CN110197315A - Methods of risk assessment, device and its storage medium - Google Patents

Methods of risk assessment, device and its storage medium Download PDF

Info

Publication number
CN110197315A
CN110197315A CN201810305580.3A CN201810305580A CN110197315A CN 110197315 A CN110197315 A CN 110197315A CN 201810305580 A CN201810305580 A CN 201810305580A CN 110197315 A CN110197315 A CN 110197315A
Authority
CN
China
Prior art keywords
information
risk assessment
application program
identification code
classification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810305580.3A
Other languages
Chinese (zh)
Other versions
CN110197315B (en
Inventor
吴艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201810305580.3A priority Critical patent/CN110197315B/en
Publication of CN110197315A publication Critical patent/CN110197315A/en
Application granted granted Critical
Publication of CN110197315B publication Critical patent/CN110197315B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Abstract

The disclosure proposes methods of risk assessment, device and its storage medium, wherein this method comprises: receiving the identification code of the mobile device from terminal device;Obtain the classification information of application program corresponding with identification code installed and used information and generate application program;Information and classification information generation risk assessment rank corresponding with identification code are installed and used based on application program, and sends risk assessment rank to terminal device.Disclosed method carries out category division and portrait based on application program of the above- mentioned information to the user for carrying out credit applications, and various dimensions portrait is carried out based on the financial consumption for the user for carrying out credit applications habit, it can obtain the accurate evaluation result of the credit and risk of fraud that carry out the user of credit applications.

