CN110400176A - Security estimation method and device - Google Patents
Security estimation method and device Download PDFInfo
- Publication number
- CN110400176A CN110400176A CN201910681468.4A CN201910681468A CN110400176A CN 110400176 A CN110400176 A CN 110400176A CN 201910681468 A CN201910681468 A CN 201910681468A CN 110400176 A CN110400176 A CN 110400176A
- Authority
- CN
- China
- Prior art keywords
- security
- valuation
- party
- information
- assessment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0283—Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Abstract
The embodiment of the present application provides a kind of security estimation method and device, method includes: the assessment request for receiving client and sending, and the security information in the assessment request is forwarded to third party's assessment system, so that third party's assessment system determines that security assesses information according to the security information, and information is assessed according to the security and carries out the assessment of third party's security, obtain third party's security valuation;The security assessment information and third party's security valuation that third party's assessment system returns are received, and information is assessed according to the security and carries out security assessment, obtains the practical valuation of security;According to the practical valuation of the security and third party's security valuation, the final valuation of security is determined;The application can effectively combine external valuation data and internal valuation data, improve the accuracy and reliability of security valuation, reduce risk management difficulty, and then carry out accurate control to risk point.
Description
Technical field
This application involves loan valuation fields, and in particular to a kind of security estimation method and device.
Background technique
Mortgage manages class business at present (customer group is the general favour bore client of the country such as medium and small micro- enterprise, self-employed entrepreneur)
Intelligent level is lower, and the value assessment of guarantee especially house property and financing operation flow are still relatively complicated, client and client
The experience of manager is bad.Meanwhile itself ability to ward off risks of little Wei enterprise is weaker, is easy by home and abroad environment and market fluctuation
It influences, the average survival time time limit is shorter, and the business risk of itself is larger, and there are more serious information dissymmetries, therefore
Credit risk management difficulty is larger, and investigation and post-loan management are difficult pair because being influenced by human resources restraining factors before the loan of bank
Such risk point carries out accurate control.
Summary of the invention
For the problems of the prior art, the application provides a kind of security estimation method and device, can effectively combine outer
Portion's valuation data and internal valuation data, improve the accuracy and reliability of security valuation, reduce risk management difficulty, and then right
Risk point carries out accurate control.
At least one of to solve the above-mentioned problems, the application the following technical schemes are provided:
In a first aspect, the application provides a kind of security estimation method, comprising:
The assessment request that client sends is received, and the security information in the assessment request is forwarded to third party and assesses system
System so that third party's assessment system determines that security assesses information according to the security information, and is assessed according to the security
Information carries out the assessment of third party's security, obtains third party's security valuation;
The security assessment information and third party's security valuation that third party's assessment system returns are received, and according to the signature
It judges and estimates information progress security assessment, obtain the practical valuation of security;
According to the practical valuation of the security and third party's security valuation, the final valuation of security is determined.
Further, before the security information by the assessment request is forwarded to third party's assessment system, packet
It includes:
Loan qualification verifying is carried out to client's essential information in the assessment request;
If verification result is not pass through, loan qualification authentication failed result is returned.
Further, information progress security assessment is assessed according to the security described, before obtaining the practical valuation of security,
Include:
According to the security information in the assessment request, the preliminary valuation of security is obtained.
Further, described that information progress security assessment is assessed according to the security, obtain the practical valuation of security, comprising:
Information is assessed according to the security to be corrected the preliminary valuation of the security, obtains the practical valuation of security.
Further, described according to the practical valuation of the security and third party's security valuation, determine that security is finally estimated
Value, comprising:
Whether the difference for judging the practical valuation of the security and third party's security valuation is more than preset difference value;
If not exceeded, then the average value by the practical valuation of the security and third party's security valuation is set as the signature
The final valuation of product;
If being more than, judge whether the practical valuation of the security is greater than the numerical value of third party's security valuation;
If more than, then third party's security valuation is set as the final valuation of the security, it otherwise will be with the client
The customized numerical value that corresponding customer manager sends is set as the final valuation of the security.
Further, after the determining final valuation of security, further includes:
It is examined according to the setting means of the final valuation of the security and the setting means of the final valuation of security and loan agreement
The corresponding relationship for criticizing process, determines corresponding loan agreement approval process.
Second aspect, the application provide a kind of security valuation device, comprising:
Security information forwarding module assesses the security in requesting for receiving the assessment request of client's transmission, and by described
Information is forwarded to third party's assessment system, so that third party's assessment system determines security assessment letter according to the security information
Breath, and information is assessed according to the security and carries out the assessment of third party's security, obtain third party's security valuation;
The practical valuation determining module of security, for receiving security assessment information that third party's assessment system returns and the
Tripartite's security valuation, and information is assessed according to the security and carries out security assessment, obtain the practical valuation of security;
The final valuation determining module of security is used for according to the practical valuation of the security and third party's security valuation, really
Determine the final valuation of security.
Further, further includes:
Qualification authentication unit, for carrying out loan qualification verifying to client's essential information in the assessment request;
Qualification verification result return unit returns to loan qualification authentication failed knot if being not pass through for verification result
Fruit.
Further, further includes:
The preliminary valuation determination unit of security, for obtaining security and tentatively estimating according to the security information in the assessment request
Value.
Further, the practical valuation determining module of the security includes:
The practical valuation determination unit of security carries out school to the preliminary valuation of the security for assessing information according to the security
Just, the practical valuation of security is obtained.
