosure;
Fig. 4 is the illustrative logical block diagram according to the risk evaluation model of the risk evaluating system of the embodiment of the present disclosure;
Fig. 5 is the exemplary process diagram according to the methods of risk assessment of the embodiment of the present disclosure;
Fig. 6 is the exemplary stream according to the classification information for generating application program in the methods of risk assessment of the embodiment of the present disclosure
Cheng Tu;
Fig. 7 is the exemplary process diagram according to the methods of risk assessment of another embodiment of the disclosure;
Fig. 8 is the exemplary process diagram according to the methods of risk assessment of the embodiment of the present disclosure;
Fig. 9 is the exemplary process diagram according to the methods of risk assessment of another embodiment of the disclosure;
Figure 10 is the exemplary block diagram according to the risk assessment device of the embodiment of the present disclosure;
Figure 11 is the exemplary block diagram according to the feature generation unit of the risk assessment device of the embodiment of the present disclosure;
Figure 12 is the exemplary block diagram according to the risk assessment unit of the risk assessment device of the embodiment of the present disclosure;
Figure 13 is the exemplary block diagram according to the risk assessment terminal of the embodiment of the present disclosure;
Figure 14 is the schematic diagram according to the electronic equipment for implement general plan appraisal procedure of the embodiment of the present disclosure.
Specific embodiment
Exemplary embodiment is described more fully with reference to the drawings.However, exemplary embodiment can be with a variety of shapes
Formula is implemented, and is not understood as limited to embodiment set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will
Fully and completely, and by the design of exemplary embodiment comprehensively it is communicated to those skilled in the art.In the figure in order to clear
It is clear, the size of subelement may be exaggerated or deformed.Identical appended drawing reference indicates same or similar knot in figure
Structure, thus the detailed description that them will be omitted.
In addition, described feature, structure or characteristic can be incorporated in one or more implementations in any suitable manner
In example.In the following description, many details are provided to provide and fully understand to embodiment of the disclosure.However,
It will be appreciated by persons skilled in the art that can be with technical solution of the disclosure without one in the specific detail or more
It is more, or can be using other methods, element etc..In other cases, be not shown in detail or describe known features, method or
Person operates to avoid fuzzy all aspects of this disclosure.
Credit agency is mainly used in credit applications fund according to the methods of risk assessment of the embodiment of the present disclosure and device
During examination & approval before granting are verified.The mobile device information that credit agency is provided by credit applications user is obtained to credit applications
Credit fraud (including overdue, promise breaking etc.) risk of user estimates judgement, is effectively managed to the risk of credit funds
And control.
Figure 1A shows the application scenarios schematic diagram of the risk assessment scheme of the disclosure.The mobile device 102 of user 101 is being pacified
When filling application program (Application, abbreviation APP), APP server is accessed to obtain installation file.Mobile device 102 is regular
Identification code and application program to the offer of server 105 including mobile device 101 install and use the information of information, server 105
Data acquisition request periodically can also be sent to mobile device 102 to obtain the identification code of mobile device 101 and application program peace
Fill use information.Between mobile device 102 and server 105 carry out data exchange when with the identification code of mobile device 102 into
Row identification.Identification code is corresponding with credit applications user, therefore can be characterized by identification code and hold the mobile device 102
Credit applications user, all features corresponding with identification code and portrait, all represent the feature and portrait of credit applications user.
In the disclosure, mobile device 102 includes but is not limited to mobile phone, personal digital assistant PDA, tablet device
PAD, net book and laptop etc..Mobile device 102 can be led to server 105 via wirelessly or non-wirelessly network
Letter.Server 105 can be the individual server or server zone of Local or Remote.For example, mobile device 102 is intelligent hand
Machine runs such as operation system of smart phone of Android (Android) or apple (IOS) thereon.When mobile device 102 is operation
When the smart phone of Android system, application program is mobile phone application, generally in mobile device in the form of APK installation file
It is transmitted between 102 and server 105.When mobile device 102 is to run the apple iphone mobile phone of IOS system, application program
It is transmitted between mobile device 102 and APP server in the form of the APP installation file on the App store of apple.The disclosure
Mobile device 102 can also run other operating systems such as Window Phone, Symbian, Blackberry.At this
In open, identification code is with international identification code IMEI for example, skilled person will understand that IMEI code is not to make
For the unique forms of identification code.
When user 101 services on line or under line to credit agency's demand for credit as credit applications user, user 101
The identification code of its mobile device 102 is provided to credit agency.The staff 103 of credit agency or credit information service is set by terminal
The server 105 of front end finance fraud detection interface access rear end on standby 104, meanwhile, the work of credit agency or credit information service
It is used as personnel 103 and obtains the progress credit applications corresponding with the identification code from server 105 also by terminal device 104
The risk assessment rank at family 101, and determine that user 101 is (for example, more with the presence or absence of credit risk according to the risk assessment rank
Head debt-credit user) and take corresponding credit policies.Figure 1B is then shown to be connect according to the credit fraud detection of the embodiment of the present disclosure
The query interface of mouth.The staff 103 of credit agency or credit information service passes through defeated in the input frame 106 of terminal device 104
Enter to carry out the identification code of the mobile device 102 of the user 101 of credit applications, system in the message box 107 of terminal device 104 to
The staff 103 of credit agency or credit information service returns to Credit Risk Assessment information.
Fig. 2 then shows the logic diagram of the risk evaluating system according to the embodiment of the present disclosure.