Description

Methods of risk assessment, device and its storage medium
Technical field
This disclosure relates to information evaluation field, and in particular, to a kind of methods of risk assessment, device and its storage medium.
Background technique
With relaxing for credit policy, petty cash borrows the quantity of crowd and the scale of demand for loan is growing.Due to Lack and the history of the detailed reference of credit applications user record investigated, credit agency be difficult to the credit of credit applications user and Risk of fraud makes effective assessment, so that the risk control to credit funds brings difficulty.
Bull debt-credit user is primarily present in cash loan crowd, which cannot be suitable in bank and other financial mechanism Financial product and service.But due to credit policy relax and numerous little Dai companies, net borrow platform appearance, cash borrow Crowd mainly carries out small amount debt-credit by borrowing in the lower net of application threshold on platform.Since net borrows the sign that information does not charge to Central Bank Letter system, and the information sharing degree netted between loan platform is lower, and partial cash, which borrows crowd, can develop into normal loan crowd, A variety of nets, which are borrowed on platform, small amount creditor-debtor entry and overdue repaying record, therefore these normal loan crowds are referred to as bull debt-credit and use Family.
Financing class to user installation and the detection of debt-credit class mobile phone application are based primarily upon to the identification of bull debt-credit user. The technology show that the list of manage money matters class and debt-credit class mobile phone application as reference listing, is answered by user mobile phone by manual sorting Installation list compares matching with known reference list, when what is applied in the mobile phone application hit reference listing of user installation When number reaches given threshold, the user is just determined as bull debt-credit user.
But manual sorting is based on to financing class and the maintenance for borrowing or lending money class mobile phone list of application, do not only result in reference listing Lag, and expend huge human cost.In addition, the class that will manage money matters is borrowed with the installation number for borrowing or lending money the application of class mobile phone as bull The unique judging characteristic for borrowing user, will lead to higher False Rate, for example, the more financing class mobile phone of credit applications user installation is answered With with more debt-credit class mobile phone application is installed, corresponding user's property is differentiated.
Accordingly, there exist carry out the demand that methods of risk assessment and device improve to credit applications user.
Summary of the invention
Aiming to overcome that for the disclosure uses credit applications using the installation list of financing class and debt-credit class mobile phone application Family carries out that information delay, cost caused by risk assessment be huge and the higher problem of False Rate, improves wind with lower cost The accuracy and efficiency nearly assessed.
According to the one side of the disclosure, a kind of methods of risk assessment is proposed, which includes:
Receive the identification code of the mobile device from terminal device;
Obtain the class of application program corresponding with the identification code installed and used information and generate the application program Other information;
Information and classification information generation risk assessment grade corresponding with the identification code are installed and used based on described Not;
The risk assessment rank is sent to the terminal device.
In accordance with an embodiment of the present disclosure, the information of installing and using includes at least one following: being installed in mobile device Application program title and quantity, during specific time the installation record of application program, answer during specific time With the safety records of the usage record, application program of program, there are the title for installing associated application program and the degree of correlation, has use The title and the degree of correlation of associated application program.
In accordance with an embodiment of the present disclosure, obtain application program corresponding with the identification code installs and uses information and life Classification information at the application program includes: to inquire the identification code in the identification code data library;If the identification Code is present in the identification code data library, then mark sheet is installed and used to inquiry application, to obtain and the identification code The corresponding description information for installing and using information and application program;Information and the description are installed and used based on described Information generates the classification information.
In accordance with an embodiment of the present disclosure, information is installed and used based on described, generating the classification information includes: to be based on moving The title and quantity of the application program installed in dynamic equipment have the title for installing associated application program and the degree of correlation, have use The title and the degree of correlation and the description information of associated application program, generate the classification information.
In accordance with an embodiment of the present disclosure, the classification information is generated by category classification model, wherein the category division Model installs and uses information and description information progress text-processing and based on classification similarity judgement generation institute for described State classification information.
In accordance with an embodiment of the present disclosure, based on the more new data for installing and using information and the description information, instruction Practice the category classification model to identify the classification of new application program.
In accordance with an embodiment of the present disclosure, information and classification information generation and the identification are installed and used based on described The corresponding risk assessment rank of code includes: to generate risk assessment rank corresponding with the identification code by risk evaluation model, The risk evaluation model installs and uses information and the classification information is classified to generate the risk assessment to described Rank.
In accordance with an embodiment of the present disclosure, methods of risk assessment further include: when the application of the reception from mobile device When installing and using information and description information of program updates the identification code data library and application program installation and using special Levy table.
In accordance with an embodiment of the present disclosure, methods of risk assessment further include: obtain the wind from the terminal device The feedback of dangerous level of evaluation is to update the risk evaluation model.
In accordance with an embodiment of the present disclosure, the identification code is IMEI code.
According to another aspect of the present disclosure, a kind of methods of risk assessment is proposed, which includes:
The identification code for sending mobile device to server is made with the installation for obtaining application program corresponding with the identification code With information and classification information;
Receive from the server based on it is described it is installing and using that information and the classification information generate with it is described The corresponding risk assessment rank of identification code.
In accordance with an embodiment of the present disclosure, the information of installing and using includes at least one following: being installed in mobile device Application program title and quantity, during specific time the installation record of application program, answer during specific time With the safety records of the usage record, application program of program, there are the title for installing associated application program and the degree of correlation, has use The title and the degree of correlation of associated application program.
In accordance with an embodiment of the present disclosure, methods of risk assessment further include: Xiang Suoshu server sends the risk assessment The feedback of rank.
In accordance with an embodiment of the present disclosure, the identification code is IMEI code.
According to the another aspect of the disclosure, a kind of risk assessment device is proposed, comprising:
Acquiring unit is set as receiving the identification code of the mobile device from terminal device;
Feature generation unit, be set as acquisition application program corresponding with the identification code installs and uses information and life At the classification information of the application program;
Risk assessment unit is set as installing and using information and classification information generation and the identification based on described The corresponding risk assessment rank of code;
Transmission unit is set as sending the risk assessment rank to the terminal device.
In accordance with an embodiment of the present disclosure, the information of installing and using includes at least one following: being installed in mobile device Application program title and quantity, during specific time the installation record of application program, answer during specific time With the safety records of the usage record, application program of program, there are the title for installing associated application program and the degree of correlation, has use The title and the degree of correlation of associated application program.
In accordance with an embodiment of the present disclosure, the feature generation unit is also configured to: in identification code data library described in inquiry Identification code;If the identification code is present in the identification code data library, mark sheet is installed and used to inquiry application, To obtain the description information for installing and using information and application program corresponding with the identification code;Made based on the installation With information and the description information, the classification information is generated.
In accordance with an embodiment of the present disclosure, the feature generation unit includes category classification model, the category classification model Be set as title and quantity based on the application program installed in mobile device, have the title for installing associated application program and The degree of correlation has using the title and the degree of correlation of associated application program and the description information, installs and uses information for described And the description information carries out text-processing and generates the classification information based on the judgement of classification similarity.
In accordance with an embodiment of the present disclosure, the feature generation unit is also configured to based on from described in the mobile device Install and use information more new data and the description information, the training category classification model is to identify new application program Classification.
In accordance with an embodiment of the present disclosure, the risk assessment unit includes risk evaluation model, the risk evaluation model It is set as installing and using information and the classification information is classified to generate and the risk assessment rank to described.
In accordance with an embodiment of the present disclosure, the feature generation unit is also configured to: when reception is from described in mobile device When installing and using information and description information of application program updates the identification code data library and application program installation and makes Use mark sheet.
In accordance with an embodiment of the present disclosure, the risk assessment unit is also configured to: obtaining the institute from the terminal device The feedback of risk assessment rank is stated to update the risk evaluation model.
In accordance with an embodiment of the present disclosure, the identification code is IMEI code.
According to the another further aspect of the disclosure, a kind of risk assessment terminal device is proposed, comprising:
Transmission unit is set as sending the identification code of mobile device to server to obtain answer corresponding with the identification code Information and classification information are installed and used with program;
Receiving unit is set as receiving and installs and uses information and classification letter based on described from the server Cease the risk assessment rank corresponding with the identification code generated.
In accordance with an embodiment of the present disclosure, the information of installing and using includes at least one following: being installed in mobile device Application program title and quantity, during specific time the installation record of application program, answer during specific time With the safety records of the usage record, application program of program, there are the title for installing associated application program and the degree of correlation, has use The title and the degree of correlation of associated application program.
In accordance with an embodiment of the present disclosure, the transmission unit is also configured to: Xiang Suoshu server sends the risk assessment The feedback of rank.
In accordance with an embodiment of the present disclosure, the identification code is IMEI code.
According to the another aspect of the disclosure, a kind of computer readable storage medium is proposed, be stored thereon with including executable The computer program of instruction when the executable instruction is executed by processor, is implemented according to methods of risk assessment as described above.
According to the another further aspect of the disclosure, a kind of electronic equipment is proposed, comprising:
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to execute risk assessment side as described above via the executable instruction is executed The step of method.