Further, the final valuation determining module of the security includes:
Dif ference judgment unit, for judging whether the practical valuation of the security and the difference of third party's security valuation surpass
Cross preset difference value;
The final valuation setup unit of first security, for estimating when the judgement practical valuation of security with third party's security
When the difference of value is no more than preset difference value, the practical valuation of the security and the average value of third party's security valuation are set as
The final valuation of security;
Numerical value judging unit, for being more than when the difference for determining the practical valuation of security and third party's security valuation
When preset difference value, judge whether the practical valuation of the security is greater than the numerical value of third party's security valuation;
The final valuation setup unit of second security judges that the practical valuation of the security is greater than third party's security for working as
When the numerical value of valuation, third party's security valuation is set as the final valuation of the security;
The final valuation setup unit of third security judges that the practical valuation of the security is given as security no more than the third party for working as
When the numerical value of product valuation, the customized numerical value that customer manager corresponding with the client sends is set as the security and is finally estimated
Value.
Further, further includes:
Approval process determination unit, for according to the setting means of the final valuation of the security and the final valuation of security
The corresponding relationship of setting means and loan agreement approval process determines corresponding loan agreement approval process.
The third aspect, the application provides a kind of electronic equipment, including memory, processor and storage are on a memory and can
The computer program run on a processor, the processor realize the step of the security estimation method when executing described program
Suddenly.
Fourth aspect, the application provide a kind of computer readable storage medium, are stored thereon with computer program, the calculating
The step of security estimation method is realized when machine program is executed by processor.
As shown from the above technical solution, the application provides a kind of security estimation method and device, passes through send client
Security information in assessment request is forwarded to third party's assessment system, and signature is determined according to security information by third party's assessment system
It judges and estimates information, and information is assessed according to security by third party's assessment system and carries out the assessment of third party's security, obtain third party's signature
Product valuation, due to often causing the confidence level of the final valuation of security lower only with reference to the valuation of third party's security in the prior art,
Or internal security valuation is only carried out, the practical valuation of obtained security causes accuracy lower because shortcoming is professional, therefore this Shen
Please under the premise of the security assessment information and then security returned according to third party's assessment system assesses to obtain security practical valuation,
The practical valuation of security is effectively combined with third party's security valuation that third party's assessment system obtains further, determines and gives as security
The final valuation of product, the final valuation of the security have both higher confidence level and high accuracy, improve security valuation accuracy and
Reliability reduces risk management difficulty, and then can carry out accurate control to risk point.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the application
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.
Fig. 1 is one of the flow diagram of the security estimation method in the embodiment of the present application;
Fig. 2 is the two of the flow diagram of the security estimation method in the embodiment of the present application;
Fig. 3 is the three of the flow diagram of the security estimation method in the embodiment of the present application;
Fig. 4 is one of the structure chart of the security valuation device in the embodiment of the present application;
Fig. 5 is the two of the structure chart of the security valuation device in the embodiment of the present application;
Fig. 6 is the three of the structure chart of the security valuation device in the embodiment of the present application;
Fig. 7 is the four of the structure chart of the security valuation device in the embodiment of the present application;
Fig. 8 is the structural schematic diagram of the electronic equipment in the embodiment of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, technical solutions in the embodiments of the present application carries out clear, complete description, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall in the protection scope of this application.
In view of mortgaging class business of managing at present, (customer group is the country Pu Huikou such as medium and small micro- enterprise, self-employed entrepreneur
Diameter client) intelligent level is lower, and the value assessment of guarantee especially house property and financing operation flow are still relatively complicated, client
And the experience of customer manager is bad.Meanwhile itself ability to ward off risks of little Wei enterprise is weaker, is easy by home and abroad environment and market
The influence of fluctuation, the average survival time time limit is shorter, and the business risk of itself is larger, and there are more serious information asymmetries
Property, therefore credit risk management difficulty is larger, investigates before the loan of bank and post-loan management by human resources restraining factors because being influenced,
It is difficult the problem of accurate control is carried out to such risk point, the application provides a kind of security estimation method and device, by will be objective
The security information in assessment request that family is sent is forwarded to third party's assessment system, by third party's assessment system according to security information
To determine security assessment information, and information progress third party's security assessment is assessed according to security by third party's assessment system, obtained
Third party's security valuation, due to often leading to the credible of the final valuation of security only with reference to the valuation of third party's security in the prior art
It spends lower, or only carries out internal security valuation, cause accuracy lower due to the practical valuation of obtained security is professional because being short of, because
This application assesses to obtain the practical valuation of security in the security assessment information and then security returned according to third party's assessment system
Under the premise of, further third party's security valuation that the practical valuation of security is obtained with third party's assessment system is effectively tied
It closes, determines that the final valuation of security, the final valuation of the security have both higher confidence level and high accuracy, improve security valuation
Accuracy and reliability reduce risk management difficulty, and then can carry out accurate control to risk point.
In order to effectively combining external valuation data and internal valuation data, the accuracy of security valuation and reliable is improved
Property, risk management difficulty is reduced, and then accurate control is carried out to risk point, the application provides a kind of implementation of security estimation method
Example, referring to Fig. 1, the security estimation method specifically includes following content:
Step S101: the assessment request that client sends is received, and the security information in the assessment request is forwarded to the
Tripartite's assessment system, so that third party's assessment system determines that security assesses information according to the security information, and according to institute
It states security assessment information and carries out the assessment of third party's security, obtain third party's security valuation.
It is requested it is understood that system can receive client by the assessment that client is sent, in the assessment request
Including at least client input security information and client's essential information, using house property as security for, the security information includes
But be not limited to: cell, Lou Dong, unit number and House Property Area Surveying where house property, client's essential information includes but is not limited to: surname
Name, age, type of credential, passport NO. and phone number.
It is understood that internal system often just can be carried out according to security information and client's essential information in the prior art
Security assessment, but since the security information of client's input is not detailed enough, there is one-sidedness, cannot include and have an impact most completely
The factor of whole security valuation, therefore the security valuation accuracy that internal system obtains is lower, system requests assessment in the application
In security information be forwarded to third party's assessment system and carry out the assessment of third party's security, third party's assessment system can correspond to
Company is assessed for the security of a certain profession, the particular content for capableing of security information carries out the offline upper security of line from the angle of profession
Investigation, and then determine that security assesses information, to improve the accuracy of security valuation.
In a kind of example, the security information of client's input is " No. 1 Unit 1, building Room 101 of A cell, construction area 98
Square meter ", third party's assessment system can carry out on-site inspection under line according to the security information, from the final security valuation of influence
All angles determine that security assessment information is that " A cell is old residential area, No. 1 building is overlooking noise jamming, the 101 Room illumination of Unit 1
Time is insufficient, its not upright reality of house type can be lower than 98 square meters using area ".
Optionally, this system can carry out preliminary valuation to security according to the security information received, such as according to above-mentioned
The security information " No. 1 Unit 1, building Room 101 of A cell, 98 square meter of construction area " that client inputs in example, in conjunction with present count
According to the every square meter of average room rate 10,000 of the A cell stored in library, obtain the preliminary valuation of security: 98 square meters are equal to multiplied by 10,000 every square meters
980000, the preliminary valuation of security can be when client starts to apply security valuation operation in advance to one security of present customers
Substantially valuation can be improved the operating experience of client.
Optionally, the security assessment information that third party's assessment system is determined according to it is able to carry out accurate third party
Security assessment, obtains third party's security valuation.Third party assesses company using cell average price as a reference value, is then according to house
It is no for school district, whether by the factors such as noise jamming, direction, floor carry out system model adjustment, and be aided with manually verify on the spot with
And the newest listed price in market carries out artificial fine tuning and obtains third party's assessment in Firm Valuation.Such as it is obtained according in examples detailed above
Security assessment information " A cell, which is that old residential area, No. 1 building are overlooking, that noise jamming, the 101 Room light application time of Unit 1 is insufficient, family
Its not upright reality of type can be lower than 98 square meters using area ", using existing weighting algorithm, for be conducive to be promoted the influence of valuation because
Element one higher weight of setting is arranged a lower weight to be unfavorable for being promoted the influence factor of valuation, finally obtains this
Third party's security valuation of security is 820,000.
Step S102: receiving the security assessment information and third party's security valuation that third party's assessment system returns, and
Information is assessed according to the security and carries out security assessment, obtains the practical valuation of security.
It is understood that this system can provide client with reference to the security assessment information that third party's assessment system returns
Security carry out security assessment, due to third party's assessment system provide security assessment information it is more careful, more professional, provide
Can influence the security assessment information of each dimension of the final valuation of security, thus this system accordingly carry out security assessment can
Obtain the practical valuation of more accurate security.
It optionally, can also be on the basis of security preliminary valuation has been obtained according to security information in above-mentioned this system
The security assessment information returned with reference to third party's assessment system is corrected the preliminary valuation of the security, such as security assessment letter
Breath show A cell be old residential area, I class school district room, be located at 5 buildings (intermediate floor), towards south, have noise jamming, these factors it
Between have weight relationship, each factor will have a scoring according to its concrete condition, so as to calculate these factors pair
The total adjustment ratio of one of average price, thus obtains the value of this house property.
Step S103: according to the practical valuation of the security and third party's security valuation, the final valuation of security is determined.
It is understood that there is also use third party's assessment system to mention completely when carrying out valuation to security in the prior art
The scheme of third party's security valuation of confession, although third party's assessment system with more professional, its not by the monitoring of this system,
Gained third party's security valuation is possible to do not have higher confidence level, therefore the application being capable of the effectively obtained signature of connecting inner
Final valuation is wanted in third party's security valuation that the practical valuation of product and third party's assessment system obtain, comprehensive consideration determination, thus
Under the premise of ensureing security valuation reliability, the accuracy of security valuation is promoted.
As can be seen from the above description, security estimation method provided by the embodiments of the present application, can be commented by send client
The security information estimated in request is forwarded to third party's assessment system, determines security according to security information by third party's assessment system
Information is assessed, and information is assessed according to security by third party's assessment system and carries out the assessment of third party's security, obtains third party's security
Valuation, due to often causing the confidence level of the final valuation of security lower only with reference to the valuation of third party's security in the prior art, or
Internal security valuation is only carried out, the practical valuation of obtained security causes accuracy lower because shortcoming is professional, therefore the application
Under the premise of the security assessment information and then security returned according to third party's assessment system assesses to obtain security practical valuation, into
The practical valuation of security is effectively combined with third party's security valuation that third party's assessment system obtains one step, determines security
Final valuation, the final valuation of the security have both higher confidence level and high accuracy, improve security valuation accuracy and can
By property, risk management difficulty is reduced, and then accurate control can be carried out to risk point.
It, can be in an embodiment of the security estimation method of the application in order to improve the efficiency of security valuation
It specifically include first to judge whether client has the step of loan qualification before forwarding third party's assessment system, it referring to fig. 2, should
Step specifically includes following content:
Step S201: loan qualification verifying is carried out to client's essential information in the assessment request.
Step S202: if verification result is not pass through, loan qualification authentication failed result is returned to.
It is understood that the premise that loan qualification verifying is unlatching the application security valuation process is carried out to client, if
Judged that the client does not have loan qualification verifying, then this system saves system operations without starting subsequent valuation process
Pressure and the cost for calling third party's assessment system, specifically, the loan qualification verifying includes but is not limited to: the personal visitor of verification
The information such as age, blacklist, anti-fraud and people's row reference at family verify the industrial and commercial registration information and management position letter of corporate client
Breath.
In order to improve the accuracy of internal security valuation, at the same it is first rough to client feedback one early period in assessment
Security valuation can also specifically include to estimate in the internal security of progress in an embodiment of the security estimation method of the application
The step of value, before obtaining the practical valuation of security, first carries out entry evaluation, obtains security preliminary valuation, which specifically includes
There is following content: according to the security information in the assessment request, obtaining the preliminary valuation of security.