When user's demand for credit service, the identification code 201 of mobile device is provided to credit information service or credit agency.Reference
Identification yardage of the staff of mechanism or credit agency according to the identification code 201 of the mobile device of user, in query service device
According to library 202.Identification code data library 202 is established in advance by server, and is receiving installing and using information and answering for application program
With when the description information of program to be safeguarded and be updated.
When the identification code 201 of the mobile device is not present in identification code data library 202, it was demonstrated that the mobile device of the user
For new equipment, server will return to the identification code 201 to the staff of credit information service or credit agency and be not present in database
Result in 202.
When inquiring the identification code 201 in identification code data library 202, server is installed from application program and using special
The description information for installing and using information and application program of application program corresponding with the identification code 201 is obtained in sign table 203.
Application program is installed and is equally established in advance by server using mark sheet 203.It is similar with identification code data library 202, using journey
Sequence is installed and using mark sheet 203 also by server in the description for installing and using information and application program for receiving application program
It is safeguarded and is updated when information.This installs and uses description information of the information for connected applications program, to the application journey of user
Sequence carries out category division and portrait, referring to fig. 4, including but not limited at least one following: the application installed in mobile device
The title and quantity 4011 of program, the installation of application program records 4012, during specific time during specific time
The safety records 4014 of the usage record 4013, application program of application program has the title and phase for installing associated application program
Pass degree 4015 has the title and the degree of correlation 4016 for using associated application program.
The installation record of application program is, for example, the application journey newly installed in nearest one month during specific time
The quantity of sequence, nearest month the application list newly installed, the list for having installed application program.During specific time
The usage record of application program is, for example, that mobile device often enlivens place, the normal active time of mobile device, mobile device nearest one
Enliven within a month place, the nearest month active time of mobile device, nearest month the application list being actively used etc..It answers
It is, for example, with the safety records of program: has cloud to look into the safety of the total amount of the application program of record, the application program for having cloud to look into record
Property, the safety for having installed application program, the safety of a nearest month application program newly installed.Wherein, cloud, which is looked into, is recorded as
The historical record and state-of-the-art record information that the included APK secure cloud inspection of Android system is surveyed.APK secure cloud is looked into as Android system
APK safety detection function, mobile device install APK application program when as safety check data.Android system movement is set
Is present in mobile device system for when leaving the factory, APK secure cloud is looked into as system function.APK secure cloud, which is looked into, to be passed through
Third party software replaces.In addition, APK secure cloud looks into the subfunction that also can integrate in third party software as software.For
Apple IOS system, there is also similar safety detection mechanism, the historical record for installing and using information of records application program and most
New record information.
Application program installs and uses information, can by mobile device application program (such as APK secure cloud is looked into) or
System function periodically, in response to event triggering perhaps from user's operation mobile device to server offer or by server is determined
Phase triggers actively in response to event to mobile device request.Mobile device, must when carrying out data exchange with server
Identification code must be provided as authentication.In server side, when in the identification code data library that the identification code is not present in server
When, server mobile device corresponding to the identification code is identified as new mobile device and update identification code data library and with
The relevant other information of the identification code.Server by the above-mentioned means, for example based on APK secure cloud check survey historical record and
State-of-the-art record, while updating identification code data library, obtain corresponding with identification code application program install and use information and
Description information, updating maintenance application program are installed and using the data in mark sheet 203, or the identification in current mobile device
When code is present in identification code data library, independent updating maintenance application program is installed and using the data in mark sheet 203.With
The mobile device side at family, APK secure cloud, which is checked, to be surveyed and can also make server more to server transmission data by slave mobile device
The new identification code not recorded by the identification code data library 202 of server before new, and update application corresponding with identification code
Program installs and uses information and description information.The update and maintenance process need intermediate arrangement and calculate.
And the description information of application program includes to content, usage mode, generic of application program etc. to using journey
The description of sequence understands application program in order to user.The description information of application program can be installed and used with application program
Information is collectively stored in application program installation and using in mark sheet, can also be additionally stored in server.Application program
Description information is initially obtained when user accesses APP server (not shown) using mobile device by mobile device, and user
Determine whether to download the installation file of the application program according to the description information of application program.It is carried out in mobile device and server
When data interaction, mobile device is by description information and installs and uses information and is sent collectively to server.When the application from server
Program installation and using obtaining when installing and using information of corresponding with identification code application program in mark sheet, general homology
Obtain the description information of these application programs.
Identification code data library 202 as described above and application program, which are installed and be can store using mark sheet 203, to be serviced
On device, or it is stored in the database separated with server.
Then, the application program obtained will be arranged and installs and uses information, especially will wherein installed in mobile device
Application program title and quantity, have the title for installing associated application program and the degree of correlation, have using associated using journey
The title and the degree of correlation of sequence, the description information of connected applications program carry out classification using trained category classification model 204 and draw
Point, obtain credit applications user each dimension of financial consumption behavior index characteristic to carry out various dimensions portrait.Wherein, it installs
Association refers to that after being mounted with a certain application program, user may install other application program by statistics;Using association then refer to by
Statistics, after having used a certain application program, user may use other application program.The degree of correlation is then characterized by certain application program,
To degree a possibility that installing or use another application.
Currently, the application category in terms of financial consumption behavior includes stock lottery transactions class, related lottery industry of gambling
Class, supplement with money consumption game class, credit card reference class, by stages consumption borrow class, small amount debt-credit class, Investment & Financing class, online shopping it is consumer,
Relate to that yellow class, Mobile banking's class, daily life payment class, urban service class, daily life be consumer, hobby class, leisure joy
Happy game class, tool of production class, education and medical care class, information service class, social platform class etc..It is divided, is compared by multiple types
It is existing that the risk class of credit applications user is only judged with class application program is borrowed or lent money with class application program of managing money matters, make with identification code
The user image of characterization is richer, and the identification and assessment for the credit risk of fraud of user are more acurrate.
For example, the cell phone apparatus for being 864315038247752 to IMEI identification code, that extracts mobile phone application installs and uses letter
Breath, removes out the included application of plant, and the application of other installations includes Kwai, Amap, KuGoo music, iqiyi.com, palm
Heroic alliance, firefly video desktop, king's honor, mobile phone Taobao, wheel look into violating the regulations, Alipay, WeChat, Tencent's video.Its
In, Kwai, WeChat are the application of social platform class, and Amap is the application of urban service class, KuGoo music, iqiyi.com, Tencent
Video, firefly video desktop are the application of hobby class, and palm hero alliance, king's honor are the application of amusement and recreation game class,
Mobile phone Taobao is the consumer application of online shopping, and wheel, which is looked into, breaks rules and regulations as information service class application, and WeChat, Alipay disappear for daily life
Take class application.
Parameter is arranged by machine learning by off-line modeling and using training data in category classification model 204.Referring to figure
3, the exemplary block diagram of the category classification model according to the embodiment of the present disclosure is shown.Model 304 mainly includes text-processing
Module 3041 and classification similarity calculation module 3042, text processing module 3041 are used for data (Apply Names, number that will be inputted
The data such as amount, the degree of correlation) it is handled to obtain the data mode that classification similarity calculation module 3042 can identify.Classification phase
Like degree computing module 3042 for installing and using information and answering for the processed application program of text processing module 3041 will to be passed through
It uses the description information of program as input, the classification information 305 for generating and exporting application program is judged based on classification similarity.?
In this example, because user may tend to using the different application for belonging to the same category, the input of model is
The title and quantity 301 of the application program have the title and strength of association for installing associated application program with the application program
302, there is the description information 306 using associated Apply Names and strength of association 303 and application program with the application program,
Judged by text-processing and classification similarity, is exported as the corresponding classification information 305 of the application program.
Fig. 2 is returned to, category classification model 204 is also required to timing updating maintenance.Category classification model 204 not only needs to make
With application program install and using the application program in mark sheet 203 install and use information and application program description information and
When obtain category division information, it is also necessary to using be newly indexed to application program installation and install and use information using in table 203
And the more new information 207 of the description information of application program re-starts off-line training to category classification model 204, so that model
204 can identify more application types.These more new informations 207 being newly indexed to are sent from mobile device to server
Information, can from the user of carry out credit applications mobile device actively to server provide, can also be by server master
Trend mobile device request.
It is installed in application program and using application program provided by mark sheet 203 installs and uses information and by category division
On the basis of the classification information for the application program that model 204 generates, risk evaluation model 205 carries out classification and risk assessment, generates
Risk assessment rank 206.Risk assessment rank 206 can be bi-values, and respectively representing credit applications user is that bull debt-credit is used
Family and/or have it is overdue repay etc. record to there are credit risk and credit applications user do not have the above problem to
There is no credit risk, it is also possible to the numerical value of such as percent value or the value of the confidence, indicates respectively that credit applications user is bull
It borrows or lends money user and/or has the records such as overdue repaying to a possibility that there are credit risks.Credit information service or credit agency
Staff can take credit applications user different risk resolution schemes according to the risk assessment rank 206.
The example logical architecture block diagram of risk evaluation model 205 is referring to fig. 4.Risk evaluation model 403 by building offline
Simultaneously parameter is arranged by machine learning using training data in mould.The input of risk evaluation model 403 is answers corresponding with identification code
With the classification information 402 for installing and using information 401 and generated by category classification model of program.Wherein, the peace of application program
Dress use information 401 specifically includes every terms of information 4011 to 4016 as described above etc..Risk evaluation model 205 includes classifier
4031, for installing and using information 401 and classification information 402 is classified to generate risk assessment rank to above-mentioned.Risk is commented
Estimate that model 205 not only needs to install and use information using application program and the description information of application program show that risk is commented in time
Estimate rank 404, it is also necessary to which using feedback information 208, off-line training adjusts model with the performance of improved model again.
In the disclosure, risk assessment mainly is carried out using application relevant to financial consumption behavior in application program.This
Field is it should be understood to the one skilled in the art that also can be used and the associated application of communication behavior, such as phone application or short message application, use
To using the relevant information of behavior, it is right using instant messaging applications such as relevant to social networks applications, such as WeChat
The credit request of credit applications user carries out risk assessment.
Credit information service or credit agency can also provide the feedback information 208 of risk assessment rank to risk evaluating system,
The feedback information is supplied to risk evaluation model 205 and adjusts the risk evaluation model 205 for off-line training to improve model
Evaluation accuracy.For example, positive feedback proves the accuracy of the risk assessment rank 206 of risk evaluation model 205, and reverse side is anti-
Feedback then prompts risk evaluation model 205 for being not met by accordingly using the classification performance of mount message and classification information
It is required that needing further training pattern parameter.In addition, feedback information 208 can also further adjust category classification model, improve
The assessment coverage rate and accuracy rate of entire risk evaluating system.
By the risk evaluating system of the embodiment of the present disclosure, compared to existing only with class application program and the debt-credit class application of managing money matters
Program come judge carry out credit applications user risk class, can further use mobile device identification code obtain correspond to
Application program install and use information and classification information, in conjunction with the installation row of the application program for the user for carrying out credit applications
Further to analyze with usage behavior, the financial consumption habit based on credit applications user carries out various dimensions portrait, to credit Shen
Credit fraud (including overdue, promise breaking etc.) risk of user please is accurately estimated, to borrow to financial institution and net flat
The risk control of platform provides help.
The methods of risk assessment and device according to the embodiment of the present disclosure is hereinafter described, wherein with embodiments above
In same or similar content will not be described in great detail.
Fig. 5 shows the methods of risk assessment according to the embodiment of the present disclosure, and this method is mainly used in server, including as follows
Step:
S100: the identification code of the mobile device from terminal device is received;
S200: the classification letter of application program corresponding with identification code installed and used information and generate application program is obtained
Breath;
S300: risk assessment rank corresponding with identification code is generated based on information and classification information is installed and used;
S400: risk assessment rank is sent to terminal device.
Wherein, application program corresponding with identification code is obtained in step S200 installs and uses information and generation using journey
The classification information of sequence include thes steps that as shown in Figure 6:
S210: identification code is inquired in identification code data library;
S220: if identification code is present in identification code data library, mark sheet is installed and used to inquiry application, with
Acquisition is corresponding with identification code to install and use information and description information;
S230: based on information and description information is installed and used, classification information is generated.
Wherein, the classification information of application program is generated, main use classes partitioning model makes according to the installation of application program
With the title of the application program installed in mobile device in information and quantity, have the title for installing associated application program and
The degree of correlation has title and the degree of correlation these information using associated application program, and the description information of connected applications program is completed.
Wherein, category classification model will install and use information and description information carries out text-processing and based on the judgement life of classification similarity
At classification information.The other information in information is installed and used as the basis to application class of procedures furthermore it is also possible to use, but
It is the title of application program, quantity, installing and using information and can more accurately characterize the finance of user in nearest a period of time
Consumer behavior.
In accordance with an embodiment of the present disclosure, the server received application program from mobile device installs and uses information
The description information of more new data and application program, the class that can be used for training category classification model to identify new application program
Not.
According to the embodiment of the present disclosure, information and application program are installed and used when application program of the reception from mobile device
Description information when, update identification code data library and application program installation and use mark sheet.
In step S300, risk assessment rank corresponding with identification code, wind are further generated by risk evaluation model
Dangerous assessment models are to installing and using information and classification information is classified to generate risk assessment rank.
Fig. 7 then shows the flow chart of the methods of risk assessment according to another embodiment of the disclosure.The methods of risk assessment phase
Than methods of risk assessment shown in fig. 5, after step S400, further includes:
S500: the feedback of the risk assessment rank from terminal device is obtained to update risk evaluation model.
By the feedback, the Evaluation accuracy of model can be improved.
Fig. 8 shows the exemplary process diagram of the methods of risk assessment according to the embodiment of the present disclosure, which answers
For terminal device, include the following steps:
S600: the identification code for sending mobile device to server is made with the installation for obtaining application program corresponding with identification code
With information and classification information;
S700: it receives generating with the identification code pair based on information and classification information is installed and used from server
The risk assessment rank answered.
Wherein, when the installation for the identification code and application program corresponding with the identification code for sending mobile device to server
When use information and description information, updates identification code data library and application program installation and use mark sheet.
In accordance with an embodiment of the present disclosure, above-mentioned methods of risk assessment compares method shown in Fig. 8, further includes as shown in Figure 9
The step of:
S800: the feedback of risk assessment rank is sent to server.
By the methods of risk assessment applied to server and terminal of the embodiment of the present disclosure, mobile device can be used
What identification code obtained corresponding application program installs and uses information and classification information, in conjunction with the application program of credit applications user
Installation behavior and usage behavior further analyze, financial consumption based on credit applications user habit carries out various dimensions portrait,
The credit risk of fraud of credit applications user is accurately estimated.
The risk assessment device according to the embodiment of the present disclosure is described more fully below.
Figure 10 is the schematic block diagram according to the risk assessment device of the embodiment of the present disclosure.The risk assessment device
500 include:
Acquiring unit 501 is set as receiving the identification code of the mobile device from terminal device;
Feature generation unit 502, be set as acquisition application program corresponding with identification code installs and uses information and life
At the classification information of application program;
Risk assessment unit 503 is set as installing and using information and classification information generation and knowledge based on application program
The corresponding risk assessment rank of other code;
Transmission unit 504 is set as sending risk assessment rank to terminal device.Wherein, feature generation unit 502 is also set
It is set to:
Identification code is inquired in identification code data library;
If identification code is present in identification code data library, inquires mobile device installation and use mark sheet, to obtain
Application program corresponding with identification code installs and uses information and description information;
Based on information and description information is installed and used, classification information is generated.
The embodiment of the present disclosure according to shown in Figure 11, feature generation unit 502 include category classification model 5021, are set as
Title based on the application program installed in mobile device and quantity have the title for installing associated application program and related
The description information for spending, having the title and the degree of correlation and application program that use associated application program, generates the class of application program
Other information.Wherein, category classification model 5021 includes text processing module and classification similarity calculation module, this article present treatment mould
Block carries out text-processing and can be identified with obtaining classification similarity calculation module for that will install and use information and description information
Form, classification similarity calculation module be then used for based on classification similarity judgement generate classification information.
According to another embodiment, feature generation unit 502 is also configured to received from mobile device based on server
Application program installs and uses the more new data of information and the description information of application program, and training category classification model is to identify
The classification of new application program.
According to yet another embodiment, feature generation unit 502 is also configured to: when application program of the reception from mobile device
When installing and using the description information of information and application program, updates identification code data library and application program installation and use feature
Table.
The embodiment according to shown in Figure 12, risk assessment unit 503 include risk evaluation model 5031, are set as being based on answering
With program install and use information and classification information carries out classification and generates risk assessment rank corresponding with identification code.
Further, which is also configured to obtain the feedback of risk assessment rank to update risk assessment
Model 5031.
Figure 13 then shows the terminal device 600 according to the embodiment of the present disclosure, which includes:
Transmission unit 601 is set as sending the identification code of mobile device to server to obtain answer corresponding with identification code
Information and classification information are installed and used with program;
Receiving unit 602 is set as receiving and installs and uses information and classification based on application program from server
The risk assessment rank corresponding with identification code that information generates.
According to the embodiment of the present disclosure, which is also configured to send the feedback of risk assessment rank to server.
By the risk assessment device and terminal device of the embodiment of the present disclosure, the identification code that mobile device can be used is obtained
Corresponding application program installs and uses information and classification information, in conjunction with the installation behavior of the application program of credit applications user
It is further analyzed with usage behavior, the financial consumption habit based on credit applications user carries out various dimensions portrait, to credit applications
The credit risk of fraud of user is accurately estimated.
It should be noted that although being referred to several moulds of risk assessment device and risk assessment terminal in the above detailed description
Block or unit, but this division is not enforceable.In fact, according to embodiment of the present disclosure, above-described two
A or more module or the feature and function of unit can embody in a module or unit.Conversely, above description
A module or unit feature and function can with further division be embodied by multiple modules or unit.As
The component that module or unit are shown may or may not be physical unit, it can and it is in one place, or can also
To be distributed over a plurality of network elements.Some or all of the modules therein can be selected to realize this public affairs according to the actual needs
The purpose of evolution case.Those of ordinary skill in the art can understand and implement without creative efforts.
In an exemplary embodiment of the disclosure, a kind of computer readable storage medium is additionally provided, meter is stored thereon with
Calculation machine program, the program include executable instruction, which may be implemented above-mentioned any when being executed by such as processor
Described in one embodiment the step of methods of risk assessment.In some possible embodiments, various aspects of the invention are also
It can be implemented as a kind of form of program product comprising program code, when described program product is run on the terminal device,
Said program code is various according to the disclosure described in this specification methods of risk assessment for executing the terminal device
The step of exemplary embodiment.
Program product according to an embodiment of the present disclosure for realizing the above method can be using portable compact disc only
It reads memory (CD-ROM) and including program code, and can be run on terminal device, such as PC.However, this public affairs
The program product opened is without being limited thereto, and in this document, readable storage medium storing program for executing can be any tangible Jie for including or store program
Matter, the program can be commanded execution system, device or device use or in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter
Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or
System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive
List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only
Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory
(CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The computer readable storage medium may include in a base band or the data as the propagation of carrier wave a part are believed
Number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetism
Signal, optical signal or above-mentioned any appropriate combination.Readable storage medium storing program for executing can also be any other than readable storage medium storing program for executing
Readable medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or
Person's program in connection.The program code for including on readable storage medium storing program for executing can transmit with any suitable medium, packet
Include but be not limited to wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the disclosure operation program
Code, described program design language include object oriented program language-Java, C++ etc., further include conventional
Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user
It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating
Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far
Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network
(WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP
To be connected by internet).
In an exemplary embodiment of the disclosure, a kind of electronic equipment is also provided, which may include processor,
And the memory of the executable instruction for storing the processor.Wherein, the processor is configured to via described in execution
Executable instruction is come the step of executing the methods of risk assessment in any one above-mentioned embodiment.
Person of ordinary skill in the field it is understood that various aspects of the disclosure can be implemented as system, method or
Program product.Therefore, various aspects of the disclosure can be with specific implementation is as follows, it may be assumed that complete hardware embodiment, complete
The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here
Referred to as circuit, " module " or " system ".
The electronic equipment 700 of this embodiment according to the disclosure is described referring to Figure 14.The electricity that Figure 14 is shown
Sub- equipment 700 is only an example, should not function to the embodiment of the present disclosure and use scope bring any restrictions.
As shown in figure 14, electronic equipment 700 is showed in the form of universal computing device.The component of electronic equipment 700 can be with
Including but not limited to: at least one processing unit 710, at least one storage unit 720, the different system components of connection (including are deposited
Storage unit 720 and processing unit 710) bus 730, display unit 740 etc..
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 710
Row, so that the processing unit 710 executes this specification for various examples according to the present invention described in methods of risk assessment
The step of property embodiment.For example, the processing unit 710 can execute the step as shown in Fig. 5 to Fig. 9.
The storage unit 720 may include the readable medium of volatile memory cell form, such as random access memory
Unit (RAM) 7201 and/or cache memory unit 7202 can further include read-only memory unit (ROM) 7203.
The storage unit 720 can also include program/practical work with one group of (at least one) program module 7205
Tool 7204, such program module 7205 includes but is not limited to: operating system, one or more application program, other programs
It may include the realization of network environment in module and program data, each of these examples or certain combination.
Bus 730 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage
Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures
Local bus.
Electronic equipment 700 can also be with one or more external equipments 800 (such as keyboard, sensing equipment, bluetooth equipment
Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 700 communicate, and/or with make
The electronic equipment 700 any equipment (such as the router, modulatedemodulate that can be communicated with one or more of the other calculating equipment
Adjust device etc.) communication.This communication can be carried out by input/output (I/O) interface 750.Also, electronic equipment 700 may be used also
To pass through network adapter 760 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network
Network, such as internet) communication.Network adapter 760 can be communicated by bus 730 with other modules of electronic equipment 700.
It should be understood that although not shown in the drawings, other hardware and/or software module can not used in conjunction with electronic equipment 700, including but not
Be limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and
Data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented
Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure
The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one
Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating
Equipment (can be personal computer, server or network equipment etc.) executes the risk assessment according to disclosure embodiment
Method.
Those skilled in the art will readily occur to its of the disclosure after considering specification and practicing scheme disclosed herein
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or
Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by appended
Claim is pointed out.
Claims (15)
1. a kind of methods of risk assessment, which is characterized in that the methods of risk assessment includes:
Receive the identification code of the mobile device from terminal device;
Obtain the classification letter of application program corresponding with the identification code installed and used information and generate the application program
Breath;
Information and classification information generation risk assessment rank corresponding with the identification code are installed and used based on described;With
And
The risk assessment rank is sent to the terminal device.
2. methods of risk assessment according to claim 1, which is characterized in that it is described install and use information include it is following at least
One of: the title and quantity of the application program installed in mobile device, the installation of application program is remembered during specific time
Record, during specific time the safety records of the usage record, application program of application program, have the associated application program of installation
Title and the degree of correlation, have title and the degree of correlation using associated application program.
3. methods of risk assessment according to claim 1 or 2, which is characterized in that obtain answer corresponding with the identification code
Include: with the classification information of program installed and used information and generate the application program
The identification code is inquired in identification code data library;
If the identification code is present in the identification code data library, mark sheet is installed and used to inquiry application, with
Obtain the description information for installing and using information and application program corresponding with the identification code;
Information and the description information are installed and used based on described, generates the classification information.
4. methods of risk assessment according to claim 3, which is characterized in that based on the information and described installed and used
Description information, generating the classification information includes:
Title and quantity based on the application program installed in mobile device have the title and phase for installing associated application program
Guan Du, have using the title and the degree of correlation of associated application program and the description information, generate the classification information.
5. methods of risk assessment according to claim 4, which is characterized in that generate the classification by category classification model
Information, wherein information and the description information installed and used is carried out text-processing and be based on by the category classification model
The judgement of classification similarity generates the classification information.
6. methods of risk assessment according to claim 5, which is characterized in that based on the peace from the mobile device
The more new data of dress use information and the description information, the training category classification model is to identify new application program
Classification.
7. methods of risk assessment according to claim 1 or 2, which is characterized in that based on it is described install and use information and
The classification information generate risk assessment rank corresponding with the identification code include: by risk evaluation model generation with it is described
The corresponding risk assessment rank of identification code, the risk evaluation model to it is described install and use information and the classification information into
Row classification is to generate the risk assessment rank.
8. methods of risk assessment according to claim 3, which is characterized in that further include: when reception is from mobile device
When installing and using information and description information of the application program updates the identification code data library and application program installation
With use mark sheet.
9. methods of risk assessment according to claim 7, which is characterized in that further include: it obtains and comes from the terminal device
The risk assessment rank feedback to update the risk evaluation model.
10. methods of risk assessment according to claim 1 or 2, which is characterized in that the identification code is IMEI code.
11. a kind of methods of risk assessment, which is characterized in that the methods of risk assessment includes:
The identification code of mobile device, which is sent, to server installs and uses letter with obtain application program corresponding with the identification code
Breath and classification information;
Receive from the server to install and use information and the classification information generating with the identification based on described
The corresponding risk assessment rank of code.
12. a kind of risk assessment device, which is characterized in that the risk assessment device includes:
Acquiring unit is set as receiving the identification code of the mobile device from terminal device;
Feature generation unit, be set as acquisition application program corresponding with the identification code installs and uses information and generation institute
State the classification information of application program;
Risk assessment unit is set as installing and using information and classification information generation and the identification code pair based on described
The risk assessment rank answered;And
Transmission unit is set as sending the risk assessment rank to the terminal device.
13. a kind of risk assessment terminal device, which is characterized in that the risk assessment terminal device includes:
Transmission unit is set as corresponding with the identification code using journey to obtain to the identification code of server transmission mobile device
Sequence installs and uses information and classification information;
Receiving unit is set as receiving and installs and uses information and classification information life based on described from the server
At risk assessment rank corresponding with the identification code.
14. a kind of computer readable storage medium is stored thereon with the computer program including executable instruction, described executable
When instruction is executed by processor, implement methods of risk assessment according to any one of claim 1 to 11.
15. a kind of electronic equipment characterized by comprising
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to execute via the executable instruction is executed according to claim 1 to any in 11
The step of methods of risk assessment described in item.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810305580.3A CN110197315B (en) | 2018-04-08 | 2018-04-08 | Risk assessment method, apparatus and storage medium thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810305580.3A CN110197315B (en) | 2018-04-08 | 2018-04-08 | Risk assessment method, apparatus and storage medium thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110197315A true CN110197315A (en) | 2019-09-03 |
CN110197315B CN110197315B (en) | 2024-03-22 |
Family
ID=67751286
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810305580.3A Active CN110197315B (en) | 2018-04-08 | 2018-04-08 | Risk assessment method, apparatus and storage medium thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110197315B (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110705637A (en) * | 2019-09-29 | 2020-01-17 | 上海淇玥信息技术有限公司 | User classification method and device based on application installation list information and electronic equipment |
CN110796542A (en) * | 2019-09-26 | 2020-02-14 | 北京淇瑀信息科技有限公司 | Financial risk control method, financial risk control device and electronic equipment |
CN110796453A (en) * | 2019-09-30 | 2020-02-14 | 深圳市云积分科技有限公司 | E-commerce club member grade processing method and device |
CN111161042A (en) * | 2019-11-26 | 2020-05-15 | 深圳壹账通智能科技有限公司 | Personal risk assessment method, device, terminal and storage medium |
CN111210335A (en) * | 2019-12-16 | 2020-05-29 | 北京淇瑀信息科技有限公司 | User risk identification method and device and electronic equipment |
CN111210336A (en) * | 2019-12-16 | 2020-05-29 | 北京淇瑀信息科技有限公司 | User risk model generation method and device and electronic equipment |
CN111429003A (en) * | 2020-03-23 | 2020-07-17 | 北京互金新融科技有限公司 | Data processing method and device |
CN111784174A (en) * | 2020-07-10 | 2020-10-16 | 上海淇毓信息科技有限公司 | Method and device for managing risk policy based on user portrait and electronic equipment |
CN111783039A (en) * | 2020-06-30 | 2020-10-16 | 北京百度网讯科技有限公司 | Risk determination method, risk determination device, computer system and storage medium |
CN111861174B (en) * | 2020-07-09 | 2021-04-13 | 北京睿知图远科技有限公司 | Credit assessment method for user portrait |
CN113254932A (en) * | 2021-06-16 | 2021-08-13 | 百度在线网络技术(北京)有限公司 | Application program risk detection method and device, electronic equipment and medium |
CN113362156A (en) * | 2021-05-26 | 2021-09-07 | 哈尔滨工业大学重庆研究院 | Financial fraud detection and identification system based on Internet of things |
CN113497743A (en) * | 2020-04-07 | 2021-10-12 | 陈美章 | Network application monitoring and analyzing system and method |
CN113706040A (en) * | 2021-09-01 | 2021-11-26 | 深圳前海微众银行股份有限公司 | Risk identification method, device, equipment and storage medium |
CN116074118A (en) * | 2023-03-07 | 2023-05-05 | 北京安胜华信科技有限公司 | API access control method, system, intelligent terminal and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060287947A1 (en) * | 2005-06-16 | 2006-12-21 | Toms Alvin D | Non-payment risk assessment |
CN102968297A (en) * | 2012-10-25 | 2013-03-13 | 北京奇虎科技有限公司 | Software management system and method for mobile terminal |
CN106504099A (en) * | 2015-09-07 | 2017-03-15 | 国家计算机网络与信息安全管理中心 | A kind of system for building user's portrait |
CA2931808A1 (en) * | 2016-05-31 | 2017-11-30 | Tracker Networks Inc. | Methos and systems for mobile device risk mamnagement |
CN107767259A (en) * | 2017-09-30 | 2018-03-06 | 平安科技(深圳)有限公司 | Loan risk control method, electronic installation and readable storage medium storing program for executing |
CN107798118A (en) * | 2017-11-08 | 2018-03-13 | 北京奇虎科技有限公司 | User's portrait building method, device and computing device based on big data |
CN107818506A (en) * | 2017-09-30 | 2018-03-20 | 上海壹账通金融科技有限公司 | Electronic installation, credit risk control method and storage medium |
-
2018
- 2018-04-08 CN CN201810305580.3A patent/CN110197315B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060287947A1 (en) * | 2005-06-16 | 2006-12-21 | Toms Alvin D | Non-payment risk assessment |
CN102968297A (en) * | 2012-10-25 | 2013-03-13 | 北京奇虎科技有限公司 | Software management system and method for mobile terminal |
CN106504099A (en) * | 2015-09-07 | 2017-03-15 | 国家计算机网络与信息安全管理中心 | A kind of system for building user's portrait |
CA2931808A1 (en) * | 2016-05-31 | 2017-11-30 | Tracker Networks Inc. | Methos and systems for mobile device risk mamnagement |
CN107767259A (en) * | 2017-09-30 | 2018-03-06 | 平安科技(深圳)有限公司 | Loan risk control method, electronic installation and readable storage medium storing program for executing |
CN107818506A (en) * | 2017-09-30 | 2018-03-20 | 上海壹账通金融科技有限公司 | Electronic installation, credit risk control method and storage medium |
CN107798118A (en) * | 2017-11-08 | 2018-03-13 | 北京奇虎科技有限公司 | User's portrait building method, device and computing device based on big data |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110796542A (en) * | 2019-09-26 | 2020-02-14 | 北京淇瑀信息科技有限公司 | Financial risk control method, financial risk control device and electronic equipment |
CN110705637A (en) * | 2019-09-29 | 2020-01-17 | 上海淇玥信息技术有限公司 | User classification method and device based on application installation list information and electronic equipment |
CN110796453A (en) * | 2019-09-30 | 2020-02-14 | 深圳市云积分科技有限公司 | E-commerce club member grade processing method and device |
CN111161042A (en) * | 2019-11-26 | 2020-05-15 | 深圳壹账通智能科技有限公司 | Personal risk assessment method, device, terminal and storage medium |
CN111210335A (en) * | 2019-12-16 | 2020-05-29 | 北京淇瑀信息科技有限公司 | User risk identification method and device and electronic equipment |
CN111210336A (en) * | 2019-12-16 | 2020-05-29 | 北京淇瑀信息科技有限公司 | User risk model generation method and device and electronic equipment |
CN111210335B (en) * | 2019-12-16 | 2023-11-14 | 北京淇瑀信息科技有限公司 | User risk identification method and device and electronic equipment |
CN111429003A (en) * | 2020-03-23 | 2020-07-17 | 北京互金新融科技有限公司 | Data processing method and device |
CN111429003B (en) * | 2020-03-23 | 2023-11-03 | 北京互金新融科技有限公司 | Data processing method and device |
CN113497743A (en) * | 2020-04-07 | 2021-10-12 | 陈美章 | Network application monitoring and analyzing system and method |
CN111783039B (en) * | 2020-06-30 | 2023-08-18 | 北京百度网讯科技有限公司 | Risk determination method, risk determination device, computer system and storage medium |
CN111783039A (en) * | 2020-06-30 | 2020-10-16 | 北京百度网讯科技有限公司 | Risk determination method, risk determination device, computer system and storage medium |
CN111861174B (en) * | 2020-07-09 | 2021-04-13 | 北京睿知图远科技有限公司 | Credit assessment method for user portrait |
CN111784174B (en) * | 2020-07-10 | 2022-09-20 | 上海淇毓信息科技有限公司 | Method and device for managing risk policy based on user portrait and electronic equipment |
CN111784174A (en) * | 2020-07-10 | 2020-10-16 | 上海淇毓信息科技有限公司 | Method and device for managing risk policy based on user portrait and electronic equipment |
CN113362156A (en) * | 2021-05-26 | 2021-09-07 | 哈尔滨工业大学重庆研究院 | Financial fraud detection and identification system based on Internet of things |
CN113362156B (en) * | 2021-05-26 | 2023-10-17 | 哈尔滨工业大学重庆研究院 | Financial fraud detection and identification system based on Internet of Things |
CN113254932A (en) * | 2021-06-16 | 2021-08-13 | 百度在线网络技术(北京)有限公司 | Application program risk detection method and device, electronic equipment and medium |
CN113254932B (en) * | 2021-06-16 | 2024-02-27 | 百度在线网络技术(北京)有限公司 | Application risk detection method and device, electronic equipment and medium |
CN113706040A (en) * | 2021-09-01 | 2021-11-26 | 深圳前海微众银行股份有限公司 | Risk identification method, device, equipment and storage medium |
CN116074118B (en) * | 2023-03-07 | 2023-06-13 | 北京安胜华信科技有限公司 | API access control method, system, intelligent terminal and storage medium |
CN116074118A (en) * | 2023-03-07 | 2023-05-05 | 北京安胜华信科技有限公司 | API access control method, system, intelligent terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110197315B (en) | 2024-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110197315A (en) | Methods of risk assessment, device and its storage medium | |
KR100751965B1 (en) | method and system for predicting attrition customers | |
CN109360012A (en) | The selection method and device, storage medium, electronic equipment of advertisement dispensing channel | |
US20190147430A1 (en) | Customizing payment sessions with machine learning models | |
CN108416668A (en) | Trade tracking and financing by accounts receivable method, system, equipment and storage medium | |
CN109410036A (en) | A kind of fraud detection model training method and device and fraud detection method and device | |
CN110992169A (en) | Risk assessment method, device, server and storage medium | |
US20180211480A1 (en) | Computer system for multiple user, multiple event real-time online wagering | |
CN109063920A (en) | A kind of transaction risk recognition methods, device and computer equipment | |
CN110070430A (en) | Assess method and device, the storage medium, electronic equipment of refund risk | |
CN110349003A (en) | Co-related risks appraisal procedure, device and electronic equipment based on social data | |
CN109922032A (en) | Method and apparatus for determining the risk of logon account | |
CN111127178A (en) | Data processing method and device, storage medium and electronic equipment | |
CN110147823A (en) | A kind of air control model training method, device and equipment | |
CN109983491A (en) | By artificial intelligence application in converging the method and apparatus of money by using voice input | |
CN110348471A (en) | Exception object recognition methods, device, medium and electronic equipment | |
CN110516967A (en) | A kind of method and relevant apparatus of information evaluation | |
CN110363655A (en) | Target user's recognition methods, device and electronic equipment based on temporal characteristics | |
CN108320220A (en) | A kind of assessment system and method for user credit degree | |
CN112232947A (en) | Loan risk prediction method and device | |
CN109002465A (en) | For having the method and system of the dialogue input equipment of intelligent crowdsourcing option | |
CN109145590A (en) | A kind of function hook detection method, detection device and computer-readable medium | |
CN110310123A (en) | Risk judgment method and apparatus | |
CN110457601A (en) | The recognition methods and device of social account, storage medium and electronic device | |
CN112330355B (en) | Method, device, equipment and storage medium for processing consumption coupon transaction data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |