CN110400176A - Security estimation method and device - Google Patents

Security estimation method and device Download PDF

Info

Publication number
CN110400176A
CN110400176A CN201910681468.4A CN201910681468A CN110400176A CN 110400176 A CN110400176 A CN 110400176A CN 201910681468 A CN201910681468 A CN 201910681468A CN 110400176 A CN110400176 A CN 110400176A
Authority
CN
China
Prior art keywords
security
valuation
party
information
assessment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910681468.4A
Other languages
Chinese (zh)
Inventor
陈昭旭
陈诗礼
陈海龙
徐伯雅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN201910681468.4A priority Critical patent/CN110400176A/en
Publication of CN110400176A publication Critical patent/CN110400176A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0283Price estimation or determination
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Abstract

The embodiment of the present application provides a kind of security estimation method and device, method includes: the assessment request for receiving client and sending, and the security information in the assessment request is forwarded to third party's assessment system, so that third party's assessment system determines that security assesses information according to the security information, and information is assessed according to the security and carries out the assessment of third party's security, obtain third party's security valuation;The security assessment information and third party's security valuation that third party's assessment system returns are received, and information is assessed according to the security and carries out security assessment, obtains the practical valuation of security;According to the practical valuation of the security and third party's security valuation, the final valuation of security is determined;The application can effectively combine external valuation data and internal valuation data, improve the accuracy and reliability of security valuation, reduce risk management difficulty, and then carry out accurate control to risk point.

Description

Security estimation method and device
Technical field
This application involves loan valuation fields, and in particular to a kind of security estimation method and device.
Background technique
Mortgage manages class business at present (customer group is the general favour bore client of the country such as medium and small micro- enterprise, self-employed entrepreneur) Intelligent level is lower, and the value assessment of guarantee especially house property and financing operation flow are still relatively complicated, client and client The experience of manager is bad.Meanwhile itself ability to ward off risks of little Wei enterprise is weaker, is easy by home and abroad environment and market fluctuation It influences, the average survival time time limit is shorter, and the business risk of itself is larger, and there are more serious information dissymmetries, therefore Credit risk management difficulty is larger, and investigation and post-loan management are difficult pair because being influenced by human resources restraining factors before the loan of bank Such risk point carries out accurate control.
Summary of the invention
For the problems of the prior art, the application provides a kind of security estimation method and device, can effectively combine outer Portion's valuation data and internal valuation data, improve the accuracy and reliability of security valuation, reduce risk management difficulty, and then right Risk point carries out accurate control.
At least one of to solve the above-mentioned problems, the application the following technical schemes are provided:
In a first aspect, the application provides a kind of security estimation method, comprising:
The assessment request that client sends is received, and the security information in the assessment request is forwarded to third party and assesses system System so that third party's assessment system determines that security assesses information according to the security information, and is assessed according to the security Information carries out the assessment of third party's security, obtains third party's security valuation;
The security assessment information and third party's security valuation that third party's assessment system returns are received, and according to the signature It judges and estimates information progress security assessment, obtain the practical valuation of security;
According to the practical valuation of the security and third party's security valuation, the final valuation of security is determined.
Further, before the security information by the assessment request is forwarded to third party's assessment system, packet It includes:
Loan qualification verifying is carried out to client's essential information in the assessment request;
If verification result is not pass through, loan qualification authentication failed result is returned.
Further, information progress security assessment is assessed according to the security described, before obtaining the practical valuation of security, Include:
According to the security information in the assessment request, the preliminary valuation of security is obtained.
Further, described that information progress security assessment is assessed according to the security, obtain the practical valuation of security, comprising:
Information is assessed according to the security to be corrected the preliminary valuation of the security, obtains the practical valuation of security.
Further, described according to the practical valuation of the security and third party's security valuation, determine that security is finally estimated Value, comprising:
Whether the difference for judging the practical valuation of the security and third party's security valuation is more than preset difference value;
If not exceeded, then the average value by the practical valuation of the security and third party's security valuation is set as the signature The final valuation of product;
If being more than, judge whether the practical valuation of the security is greater than the numerical value of third party's security valuation;
If more than, then third party's security valuation is set as the final valuation of the security, it otherwise will be with the client The customized numerical value that corresponding customer manager sends is set as the final valuation of the security.
Further, after the determining final valuation of security, further includes:
It is examined according to the setting means of the final valuation of the security and the setting means of the final valuation of security and loan agreement The corresponding relationship for criticizing process, determines corresponding loan agreement approval process.
Second aspect, the application provide a kind of security valuation device, comprising:
Security information forwarding module assesses the security in requesting for receiving the assessment request of client's transmission, and by described Information is forwarded to third party's assessment system, so that third party's assessment system determines security assessment letter according to the security information Breath, and information is assessed according to the security and carries out the assessment of third party's security, obtain third party's security valuation;
The practical valuation determining module of security, for receiving security assessment information that third party's assessment system returns and the Tripartite's security valuation, and information is assessed according to the security and carries out security assessment, obtain the practical valuation of security;
The final valuation determining module of security is used for according to the practical valuation of the security and third party's security valuation, really Determine the final valuation of security.
Further, further includes:
Qualification authentication unit, for carrying out loan qualification verifying to client's essential information in the assessment request;
Qualification verification result return unit returns to loan qualification authentication failed knot if being not pass through for verification result Fruit.
Further, further includes:
The preliminary valuation determination unit of security, for obtaining security and tentatively estimating according to the security information in the assessment request Value.
Further, the practical valuation determining module of the security includes:
The practical valuation determination unit of security carries out school to the preliminary valuation of the security for assessing information according to the security Just, the practical valuation of security is obtained.
Further, the final valuation determining module of the security includes:
Dif ference judgment unit, for judging whether the practical valuation of the security and the difference of third party's security valuation surpass Cross preset difference value;
The final valuation setup unit of first security, for estimating when the judgement practical valuation of security with third party's security When the difference of value is no more than preset difference value, the practical valuation of the security and the average value of third party's security valuation are set as The final valuation of security;
Numerical value judging unit, for being more than when the difference for determining the practical valuation of security and third party's security valuation When preset difference value, judge whether the practical valuation of the security is greater than the numerical value of third party's security valuation;
The final valuation setup unit of second security judges that the practical valuation of the security is greater than third party's security for working as When the numerical value of valuation, third party's security valuation is set as the final valuation of the security;
The final valuation setup unit of third security judges that the practical valuation of the security is given as security no more than the third party for working as When the numerical value of product valuation, the customized numerical value that customer manager corresponding with the client sends is set as the security and is finally estimated Value.
Further, further includes:
Approval process determination unit, for according to the setting means of the final valuation of the security and the final valuation of security The corresponding relationship of setting means and loan agreement approval process determines corresponding loan agreement approval process.
The third aspect, the application provides a kind of electronic equipment, including memory, processor and storage are on a memory and can The computer program run on a processor, the processor realize the step of the security estimation method when executing described program Suddenly.
Fourth aspect, the application provide a kind of computer readable storage medium, are stored thereon with computer program, the calculating The step of security estimation method is realized when machine program is executed by processor.
As shown from the above technical solution, the application provides a kind of security estimation method and device, passes through send client Security information in assessment request is forwarded to third party's assessment system, and signature is determined according to security information by third party's assessment system It judges and estimates information, and information is assessed according to security by third party's assessment system and carries out the assessment of third party's security, obtain third party's signature Product valuation, due to often causing the confidence level of the final valuation of security lower only with reference to the valuation of third party's security in the prior art, Or internal security valuation is only carried out, the practical valuation of obtained security causes accuracy lower because shortcoming is professional, therefore this Shen Please under the premise of the security assessment information and then security returned according to third party's assessment system assesses to obtain security practical valuation, The practical valuation of security is effectively combined with third party's security valuation that third party's assessment system obtains further, determines and gives as security The final valuation of product, the final valuation of the security have both higher confidence level and high accuracy, improve security valuation accuracy and Reliability reduces risk management difficulty, and then can carry out accurate control to risk point.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the application Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 is one of the flow diagram of the security estimation method in the embodiment of the present application;
Fig. 2 is the two of the flow diagram of the security estimation method in the embodiment of the present application;
Fig. 3 is the three of the flow diagram of the security estimation method in the embodiment of the present application;
Fig. 4 is one of the structure chart of the security valuation device in the embodiment of the present application;
Fig. 5 is the two of the structure chart of the security valuation device in the embodiment of the present application;
Fig. 6 is the three of the structure chart of the security valuation device in the embodiment of the present application;
Fig. 7 is the four of the structure chart of the security valuation device in the embodiment of the present application;
Fig. 8 is the structural schematic diagram of the electronic equipment in the embodiment of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, technical solutions in the embodiments of the present application carries out clear, complete description, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall in the protection scope of this application.
In view of mortgaging class business of managing at present, (customer group is the country Pu Huikou such as medium and small micro- enterprise, self-employed entrepreneur Diameter client) intelligent level is lower, and the value assessment of guarantee especially house property and financing operation flow are still relatively complicated, client And the experience of customer manager is bad.Meanwhile itself ability to ward off risks of little Wei enterprise is weaker, is easy by home and abroad environment and market The influence of fluctuation, the average survival time time limit is shorter, and the business risk of itself is larger, and there are more serious information asymmetries Property, therefore credit risk management difficulty is larger, investigates before the loan of bank and post-loan management by human resources restraining factors because being influenced, It is difficult the problem of accurate control is carried out to such risk point, the application provides a kind of security estimation method and device, by will be objective The security information in assessment request that family is sent is forwarded to third party's assessment system, by third party's assessment system according to security information To determine security assessment information, and information progress third party's security assessment is assessed according to security by third party's assessment system, obtained Third party's security valuation, due to often leading to the credible of the final valuation of security only with reference to the valuation of third party's security in the prior art It spends lower, or only carries out internal security valuation, cause accuracy lower due to the practical valuation of obtained security is professional because being short of, because This application assesses to obtain the practical valuation of security in the security assessment information and then security returned according to third party's assessment system Under the premise of, further third party's security valuation that the practical valuation of security is obtained with third party's assessment system is effectively tied It closes, determines that the final valuation of security, the final valuation of the security have both higher confidence level and high accuracy, improve security valuation Accuracy and reliability reduce risk management difficulty, and then can carry out accurate control to risk point.
In order to effectively combining external valuation data and internal valuation data, the accuracy of security valuation and reliable is improved Property, risk management difficulty is reduced, and then accurate control is carried out to risk point, the application provides a kind of implementation of security estimation method Example, referring to Fig. 1, the security estimation method specifically includes following content:
Step S101: the assessment request that client sends is received, and the security information in the assessment request is forwarded to the Tripartite's assessment system, so that third party's assessment system determines that security assesses information according to the security information, and according to institute It states security assessment information and carries out the assessment of third party's security, obtain third party's security valuation.
It is requested it is understood that system can receive client by the assessment that client is sent, in the assessment request Including at least client input security information and client's essential information, using house property as security for, the security information includes But be not limited to: cell, Lou Dong, unit number and House Property Area Surveying where house property, client's essential information includes but is not limited to: surname Name, age, type of credential, passport NO. and phone number.
It is understood that internal system often just can be carried out according to security information and client's essential information in the prior art Security assessment, but since the security information of client's input is not detailed enough, there is one-sidedness, cannot include and have an impact most completely The factor of whole security valuation, therefore the security valuation accuracy that internal system obtains is lower, system requests assessment in the application In security information be forwarded to third party's assessment system and carry out the assessment of third party's security, third party's assessment system can correspond to Company is assessed for the security of a certain profession, the particular content for capableing of security information carries out the offline upper security of line from the angle of profession Investigation, and then determine that security assesses information, to improve the accuracy of security valuation.
In a kind of example, the security information of client's input is " No. 1 Unit 1, building Room 101 of A cell, construction area 98 Square meter ", third party's assessment system can carry out on-site inspection under line according to the security information, from the final security valuation of influence All angles determine that security assessment information is that " A cell is old residential area, No. 1 building is overlooking noise jamming, the 101 Room illumination of Unit 1 Time is insufficient, its not upright reality of house type can be lower than 98 square meters using area ".
Optionally, this system can carry out preliminary valuation to security according to the security information received, such as according to above-mentioned The security information " No. 1 Unit 1, building Room 101 of A cell, 98 square meter of construction area " that client inputs in example, in conjunction with present count According to the every square meter of average room rate 10,000 of the A cell stored in library, obtain the preliminary valuation of security: 98 square meters are equal to multiplied by 10,000 every square meters 980000, the preliminary valuation of security can be when client starts to apply security valuation operation in advance to one security of present customers Substantially valuation can be improved the operating experience of client.
Optionally, the security assessment information that third party's assessment system is determined according to it is able to carry out accurate third party Security assessment, obtains third party's security valuation.Third party assesses company using cell average price as a reference value, is then according to house It is no for school district, whether by the factors such as noise jamming, direction, floor carry out system model adjustment, and be aided with manually verify on the spot with And the newest listed price in market carries out artificial fine tuning and obtains third party's assessment in Firm Valuation.Such as it is obtained according in examples detailed above Security assessment information " A cell, which is that old residential area, No. 1 building are overlooking, that noise jamming, the 101 Room light application time of Unit 1 is insufficient, family Its not upright reality of type can be lower than 98 square meters using area ", using existing weighting algorithm, for be conducive to be promoted the influence of valuation because Element one higher weight of setting is arranged a lower weight to be unfavorable for being promoted the influence factor of valuation, finally obtains this Third party's security valuation of security is 820,000.
Step S102: receiving the security assessment information and third party's security valuation that third party's assessment system returns, and Information is assessed according to the security and carries out security assessment, obtains the practical valuation of security.
It is understood that this system can provide client with reference to the security assessment information that third party's assessment system returns Security carry out security assessment, due to third party's assessment system provide security assessment information it is more careful, more professional, provide Can influence the security assessment information of each dimension of the final valuation of security, thus this system accordingly carry out security assessment can Obtain the practical valuation of more accurate security.
It optionally, can also be on the basis of security preliminary valuation has been obtained according to security information in above-mentioned this system The security assessment information returned with reference to third party's assessment system is corrected the preliminary valuation of the security, such as security assessment letter Breath show A cell be old residential area, I class school district room, be located at 5 buildings (intermediate floor), towards south, have noise jamming, these factors it Between have weight relationship, each factor will have a scoring according to its concrete condition, so as to calculate these factors pair The total adjustment ratio of one of average price, thus obtains the value of this house property.
Step S103: according to the practical valuation of the security and third party's security valuation, the final valuation of security is determined.
It is understood that there is also use third party's assessment system to mention completely when carrying out valuation to security in the prior art The scheme of third party's security valuation of confession, although third party's assessment system with more professional, its not by the monitoring of this system, Gained third party's security valuation is possible to do not have higher confidence level, therefore the application being capable of the effectively obtained signature of connecting inner Final valuation is wanted in third party's security valuation that the practical valuation of product and third party's assessment system obtain, comprehensive consideration determination, thus Under the premise of ensureing security valuation reliability, the accuracy of security valuation is promoted.
As can be seen from the above description, security estimation method provided by the embodiments of the present application, can be commented by send client The security information estimated in request is forwarded to third party's assessment system, determines security according to security information by third party's assessment system Information is assessed, and information is assessed according to security by third party's assessment system and carries out the assessment of third party's security, obtains third party's security Valuation, due to often causing the confidence level of the final valuation of security lower only with reference to the valuation of third party's security in the prior art, or Internal security valuation is only carried out, the practical valuation of obtained security causes accuracy lower because shortcoming is professional, therefore the application Under the premise of the security assessment information and then security returned according to third party's assessment system assesses to obtain security practical valuation, into The practical valuation of security is effectively combined with third party's security valuation that third party's assessment system obtains one step, determines security Final valuation, the final valuation of the security have both higher confidence level and high accuracy, improve security valuation accuracy and can By property, risk management difficulty is reduced, and then accurate control can be carried out to risk point.
It, can be in an embodiment of the security estimation method of the application in order to improve the efficiency of security valuation It specifically include first to judge whether client has the step of loan qualification before forwarding third party's assessment system, it referring to fig. 2, should Step specifically includes following content:
Step S201: loan qualification verifying is carried out to client's essential information in the assessment request.
Step S202: if verification result is not pass through, loan qualification authentication failed result is returned to.
It is understood that the premise that loan qualification verifying is unlatching the application security valuation process is carried out to client, if Judged that the client does not have loan qualification verifying, then this system saves system operations without starting subsequent valuation process Pressure and the cost for calling third party's assessment system, specifically, the loan qualification verifying includes but is not limited to: the personal visitor of verification The information such as age, blacklist, anti-fraud and people's row reference at family verify the industrial and commercial registration information and management position letter of corporate client Breath.
In order to improve the accuracy of internal security valuation, at the same it is first rough to client feedback one early period in assessment Security valuation can also specifically include to estimate in the internal security of progress in an embodiment of the security estimation method of the application The step of value, before obtaining the practical valuation of security, first carries out entry evaluation, obtains security preliminary valuation, which specifically includes There is following content: according to the security information in the assessment request, obtaining the preliminary valuation of security.
Optionally, this system can carry out preliminary valuation to security according to the security information received, such as according to above-mentioned The security information " No. 1 Unit 1, building Room 101 of A cell, 98 square meter of construction area " that client inputs in example, in conjunction with present count According to the every square meter of average room rate 10,000 of the A cell stored in library, obtain the preliminary valuation of security: 98 square meters are equal to multiplied by 10,000 every square meters 980000, the preliminary valuation of security can be when client starts to apply security valuation operation in advance to one security of present customers Substantially valuation can be improved the operating experience of client.
In order to improve the accuracy of internal security valuation, in an embodiment of the security estimation method of the application, It can also specifically include that more accurate security is obtained according to the professional security assessment information that third party's assessment system provides The step of practical valuation, which specifically includes following content: assessing information according to the security and tentatively estimates to the security Value is corrected, and obtains the practical valuation of security.
It optionally, can also be on the basis of security preliminary valuation has been obtained according to security information in above-mentioned this system The security assessment information returned with reference to third party's assessment system is corrected the preliminary valuation of the security, such as security assessment letter Breath shows that A cell is old residential area, then can the former preliminary valuation of security be 980,000 on the basis of carry out downward price adjustment, obtain security Practical valuation.
In order to effectively combine external valuation data and internal valuation data, and then improve the accurate of internal security valuation Degree, can also specifically include the practical valuation of security of connecting inner in an embodiment of the security estimation method of the application With the specific data of third party's security valuation, choosing then corresponding security final valuation setting means the step of, referring to Fig. 3, the step Suddenly specifically include following content:
Step S301: whether the difference for judging the practical valuation of the security and third party's security valuation is more than default poor Value.
Step S302: if not exceeded, then setting the practical valuation of the security and the average value of third party's security valuation It is set to the final valuation of the security.
Step S303: if being more than, judge whether the practical valuation of the security is greater than the number of third party's security valuation Value.
Step S304: if more than, then third party's security valuation is set as the final valuation of the security, it otherwise will be with The customized numerical value that the corresponding customer manager of the client sends is set as the final valuation of the security.
It is understood that according to the practical valuation of security and the valuation of third party's security, it can in a number of different ways really Determine the final valuation of security.
It is alternatively possible to determine that security is finally estimated according to the size of the difference of the practical valuation of security and third party's security valuation Value specifically judges whether the difference of the practical valuation of the security and third party's security valuation is more than preset difference value, if not It is more than that then the average value by the practical valuation of the security and third party's security valuation is set as the final valuation of the security, For example, the practical valuation of security is 920,000, third party's security valuation is 880,000, and the two difference is 40,000, and is preset Preset difference value be 100,000, since the two difference is less than preset difference value, i.e. the practical valuation of security assessed of built-in system The third party's security valuation assessed with third party's assessment system is not much different, and shows that the assessment accuracy of the two is all higher, Then the average value of the practical valuation of the security and third party's security valuation can be set as the final valuation of the security and institute Stating the final valuation of security is (92+88)/2=90.
Optionally, if the difference of the practical valuation of the security and third party's security valuation is more than preset difference value, table The deviation of bright alternative one estimation is larger, and due to being unable to judge accurately built-in system and third party's assessment system, which occurs Relatively large deviation, therefore first judge whether the practical valuation of the security is greater than the numerical value of third party's security valuation at this time, i.e., first Valuation between the two lesser one is determined, if more than illustrating that third party's security valuation is smaller, then in order to ensure security valuation Lesser third party's security valuation is set as the final valuation of the security by reliability, at this time if it is determined that built-in system The practical valuation of security is smaller, due to that still can not determine that deviation occurs in third party's assessment system or built-in system occurs Deviation, therefore the customized numerical value that customer manager corresponding with the client sends can be set as the security and finally estimated Value.
In order to improve the reliability of subsequent loan approval process, in an embodiment of the security estimation method of the application In, it can also specifically include that the step of corresponding subsequent approval process is selected according to the difference of the final valuation setting means of security Suddenly, which specifically includes following content: according to the setting means of the final valuation of the security and the final valuation of security The corresponding relationship of setting means and loan agreement approval process determines corresponding loan agreement approval process.
It is understood that the method that a variety of final valuations of determining security are listed in above-mentioned steps, due to every kind of determination The method of the final valuation of security have different valuation risks, therefore can according to the setting means of the final valuation of the security with And the corresponding relationship of the setting means of the final valuation of security and loan agreement approval process, determine corresponding loan agreement examination & approval stream Journey, such as above provide a kind of customer managers to have higher valuation with the method for the final valuation of customized security, this method Risk, therefore the final valuation of security determining in this approach is corresponding with the approval process of complex cumbersome loan agreement, such as It needs directly under higher level and directly under the long examination & approval of row;And the security determined by the mean value of the practical valuation of security and the valuation of third party's security is most The method of whole valuation, confidence level with higher and accuracy, customer manager can voluntarily examine loan agreement;For different signatures The setting method of the final valuation of product starts different subsequent loan agreement approval processes, can be improved subsequent loan approval process Reliability.
In order to effectively combining external valuation data and internal valuation data, the accuracy of security valuation and reliable is improved Property, risk management difficulty is reduced, and then accurate control is carried out to risk point, the application provides one kind and estimates for realizing the security The embodiment of the security valuation device of all or part of the content of value method, referring to fig. 4, the security valuation device specifically includes There is following content:
Security information forwarding module 10 assesses the signature in requesting for receiving the assessment request of client's transmission, and by described Product information is forwarded to third party's assessment system, so that third party's assessment system determines that security is assessed according to the security information Information, and information is assessed according to the security and carries out the assessment of third party's security, obtain third party's security valuation.
The practical valuation determining module 20 of security, for receive security assessment information that third party's assessment system returns and Third party's security valuation, and information is assessed according to the security and carries out security assessment, obtain the practical valuation of security.
The final valuation determining module 30 of security is used for according to the practical valuation of the security and third party's security valuation, Determine the final valuation of security.
As can be seen from the above description, security valuation device provided by the embodiments of the present application, can be commented by send client The security information estimated in request is forwarded to third party's assessment system, determines security according to security information by third party's assessment system Information is assessed, and information is assessed according to security by third party's assessment system and carries out the assessment of third party's security, obtains third party's security Valuation, due to often causing the confidence level of the final valuation of security lower only with reference to the valuation of third party's security in the prior art, or Internal security valuation is only carried out, the practical valuation of obtained security causes accuracy lower because shortcoming is professional, therefore the application Under the premise of the security assessment information and then security returned according to third party's assessment system assesses to obtain security practical valuation, into The practical valuation of security is effectively combined with third party's security valuation that third party's assessment system obtains one step, determines security Final valuation, the final valuation of the security have both higher confidence level and high accuracy, improve security valuation accuracy and can By property, risk management difficulty is reduced, and then accurate control can be carried out to risk point.
In order to the efficiency of high security valuation, in an embodiment of the security valuation device of the application, referring to Fig. 5, Also specifically include following content:
Qualification authentication unit 41, for carrying out loan qualification verifying to client's essential information in the assessment request.
Qualification verification result return unit 42 returns to loan qualification authentication failed if being not pass through for verification result As a result.
In order to improve the accuracy of internal security valuation, in an embodiment of the security valuation device of the application, Also specifically include following content: the preliminary valuation determination unit 51 of security, for assessing the security information in requesting according to described, Obtain the preliminary valuation of security.
In order to improve the accuracy of internal security valuation, in an embodiment of the security valuation device of the application, Referring to Fig. 6, the practical valuation determining module 20 of security includes:
The practical valuation determination unit 21 of security carries out the preliminary valuation of the security for assessing information according to the security Correction, obtains the practical valuation of security.
In order to effectively combine external valuation data and internal valuation data, and then improve the accurate of internal security valuation Degree, in an embodiment of the security valuation device of the application, referring to Fig. 7, the final valuation determining module 30 of security includes:
Dif ference judgment unit 31, for judge the practical valuation of the security and third party's security valuation difference whether More than preset difference value.
The final valuation setup unit 32 of first security, for when the judgement practical valuation of security and third party's security When the difference of valuation is no more than preset difference value, the average value of the practical valuation of the security and third party's security valuation is set For the final valuation of the security.
Numerical value judging unit 33, for surpassing when the difference for determining the practical valuation of security and third party's security valuation When crossing preset difference value, judge whether the practical valuation of the security is greater than the numerical value of third party's security valuation.
The final valuation setup unit 34 of second security judges that the practical valuation of the security is given as security greater than the third party for working as When the numerical value of product valuation, third party's security valuation is set as the final valuation of the security.
The final valuation setup unit 35 of third security judges the practical valuation of the security no more than the third party for working as When the numerical value of security valuation, it is final that the customized numerical value that customer manager corresponding with the client sends is set as the security Valuation.
In order to further explain this programme, the application also provides a kind of above-mentioned security valuation device of application and realizes that security is estimated The specific application example of value method, specifically includes following content:
1, client is by Mobile banking, online bank login system, system to client show corresponding business handling row, The fields such as cell, Lou Dong, unit number, House Property Area Surveying mention where the financing amount of money, financing time limit, drawing mode, the intended use of the loan, house property It supplies client and carries out typing, and require to sign the reference inquiry texts such as power of attorney on Client line, system is according to the room of client's typing It produces information and carries out the preliminary valuation of house property, such as average room rate and client's typing according to the cell prestored in database House Property Area Surveying is multiplied, and obtains the preliminary valuation of house property.
2, after client submits loan application, the age of the online verification individual client of system, blacklist, anti-fraud, people's row The information such as reference verify industrial and commercial registration information, the management position information of corporate client, and system refuses risk client, when client is (a People, legal person) qualification verification pass through after, system by loan application be sent to credit processing functional module.
3, loan application to be processed is sent to the customer manager that handles of corresponding bank by system automatically, and customer manager can be with External assessment company is selected, house property task to be assessed is sent to assessment incorporated business's Internetbank, assessment company logs in enterprise's Internetbank House property assessment report and third party's house property valuation are uploaded to enterprise's Internetbank.
4, house property assessment information (such as the fitting case, family in the house property assessment report that system is uploaded according to assessment company Type situation and residential property situation) value assessment is carried out to house property again, the practical valuation of house property is obtained, and according to obtained house property Practical valuation and third party's house property valuation carry out cross validation, i.e., when the numerical value difference of two valuations is smaller, system calculates automatically This house property value (such as average value of both of the aforesaid valuation) is generated, and automatically generates security archives and contract of guaranty.
5, this business again returns to credit processing module, and system is according to parameter setting, the automatic filling of model rule Business account information, customer manager, which confirms the financing account information of this business, can carry out business submission.
6, after system receives the service request that customer manager submits, first to client's progress legitimacy verifies, including but It is not limited to: verifying people's row reference of client, public control information, customer rating information, financing appropriateness check information, especially closes The information such as note, anti-fraud.
7, after system check passes through, customer manager can initiate to mortgage application online, and system receives customer manager's transmission Line mortgage application after, house property to be mortgaged, borrower's details are automatically sent to the data at Immovable Property Registration center Interface, Immovable Property Registration center complete that enrollment results are returned to this system after mortgage registration operates, and this system automatically updates security State (such as being set as having mortgaged).
8, internal system complete certificate category information approval after be client make loans, client can log in Mobile banking, Web bank withdraws deposit, and subsequent can carry out giving back for loan fund in Mobile banking, Web bank.
9, after loan origination, system automatically according to client manage flowing water, third party's house property database, industrial and commercial registration, The information such as people's row reference, anti-fraud, special attention are monitored to risk after the loan of client and early warning.
Embodiments herein, which also provides, can be realized one of Overall Steps in the estimation method of the security in above-described embodiment The specific embodiment of kind electronic equipment, referring to Fig. 8, the electronic equipment specifically includes following content:
Processor (processor) 601, memory (memory) 602, communication interface (Communications Interface) 603 and bus 604;
Wherein, the processor 601, memory 602, communication interface 603 complete mutual lead to by the bus 604 Letter;The communication interface 603 is for realizing security valuation device, online operation system, client device and other participation machines Information transmission between structure;
The processor 601 is used to call the computer program in the memory 602, and the processor executes the meter The Overall Steps in the security estimation method in above-described embodiment are realized when calculation machine program, for example, described in processor execution Following step is realized when computer program:
Step S101: the assessment request that client sends is received, and the security information in the assessment request is forwarded to the Tripartite's assessment system, so that third party's assessment system determines that security assesses information according to the security information, and according to institute It states security assessment information and carries out the assessment of third party's security, obtain third party's security valuation.
Step S102: receiving the security assessment information and third party's security valuation that third party's assessment system returns, and Information is assessed according to the security and carries out security assessment, obtains the practical valuation of security.
Step S103: according to the practical valuation of the security and third party's security valuation, the final valuation of security is determined.
As can be seen from the above description, electronic equipment provided by the embodiments of the present application, can be asked by the assessment for sending client Security information in asking is forwarded to third party's assessment system, determines that security is assessed according to security information by third party's assessment system Information, and information is assessed according to security by third party's assessment system and carries out the assessment of third party's security, third party's security valuation is obtained, Due to often causing the confidence level of the final valuation of security lower only with reference to the valuation of third party's security in the prior art, or only carry out Internal security valuation, the practical valuation of obtained security causes accuracy lower because shortcoming is professional, therefore the application is in basis The security assessment information and then security that third party's assessment system returns are assessed under the premise of obtaining the practical valuation of security, further The practical valuation of security is effectively combined with third party's security valuation that third party's assessment system obtains, determines that security is finally estimated Value, the final valuation of the security have both higher confidence level and high accuracy, improve the accuracy and reliability of security valuation, drop Low risk management difficulty, and then accurate control can be carried out to risk point.
Embodiments herein, which also provides, can be realized one of Overall Steps in the estimation method of the security in above-described embodiment Computer readable storage medium is planted, is stored with computer program on the computer readable storage medium, the computer program quilt Processor realizes the Overall Steps of the security estimation method in above-described embodiment when executing, for example, described in processor execution Following step is realized when computer program:
Step S101: the assessment request that client sends is received, and the security information in the assessment request is forwarded to the Tripartite's assessment system, so that third party's assessment system determines that security assesses information according to the security information, and according to institute It states security assessment information and carries out the assessment of third party's security, obtain third party's security valuation.
Step S102: receiving the security assessment information and third party's security valuation that third party's assessment system returns, and Information is assessed according to the security and carries out security assessment, obtains the practical valuation of security.
Step S103: according to the practical valuation of the security and third party's security valuation, the final valuation of security is determined.
As can be seen from the above description, computer readable storage medium provided by the embodiments of the present application, it can be by the way that client be sent out The security information in assessment request sent is forwarded to third party's assessment system, by third party's assessment system according to security information come really Determine security assessment information, and information is assessed according to security by third party's assessment system and carries out the assessment of third party's security, obtains third Square security valuation, due to often cause in the prior art only with reference to the valuation of third party's security the confidence level of the final valuation of security compared with It is low, or internal security valuation is only carried out, the practical valuation of obtained security causes accuracy lower because shortcoming is professional, therefore this Apply assessing to obtain the premise of the practical valuation of security in the security assessment information and then security that are returned according to third party's assessment system Under, further the practical valuation of security is effectively combined with third party's security valuation that third party's assessment system obtains, really Determine the final valuation of security, the final valuation of the security has both higher confidence level and high accuracy, improves the accurate of security valuation Degree and reliability reduce risk management difficulty, and then can carry out accurate control to risk point.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for hardware+ For program class embodiment, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to side The part of method embodiment illustrates.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can With or may be advantageous.
Although this application provides the method operating procedure as described in embodiment or flow chart, based on conventional or noninvasive The labour for the property made may include more or less operating procedure.The step of enumerating in embodiment sequence is only numerous steps One of execution sequence mode, does not represent and unique executes sequence.It, can when device or client production in practice executes To execute or parallel execute (such as at parallel processor or multithreading according to embodiment or method shown in the drawings sequence The environment of reason).
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, vehicle-mounted human-computer interaction device, cellular phone, camera phone, smart phone, individual Digital assistants, media player, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or The combination of any equipment in these equipment of person.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It will be understood by those skilled in the art that the embodiment of this specification can provide as the production of method, system or computer program Product.Therefore, in terms of this specification embodiment can be used complete hardware embodiment, complete software embodiment or combine software and hardware Embodiment form.
This specification embodiment can describe in the general context of computer-executable instructions executed by a computer, Such as program module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, journey Sequence, object, component, data structure etc..This specification embodiment can also be practiced in a distributed computing environment, in these points Cloth calculates in environment, by executing task by the connected remote processing devices of communication network.In distributed computing ring In border, program module can be located in the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", The description of " specific example " or " some examples " etc. means specific features described in conjunction with this embodiment or example, structure, material Or feature is contained at least one embodiment or example of this specification embodiment.In the present specification, to above-mentioned term Schematic representation be necessarily directed to identical embodiment or example.Moreover, description specific features, structure, material or Person's feature may be combined in any suitable manner in any one or more of the embodiments or examples.In addition, in not conflicting feelings Under condition, those skilled in the art by different embodiments or examples described in this specification and different embodiment or can show The feature of example is combined.
The foregoing is merely the embodiments of this specification, are not limited to this specification embodiment.For ability For field technique personnel, this specification embodiment can have various modifications and variations.It is all this specification embodiment spirit and Any modification, equivalent replacement, improvement and so within principle should be included in the scope of the claims of this specification embodiment Within.

Claims (14)

1. a kind of security estimation method, which is characterized in that the described method includes:
The assessment request that client sends is received, and the security information in the assessment request is forwarded to third party's assessment system, So that third party's assessment system determines that security assesses information according to the security information, and information is assessed according to the security The assessment of third party's security is carried out, third party's security valuation is obtained;
The security assessment information and third party's security valuation that third party's assessment system returns are received, and is commented according to the security Estimate information and carry out security assessment, obtains the practical valuation of security;
According to the practical valuation of the security and third party's security valuation, the final valuation of security is determined.
2. security estimation method according to claim 1, which is characterized in that in the security by the assessment request Information is forwarded to before third party's assessment system, comprising:
Loan qualification verifying is carried out to client's essential information in the assessment request;
If verification result is not pass through, loan qualification authentication failed result is returned.
3. security estimation method according to claim 1, which is characterized in that it is described according to the security assess information into Row security assessment, before obtaining the practical valuation of security, comprising:
According to the security information in the assessment request, the preliminary valuation of security is obtained.
4. security estimation method according to claim 3, which is characterized in that described to assess information progress according to the security Security assessment, obtains the practical valuation of security, comprising:
Information is assessed according to the security to be corrected the preliminary valuation of the security, obtains the practical valuation of security.
5. security estimation method according to claim 1, which is characterized in that described according to the practical valuation of the security and institute Third party's security valuation is stated, determines the final valuation of security, comprising:
Whether the difference for judging the practical valuation of the security and third party's security valuation is more than preset difference value;
If not exceeded, then the average value by the practical valuation of the security and third party's security valuation is set as the security most Whole valuation;
If being more than, judge whether the practical valuation of the security is greater than the numerical value of third party's security valuation;
If more than, then third party's security valuation is set as the final valuation of the security, it otherwise will be corresponding with the client Customer manager send customized numerical value be set as the final valuation of the security.
6. security estimation method according to claim 1, which is characterized in that after the determining final valuation of security, Further include:
It is flowed according to the setting means of the final valuation of the security and the examination & approval of the setting means of the final valuation of security and loan agreement The corresponding relationship of journey determines corresponding loan agreement approval process.
7. a kind of security valuation device characterized by comprising
Security information forwarding module assesses the security information in requesting for receiving the assessment request of client's transmission, and by described It is forwarded to third party's assessment system, so that third party's assessment system determines that security assesses information according to the security information, And information is assessed according to the security and carries out the assessment of third party's security, obtain third party's security valuation;
The practical valuation determining module of security, for receiving the security assessment information and third party that third party's assessment system returns Security valuation, and information is assessed according to the security and carries out security assessment, obtain the practical valuation of security;
The final valuation determining module of security, for determining and giving as security according to the practical valuation of the security and third party's security valuation The final valuation of product.
8. security valuation device according to claim 7, which is characterized in that further include:
Qualification authentication unit, for carrying out loan qualification verifying to client's essential information in the assessment request;
Qualification verification result return unit returns to loan qualification authentication failed result if being not pass through for verification result.
9. security valuation device according to claim 7, which is characterized in that further include:
The preliminary valuation determination unit of security, for obtaining the preliminary valuation of security according to the security information in the assessment request.
10. security valuation device according to claim 9, which is characterized in that the practical valuation determining module packet of security It includes:
The practical valuation determination unit of security is corrected the preliminary valuation of the security for assessing information according to the security, Obtain the practical valuation of security.
11. security valuation device according to claim 7, which is characterized in that the final valuation determining module packet of security It includes:
Dif ference judgment unit, for judging whether the practical valuation of the security and the difference of third party's security valuation are more than pre- If difference;
The final valuation setup unit of first security, for when the judgement practical valuation of security and third party's security valuation When difference is no more than preset difference value, the average value of the practical valuation of the security and third party's security valuation is set as described The final valuation of security;
Numerical value judging unit, for being more than default when the difference for determining the practical valuation of security and third party's security valuation When difference, judge whether the practical valuation of the security is greater than the numerical value of third party's security valuation;
The final valuation setup unit of second security judges that the practical valuation of the security is greater than third party's security valuation for working as Numerical value when, third party's security valuation is set as the final valuation of the security;
The final valuation setup unit of third security judges that the practical valuation of the security is estimated no more than third party's security for working as When the numerical value of value, the customized numerical value that customer manager corresponding with the client sends is set as the final valuation of the security.
12. security valuation device according to claim 7, which is characterized in that further include:
Approval process determination unit, for according to the setting means of the final valuation of the security and the setting of the final valuation of security The corresponding relationship of mode and loan agreement approval process determines corresponding loan agreement approval process.
13. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that the processor realizes that security as claimed in any one of claims 1 to 6 is estimated when executing described program The step of value method.
14. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of processor realizes security estimation method as claimed in any one of claims 1 to 6 when executing.
CN201910681468.4A 2019-07-26 2019-07-26 Security estimation method and device Pending CN110400176A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910681468.4A CN110400176A (en) 2019-07-26 2019-07-26 Security estimation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910681468.4A CN110400176A (en) 2019-07-26 2019-07-26 Security estimation method and device

Publications (1)

Publication Number Publication Date
CN110400176A true CN110400176A (en) 2019-11-01

Family

ID=68326080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910681468.4A Pending CN110400176A (en) 2019-07-26 2019-07-26 Security estimation method and device

Country Status (1)

Country Link
CN (1) CN110400176A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112785342A (en) * 2021-01-28 2021-05-11 中国工商银行股份有限公司 Real estate dynamic estimation method and device
CN112927023A (en) * 2021-03-26 2021-06-08 中国建设银行股份有限公司 Method and device for evaluating value of escort

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102592237A (en) * 2012-01-16 2012-07-18 深圳市宇商网科技有限公司 Commodity pledge price evaluating method and system based on electronic-commerce network platform
US20130332338A1 (en) * 2010-01-13 2013-12-12 Corelogic Solutions, Llc System and method of detecting and assessing multiple types of risks related to mortgage lending
US20150081590A1 (en) * 2013-09-13 2015-03-19 David Avrick System and method for analyzing the performance of mortgage-backed securities and identifying potential mortgage borrowers
CN106952159A (en) * 2017-03-20 2017-07-14 重庆汇集源科技有限公司 A kind of real security risk control method, system and storage medium
CN108053269A (en) * 2018-01-03 2018-05-18 中国科学院科技战略咨询研究院 A kind of big data intellectual property value appraisal system and method
CN108846704A (en) * 2018-06-25 2018-11-20 平安科技(深圳)有限公司 House property valuation methods, device, computer equipment and storage medium
CN109584030A (en) * 2018-10-31 2019-04-05 平安直通咨询有限公司 Mechanism recommended method, device and storage medium
CN109598605A (en) * 2018-11-26 2019-04-09 格锐科技有限公司 A kind of long-distance intelligent assessment and loan self-aid system based on entity guaranty

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130332338A1 (en) * 2010-01-13 2013-12-12 Corelogic Solutions, Llc System and method of detecting and assessing multiple types of risks related to mortgage lending
CN102592237A (en) * 2012-01-16 2012-07-18 深圳市宇商网科技有限公司 Commodity pledge price evaluating method and system based on electronic-commerce network platform
US20150081590A1 (en) * 2013-09-13 2015-03-19 David Avrick System and method for analyzing the performance of mortgage-backed securities and identifying potential mortgage borrowers
CN106952159A (en) * 2017-03-20 2017-07-14 重庆汇集源科技有限公司 A kind of real security risk control method, system and storage medium
CN108053269A (en) * 2018-01-03 2018-05-18 中国科学院科技战略咨询研究院 A kind of big data intellectual property value appraisal system and method
CN108846704A (en) * 2018-06-25 2018-11-20 平安科技(深圳)有限公司 House property valuation methods, device, computer equipment and storage medium
CN109584030A (en) * 2018-10-31 2019-04-05 平安直通咨询有限公司 Mechanism recommended method, device and storage medium
CN109598605A (en) * 2018-11-26 2019-04-09 格锐科技有限公司 A kind of long-distance intelligent assessment and loan self-aid system based on entity guaranty

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
合同文本: "商业银行押品价值评估管理制度体系", 《HTTPS://WWW.DOCIN.COM/P-1312411342.HTML&ISPAY=1》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112785342A (en) * 2021-01-28 2021-05-11 中国工商银行股份有限公司 Real estate dynamic estimation method and device
CN112927023A (en) * 2021-03-26 2021-06-08 中国建设银行股份有限公司 Method and device for evaluating value of escort

Similar Documents

Publication Publication Date Title
US11265324B2 (en) User permissions for access to secure data at third-party
WO2020192272A1 (en) Blockchain-based transfer method and system, computing device and storage medium
US8719911B2 (en) Methods, systems, and computer program products for authenticating an identity of a user by generating a confidence indicator of the identity of the user based on a combination of multiple authentication techniques
US20080133391A1 (en) User interface for sociofinancial systems and methods
US20080133402A1 (en) Sociofinancial systems and methods
CN104966229A (en) Information processing method and credit platform
CN110738473B (en) Wind control method, system, device and equipment
CN110866822B (en) Wind control management method and device for securitization of assets, electronic equipment and storage medium
US20180322571A1 (en) System and method for facilitating electronic transactions
CN109740914A (en) A kind of method, storage medium, equipment and system that financial business is assessed, recommended
CN109447791A (en) A kind of funds transaction method and device based on block chain
CA3165099A1 (en) System and method for assessing a digital interaction with a digital third party account service
CN110400176A (en) Security estimation method and device
CN110135801A (en) A kind of item information processing method and device
CN109670953A (en) A kind of equity register method, device and equipment
CN109670961A (en) Management method, device, terminal device and computer readable storage medium after throwing
US20220129871A1 (en) System for mapping user trust relationships
CN112702410A (en) Evaluation system and method based on block chain network and related equipment
TWI439957B (en) Loan method for distinct checking the amount of the loan and its interest rate
CN111260363A (en) Public benefit fund supervision method, device, equipment and medium based on block chain
CN109359988B (en) Resource allocation method, system, server and storage medium based on block chain
KR101796053B1 (en) Method and apparatus for managing fund based on community
KR101948979B1 (en) Method for processing peer to peer lending finance data for first investment and later fund procurement based consignment asset warranty and apparatus thereof
Ortlepp A Feasibility Study on Using the Blockchain to Build a Credit Register for Individuals Who Do Not Have Access to Traditional Credit Scores
US20230206320A1 (en) Method and system for generating a financial infographic of a user through a financing platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191101