By methods of risk assessment, device provided by the disclosure and its storage medium, the identification code of mobile device is used Obtain corresponding application program installs and uses information and classification information, and based on above- mentioned information to the use for carrying out credit applications The application program at family carries out category division and portrait, in combination with the installation behavior of the application program for the user for carrying out credit applications It is further analyzed with usage behavior, the financial consumption habit based on the user for carrying out credit applications carries out various dimensions portrait, obtains The credit of user and the accurate evaluation of risk of fraud for carrying out credit applications are as a result, reducing cost and can effectively improve risk and comment The efficiency estimated.
Detailed description of the invention
Its exemplary embodiment is described in detail by referring to accompanying drawing, the above and other feature and advantage of the disclosure will become It is more obvious.
Figure 1A is the application scenarios schematic diagram according to the risk assessment scheme of the embodiment of the present disclosure;
Figure 1B is the query interface schematic diagram according to the risk evaluating system of the embodiment of the present disclosure;
Fig. 2 is the illustrative logical block diagram according to the risk evaluating system of the embodiment of the present disclosure;
Fig. 3 is the illustrative logical block diagram according to the category classification model of the risk evaluating system of the embodiment of the present disclosure;
Fig. 4 is the illustrative logical block diagram according to the risk evaluation model of the risk evaluating system of the embodiment of the present disclosure;
Fig. 5 is the exemplary process diagram according to the methods of risk assessment of the embodiment of the present disclosure;
Fig. 6 is the exemplary stream according to the classification information for generating application program in the methods of risk assessment of the embodiment of the present disclosure Cheng Tu;
Fig. 7 is the exemplary process diagram according to the methods of risk assessment of another embodiment of the disclosure;
Fig. 8 is the exemplary process diagram according to the methods of risk assessment of the embodiment of the present disclosure;
Fig. 9 is the exemplary process diagram according to the methods of risk assessment of another embodiment of the disclosure;
Figure 10 is the exemplary block diagram according to the risk assessment device of the embodiment of the present disclosure;
Figure 11 is the exemplary block diagram according to the feature generation unit of the risk assessment device of the embodiment of the present disclosure;
Figure 12 is the exemplary block diagram according to the risk assessment unit of the risk assessment device of the embodiment of the present disclosure;
Figure 13 is the exemplary block diagram according to the risk assessment terminal of the embodiment of the present disclosure;
Figure 14 is the schematic diagram according to the electronic equipment for implement general plan appraisal procedure of the embodiment of the present disclosure.
Specific embodiment
Exemplary embodiment is described more fully with reference to the drawings.However, exemplary embodiment can be with a variety of shapes Formula is implemented, and is not understood as limited to embodiment set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will Fully and completely, and by the design of exemplary embodiment comprehensively it is communicated to those skilled in the art.In the figure in order to clear It is clear, the size of subelement may be exaggerated or deformed.Identical appended drawing reference indicates same or similar knot in figure Structure, thus the detailed description that them will be omitted.
In addition, described feature, structure or characteristic can be incorporated in one or more implementations in any suitable manner In example.In the following description, many details are provided to provide and fully understand to embodiment of the disclosure.However, It will be appreciated by persons skilled in the art that can be with technical solution of the disclosure without one in the specific detail or more It is more, or can be using other methods, element etc..In other cases, be not shown in detail or describe known features, method or Person operates to avoid fuzzy all aspects of this disclosure.
Credit agency is mainly used in credit applications fund according to the methods of risk assessment of the embodiment of the present disclosure and device During examination & approval before granting are verified.The mobile device information that credit agency is provided by credit applications user is obtained to credit applications Credit fraud (including overdue, promise breaking etc.) risk of user estimates judgement, is effectively managed to the risk of credit funds And control.
Figure 1A shows the application scenarios schematic diagram of the risk assessment scheme of the disclosure.The mobile device 102 of user 101 is being pacified When filling application program (Application, abbreviation APP), APP server is accessed to obtain installation file.Mobile device 102 is regular Identification code and application program to the offer of server 105 including mobile device 101 install and use the information of information, server 105 Data acquisition request periodically can also be sent to mobile device 102 to obtain the identification code of mobile device 101 and application program peace Fill use information.Between mobile device 102 and server 105 carry out data exchange when with the identification code of mobile device 102 into Row identification.Identification code is corresponding with credit applications user, therefore can be characterized by identification code and hold the mobile device 102 Credit applications user, all features corresponding with identification code and portrait, all represent the feature and portrait of credit applications user.
In the disclosure, mobile device 102 includes but is not limited to mobile phone, personal digital assistant PDA, tablet device PAD, net book and laptop etc..Mobile device 102 can be led to server 105 via wirelessly or non-wirelessly network Letter.Server 105 can be the individual server or server zone of Local or Remote.For example, mobile device 102 is intelligent hand Machine runs such as operation system of smart phone of Android (Android) or apple (IOS) thereon.When mobile device 102 is operation When the smart phone of Android system, application program is mobile phone application, generally in mobile device in the form of APK installation file It is transmitted between 102 and server 105.When mobile device 102 is to run the apple iphone mobile phone of IOS system, application program It is transmitted between mobile device 102 and APP server in the form of the APP installation file on the App store of apple.The disclosure Mobile device 102 can also run other operating systems such as Window Phone, Symbian, Blackberry.At this In open, identification code is with international identification code IMEI for example, skilled person will understand that IMEI code is not to make For the unique forms of identification code.
When user 101 services on line or under line to credit agency's demand for credit as credit applications user, user 101 The identification code of its mobile device 102 is provided to credit agency.The staff 103 of credit agency or credit information service is set by terminal The server 105 of front end finance fraud detection interface access rear end on standby 104, meanwhile, the work of credit agency or credit information service It is used as personnel 103 and obtains the progress credit applications corresponding with the identification code from server 105 also by terminal device 104 The risk assessment rank at family 101, and determine that user 101 is (for example, more with the presence or absence of credit risk according to the risk assessment rank Head debt-credit user) and take corresponding credit policies.Figure 1B is then shown to be connect according to the credit fraud detection of the embodiment of the present disclosure The query interface of mouth.The staff 103 of credit agency or credit information service passes through defeated in the input frame 106 of terminal device 104 Enter to carry out the identification code of the mobile device 102 of the user 101 of credit applications, system in the message box 107 of terminal device 104 to The staff 103 of credit agency or credit information service returns to Credit Risk Assessment information.
Fig. 2 then shows the logic diagram of the risk evaluating system according to the embodiment of the present disclosure.
When user's demand for credit service, the identification code 201 of mobile device is provided to credit information service or credit agency.Reference Identification yardage of the staff of mechanism or credit agency according to the identification code 201 of the mobile device of user, in query service device According to library 202.Identification code data library 202 is established in advance by server, and is receiving installing and using information and answering for application program With when the description information of program to be safeguarded and be updated.
When the identification code 201 of the mobile device is not present in identification code data library 202, it was demonstrated that the mobile device of the user For new equipment, server will return to the identification code 201 to the staff of credit information service or credit agency and be not present in database Result in 202.
When inquiring the identification code 201 in identification code data library 202, server is installed from application program and using special The description information for installing and using information and application program of application program corresponding with the identification code 201 is obtained in sign table 203. Application program is installed and is equally established in advance by server using mark sheet 203.It is similar with identification code data library 202, using journey Sequence is installed and using mark sheet 203 also by server in the description for installing and using information and application program for receiving application program It is safeguarded and is updated when information.This installs and uses description information of the information for connected applications program, to the application journey of user Sequence carries out category division and portrait, referring to fig. 4, including but not limited at least one following: the application installed in mobile device The title and quantity 4011 of program, the installation of application program records 4012, during specific time during specific time The safety records 4014 of the usage record 4013, application program of application program has the title and phase for installing associated application program Pass degree 4015 has the title and the degree of correlation 4016 for using associated application program.
The installation record of application program is, for example, the application journey newly installed in nearest one month during specific time The quantity of sequence, nearest month the application list newly installed, the list for having installed application program.During specific time The usage record of application program is, for example, that mobile device often enlivens place, the normal active time of mobile device, mobile device nearest one Enliven within a month place, the nearest month active time of mobile device, nearest month the application list being actively used etc..It answers It is, for example, with the safety records of program: has cloud to look into the safety of the total amount of the application program of record, the application program for having cloud to look into record Property, the safety for having installed application program, the safety of a nearest month application program newly installed.Wherein, cloud, which is looked into, is recorded as The historical record and state-of-the-art record information that the included APK secure cloud inspection of Android system is surveyed.APK secure cloud is looked into as Android system APK safety detection function, mobile device install APK application program when as safety check data.Android system movement is set Is present in mobile device system for when leaving the factory, APK secure cloud is looked into as system function.APK secure cloud, which is looked into, to be passed through Third party software replaces.In addition, APK secure cloud looks into the subfunction that also can integrate in third party software as software.For Apple IOS system, there is also similar safety detection mechanism, the historical record for installing and using information of records application program and most New record information.
Application program installs and uses information, can by mobile device application program (such as APK secure cloud is looked into) or System function periodically, in response to event triggering perhaps from user's operation mobile device to server offer or by server is determined Phase triggers actively in response to event to mobile device request.Mobile device, must when carrying out data exchange with server Identification code must be provided as authentication.In server side, when in the identification code data library that the identification code is not present in server When, server mobile device corresponding to the identification code is identified as new mobile device and update identification code data library and with The relevant other information of the identification code.Server by the above-mentioned means, for example based on APK secure cloud check survey historical record and State-of-the-art record, while updating identification code data library, obtain corresponding with identification code application program install and use information and Description information, updating maintenance application program are installed and using the data in mark sheet 203, or the identification in current mobile device When code is present in identification code data library, independent updating maintenance application program is installed and using the data in mark sheet 203.With The mobile device side at family, APK secure cloud, which is checked, to be surveyed and can also make server more to server transmission data by slave mobile device The new identification code not recorded by the identification code data library 202 of server before new, and update application corresponding with identification code Program installs and uses information and description information.The update and maintenance process need intermediate arrangement and calculate.