Optionally, this system can carry out preliminary valuation to security according to the security information received, such as according to above-mentioned
The security information " No. 1 Unit 1, building Room 101 of A cell, 98 square meter of construction area " that client inputs in example, in conjunction with present count
According to the every square meter of average room rate 10,000 of the A cell stored in library, obtain the preliminary valuation of security: 98 square meters are equal to multiplied by 10,000 every square meters
980000, the preliminary valuation of security can be when client starts to apply security valuation operation in advance to one security of present customers
Substantially valuation can be improved the operating experience of client.
In order to improve the accuracy of internal security valuation, in an embodiment of the security estimation method of the application,
It can also specifically include that more accurate security is obtained according to the professional security assessment information that third party's assessment system provides
The step of practical valuation, which specifically includes following content: assessing information according to the security and tentatively estimates to the security
Value is corrected, and obtains the practical valuation of security.
It optionally, can also be on the basis of security preliminary valuation has been obtained according to security information in above-mentioned this system
The security assessment information returned with reference to third party's assessment system is corrected the preliminary valuation of the security, such as security assessment letter
Breath shows that A cell is old residential area, then can the former preliminary valuation of security be 980,000 on the basis of carry out downward price adjustment, obtain security
Practical valuation.
In order to effectively combine external valuation data and internal valuation data, and then improve the accurate of internal security valuation
Degree, can also specifically include the practical valuation of security of connecting inner in an embodiment of the security estimation method of the application
With the specific data of third party's security valuation, choosing then corresponding security final valuation setting means the step of, referring to Fig. 3, the step
Suddenly specifically include following content:
Step S301: whether the difference for judging the practical valuation of the security and third party's security valuation is more than default poor
Value.
Step S302: if not exceeded, then setting the practical valuation of the security and the average value of third party's security valuation
It is set to the final valuation of the security.
Step S303: if being more than, judge whether the practical valuation of the security is greater than the number of third party's security valuation
Value.
Step S304: if more than, then third party's security valuation is set as the final valuation of the security, it otherwise will be with
The customized numerical value that the corresponding customer manager of the client sends is set as the final valuation of the security.
It is understood that according to the practical valuation of security and the valuation of third party's security, it can in a number of different ways really
Determine the final valuation of security.
It is alternatively possible to determine that security is finally estimated according to the size of the difference of the practical valuation of security and third party's security valuation
Value specifically judges whether the difference of the practical valuation of the security and third party's security valuation is more than preset difference value, if not
It is more than that then the average value by the practical valuation of the security and third party's security valuation is set as the final valuation of the security,
For example, the practical valuation of security is 920,000, third party's security valuation is 880,000, and the two difference is 40,000, and is preset
Preset difference value be 100,000, since the two difference is less than preset difference value, i.e. the practical valuation of security assessed of built-in system
The third party's security valuation assessed with third party's assessment system is not much different, and shows that the assessment accuracy of the two is all higher,
Then the average value of the practical valuation of the security and third party's security valuation can be set as the final valuation of the security and institute
Stating the final valuation of security is (92+88)/2=90.
Optionally, if the difference of the practical valuation of the security and third party's security valuation is more than preset difference value, table
The deviation of bright alternative one estimation is larger, and due to being unable to judge accurately built-in system and third party's assessment system, which occurs
Relatively large deviation, therefore first judge whether the practical valuation of the security is greater than the numerical value of third party's security valuation at this time, i.e., first
Valuation between the two lesser one is determined, if more than illustrating that third party's security valuation is smaller, then in order to ensure security valuation
Lesser third party's security valuation is set as the final valuation of the security by reliability, at this time if it is determined that built-in system
The practical valuation of security is smaller, due to that still can not determine that deviation occurs in third party's assessment system or built-in system occurs
Deviation, therefore the customized numerical value that customer manager corresponding with the client sends can be set as the security and finally estimated
Value.
In order to improve the reliability of subsequent loan approval process, in an embodiment of the security estimation method of the application
In, it can also specifically include that the step of corresponding subsequent approval process is selected according to the difference of the final valuation setting means of security
Suddenly, which specifically includes following content: according to the setting means of the final valuation of the security and the final valuation of security
The corresponding relationship of setting means and loan agreement approval process determines corresponding loan agreement approval process.
It is understood that the method that a variety of final valuations of determining security are listed in above-mentioned steps, due to every kind of determination
The method of the final valuation of security have different valuation risks, therefore can according to the setting means of the final valuation of the security with
And the corresponding relationship of the setting means of the final valuation of security and loan agreement approval process, determine corresponding loan agreement examination & approval stream
Journey, such as above provide a kind of customer managers to have higher valuation with the method for the final valuation of customized security, this method
Risk, therefore the final valuation of security determining in this approach is corresponding with the approval process of complex cumbersome loan agreement, such as
It needs directly under higher level and directly under the long examination & approval of row;And the security determined by the mean value of the practical valuation of security and the valuation of third party's security is most
The method of whole valuation, confidence level with higher and accuracy, customer manager can voluntarily examine loan agreement;For different signatures
The setting method of the final valuation of product starts different subsequent loan agreement approval processes, can be improved subsequent loan approval process
Reliability.
In order to effectively combining external valuation data and internal valuation data, the accuracy of security valuation and reliable is improved
Property, risk management difficulty is reduced, and then accurate control is carried out to risk point, the application provides one kind and estimates for realizing the security
The embodiment of the security valuation device of all or part of the content of value method, referring to fig. 4, the security valuation device specifically includes
There is following content:
Security information forwarding module 10 assesses the signature in requesting for receiving the assessment request of client's transmission, and by described
Product information is forwarded to third party's assessment system, so that third party's assessment system determines that security is assessed according to the security information
Information, and information is assessed according to the security and carries out the assessment of third party's security, obtain third party's security valuation.
The practical valuation determining module 20 of security, for receive security assessment information that third party's assessment system returns and
Third party's security valuation, and information is assessed according to the security and carries out security assessment, obtain the practical valuation of security.
The final valuation determining module 30 of security is used for according to the practical valuation of the security and third party's security valuation,
Determine the final valuation of security.
As can be seen from the above description, security valuation device provided by the embodiments of the present application, can be commented by send client
The security information estimated in request is forwarded to third party's assessment system, determines security according to security information by third party's assessment system
Information is assessed, and information is assessed according to security by third party's assessment system and carries out the assessment of third party's security, obtains third party's security
Valuation, due to often causing the confidence level of the final valuation of security lower only with reference to the valuation of third party's security in the prior art, or
Internal security valuation is only carried out, the practical valuation of obtained security causes accuracy lower because shortcoming is professional, therefore the application
Under the premise of the security assessment information and then security returned according to third party's assessment system assesses to obtain security practical valuation, into
The practical valuation of security is effectively combined with third party's security valuation that third party's assessment system obtains one step, determines security
Final valuation, the final valuation of the security have both higher confidence level and high accuracy, improve security valuation accuracy and can
By property, risk management difficulty is reduced, and then accurate control can be carried out to risk point.
In order to the efficiency of high security valuation, in an embodiment of the security valuation device of the application, referring to Fig. 5,
Also specifically include following content:
Qualification authentication unit 41, for carrying out loan qualification verifying to client's essential information in the assessment request.
Qualification verification result return unit 42 returns to loan qualification authentication failed if being not pass through for verification result
As a result.
In order to improve the accuracy of internal security valuation, in an embodiment of the security valuation device of the application,
Also specifically include following content: the preliminary valuation determination unit 51 of security, for assessing the security information in requesting according to described,
Obtain the preliminary valuation of security.
In order to improve the accuracy of internal security valuation, in an embodiment of the security valuation device of the application,
Referring to Fig. 6, the practical valuation determining module 20 of security includes:
The practical valuation determination unit 21 of security carries out the preliminary valuation of the security for assessing information according to the security
Correction, obtains the practical valuation of security.
In order to effectively combine external valuation data and internal valuation data, and then improve the accurate of internal security valuation
Degree, in an embodiment of the security valuation device of the application, referring to Fig. 7, the final valuation determining module 30 of security includes:
Dif ference judgment unit 31, for judge the practical valuation of the security and third party's security valuation difference whether
More than preset difference value.
The final valuation setup unit 32 of first security, for when the judgement practical valuation of security and third party's security
When the difference of valuation is no more than preset difference value, the average value of the practical valuation of the security and third party's security valuation is set
For the final valuation of the security.
Numerical value judging unit 33, for surpassing when the difference for determining the practical valuation of security and third party's security valuation
When crossing preset difference value, judge whether the practical valuation of the security is greater than the numerical value of third party's security valuation.
The final valuation setup unit 34 of second security judges that the practical valuation of the security is given as security greater than the third party for working as
When the numerical value of product valuation, third party's security valuation is set as the final valuation of the security.
The final valuation setup unit 35 of third security judges the practical valuation of the security no more than the third party for working as
When the numerical value of security valuation, it is final that the customized numerical value that customer manager corresponding with the client sends is set as the security
Valuation.
In order to further explain this programme, the application also provides a kind of above-mentioned security valuation device of application and realizes that security is estimated
The specific application example of value method, specifically includes following content:
1, client is by Mobile banking, online bank login system, system to client show corresponding business handling row,
The fields such as cell, Lou Dong, unit number, House Property Area Surveying mention where the financing amount of money, financing time limit, drawing mode, the intended use of the loan, house property
It supplies client and carries out typing, and require to sign the reference inquiry texts such as power of attorney on Client line, system is according to the room of client's typing
It produces information and carries out the preliminary valuation of house property, such as average room rate and client's typing according to the cell prestored in database
House Property Area Surveying is multiplied, and obtains the preliminary valuation of house property.
2, after client submits loan application, the age of the online verification individual client of system, blacklist, anti-fraud, people's row
The information such as reference verify industrial and commercial registration information, the management position information of corporate client, and system refuses risk client, when client is (a
People, legal person) qualification verification pass through after, system by loan application be sent to credit processing functional module.
3, loan application to be processed is sent to the customer manager that handles of corresponding bank by system automatically, and customer manager can be with
External assessment company is selected, house property task to be assessed is sent to assessment incorporated business's Internetbank, assessment company logs in enterprise's Internetbank
House property assessment report and third party's house property valuation are uploaded to enterprise's Internetbank.
4, house property assessment information (such as the fitting case, family in the house property assessment report that system is uploaded according to assessment company
Type situation and residential property situation) value assessment is carried out to house property again, the practical valuation of house property is obtained, and according to obtained house property
Practical valuation and third party's house property valuation carry out cross validation, i.e., when the numerical value difference of two valuations is smaller, system calculates automatically
This house property value (such as average value of both of the aforesaid valuation) is generated, and automatically generates security archives and contract of guaranty.
5, this business again returns to credit processing module, and system is according to parameter setting, the automatic filling of model rule
Business account information, customer manager, which confirms the financing account information of this business, can carry out business submission.
6, after system receives the service request that customer manager submits, first to client's progress legitimacy verifies, including but
It is not limited to: verifying people's row reference of client, public control information, customer rating information, financing appropriateness check information, especially closes
The information such as note, anti-fraud.
7, after system check passes through, customer manager can initiate to mortgage application online, and system receives customer manager's transmission
Line mortgage application after, house property to be mortgaged, borrower's details are automatically sent to the data at Immovable Property Registration center
Interface, Immovable Property Registration center complete that enrollment results are returned to this system after mortgage registration operates, and this system automatically updates security
State (such as being set as having mortgaged).
8, internal system complete certificate category information approval after be client make loans, client can log in Mobile banking,
Web bank withdraws deposit, and subsequent can carry out giving back for loan fund in Mobile banking, Web bank.
9, after loan origination, system automatically according to client manage flowing water, third party's house property database, industrial and commercial registration,
The information such as people's row reference, anti-fraud, special attention are monitored to risk after the loan of client and early warning.
Embodiments herein, which also provides, can be realized one of Overall Steps in the estimation method of the security in above-described embodiment
The specific embodiment of kind electronic equipment, referring to Fig. 8, the electronic equipment specifically includes following content:
Processor (processor) 601, memory (memory) 602, communication interface (Communications
Interface) 603 and bus 604;
Wherein, the processor 601, memory 602, communication interface 603 complete mutual lead to by the bus 604
Letter;The communication interface 603 is for realizing security valuation device, online operation system, client device and other participation machines
Information transmission between structure;
The processor 601 is used to call the computer program in the memory 602, and the processor executes the meter
The Overall Steps in the security estimation method in above-described embodiment are realized when calculation machine program, for example, described in processor execution
Following step is realized when computer program:
Step S101: the assessment request that client sends is received, and the security information in the assessment request is forwarded to the
Tripartite's assessment system, so that third party's assessment system determines that security assesses information according to the security information, and according to institute
It states security assessment information and carries out the assessment of third party's security, obtain third party's security valuation.
Step S102: receiving the security assessment information and third party's security valuation that third party's assessment system returns, and
Information is assessed according to the security and carries out security assessment, obtains the practical valuation of security.
Step S103: according to the practical valuation of the security and third party's security valuation, the final valuation of security is determined.
As can be seen from the above description, electronic equipment provided by the embodiments of the present application, can be asked by the assessment for sending client
Security information in asking is forwarded to third party's assessment system, determines that security is assessed according to security information by third party's assessment system
Information, and information is assessed according to security by third party's assessment system and carries out the assessment of third party's security, third party's security valuation is obtained,
Due to often causing the confidence level of the final valuation of security lower only with reference to the valuation of third party's security in the prior art, or only carry out
Internal security valuation, the practical valuation of obtained security causes accuracy lower because shortcoming is professional, therefore the application is in basis
The security assessment information and then security that third party's assessment system returns are assessed under the premise of obtaining the practical valuation of security, further
The practical valuation of security is effectively combined with third party's security valuation that third party's assessment system obtains, determines that security is finally estimated
Value, the final valuation of the security have both higher confidence level and high accuracy, improve the accuracy and reliability of security valuation, drop
Low risk management difficulty, and then accurate control can be carried out to risk point.
Embodiments herein, which also provides, can be realized one of Overall Steps in the estimation method of the security in above-described embodiment
Computer readable storage medium is planted, is stored with computer program on the computer readable storage medium, the computer program quilt
Processor realizes the Overall Steps of the security estimation method in above-described embodiment when executing, for example, described in processor execution
Following step is realized when computer program:
Step S101: the assessment request that client sends is received, and the security information in the assessment request is forwarded to the
Tripartite's assessment system, so that third party's assessment system determines that security assesses information according to the security information, and according to institute
It states security assessment information and carries out the assessment of third party's security, obtain third party's security valuation.
Step S102: receiving the security assessment information and third party's security valuation that third party's assessment system returns, and
Information is assessed according to the security and carries out security assessment, obtains the practical valuation of security.
Step S103: according to the practical valuation of the security and third party's security valuation, the final valuation of security is determined.
As can be seen from the above description, computer readable storage medium provided by the embodiments of the present application, it can be by the way that client be sent out
The security information in assessment request sent is forwarded to third party's assessment system, by third party's assessment system according to security information come really
Determine security assessment information, and information is assessed according to security by third party's assessment system and carries out the assessment of third party's security, obtains third
Square security valuation, due to often cause in the prior art only with reference to the valuation of third party's security the confidence level of the final valuation of security compared with
It is low, or internal security valuation is only carried out, the practical valuation of obtained security causes accuracy lower because shortcoming is professional, therefore this
Apply assessing to obtain the premise of the practical valuation of security in the security assessment information and then security that are returned according to third party's assessment system
Under, further the practical valuation of security is effectively combined with third party's security valuation that third party's assessment system obtains, really
Determine the final valuation of security, the final valuation of the security has both higher confidence level and high accuracy, improves the accurate of security valuation
Degree and reliability reduce risk management difficulty, and then can carry out accurate control to risk point.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for hardware+
For program class embodiment, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to side
The part of method embodiment illustrates.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims
It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment
It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable
Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can
With or may be advantageous.
Although this application provides the method operating procedure as described in embodiment or flow chart, based on conventional or noninvasive
The labour for the property made may include more or less operating procedure.The step of enumerating in embodiment sequence is only numerous steps
One of execution sequence mode, does not represent and unique executes sequence.It, can when device or client production in practice executes
To execute or parallel execute (such as at parallel processor or multithreading according to embodiment or method shown in the drawings sequence
The environment of reason).
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, vehicle-mounted human-computer interaction device, cellular phone, camera phone, smart phone, individual
Digital assistants, media player, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or
The combination of any equipment in these equipment of person.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It will be understood by those skilled in the art that the embodiment of this specification can provide as the production of method, system or computer program
Product.Therefore, in terms of this specification embodiment can be used complete hardware embodiment, complete software embodiment or combine software and hardware
Embodiment form.
This specification embodiment can describe in the general context of computer-executable instructions executed by a computer,
Such as program module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, journey
Sequence, object, component, data structure etc..This specification embodiment can also be practiced in a distributed computing environment, in these points
Cloth calculates in environment, by executing task by the connected remote processing devices of communication network.In distributed computing ring
In border, program module can be located in the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ",
The description of " specific example " or " some examples " etc. means specific features described in conjunction with this embodiment or example, structure, material
Or feature is contained at least one embodiment or example of this specification embodiment.In the present specification, to above-mentioned term
Schematic representation be necessarily directed to identical embodiment or example.Moreover, description specific features, structure, material or
Person's feature may be combined in any suitable manner in any one or more of the embodiments or examples.In addition, in not conflicting feelings
Under condition, those skilled in the art by different embodiments or examples described in this specification and different embodiment or can show
The feature of example is combined.
The foregoing is merely the embodiments of this specification, are not limited to this specification embodiment.For ability
For field technique personnel, this specification embodiment can have various modifications and variations.It is all this specification embodiment spirit and
Any modification, equivalent replacement, improvement and so within principle should be included in the scope of the claims of this specification embodiment
Within.
Claims (14)
1. a kind of security estimation method, which is characterized in that the described method includes:
The assessment request that client sends is received, and the security information in the assessment request is forwarded to third party's assessment system,
So that third party's assessment system determines that security assesses information according to the security information, and information is assessed according to the security
The assessment of third party's security is carried out, third party's security valuation is obtained;
The security assessment information and third party's security valuation that third party's assessment system returns are received, and is commented according to the security
Estimate information and carry out security assessment, obtains the practical valuation of security;
According to the practical valuation of the security and third party's security valuation, the final valuation of security is determined.
2. security estimation method according to claim 1, which is characterized in that in the security by the assessment request
Information is forwarded to before third party's assessment system, comprising:
Loan qualification verifying is carried out to client's essential information in the assessment request;
If verification result is not pass through, loan qualification authentication failed result is returned.
3. security estimation method according to claim 1, which is characterized in that it is described according to the security assess information into
Row security assessment, before obtaining the practical valuation of security, comprising:
According to the security information in the assessment request, the preliminary valuation of security is obtained.
4. security estimation method according to claim 3, which is characterized in that described to assess information progress according to the security
Security assessment, obtains the practical valuation of security, comprising:
Information is assessed according to the security to be corrected the preliminary valuation of the security, obtains the practical valuation of security.
5. security estimation method according to claim 1, which is characterized in that described according to the practical valuation of the security and institute
Third party's security valuation is stated, determines the final valuation of security, comprising:
Whether the difference for judging the practical valuation of the security and third party's security valuation is more than preset difference value;
If not exceeded, then the average value by the practical valuation of the security and third party's security valuation is set as the security most
Whole valuation;
If being more than, judge whether the practical valuation of the security is greater than the numerical value of third party's security valuation;
If more than, then third party's security valuation is set as the final valuation of the security, it otherwise will be corresponding with the client
Customer manager send customized numerical value be set as the final valuation of the security.
6. security estimation method according to claim 1, which is characterized in that after the determining final valuation of security,
Further include:
It is flowed according to the setting means of the final valuation of the security and the examination & approval of the setting means of the final valuation of security and loan agreement
The corresponding relationship of journey determines corresponding loan agreement approval process.
7. a kind of security valuation device characterized by comprising
Security information forwarding module assesses the security information in requesting for receiving the assessment request of client's transmission, and by described
It is forwarded to third party's assessment system, so that third party's assessment system determines that security assesses information according to the security information,
And information is assessed according to the security and carries out the assessment of third party's security, obtain third party's security valuation;
The practical valuation determining module of security, for receiving the security assessment information and third party that third party's assessment system returns
Security valuation, and information is assessed according to the security and carries out security assessment, obtain the practical valuation of security;
The final valuation determining module of security, for determining and giving as security according to the practical valuation of the security and third party's security valuation
The final valuation of product.
8. security valuation device according to claim 7, which is characterized in that further include:
Qualification authentication unit, for carrying out loan qualification verifying to client's essential information in the assessment request;
Qualification verification result return unit returns to loan qualification authentication failed result if being not pass through for verification result.
9. security valuation device according to claim 7, which is characterized in that further include:
The preliminary valuation determination unit of security, for obtaining the preliminary valuation of security according to the security information in the assessment request.
10. security valuation device according to claim 9, which is characterized in that the practical valuation determining module packet of security
It includes:
The practical valuation determination unit of security is corrected the preliminary valuation of the security for assessing information according to the security,
Obtain the practical valuation of security.
11. security valuation device according to claim 7, which is characterized in that the final valuation determining module packet of security
It includes:
Dif ference judgment unit, for judging whether the practical valuation of the security and the difference of third party's security valuation are more than pre-
If difference;
The final valuation setup unit of first security, for when the judgement practical valuation of security and third party's security valuation
When difference is no more than preset difference value, the average value of the practical valuation of the security and third party's security valuation is set as described
The final valuation of security;
Numerical value judging unit, for being more than default when the difference for determining the practical valuation of security and third party's security valuation
When difference, judge whether the practical valuation of the security is greater than the numerical value of third party's security valuation;
The final valuation setup unit of second security judges that the practical valuation of the security is greater than third party's security valuation for working as
Numerical value when, third party's security valuation is set as the final valuation of the security;
The final valuation setup unit of third security judges that the practical valuation of the security is estimated no more than third party's security for working as
When the numerical value of value, the customized numerical value that customer manager corresponding with the client sends is set as the final valuation of the security.
12. security valuation device according to claim 7, which is characterized in that further include:
Approval process determination unit, for according to the setting means of the final valuation of the security and the setting of the final valuation of security
The corresponding relationship of mode and loan agreement approval process determines corresponding loan agreement approval process.
13. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor
Machine program, which is characterized in that the processor realizes that security as claimed in any one of claims 1 to 6 is estimated when executing described program
The step of value method.
14. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt
The step of processor realizes security estimation method as claimed in any one of claims 1 to 6 when executing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910681468.4A CN110400176A (en) | 2019-07-26 | 2019-07-26 | Security estimation method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910681468.4A CN110400176A (en) | 2019-07-26 | 2019-07-26 | Security estimation method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110400176A true CN110400176A (en) | 2019-11-01 |
Family
ID=68326080
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910681468.4A Pending CN110400176A (en) | 2019-07-26 | 2019-07-26 | Security estimation method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110400176A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112785342A (en) * | 2021-01-28 | 2021-05-11 | 中国工商银行股份有限公司 | Real estate dynamic estimation method and device |
CN112927023A (en) * | 2021-03-26 | 2021-06-08 | 中国建设银行股份有限公司 | Method and device for evaluating value of escort |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102592237A (en) * | 2012-01-16 | 2012-07-18 | 深圳市宇商网科技有限公司 | Commodity pledge price evaluating method and system based on electronic-commerce network platform |
US20130332338A1 (en) * | 2010-01-13 | 2013-12-12 | Corelogic Solutions, Llc | System and method of detecting and assessing multiple types of risks related to mortgage lending |
US20150081590A1 (en) * | 2013-09-13 | 2015-03-19 | David Avrick | System and method for analyzing the performance of mortgage-backed securities and identifying potential mortgage borrowers |
CN106952159A (en) * | 2017-03-20 | 2017-07-14 | 重庆汇集源科技有限公司 | A kind of real security risk control method, system and storage medium |
CN108053269A (en) * | 2018-01-03 | 2018-05-18 | 中国科学院科技战略咨询研究院 | A kind of big data intellectual property value appraisal system and method |
CN108846704A (en) * | 2018-06-25 | 2018-11-20 | 平安科技(深圳)有限公司 | House property valuation methods, device, computer equipment and storage medium |
CN109584030A (en) * | 2018-10-31 | 2019-04-05 | 平安直通咨询有限公司 | Mechanism recommended method, device and storage medium |
CN109598605A (en) * | 2018-11-26 | 2019-04-09 | 格锐科技有限公司 | A kind of long-distance intelligent assessment and loan self-aid system based on entity guaranty |
-
2019
- 2019-07-26 CN CN201910681468.4A patent/CN110400176A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130332338A1 (en) * | 2010-01-13 | 2013-12-12 | Corelogic Solutions, Llc | System and method of detecting and assessing multiple types of risks related to mortgage lending |
CN102592237A (en) * | 2012-01-16 | 2012-07-18 | 深圳市宇商网科技有限公司 | Commodity pledge price evaluating method and system based on electronic-commerce network platform |
US20150081590A1 (en) * | 2013-09-13 | 2015-03-19 | David Avrick | System and method for analyzing the performance of mortgage-backed securities and identifying potential mortgage borrowers |
CN106952159A (en) * | 2017-03-20 | 2017-07-14 | 重庆汇集源科技有限公司 | A kind of real security risk control method, system and storage medium |
CN108053269A (en) * | 2018-01-03 | 2018-05-18 | 中国科学院科技战略咨询研究院 | A kind of big data intellectual property value appraisal system and method |
CN108846704A (en) * | 2018-06-25 | 2018-11-20 | 平安科技(深圳)有限公司 | House property valuation methods, device, computer equipment and storage medium |
CN109584030A (en) * | 2018-10-31 | 2019-04-05 | 平安直通咨询有限公司 | Mechanism recommended method, device and storage medium |
CN109598605A (en) * | 2018-11-26 | 2019-04-09 | 格锐科技有限公司 | A kind of long-distance intelligent assessment and loan self-aid system based on entity guaranty |
Non-Patent Citations (1)
Title |
---|
合同文本: "商业银行押品价值评估管理制度体系", 《HTTPS://WWW.DOCIN.COM/P-1312411342.HTML&ISPAY=1》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112785342A (en) * | 2021-01-28 | 2021-05-11 | 中国工商银行股份有限公司 | Real estate dynamic estimation method and device |
CN112927023A (en) * | 2021-03-26 | 2021-06-08 | 中国建设银行股份有限公司 | Method and device for evaluating value of escort |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11265324B2 (en) | User permissions for access to secure data at third-party | |
WO2020192272A1 (en) | Blockchain-based transfer method and system, computing device and storage medium | |
US8719911B2 (en) | Methods, systems, and computer program products for authenticating an identity of a user by generating a confidence indicator of the identity of the user based on a combination of multiple authentication techniques | |
US20080133391A1 (en) | User interface for sociofinancial systems and methods | |
US20080133402A1 (en) | Sociofinancial systems and methods | |
CN104966229A (en) | Information processing method and credit platform | |
CN110738473B (en) | Wind control method, system, device and equipment | |
CN110866822B (en) | Wind control management method and device for securitization of assets, electronic equipment and storage medium | |
US20180322571A1 (en) | System and method for facilitating electronic transactions | |
CN109740914A (en) | A kind of method, storage medium, equipment and system that financial business is assessed, recommended | |
CN109447791A (en) | A kind of funds transaction method and device based on block chain | |
CA3165099A1 (en) | System and method for assessing a digital interaction with a digital third party account service | |
CN110400176A (en) | Security estimation method and device | |
CN110135801A (en) | A kind of item information processing method and device | |
CN109670953A (en) | A kind of equity register method, device and equipment | |
CN109670961A (en) | Management method, device, terminal device and computer readable storage medium after throwing | |
US20220129871A1 (en) | System for mapping user trust relationships | |
CN112702410A (en) | Evaluation system and method based on block chain network and related equipment | |
TWI439957B (en) | Loan method for distinct checking the amount of the loan and its interest rate | |
CN111260363A (en) | Public benefit fund supervision method, device, equipment and medium based on block chain | |
CN109359988B (en) | Resource allocation method, system, server and storage medium based on block chain | |
KR101796053B1 (en) | Method and apparatus for managing fund based on community | |
KR101948979B1 (en) | Method for processing peer to peer lending finance data for first investment and later fund procurement based consignment asset warranty and apparatus thereof | |
Ortlepp | A Feasibility Study on Using the Blockchain to Build a Credit Register for Individuals Who Do Not Have Access to Traditional Credit Scores | |
US20230206320A1 (en) | Method and system for generating a financial infographic of a user through a financing platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191101 |