And the description information of application program includes to content, usage mode, generic of application program etc. to using journey The description of sequence understands application program in order to user.The description information of application program can be installed and used with application program Information is collectively stored in application program installation and using in mark sheet, can also be additionally stored in server.Application program Description information is initially obtained when user accesses APP server (not shown) using mobile device by mobile device, and user Determine whether to download the installation file of the application program according to the description information of application program.It is carried out in mobile device and server When data interaction, mobile device is by description information and installs and uses information and is sent collectively to server.When the application from server Program installation and using obtaining when installing and using information of corresponding with identification code application program in mark sheet, general homology Obtain the description information of these application programs.
Identification code data library 202 as described above and application program, which are installed and be can store using mark sheet 203, to be serviced On device, or it is stored in the database separated with server.
Then, the application program obtained will be arranged and installs and uses information, especially will wherein installed in mobile device Application program title and quantity, have the title for installing associated application program and the degree of correlation, have using associated using journey The title and the degree of correlation of sequence, the description information of connected applications program carry out classification using trained category classification model 204 and draw Point, obtain credit applications user each dimension of financial consumption behavior index characteristic to carry out various dimensions portrait.Wherein, it installs Association refers to that after being mounted with a certain application program, user may install other application program by statistics;Using association then refer to by Statistics, after having used a certain application program, user may use other application program.The degree of correlation is then characterized by certain application program, To degree a possibility that installing or use another application.
Currently, the application category in terms of financial consumption behavior includes stock lottery transactions class, related lottery industry of gambling Class, supplement with money consumption game class, credit card reference class, by stages consumption borrow class, small amount debt-credit class, Investment & Financing class, online shopping it is consumer, Relate to that yellow class, Mobile banking's class, daily life payment class, urban service class, daily life be consumer, hobby class, leisure joy Happy game class, tool of production class, education and medical care class, information service class, social platform class etc..It is divided, is compared by multiple types It is existing that the risk class of credit applications user is only judged with class application program is borrowed or lent money with class application program of managing money matters, make with identification code The user image of characterization is richer, and the identification and assessment for the credit risk of fraud of user are more acurrate.
For example, the cell phone apparatus for being 864315038247752 to IMEI identification code, that extracts mobile phone application installs and uses letter Breath, removes out the included application of plant, and the application of other installations includes Kwai, Amap, KuGoo music, iqiyi.com, palm Heroic alliance, firefly video desktop, king's honor, mobile phone Taobao, wheel look into violating the regulations, Alipay, WeChat, Tencent's video.Its In, Kwai, WeChat are the application of social platform class, and Amap is the application of urban service class, KuGoo music, iqiyi.com, Tencent Video, firefly video desktop are the application of hobby class, and palm hero alliance, king's honor are the application of amusement and recreation game class, Mobile phone Taobao is the consumer application of online shopping, and wheel, which is looked into, breaks rules and regulations as information service class application, and WeChat, Alipay disappear for daily life Take class application.
Parameter is arranged by machine learning by off-line modeling and using training data in category classification model 204.Referring to figure 3, the exemplary block diagram of the category classification model according to the embodiment of the present disclosure is shown.Model 304 mainly includes text-processing Module 3041 and classification similarity calculation module 3042, text processing module 3041 are used for data (Apply Names, number that will be inputted The data such as amount, the degree of correlation) it is handled to obtain the data mode that classification similarity calculation module 3042 can identify.Classification phase Like degree computing module 3042 for installing and using information and answering for the processed application program of text processing module 3041 will to be passed through It uses the description information of program as input, the classification information 305 for generating and exporting application program is judged based on classification similarity.? In this example, because user may tend to using the different application for belonging to the same category, the input of model is The title and quantity 301 of the application program have the title and strength of association for installing associated application program with the application program 302, there is the description information 306 using associated Apply Names and strength of association 303 and application program with the application program, Judged by text-processing and classification similarity, is exported as the corresponding classification information 305 of the application program.
Fig. 2 is returned to, category classification model 204 is also required to timing updating maintenance.Category classification model 204 not only needs to make With application program install and using the application program in mark sheet 203 install and use information and application program description information and When obtain category division information, it is also necessary to using be newly indexed to application program installation and install and use information using in table 203 And the more new information 207 of the description information of application program re-starts off-line training to category classification model 204, so that model 204 can identify more application types.These more new informations 207 being newly indexed to are sent from mobile device to server Information, can from the user of carry out credit applications mobile device actively to server provide, can also be by server master Trend mobile device request.
It is installed in application program and using application program provided by mark sheet 203 installs and uses information and by category division On the basis of the classification information for the application program that model 204 generates, risk evaluation model 205 carries out classification and risk assessment, generates Risk assessment rank 206.Risk assessment rank 206 can be bi-values, and respectively representing credit applications user is that bull debt-credit is used Family and/or have it is overdue repay etc. record to there are credit risk and credit applications user do not have the above problem to There is no credit risk, it is also possible to the numerical value of such as percent value or the value of the confidence, indicates respectively that credit applications user is bull It borrows or lends money user and/or has the records such as overdue repaying to a possibility that there are credit risks.Credit information service or credit agency Staff can take credit applications user different risk resolution schemes according to the risk assessment rank 206.
The example logical architecture block diagram of risk evaluation model 205 is referring to fig. 4.Risk evaluation model 403 by building offline Simultaneously parameter is arranged by machine learning using training data in mould.The input of risk evaluation model 403 is answers corresponding with identification code With the classification information 402 for installing and using information 401 and generated by category classification model of program.Wherein, the peace of application program Dress use information 401 specifically includes every terms of information 4011 to 4016 as described above etc..Risk evaluation model 205 includes classifier 4031, for installing and using information 401 and classification information 402 is classified to generate risk assessment rank to above-mentioned.Risk is commented Estimate that model 205 not only needs to install and use information using application program and the description information of application program show that risk is commented in time Estimate rank 404, it is also necessary to which using feedback information 208, off-line training adjusts model with the performance of improved model again.
In the disclosure, risk assessment mainly is carried out using application relevant to financial consumption behavior in application program.This Field is it should be understood to the one skilled in the art that also can be used and the associated application of communication behavior, such as phone application or short message application, use To using the relevant information of behavior, it is right using instant messaging applications such as relevant to social networks applications, such as WeChat The credit request of credit applications user carries out risk assessment.
Credit information service or credit agency can also provide the feedback information 208 of risk assessment rank to risk evaluating system, The feedback information is supplied to risk evaluation model 205 and adjusts the risk evaluation model 205 for off-line training to improve model Evaluation accuracy.For example, positive feedback proves the accuracy of the risk assessment rank 206 of risk evaluation model 205, and reverse side is anti- Feedback then prompts risk evaluation model 205 for being not met by accordingly using the classification performance of mount message and classification information It is required that needing further training pattern parameter.In addition, feedback information 208 can also further adjust category classification model, improve The assessment coverage rate and accuracy rate of entire risk evaluating system.
By the risk evaluating system of the embodiment of the present disclosure, compared to existing only with class application program and the debt-credit class application of managing money matters Program come judge carry out credit applications user risk class, can further use mobile device identification code obtain correspond to Application program install and use information and classification information, in conjunction with the installation row of the application program for the user for carrying out credit applications Further to analyze with usage behavior, the financial consumption habit based on credit applications user carries out various dimensions portrait, to credit Shen Credit fraud (including overdue, promise breaking etc.) risk of user please is accurately estimated, to borrow to financial institution and net flat The risk control of platform provides help.
The methods of risk assessment and device according to the embodiment of the present disclosure is hereinafter described, wherein with embodiments above In same or similar content will not be described in great detail.
Fig. 5 shows the methods of risk assessment according to the embodiment of the present disclosure, and this method is mainly used in server, including as follows Step:
S100: the identification code of the mobile device from terminal device is received;
S200: the classification letter of application program corresponding with identification code installed and used information and generate application program is obtained Breath;
S300: risk assessment rank corresponding with identification code is generated based on information and classification information is installed and used;
S400: risk assessment rank is sent to terminal device.
Wherein, application program corresponding with identification code is obtained in step S200 installs and uses information and generation using journey The classification information of sequence include thes steps that as shown in Figure 6:
S210: identification code is inquired in identification code data library;
S220: if identification code is present in identification code data library, mark sheet is installed and used to inquiry application, with Acquisition is corresponding with identification code to install and use information and description information;
S230: based on information and description information is installed and used, classification information is generated.
Wherein, the classification information of application program is generated, main use classes partitioning model makes according to the installation of application program With the title of the application program installed in mobile device in information and quantity, have the title for installing associated application program and The degree of correlation has title and the degree of correlation these information using associated application program, and the description information of connected applications program is completed. Wherein, category classification model will install and use information and description information carries out text-processing and based on the judgement life of classification similarity At classification information.The other information in information is installed and used as the basis to application class of procedures furthermore it is also possible to use, but It is the title of application program, quantity, installing and using information and can more accurately characterize the finance of user in nearest a period of time Consumer behavior.
In accordance with an embodiment of the present disclosure, the server received application program from mobile device installs and uses information The description information of more new data and application program, the class that can be used for training category classification model to identify new application program Not.
According to the embodiment of the present disclosure, information and application program are installed and used when application program of the reception from mobile device Description information when, update identification code data library and application program installation and use mark sheet.
In step S300, risk assessment rank corresponding with identification code, wind are further generated by risk evaluation model Dangerous assessment models are to installing and using information and classification information is classified to generate risk assessment rank.
Fig. 7 then shows the flow chart of the methods of risk assessment according to another embodiment of the disclosure.The methods of risk assessment phase Than methods of risk assessment shown in fig. 5, after step S400, further includes:
S500: the feedback of the risk assessment rank from terminal device is obtained to update risk evaluation model.
By the feedback, the Evaluation accuracy of model can be improved.
Fig. 8 shows the exemplary process diagram of the methods of risk assessment according to the embodiment of the present disclosure, which answers For terminal device, include the following steps:
S600: the identification code for sending mobile device to server is made with the installation for obtaining application program corresponding with identification code With information and classification information;
S700: it receives generating with the identification code pair based on information and classification information is installed and used from server The risk assessment rank answered.
Wherein, when the installation for the identification code and application program corresponding with the identification code for sending mobile device to server When use information and description information, updates identification code data library and application program installation and use mark sheet.
In accordance with an embodiment of the present disclosure, above-mentioned methods of risk assessment compares method shown in Fig. 8, further includes as shown in Figure 9 The step of:
S800: the feedback of risk assessment rank is sent to server.
By the methods of risk assessment applied to server and terminal of the embodiment of the present disclosure, mobile device can be used What identification code obtained corresponding application program installs and uses information and classification information, in conjunction with the application program of credit applications user Installation behavior and usage behavior further analyze, financial consumption based on credit applications user habit carries out various dimensions portrait, The credit risk of fraud of credit applications user is accurately estimated.
The risk assessment device according to the embodiment of the present disclosure is described more fully below.
Figure 10 is the schematic block diagram according to the risk assessment device of the embodiment of the present disclosure.The risk assessment device 500 include:
Acquiring unit 501 is set as receiving the identification code of the mobile device from terminal device;
Feature generation unit 502, be set as acquisition application program corresponding with identification code installs and uses information and life At the classification information of application program;
Risk assessment unit 503 is set as installing and using information and classification information generation and knowledge based on application program The corresponding risk assessment rank of other code;
Transmission unit 504 is set as sending risk assessment rank to terminal device.Wherein, feature generation unit 502 is also set It is set to:
Identification code is inquired in identification code data library;
If identification code is present in identification code data library, inquires mobile device installation and use mark sheet, to obtain Application program corresponding with identification code installs and uses information and description information;
Based on information and description information is installed and used, classification information is generated.
The embodiment of the present disclosure according to shown in Figure 11, feature generation unit 502 include category classification model 5021, are set as Title based on the application program installed in mobile device and quantity have the title for installing associated application program and related The description information for spending, having the title and the degree of correlation and application program that use associated application program, generates the class of application program Other information.Wherein, category classification model 5021 includes text processing module and classification similarity calculation module, this article present treatment mould Block carries out text-processing and can be identified with obtaining classification similarity calculation module for that will install and use information and description information Form, classification similarity calculation module be then used for based on classification similarity judgement generate classification information.
According to another embodiment, feature generation unit 502 is also configured to received from mobile device based on server Application program installs and uses the more new data of information and the description information of application program, and training category classification model is to identify The classification of new application program.
According to yet another embodiment, feature generation unit 502 is also configured to: when application program of the reception from mobile device When installing and using the description information of information and application program, updates identification code data library and application program installation and use feature Table.
The embodiment according to shown in Figure 12, risk assessment unit 503 include risk evaluation model 5031, are set as being based on answering With program install and use information and classification information carries out classification and generates risk assessment rank corresponding with identification code.
Further, which is also configured to obtain the feedback of risk assessment rank to update risk assessment Model 5031.
Figure 13 then shows the terminal device 600 according to the embodiment of the present disclosure, which includes:
Transmission unit 601 is set as sending the identification code of mobile device to server to obtain answer corresponding with identification code Information and classification information are installed and used with program;
Receiving unit 602 is set as receiving and installs and uses information and classification based on application program from server The risk assessment rank corresponding with identification code that information generates.
According to the embodiment of the present disclosure, which is also configured to send the feedback of risk assessment rank to server.
By the risk assessment device and terminal device of the embodiment of the present disclosure, the identification code that mobile device can be used is obtained Corresponding application program installs and uses information and classification information, in conjunction with the installation behavior of the application program of credit applications user It is further analyzed with usage behavior, the financial consumption habit based on credit applications user carries out various dimensions portrait, to credit applications The credit risk of fraud of user is accurately estimated.
It should be noted that although being referred to several moulds of risk assessment device and risk assessment terminal in the above detailed description Block or unit, but this division is not enforceable.In fact, according to embodiment of the present disclosure, above-described two A or more module or the feature and function of unit can embody in a module or unit.Conversely, above description A module or unit feature and function can with further division be embodied by multiple modules or unit.As The component that module or unit are shown may or may not be physical unit, it can and it is in one place, or can also To be distributed over a plurality of network elements.Some or all of the modules therein can be selected to realize this public affairs according to the actual needs The purpose of evolution case.Those of ordinary skill in the art can understand and implement without creative efforts.
In an exemplary embodiment of the disclosure, a kind of computer readable storage medium is additionally provided, meter is stored thereon with Calculation machine program, the program include executable instruction, which may be implemented above-mentioned any when being executed by such as processor Described in one embodiment the step of methods of risk assessment.In some possible embodiments, various aspects of the invention are also It can be implemented as a kind of form of program product comprising program code, when described program product is run on the terminal device, Said program code is various according to the disclosure described in this specification methods of risk assessment for executing the terminal device The step of exemplary embodiment.
Program product according to an embodiment of the present disclosure for realizing the above method can be using portable compact disc only It reads memory (CD-ROM) and including program code, and can be run on terminal device, such as PC.However, this public affairs The program product opened is without being limited thereto, and in this document, readable storage medium storing program for executing can be any tangible Jie for including or store program Matter, the program can be commanded execution system, device or device use or in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The computer readable storage medium may include in a base band or the data as the propagation of carrier wave a part are believed Number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetism Signal, optical signal or above-mentioned any appropriate combination.Readable storage medium storing program for executing can also be any other than readable storage medium storing program for executing Readable medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or Person's program in connection.The program code for including on readable storage medium storing program for executing can transmit with any suitable medium, packet Include but be not limited to wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the disclosure operation program Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
In an exemplary embodiment of the disclosure, a kind of electronic equipment is also provided, which may include processor, And the memory of the executable instruction for storing the processor.Wherein, the processor is configured to via described in execution Executable instruction is come the step of executing the methods of risk assessment in any one above-mentioned embodiment.
Person of ordinary skill in the field it is understood that various aspects of the disclosure can be implemented as system, method or Program product.Therefore, various aspects of the disclosure can be with specific implementation is as follows, it may be assumed that complete hardware embodiment, complete The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here Referred to as circuit, " module " or " system ".
The electronic equipment 700 of this embodiment according to the disclosure is described referring to Figure 14.The electricity that Figure 14 is shown Sub- equipment 700 is only an example, should not function to the embodiment of the present disclosure and use scope bring any restrictions.
As shown in figure 14, electronic equipment 700 is showed in the form of universal computing device.The component of electronic equipment 700 can be with Including but not limited to: at least one processing unit 710, at least one storage unit 720, the different system components of connection (including are deposited Storage unit 720 and processing unit 710) bus 730, display unit 740 etc..
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 710 Row, so that the processing unit 710 executes this specification for various examples according to the present invention described in methods of risk assessment The step of property embodiment.For example, the processing unit 710 can execute the step as shown in Fig. 5 to Fig. 9.
The storage unit 720 may include the readable medium of volatile memory cell form, such as random access memory Unit (RAM) 7201 and/or cache memory unit 7202 can further include read-only memory unit (ROM) 7203.
The storage unit 720 can also include program/practical work with one group of (at least one) program module 7205 Tool 7204, such program module 7205 includes but is not limited to: operating system, one or more application program, other programs It may include the realization of network environment in module and program data, each of these examples or certain combination.
Bus 730 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.
Electronic equipment 700 can also be with one or more external equipments 800 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 700 communicate, and/or with make The electronic equipment 700 any equipment (such as the router, modulatedemodulate that can be communicated with one or more of the other calculating equipment Adjust device etc.) communication.This communication can be carried out by input/output (I/O) interface 750.Also, electronic equipment 700 may be used also To pass through network adapter 760 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network Network, such as internet) communication.Network adapter 760 can be communicated by bus 730 with other modules of electronic equipment 700. It should be understood that although not shown in the drawings, other hardware and/or software module can not used in conjunction with electronic equipment 700, including but not Be limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and Data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server or network equipment etc.) executes the risk assessment according to disclosure embodiment Method.
Those skilled in the art will readily occur to its of the disclosure after considering specification and practicing scheme disclosed herein Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by appended Claim is pointed out.

Claims (15)

1. a kind of methods of risk assessment, which is characterized in that the methods of risk assessment includes:
Receive the identification code of the mobile device from terminal device;
Obtain the classification letter of application program corresponding with the identification code installed and used information and generate the application program Breath;
Information and classification information generation risk assessment rank corresponding with the identification code are installed and used based on described;With And
The risk assessment rank is sent to the terminal device.
2. methods of risk assessment according to claim 1, which is characterized in that it is described install and use information include it is following at least One of: the title and quantity of the application program installed in mobile device, the installation of application program is remembered during specific time Record, during specific time the safety records of the usage record, application program of application program, have the associated application program of installation Title and the degree of correlation, have title and the degree of correlation using associated application program.
3. methods of risk assessment according to claim 1 or 2, which is characterized in that obtain answer corresponding with the identification code Include: with the classification information of program installed and used information and generate the application program
The identification code is inquired in identification code data library;
If the identification code is present in the identification code data library, mark sheet is installed and used to inquiry application, with Obtain the description information for installing and using information and application program corresponding with the identification code;
Information and the description information are installed and used based on described, generates the classification information.
4. methods of risk assessment according to claim 3, which is characterized in that based on the information and described installed and used Description information, generating the classification information includes:
Title and quantity based on the application program installed in mobile device have the title and phase for installing associated application program Guan Du, have using the title and the degree of correlation of associated application program and the description information, generate the classification information.
5. methods of risk assessment according to claim 4, which is characterized in that generate the classification by category classification model Information, wherein information and the description information installed and used is carried out text-processing and be based on by the category classification model The judgement of classification similarity generates the classification information.
6. methods of risk assessment according to claim 5, which is characterized in that based on the peace from the mobile device The more new data of dress use information and the description information, the training category classification model is to identify new application program Classification.
7. methods of risk assessment according to claim 1 or 2, which is characterized in that based on it is described install and use information and The classification information generate risk assessment rank corresponding with the identification code include: by risk evaluation model generation with it is described The corresponding risk assessment rank of identification code, the risk evaluation model to it is described install and use information and the classification information into Row classification is to generate the risk assessment rank.
8. methods of risk assessment according to claim 3, which is characterized in that further include: when reception is from mobile device When installing and using information and description information of the application program updates the identification code data library and application program installation With use mark sheet.
9. methods of risk assessment according to claim 7, which is characterized in that further include: it obtains and comes from the terminal device The risk assessment rank feedback to update the risk evaluation model.
10. methods of risk assessment according to claim 1 or 2, which is characterized in that the identification code is IMEI code.
11. a kind of methods of risk assessment, which is characterized in that the methods of risk assessment includes:
The identification code of mobile device, which is sent, to server installs and uses letter with obtain application program corresponding with the identification code Breath and classification information;
Receive from the server to install and use information and the classification information generating with the identification based on described The corresponding risk assessment rank of code.
12. a kind of risk assessment device, which is characterized in that the risk assessment device includes:
Acquiring unit is set as receiving the identification code of the mobile device from terminal device;
Feature generation unit, be set as acquisition application program corresponding with the identification code installs and uses information and generation institute State the classification information of application program;
Risk assessment unit is set as installing and using information and classification information generation and the identification code pair based on described The risk assessment rank answered;And
Transmission unit is set as sending the risk assessment rank to the terminal device.
13. a kind of risk assessment terminal device, which is characterized in that the risk assessment terminal device includes:
Transmission unit is set as corresponding with the identification code using journey to obtain to the identification code of server transmission mobile device Sequence installs and uses information and classification information;
Receiving unit is set as receiving and installs and uses information and classification information life based on described from the server At risk assessment rank corresponding with the identification code.
14. a kind of computer readable storage medium is stored thereon with the computer program including executable instruction, described executable When instruction is executed by processor, implement methods of risk assessment according to any one of claim 1 to 11.
15. a kind of electronic equipment characterized by comprising
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to execute via the executable instruction is executed according to claim 1 to any in 11 The step of methods of risk assessment described in item.
CN201810305580.3A 2018-04-08 2018-04-08 Risk assessment method, apparatus and storage medium thereof Active CN110197315B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810305580.3A CN110197315B (en) 2018-04-08 2018-04-08 Risk assessment method, apparatus and storage medium thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810305580.3A CN110197315B (en) 2018-04-08 2018-04-08 Risk assessment method, apparatus and storage medium thereof

Publications (2)

Publication Number Publication Date
CN110197315A true CN110197315A (en) 2019-09-03
CN110197315B CN110197315B (en) 2024-03-22

Family

ID=67751286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810305580.3A Active CN110197315B (en) 2018-04-08 2018-04-08 Risk assessment method, apparatus and storage medium thereof

Country Status (1)

Country Link
CN (1) CN110197315B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110705637A (en) * 2019-09-29 2020-01-17 上海淇玥信息技术有限公司 User classification method and device based on application installation list information and electronic equipment
CN110796542A (en) * 2019-09-26 2020-02-14 北京淇瑀信息科技有限公司 Financial risk control method, financial risk control device and electronic equipment
CN110796453A (en) * 2019-09-30 2020-02-14 深圳市云积分科技有限公司 E-commerce club member grade processing method and device
CN111161042A (en) * 2019-11-26 2020-05-15 深圳壹账通智能科技有限公司 Personal risk assessment method, device, terminal and storage medium
CN111210335A (en) * 2019-12-16 2020-05-29 北京淇瑀信息科技有限公司 User risk identification method and device and electronic equipment
CN111210336A (en) * 2019-12-16 2020-05-29 北京淇瑀信息科技有限公司 User risk model generation method and device and electronic equipment
CN111429003A (en) * 2020-03-23 2020-07-17 北京互金新融科技有限公司 Data processing method and device
CN111784174A (en) * 2020-07-10 2020-10-16 上海淇毓信息科技有限公司 Method and device for managing risk policy based on user portrait and electronic equipment
CN111783039A (en) * 2020-06-30 2020-10-16 北京百度网讯科技有限公司 Risk determination method, risk determination device, computer system and storage medium
CN111861174B (en) * 2020-07-09 2021-04-13 北京睿知图远科技有限公司 Credit assessment method for user portrait
CN113254932A (en) * 2021-06-16 2021-08-13 百度在线网络技术(北京)有限公司 Application program risk detection method and device, electronic equipment and medium
CN113362156A (en) * 2021-05-26 2021-09-07 哈尔滨工业大学重庆研究院 Financial fraud detection and identification system based on Internet of things
CN113497743A (en) * 2020-04-07 2021-10-12 陈美章 Network application monitoring and analyzing system and method
CN113706040A (en) * 2021-09-01 2021-11-26 深圳前海微众银行股份有限公司 Risk identification method, device, equipment and storage medium
CN116074118A (en) * 2023-03-07 2023-05-05 北京安胜华信科技有限公司 API access control method, system, intelligent terminal and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060287947A1 (en) * 2005-06-16 2006-12-21 Toms Alvin D Non-payment risk assessment
CN102968297A (en) * 2012-10-25 2013-03-13 北京奇虎科技有限公司 Software management system and method for mobile terminal
CN106504099A (en) * 2015-09-07 2017-03-15 国家计算机网络与信息安全管理中心 A kind of system for building user's portrait
CA2931808A1 (en) * 2016-05-31 2017-11-30 Tracker Networks Inc. Methos and systems for mobile device risk mamnagement
CN107767259A (en) * 2017-09-30 2018-03-06 平安科技(深圳)有限公司 Loan risk control method, electronic installation and readable storage medium storing program for executing
CN107798118A (en) * 2017-11-08 2018-03-13 北京奇虎科技有限公司 User's portrait building method, device and computing device based on big data
CN107818506A (en) * 2017-09-30 2018-03-20 上海壹账通金融科技有限公司 Electronic installation, credit risk control method and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060287947A1 (en) * 2005-06-16 2006-12-21 Toms Alvin D Non-payment risk assessment
CN102968297A (en) * 2012-10-25 2013-03-13 北京奇虎科技有限公司 Software management system and method for mobile terminal
CN106504099A (en) * 2015-09-07 2017-03-15 国家计算机网络与信息安全管理中心 A kind of system for building user's portrait
CA2931808A1 (en) * 2016-05-31 2017-11-30 Tracker Networks Inc. Methos and systems for mobile device risk mamnagement
CN107767259A (en) * 2017-09-30 2018-03-06 平安科技(深圳)有限公司 Loan risk control method, electronic installation and readable storage medium storing program for executing
CN107818506A (en) * 2017-09-30 2018-03-20 上海壹账通金融科技有限公司 Electronic installation, credit risk control method and storage medium
CN107798118A (en) * 2017-11-08 2018-03-13 北京奇虎科技有限公司 User's portrait building method, device and computing device based on big data

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110796542A (en) * 2019-09-26 2020-02-14 北京淇瑀信息科技有限公司 Financial risk control method, financial risk control device and electronic equipment
CN110705637A (en) * 2019-09-29 2020-01-17 上海淇玥信息技术有限公司 User classification method and device based on application installation list information and electronic equipment
CN110796453A (en) * 2019-09-30 2020-02-14 深圳市云积分科技有限公司 E-commerce club member grade processing method and device
CN111161042A (en) * 2019-11-26 2020-05-15 深圳壹账通智能科技有限公司 Personal risk assessment method, device, terminal and storage medium
CN111210335A (en) * 2019-12-16 2020-05-29 北京淇瑀信息科技有限公司 User risk identification method and device and electronic equipment
CN111210336A (en) * 2019-12-16 2020-05-29 北京淇瑀信息科技有限公司 User risk model generation method and device and electronic equipment
CN111210335B (en) * 2019-12-16 2023-11-14 北京淇瑀信息科技有限公司 User risk identification method and device and electronic equipment
CN111429003A (en) * 2020-03-23 2020-07-17 北京互金新融科技有限公司 Data processing method and device
CN111429003B (en) * 2020-03-23 2023-11-03 北京互金新融科技有限公司 Data processing method and device
CN113497743A (en) * 2020-04-07 2021-10-12 陈美章 Network application monitoring and analyzing system and method
CN111783039B (en) * 2020-06-30 2023-08-18 北京百度网讯科技有限公司 Risk determination method, risk determination device, computer system and storage medium
CN111783039A (en) * 2020-06-30 2020-10-16 北京百度网讯科技有限公司 Risk determination method, risk determination device, computer system and storage medium
CN111861174B (en) * 2020-07-09 2021-04-13 北京睿知图远科技有限公司 Credit assessment method for user portrait
CN111784174B (en) * 2020-07-10 2022-09-20 上海淇毓信息科技有限公司 Method and device for managing risk policy based on user portrait and electronic equipment
CN111784174A (en) * 2020-07-10 2020-10-16 上海淇毓信息科技有限公司 Method and device for managing risk policy based on user portrait and electronic equipment
CN113362156A (en) * 2021-05-26 2021-09-07 哈尔滨工业大学重庆研究院 Financial fraud detection and identification system based on Internet of things
CN113362156B (en) * 2021-05-26 2023-10-17 哈尔滨工业大学重庆研究院 Financial fraud detection and identification system based on Internet of Things
CN113254932A (en) * 2021-06-16 2021-08-13 百度在线网络技术(北京)有限公司 Application program risk detection method and device, electronic equipment and medium
CN113254932B (en) * 2021-06-16 2024-02-27 百度在线网络技术(北京)有限公司 Application risk detection method and device, electronic equipment and medium
CN113706040A (en) * 2021-09-01 2021-11-26 深圳前海微众银行股份有限公司 Risk identification method, device, equipment and storage medium
CN116074118B (en) * 2023-03-07 2023-06-13 北京安胜华信科技有限公司 API access control method, system, intelligent terminal and storage medium
CN116074118A (en) * 2023-03-07 2023-05-05 北京安胜华信科技有限公司 API access control method, system, intelligent terminal and storage medium

Also Published As

Publication number Publication date
CN110197315B (en) 2024-03-22

Similar Documents

Publication Publication Date Title
CN110197315A (en) Methods of risk assessment, device and its storage medium
KR100751965B1 (en) method and system for predicting attrition customers
CN109360012A (en) The selection method and device, storage medium, electronic equipment of advertisement dispensing channel
US20190147430A1 (en) Customizing payment sessions with machine learning models
CN108416668A (en) Trade tracking and financing by accounts receivable method, system, equipment and storage medium
CN109410036A (en) A kind of fraud detection model training method and device and fraud detection method and device
CN110992169A (en) Risk assessment method, device, server and storage medium
US20180211480A1 (en) Computer system for multiple user, multiple event real-time online wagering
CN109063920A (en) A kind of transaction risk recognition methods, device and computer equipment
CN110070430A (en) Assess method and device, the storage medium, electronic equipment of refund risk
CN110349003A (en) Co-related risks appraisal procedure, device and electronic equipment based on social data
CN109922032A (en) Method and apparatus for determining the risk of logon account
CN111127178A (en) Data processing method and device, storage medium and electronic equipment
CN110147823A (en) A kind of air control model training method, device and equipment
CN109983491A (en) By artificial intelligence application in converging the method and apparatus of money by using voice input
CN110348471A (en) Exception object recognition methods, device, medium and electronic equipment
CN110516967A (en) A kind of method and relevant apparatus of information evaluation
CN110363655A (en) Target user's recognition methods, device and electronic equipment based on temporal characteristics
CN108320220A (en) A kind of assessment system and method for user credit degree
CN112232947A (en) Loan risk prediction method and device
CN109002465A (en) For having the method and system of the dialogue input equipment of intelligent crowdsourcing option
CN109145590A (en) A kind of function hook detection method, detection device and computer-readable medium
CN110310123A (en) Risk judgment method and apparatus
CN110457601A (en) The recognition methods and device of social account, storage medium and electronic device
CN112330355B (en) Method, device, equipment and storage medium for processing consumption coupon transaction data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant