CN111652596A - Credit service anti-fraud method, device, terminal equipment and storage medium - Google Patents

Credit service anti-fraud method, device, terminal equipment and storage medium Download PDF

Info

Publication number
CN111652596A
CN111652596A CN202010545897.1A CN202010545897A CN111652596A CN 111652596 A CN111652596 A CN 111652596A CN 202010545897 A CN202010545897 A CN 202010545897A CN 111652596 A CN111652596 A CN 111652596A
Authority
CN
China
Prior art keywords
user
auditing
credit
face recognition
fraud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010545897.1A
Other languages
Chinese (zh)
Other versions
CN111652596B (en
Inventor
谢绍恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WeBank Co Ltd
Original Assignee
WeBank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WeBank Co Ltd filed Critical WeBank Co Ltd
Priority to CN202010545897.1A priority Critical patent/CN111652596B/en
Publication of CN111652596A publication Critical patent/CN111652596A/en
Application granted granted Critical
Publication of CN111652596B publication Critical patent/CN111652596B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Technology Law (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to the technical field of financial science and technology, and discloses an anti-fraud method and device for credit business, terminal equipment and a computer storage medium. The credit business anti-fraud method comprises the following steps: acquiring historical behavior data of a user to be checked in real time when the credit business needs to be checked; if the need of face recognition is determined according to the historical behavior data, face data of the user to be subjected to the core body is collected for recognition, and a face recognition result is obtained; analyzing the face recognition result, outputting an asynchronous auditing mode, and receiving an auditing result for identity verification of the user to be verified according to the asynchronous auditing mode; and performing corresponding processing on the credit service according to the auditing result. The invention avoids the problems of serious human resource consumption and poor timeliness for identity verification of the user caused by the traditional anti-fraud mode, and realizes the good balance of anti-fraud risk control and user timeliness for the user verification.

Description

Credit service anti-fraud method, device, terminal equipment and storage medium
Technical Field
The invention relates to the technical field of financial technology (Fintech), in particular to an anti-fraud method and device for credit business, terminal equipment and a computer storage medium.
Background
With the development of computer technology, more and more technologies are applied in the financial field, and the traditional financial industry is gradually changing to financial technology (Fintech), but higher requirements are also put forward on the technologies due to the requirements of the financial industry on safety and real-time performance.
In the high-risk financial business processing such as bank account opening, loan application, investment and financing, sensitive information modification and the like, asynchronous auditing needs to be carried out by using human face recognition system technologies such as human face acquisition, human image comparison, living body detection and the like or manually, so that the user is verified to ensure the authenticity of the identity of the user, and the safety requirement of remote real-name authentication is met. On one hand, however, on the basis of system technology, the core is difficult to effectively prevent the counterfeit attack risks such as 'secondary copying, image buckling, printing, video frame extraction, high-imitation mold, face brushing for a third person' and the like, and the fraud behaviors such as counterfeit account opening, counterfeit loan, account taking over, account embezzlement and the like are difficult to avoid; on the other hand, if manual asynchronous auditing is to be continuously implemented after verification based on the system technology, not only is the consumption of human resources large, but also the authentication timeliness is very poor.
In summary, how to further ensure the timeliness of the core body and the user experience on the premise of ensuring the authentication efficiency of the core body aiming at the user to realize effective risk control is always a problem to be solved urgently in the industry.
Disclosure of Invention
The invention mainly aims to provide an anti-fraud method, an anti-fraud device, a terminal device and a computer storage medium for credit business, aiming at improving the timeliness of user verification on the premise of ensuring the verification efficiency of the user verification to carry out effective risk control and achieving good balance between the risk control and the timeliness.
In order to achieve the above object, the present invention provides an anti-fraud method for credit service, the anti-fraud method for credit service comprising:
acquiring historical behavior data of a user to be checked in real time when the credit business needs to be checked;
if the need of face recognition is determined according to the historical behavior data, face data of the user to be subjected to the core body is collected for recognition, and a face recognition result is obtained;
analyzing the face recognition result, outputting an asynchronous auditing mode, and receiving an auditing result for identity verification of the user to be verified according to the asynchronous auditing mode;
and performing corresponding processing on the credit service according to the auditing result.
Optionally, after the step of analyzing the face recognition result and outputting an asynchronous auditing manner, and receiving an auditing result of identity verification of the user to be verified according to the asynchronous auditing manner, the method further includes:
if the auditing result is not received after the preset time length is exceeded, detecting the overall risk degree of the credit business;
and if the overall risk degree is lower than a preset risk degree threshold value, the credit business is started to be transacted by verifying the identity of the user to be verified.
Optionally, the step of collecting historical behavior data of the user to be credited in real time when it is determined that the credit service needs identity verification includes:
if the credit business is detected to belong to the preset high-risk financial business, judging that the credit business needs identity verification;
and marking the user initiating the service transaction request aiming at the credit service as a user to be checked, and collecting the historical behavior data of the user to be checked.
Optionally, after the step of collecting the historical behavior data of the user to be verified, the method further includes:
determining whether the face recognition of the user to be subjected to the core body is needed or not according to the historical behavior data;
the step of determining whether the face recognition needs to be performed on the user to be subjected to the core body according to the historical behavior data comprises the following steps:
if negative behavior data exist in the historical behavior data, determining that face recognition needs to be carried out on the user to be subjected to the body checking;
and if negative behavior data do not exist in the historical behavior data, determining that face recognition is not needed for the user to be subjected to the body checking.
Optionally, the asynchronous auditing manner includes: asynchronous auditing is not needed, the auditing is carried out after the first auditing and the first auditing is carried out after the first auditing is carried out,
the step of analyzing the face recognition result and outputting an asynchronous auditing mode comprises the following steps:
if the authentication index value mapped by the face recognition result is high after analysis, outputting the non-asynchronous audit;
if the authentication index value mapped by the face recognition result is obtained through analysis, outputting the first pass and the second pass;
and if the authentication index value mapped by the face recognition result obtained by analysis is low, outputting the verification before passing.
Optionally, the step of performing corresponding processing on the credit service according to the audit result includes:
if the auditing result identifies that the user to be credited passes the crediting operation, starting to transact the credit business;
and if the auditing result indicates that the user to be credited does not pass the crediting process, stopping continuously transacting the credit business started to be transacted, or performing advanced payment urging process on the credit business transacted and completed.
Optionally, the step of performing corresponding processing on the credit service according to the audit result further includes:
and if the auditing result identifies that the user to be verified has a malicious attack intention, detecting the financial account associated with the credit service, and managing and controlling the financial account.
In addition, to achieve the above object, the present invention provides an anti-fraud apparatus for a credit service, including:
the data acquisition module is used for acquiring historical behavior data of the user to be credited in real time when the credit business needs identity verification;
the data processing module is used for collecting the face data of the user to be subjected to the body checking for recognition and acquiring a face recognition result if the need of face recognition is determined according to the historical behavior data;
the auditing and allocating module is used for analyzing the face recognition result, outputting an asynchronous auditing mode and receiving an auditing result for identity verification of the user to be verified according to the asynchronous auditing mode;
and the business processing module is used for executing corresponding processing on the credit business according to the auditing result.
In addition, to achieve the above object, the present invention also provides a terminal device, including: a memory, a processor and an anti-fraud program for credit services stored on said memory and operable on said processor, said anti-fraud program for credit services when executed by said processor implementing the steps of the anti-fraud method for credit services as described above.
Further, to achieve the above object, the present invention also provides a computer storage medium having stored thereon an anti-fraud program for a credit service, the anti-fraud program for a credit service implementing the steps of the anti-fraud method for a credit service as described above when executed by a processor.
The invention provides an anti-fraud method, an anti-fraud device, terminal equipment and a computer storage medium for credit business, wherein the method comprises the steps of collecting historical behavior data of a user to be credited in real time by judging that the credit business needs identity verification; if the need of face recognition is determined according to the historical behavior data, face data of the user to be subjected to the core body is collected for recognition, and a face recognition result is obtained; analyzing the face recognition result, outputting an asynchronous auditing mode, and receiving an auditing result for identity verification of the user to be verified according to the asynchronous auditing mode; and performing corresponding processing on the credit service according to the auditing result.
When the credit business applied and processed by the user needs to be verified aiming at the user, the method further determines whether face recognition needs to be carried out aiming at the user by combining the historical behavior data of the user, thereby ensuring that anti-fraud risk control is carried out aiming at the basic verification efficiency of verifying the user; the face recognition system is only called to collect face data for recognition when the need is determined, so that the intelligence and timeliness of identity audit risk control for the user are improved; in addition, the method calls manual asynchronous auditing by analyzing the face recognition result and outputting different asynchronous auditing modes, thereby not only avoiding the problems of serious human resource consumption and poor timeliness caused by the fact that the manual asynchronous auditing is continuously and completely implemented by a face recognition system in the traditional anti-fraud mode, but also realizing the good balance of anti-fraud risk control and user core timeliness of the user core.
Drawings
FIG. 1 is a schematic diagram of an apparatus architecture of a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flow chart illustrating an embodiment of an anti-fraud method for credit services according to the present invention;
FIG. 3 is a flow chart illustrating another embodiment of an anti-fraud method for credit services of the present invention;
FIG. 4 is a detailed flow chart of step S30 in one embodiment of the method for anti-fraud of credit services according to the present invention;
FIG. 5 is a flow chart illustrating the application of one embodiment of the anti-fraud method for credit services of the present invention;
fig. 6 is a functional block diagram of a first embodiment of the anti-fraud device for credit service of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a schematic device structure diagram of a hardware operating environment according to an embodiment of the present invention.
The terminal device in the embodiment of the present invention may be a smart phone, or may be a terminal device such as a PC (Personal Computer), a tablet Computer, or a portable Computer.
As shown in fig. 1, the terminal device may include: a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., a Wi-Fi interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the terminal device configuration shown in fig. 1 is not intended to be limiting of the terminal device and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, the memory 1005, which is a type of computer storage medium, may include an operating system, a network communication module, a user interface module, and an anti-fraud program for credit services.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a backend server and performing data communication with the backend server; the user interface 1003 is mainly used for connecting a client and performing data communication with the client; and the processor 1001 may be used to invoke an anti-fraud procedure for the credit service stored in the memory 1005 and perform the following operations:
acquiring historical behavior data of a user to be checked in real time when the credit business needs to be checked;
if the need of face recognition is determined according to the historical behavior data, face data of the user to be subjected to the core body is collected for recognition, and a face recognition result is obtained;
analyzing the face recognition result, outputting an asynchronous auditing mode, and receiving an auditing result for identity verification of the user to be verified according to the asynchronous auditing mode;
and performing corresponding processing on the credit service according to the auditing result.
Further, the processor 1001 may call an anti-fraud program of the credit service stored in the memory 1005, and after performing the analysis of the face recognition result and outputting an asynchronous auditing manner, and receiving an auditing result of identity verification of the user to be verified according to the asynchronous auditing manner, further perform the following operations:
if the auditing result is not received after the preset time length is exceeded, detecting the overall risk degree of the credit business;
and if the overall risk degree is lower than a preset risk degree threshold value, the credit business is started to be transacted by verifying the identity of the user to be verified.
Further, the processor 1001 may call an anti-fraud program of the credit service stored in the memory 1005, and also perform the following operations:
if the credit business is detected to belong to the preset high-risk financial business, judging that the credit business needs identity verification;
and marking the user initiating the service transaction request aiming at the credit service as a user to be checked, and collecting the historical behavior data of the user to be checked.
Further, the processor 1001 may call an anti-fraud program of the credit service stored in the memory 1005, and after performing the collection of the historical behavior data of the user to be verified, further perform the following operations:
determining whether the face recognition of the user to be subjected to the core body is needed or not according to the historical behavior data;
the processor 1001 may invoke an anti-fraud procedure for the credit service stored in the memory 1005, and also perform the following operations:
if negative behavior data exist in the historical behavior data, determining that face recognition needs to be carried out on the user to be subjected to the body checking;
and if negative behavior data do not exist in the historical behavior data, determining that face recognition is not needed for the user to be subjected to the body checking.
Further, the asynchronous auditing mode comprises: without asynchronous auditing, first-pass-then-auditing, and first-audit-then-pass, the preset topics further include policy topics, and the processor 1001 may invoke an anti-fraud procedure for credit services stored in the memory 1005, and further perform the following operations:
if the authentication index value mapped by the face recognition result is high after analysis, outputting the non-asynchronous audit;
if the authentication index value mapped by the face recognition result is obtained through analysis, outputting the first pass and the second pass;
and if the authentication index value mapped by the face recognition result obtained by analysis is low, outputting the verification before passing.
Further, the processor 1001 may call an anti-fraud program of the credit service stored in the memory 1005, and also perform the following operations:
if the auditing result identifies that the user to be credited passes the crediting operation, starting to transact the credit business;
and if the auditing result indicates that the user to be credited does not pass the crediting process, stopping continuously transacting the credit business started to be transacted, or performing advanced payment urging process on the credit business transacted and completed.
Further, the processor 1001 may call an anti-fraud program of the credit service stored in the memory 1005, and also perform the following operations:
and if the auditing result identifies that the user to be verified has a malicious attack intention, detecting the financial account associated with the credit service, and managing and controlling the financial account.
Based on the hardware structure, the invention provides various embodiments of the anti-fraud method for the credit service.
It should be noted that, for high-risk financial business processing such as bank account opening, loan application, investment and financing, sensitive information modification and the like, asynchronous auditing needs to be performed by using system technologies of face recognition such as face acquisition, face comparison, living body detection and the like or manually, so as to verify the identity of a user to ensure the authenticity of the user identity and meet the security requirement of remote real-name authentication. On one hand, however, on the basis of the system technology, the core is difficult to effectively prevent the counterfeit attack risks such as 'secondary copying, image buckling, printing, video frame extraction, high-imitation mold, face brushing for the third person' and the like, and the fraud behaviors such as counterfeit account opening, counterfeit loan, account taking over, account embezzlement and the like are difficult to avoid; on the other hand, if manual asynchronous auditing is to be continuously implemented after verification based on the system technology, not only is the consumption of human resources large, but also the authentication timeliness is very poor.
In summary, how to further ensure the timeliness of the core body and the user experience on the premise of ensuring the authentication efficiency of the core body aiming at the user to realize effective risk control is always a problem to be solved urgently in the industry. In view of the above, the present invention provides an anti-fraud method for credit business, which aims to improve the timeliness of the core for the user and achieve a good balance between the risk control and the timeliness on the premise of ensuring the core authentication efficiency for the user to perform effective risk control.
Referring to fig. 2, fig. 2 is a flow chart illustrating a first embodiment of the anti-fraud method for credit service of the present invention. In this embodiment, the anti-fraud method for credit service includes:
step S10, collecting the historical behavior data of the user waiting for core when the credit business needs to be subjected to identity core;
it should be noted that the anti-fraud method for credit service of the present embodiment can be implemented by the terminal device described above.
The method comprises the steps that terminal equipment judges whether a user needs identity verification before transacting a credit business by detecting whether the credit business pointed by a business transaction request initiated by the user belongs to a preset high-risk financial business, and collects historical behavior data processed by the user aiming at the financial credit business when the user needs identity verification before transacting the credit business.
It should be noted that, in this embodiment, the preset high-risk financial service may be one or more financial service types preset by the enterprise staff. Specifically, for example, the enterprise staff may preset financial services such as bank account opening, loan application, investment financing, and sensitive information modification as high-risk financial services based on actual work requirements. It should be understood that, based on different design requirements of actual applications, the preset high-risk financial service may also be set as the preset high-risk financial service in other ways than the one set by the staff set by the self-help of the staff as set forth herein, and the anti-fraud method for credit service of the present invention does not specifically limit the kind and setting way of the preset high-risk financial service.
Further, in a possible embodiment, the step S10 may include:
step S101, if the credit business is detected to belong to a preset high-risk financial business, judging that the credit business needs identity verification;
when the terminal equipment detects that the credit service appointed by the service transaction request initiated by the user belongs to one of the preset high-risk financial services, the terminal equipment immediately determines that the user needs identity verification before the credit service is transacted.
Specifically, for example, as shown in the application flow shown in fig. 5, after receiving a service transaction request initiated by a user, a terminal device detects that a credit service specified by the service transaction request is a loan application, and the terminal device detects that the credit service-loan application belongs to one of the high-risk financial services predefined by an enterprise worker, the terminal device determines that the user needs to be brushed to perform identity verification by face recognition before transacting the credit service-loan application.
Further, in another embodiment, if the terminal device detects that the credit service specified by the service transaction request initiated by the user does not belong to any of the above high-risk financial services predefined by the enterprise staff, the terminal device will determine that the user does not need to perform identity verification for the user before the credit service is transacted, and directly start the transaction process of the credit service.
Step S102, marking the user who initiates the business transaction request aiming at the credit business as a user to be checked, and collecting the historical behavior data of the user to be checked.
It should be noted that, in this embodiment, the historical behavior data may specifically be all behavior data recorded by the terminal device during the process of transacting the financial transaction by the user.
The terminal equipment marks the user as a user to be checked before the user transacts the requested credit service and needs to check the identity of the user, and then extracts all behavior data of the user to be checked from a database storing the behavior data generated in the process of transacting any financial service by all users.
Specifically, for example, the terminal device records all the behavior data generated based on the user operation in the process of transacting any financial service developed by the enterprise by the user, and stores the behavior data in a pre-configured database specially used for storing the behavior data generated in the process of transacting any financial service by all the users, so that the terminal device needs to verify the identity of the user before the terminal device judges that the current user transacts the credit service-loan application requested by the user, marks the user as a user to be verified in real time, and then matches and extracts the financial service developed by the user to be verified before transacting the enterprise (such as bank account opening, loan application, investment financing, sensitive information modification, etc.), all behavioral data generated.
In this embodiment, after it is determined that the user needs to be refreshed for identity verification, instead of directly calling the face recognition system to perform face recognition authentication operation based on a system technology, the historical behavior data that the user has performed financial service transaction in the past is preferentially acquired for subsequent analysis of whether face recognition authentication operation is performed, so that the intelligence of identity verification for the user is improved, and the problems that the face recognition system is still called to perform face recognition authentication operation for the user under the condition that the face recognition operation is not needed in a traditional manner, system resources are wasted, authentication timeliness is reduced are solved, and authentication efficiency of identity verification for the user is improved.
Further, in a possible embodiment, after step S10, the method for anti-fraud of credit service of the present invention may further include:
and step A, determining whether the face recognition of the user to be subjected to the core is required or not according to the historical behavior data.
After the terminal device extracts all behavior data of the user to be checked from a database storing the behavior data generated in the process of handling any financial service by all users, the terminal device further judges whether to call a face recognition system to perform face recognition on the user to be checked based on the all behavior data so as to perform identity authentication and verification on the user to be checked based on a system technology.
Further, in a possible embodiment, step a may include:
step A1, if negative behavior data exist in the historical behavior data, determining that face recognition needs to be carried out on the user to be subjected to the body check;
step A2, if it is detected that negative-going behavior data does not exist in the historical behavior data, it is determined that face recognition is not required to be performed on the user to be subjected to the body check.
Specifically, for example, as shown in the application flow shown in fig. 5, the terminal device determines whether to invoke the face recognition system to perform face recognition on the to-be-verified user based on the system technology by detecting whether negative behaviors such as defaulting repayment, filling false information and the like exist in all behavior data generated during the previous financial business (such as bank account opening, loan application, investment and financing, sensitive information modification and the like) of the to-be-verified user in the process of transacting the enterprise development. That is, when detecting that any type of negative-going behavior exists in all the behavior data, the terminal device determines that the face recognition system needs to be called to perform face recognition for the user to be checked based on the system technology, or when detecting that any type of negative-going behavior does not exist in all the behavior data, the terminal device determines that the face recognition system does not need to be called to perform face recognition for the user to be checked based on the system technology.
In this embodiment, it is determined whether a face recognition system needs to be invoked to perform face recognition on a user based on a system technology based on analyzing historical behavior data generated by transacting an enterprise to develop financial services, that is, it is determined that face recognition is performed on the user to verify the identity only when it is determined that there is a negative behavior in transacting the financial services based on analyzing the historical behavior data, and when it is determined that the financial services are always performed in a positive direction based on analyzing the historical behavior data and there is no abnormal negative behavior, it may be directly determined that the user does not need to perform face recognition and it is determined that identity verification passes through, so that intelligence of identity verification on the user is improved, problems of system resource waste and reduced authentication timeliness caused by a traditional verification method are avoided, and authentication efficiency of identity verification on the user is improved.
Step S20, if it is determined that face recognition is needed according to the historical behavior data, collecting the face data of the user to be subjected to the body check for recognition and obtaining a face recognition result;
if the terminal equipment determines that the face identification needs to be carried out on the user to be subjected to the body core based on the analysis of the historical behavior data of the user to be subjected to the body core so as to verify the identity, the face identification system is called to start to collect the face data of the user to be subjected to the body core so as to carry out the identification, and then the terminal equipment receives the face identification result output by the face identification system after the face data is identified.
Specifically, for example, as shown in the application flow shown in fig. 5, when the terminal device detects that any type of negative behavior exists in all the behavior data, and thus it is determined that a face recognition system needs to be called to perform face recognition on a user to be checked based on the system technology, the terminal device immediately calls the face recognition system (the face brushing system shown in the figure) to prompt the user to be checked to brush the face, so that the face recognition system judges the credibility of the face data of the user to be checked based on the collected face data of the user to be checked, and applies the existing mature face recognition technology to perform multi-factor recognition such as face five sense organs positioning, face feature extraction, face identity verification, face living body identification, face attribute recognition and the like, and calculates and outputs an identified face recognition result, and the terminal device receives the face recognition result.
Further, in a possible embodiment, as shown in the application flow shown in fig. 5, after receiving a face recognition result output by the face recognition system, if the face recognition result identifier passes face recognition authentication based on a system technology, the terminal device performs a process of subsequently analyzing the face recognition result to output an asynchronous auditing manner for invoking manual asynchronous auditing; or, if the face recognition result received by the terminal device is identified and the face recognition authentication based on the system technology is not passed, the terminal device immediately judges whether the face recognition result conforms to a preset 'wrong picking pair' rule, and when the face recognition result conforms to the 'wrong picking pair' rule, the terminal device still performs a process of subsequently analyzing the face recognition result for the user to be verified to output and call an asynchronous auditing mode for manually performing asynchronous auditing.
It should be noted that, in this embodiment, in the process that the terminal device analyzes the face recognition result for the user to be checked who meets the rule of "wrong picking pair" to output the asynchronous auditing mode of invoking the manual asynchronous auditing, the terminal device directly outputs the asynchronous auditing mode of first auditing and then passing through to directly invoke the manual identity authentication auditing for the user to be checked, and when the received auditing result identifier fed back manually performs the identity authentication auditing for the user to be checked, the terminal device starts to transact the credit service specified by the service transaction request initiated by the user to be checked, otherwise, the terminal device directly refuses to transact the credit service.
Step S30, analyzing the face recognition result and outputting an asynchronous auditing mode, and receiving an auditing result for identity verification of the user to be verified according to the asynchronous auditing mode;
after the terminal device obtains a face recognition result obtained by calling the face recognition system to perform face recognition on a user to be subjected to core based on a system technology, the authentication index mapped by the face recognition result is analyzed, different asynchronous auditing modes are correspondingly output based on the height of the authentication index to call a manual work to execute an auditing process according to the asynchronous auditing mode, and then the terminal device receives an auditing result fed back after the manual work is performed asynchronous auditing and used for performing identity verification on the user to be subjected to core.
Further, referring to the detailed flow of step S30 shown in fig. 4, in a possible embodiment, the asynchronous auditing manner output by the terminal device based on the authentication index mapped by the analysis face recognition result includes: the step S30 may include, without asynchronous audit, first pass and then audit, and first audit and then pass:
step S301, if the authentication index value mapped by the face recognition result obtained by analysis is high, outputting the non-asynchronous audit;
specifically, for example, as shown in the application flow shown in fig. 5, when the terminal device analyzes a face recognition result obtained by calling a face recognition system to perform face recognition for a to-be-core user based on a system technology, and detects that index values of authentication indexes such as "portrait comparison score" and "living body monitoring score" mapped by the face recognition result are high, the terminal device outputs an asynchronous auditing manner without asynchronous auditing, so that further auditing for the to-be-core user does not need to be further called, and directly outputs an auditing result passing identity verification for the to-be-core user, so as to start transacting a credit service-loan application specified by a service transaction application initiated by the to-be-core user.
Step S302, if the authentication index value mapped by the face recognition result obtained by analysis is middle, outputting the first passing and the second examining;
specifically, for example, as shown in the application flow shown in fig. 5, in a case that a terminal device analyzes a face recognition result obtained by calling a face recognition system to perform face recognition for a user to be checked based on a system technology, and detects that index values of authentication indexes such as "face comparison score" and "living body monitoring score" mapped by the face recognition result are in the middle, the terminal device outputs an asynchronous auditing manner of passing first and then auditing, so as to output an auditing result of passing identity authentication verification for the user to be checked first, so as to start to handle a credit service-loan application specified by a service handling application initiated by the user to be checked, and further call a manual operation to further audit the user to be checked while or after the user to be checked starts to handle the credit service-loan application.
And step S303, if the authentication index value mapped by the face recognition result obtained by analysis is low, outputting the verification before passing.
Specifically, for example, as shown in the application flow shown in fig. 5, when a terminal device analyzes a face recognition result obtained by calling a face recognition system to perform face recognition for a user to be checked based on a system technology, and detects that index values of authentication indexes such as "portrait comparison score" and "living body monitoring score" mapped by the face recognition result are low, the terminal device outputs an asynchronous auditing manner that the audit is passed after the first audit is performed, so as to further call a manual operation to perform further audit on the user to be checked, and only when the audit is passed, outputs an auditing result that the identity verification of the user to be checked is passed, so as to start to transact a credit business-loan application specified by a business transaction application initiated by the user to be checked.
And step S40, executing corresponding processing to the credit business according to the auditing result.
The terminal equipment outputs an asynchronous auditing mode of first passing and then auditing, so that a credit business appointed by a user to be checked initiates a business transaction application is firstly transacted, then, the terminal equipment receives and calls an auditing result of manually performing identity authentication and auditing for the user to be checked while or after the credit business is transacted, if the auditing result identifies that the identity authentication and auditing of the user to be checked pass, the terminal equipment continues transacting the credit business and can output prompt information of passing the identity authentication and auditing, or if the auditing result identifies that the identity authentication and auditing do not pass, the terminal equipment immediately stops transacting the credit business or performs advanced money-urging operation on the transacted credit business; in addition, the terminal equipment outputs an asynchronous auditing mode after auditing, and after receiving an auditing result obtained by manually conducting identity authentication auditing on a user to be credited before starting to transact the credit business, if the auditing result identifies that the identity authentication auditing of the user to be credited passes, the terminal equipment starts to transact the credit business and can output prompt information that the identity authentication auditing passes, or if the auditing result identifies that the identity authentication auditing does not pass, the terminal equipment refuses to transact the credit business and can output prompt information that the identity authentication fails.
The embodiment of the invention provides an anti-fraud method for credit business, which is used for judging the financial credit business, and needs to check the identity of the user before the credit business request is processed, collects the historical behavior data of the user for the financial credit business, and then further determines whether the user needs face recognition in the body-checking process by combining the historical behavior data, after the face recognition is determined to be needed, the face data of the user is collected for recognition and a face recognition result is obtained, analyzing the face recognition structure, outputting an asynchronous auditing mode for invoking manual asynchronous auditing, receiving auditing result of manually auditing the user according to the asynchronous auditing mode, so as to perform corresponding processing on the credit service based on different conditions of the user identified by the auditing result.
When the credit business applied and processed by the user needs to be verified aiming at the user, the method further determines whether face recognition needs to be carried out aiming at the user by combining the historical behavior data of the user, thereby ensuring that anti-fraud risk control is carried out aiming at the basic verification efficiency of verifying the user; the face recognition system is only called to collect face data for recognition when the need is determined, so that the intelligence and timeliness of identity audit risk control for the user are improved; in addition, the method calls manual asynchronous auditing by analyzing the face recognition result and outputting different asynchronous auditing modes, thereby not only avoiding the problems of serious human resource consumption and poor timeliness caused by the fact that the manual asynchronous auditing is continuously and completely implemented by a face recognition system in the traditional anti-fraud mode, but also realizing the good balance of anti-fraud risk control and user core timeliness of the user core.
Further, based on the above-described first embodiment, a second embodiment of the anti-fraud method of credit service of the present invention is proposed. Referring to fig. 3, fig. 3 is a flowchart illustrating a second embodiment of a credit transaction fraud prevention method according to the present invention.
In this embodiment, after analyzing the face recognition result and outputting an asynchronous auditing manner and receiving an auditing result of identity verification of the user to be verified according to the asynchronous auditing manner in step S30, the anti-fraud method for credit service of the present invention may further include:
and step S50, if the auditing result is not received after the preset time length is exceeded, detecting the overall risk degree of the credit business.
The terminal equipment outputs a corresponding asynchronous auditing mode based on the analysis of the face recognition result so as to call the manual identity authentication and verification process aiming at the user to be core, the terminal equipment starts timing from the moment of outputting the asynchronous auditing mode, and then, if the terminal equipment detects that the recorded time length exceeds the preset time length, but still receives the auditing result fed back by calling the manual identity authentication and verification process aiming at the user to be core, the terminal equipment detects the overall risk degree of the credit service appointed by the service transaction request initiated by the user to be core.
It should be noted that, in this embodiment, the preset time period may be set to any time period based on the requirement of practical application, for example, in order to ensure timeliness of performing authentication and verification on the identity of the user to be authenticated, the preset time period may be set to 1 min.
Specifically, for example, in the application flow shown in fig. 5, a face recognition result obtained by calling the face recognition system to perform face recognition for the user to be verified based on the system technology is analyzed at the terminal device, and detects that the index values of authentication indexes such as 'portrait comparison score' and 'living body monitoring score' mapped by the face recognition result are high or medium, therefore, when the asynchronous auditing modes of first passing and then auditing and first auditing and then passing are correspondingly output so as to call the auditing result obtained by feedback after further auditing aiming at the user to be core is further audited, the terminal equipment starts timing at the moment of outputting the asynchronous auditing mode of first passing and then auditing and first auditing and then passing, and after the timing exceeds the preset 1min, the terminal equipment immediately detects the overall risk degree of the credit business-loan application appointed by the business transaction request initiated by the user to be verified.
It should be noted that, in this embodiment, the overall risk degree of the credit service may specifically be a risk degree determined comprehensively by analyzing factors such as the risk level of the financial service type to which the credit service belongs, and the identity reliability recorded after the enterprise staff recorded by the terminal device verifies the identity of the user to be verified in advance. It should be understood that the overall risk level may of course be detected and determined based on other means or factors, depending on the different needs of the actual application, and the anti-fraud method of credit service of the present invention is not specifically limited to detecting the overall risk level of credit service.
And step S60, if the overall risk is lower than a preset risk threshold, the credit business is started to be transacted through identity verification of the user to be credited.
It should be noted that, in this embodiment, the preset risk threshold may be defined autonomously by the enterprise staff according to the needs of the practical application, and specifically, for example, the preset risk threshold may be defined autonomously by the enterprise staff as 50% based on the basic authentication efficiency considerations for performing identity verification. It should be understood that the preset risk threshold may of course be set to any other size than the above values in other ways than the one set by the staff set by himself as explained herein, depending on the design requirements of the actual application, and the anti-fraud method of credit business of the present invention is not specifically limited to the size and the setting of the preset risk threshold.
After detecting the overall risk degree of the credit service appointed by the service transaction request initiated by the user to be credited, if the overall risk degree is further detected to be smaller than a preset risk degree threshold value preset by enterprise staff, the terminal equipment immediately judges that the identity authentication of the user to be credited passes the verification, and starts to transact the credit service in time.
Specifically, for example, in the application flow shown in fig. 5, when the terminal device detects that the overall risk of the credit service-loan application specified by the service transaction request initiated by the user to be verified is less than-50% of the preset risk threshold value autonomously defined by the enterprise staff, the terminal device may directly determine that the identity authentication verification for the user to be verified has passed in order to ensure the timeliness of the identity verification for the user, so as to start to transact the credit service-loan application specified by the service transaction request initiated by the user to be verified.
Further, in another embodiment, after the overall risk of the credit service is lower than the preset risk threshold and the credit service is started to be transacted by verifying the identity of the user to be credited, the terminal device may further wait for invoking an audit result of manually performing identity authentication audit on the user to be credited according to the output asynchronous audit mode, and perform corresponding processing for the credit service based on the result.
In this embodiment, in the process of outputting the corresponding asynchronous auditing manner based on the analysis of the face recognition result by the terminal device to call the manual identity authentication verification for the user to be authenticated, the terminal device starts timing from the time when the asynchronous auditing manner is output, and then, if the terminal device detects that the recorded time length exceeds the preset time length, but still receives the auditing result fed back by calling the manual identity authentication verification for the user to be authenticated, the terminal device detects the overall risk of the credit service specified by the service transaction request initiated by the user to be authenticated. After detecting the overall risk degree of the credit service appointed by the service transaction request initiated by the user to be credited, if the overall risk degree is further detected to be smaller than a preset risk degree threshold value preset by enterprise staff, the terminal equipment immediately judges that the identity authentication of the user to be credited passes the verification, and starts to transact the credit service in time. The problem that in the process of calling manual work to verify the identity of the user, due to the inconvenience of manual operation, the waiting time of the user is too long, and the timeliness is seriously influenced is solved, the intelligence and timeliness of identity verification risk control of the user are improved, and the good balance between anti-fraud risk control and core timeliness of the user is realized.
Further, based on the above-described first embodiment, a third embodiment of the anti-fraud method of credit service of the present invention is proposed. In this embodiment, the step S40, performing corresponding processing on the credit service according to the audit result, may include:
step S401, if the auditing result identifies that the user to be credited passes the crediting, the credit business is started to be transacted;
the terminal equipment outputs an asynchronous auditing mode of first auditing and then passing, so as to call manual identity authentication auditing aiming at a user to be nuclear, and after receiving an auditing result fed back manually, if the auditing result identifier passes the identity authentication auditing aiming at the user to be nuclear, the terminal equipment starts to transact credit business appointed by a business transaction request initiated by the user to be nuclear.
Step S402, if the auditing result indicates that the user to be credited does not pass the crediting process, the credit business which is started to be transacted is stopped to be transacted continuously, or the advanced payment urging process is carried out aiming at the credit business which is transacted and completed.
The terminal equipment outputs an asynchronous auditing mode of first auditing and then passing, so as to call manual identity authentication and auditing aiming at a user to be checked, and after receiving an auditing result fed back manually, if the auditing result mark does not pass the identity authentication and auditing aiming at the user to be checked, the terminal equipment refuses to process credit business appointed by a business transaction request initiated by the user to be checked; or the terminal equipment directly starts to transact the credit business appointed by the business transaction application initiated by the user to be credited in an asynchronous auditing mode of first passing and then auditing when outputting the asynchronous auditing mode, then further calls manual identity authentication and auditing aiming at the user to be credited while or after transacting the credit business for the user to be credited, and after receiving an auditing result fed back manually, if the auditing result mark does not pass the identity authentication and auditing aiming at the user to be credited, the terminal equipment immediately stops transacting the credit business or carries out advanced payment urging operation on the transacted credit business.
Further, in another embodiment, the step S40 may further include:
step S403, if the auditing result identifies that the user to be credited has the malicious attack intention, detecting the financial account associated with the credit service, and managing and controlling the financial account.
The terminal equipment outputs an asynchronous auditing mode after auditing, receives an auditing result obtained by firstly carrying out identity authentication and auditing on a user to be checked before starting to transact the credit business by calling manual work, and refuses to transact the credit business and simultaneously locks and other controls if the auditing result identifies the identity authentication and auditing confirmation of the user to be checked and the user to be checked has the intention of malicious attack on the associated account of the credit business. Or the terminal device outputs an asynchronous auditing mode of first passing and then auditing, so that the credit business appointed by the business transaction application initiated by the user to be credited is started to be transacted first, then the terminal device receives and calls an auditing result of manually performing identity authentication and auditing for the user to be credited while the user to be credited starts to transact the credit business or after the auditing result calls that the user to be credited has the intention of malicious attack on the associated account of the credit business, then the terminal device immediately stops transacting the credit business continuously and performs locking and other control on the associated account.
In this embodiment, based on whether the user identity authentication audit identified by the audit result of the manual authentication and verification for the user identity is passed and whether the user has a malicious attack behavior, corresponding processing such as transaction, termination of transaction, advance of payment due, account management and control is performed on the credit service specified by the service transaction request initiated by the user, so that the control efficiency of risk control on the credit service is ensured.
The invention also provides an anti-fraud device for credit business.
Referring to fig. 6, fig. 6 is a functional block diagram of a first embodiment of the anti-fraud apparatus for credit service of the present invention.
As shown in fig. 3, the anti-fraud apparatus for credit service comprises:
the data acquisition module 10 is used for acquiring historical behavior data of a user to be credited in real time when the credit business needs identity verification;
the data processing module 20 is configured to, if it is determined that face recognition is required according to the historical behavior data, acquire face data of the user to be subjected to the body check for recognition and obtain a face recognition result;
the auditing and allocating module 30 is configured to analyze the face recognition result, output an asynchronous auditing manner, and receive an auditing result obtained by performing identity verification on the user to be verified according to the asynchronous auditing manner;
and the business processing module 40 executes corresponding processing on the credit business according to the auditing result.
Further, the anti-fraud apparatus for credit service further comprises:
the risk detection module is used for detecting the overall risk degree of the credit business if the audit result is not received after the preset duration is exceeded;
and the core body passing module is used for starting to transact the credit business by verifying the identity of the user to be core if the overall risk is lower than a preset risk threshold.
Further, the data acquisition module 10 includes:
the judging unit is used for judging that the credit business needs identity verification if the credit business is detected to belong to the preset high-risk financial business;
and the acquisition unit is used for marking the user initiating the service transaction request aiming at the credit service as a user to be checked and acquiring the historical behavior data of the user to be checked.
Further, the anti-fraud apparatus for credit service further comprises:
the face brushing determining module is used for determining whether the face recognition of the user to be subjected to the body checking is needed or not according to the historical behavior data;
the face brushing determination module includes:
the first determining unit is used for determining that face recognition needs to be carried out on the user to be subjected to the body check if negative behavior data exist in the historical behavior data;
and the second determining unit is used for determining that the face recognition of the user to be subjected to the body check is not required if negative behavior data does not exist in the historical behavior data.
Further, the asynchronous auditing mode comprises: the audit allocation module 30 does not need asynchronous audit, first passes then audit, and includes:
the first allocation unit is used for outputting the non-asynchronous audit if the authentication index value mapped by the face recognition result obtained through analysis is high;
the second allocation unit is used for outputting the first pass and the second check if the authentication index value mapped by the face recognition result obtained through analysis is middle;
and the third allocating unit is used for outputting the verification before passing if the authentication index value mapped by the face recognition result obtained through analysis is low.
Further, the service processing module 40 includes:
the first processing unit is used for starting to transact the credit business if the auditing result identifies that the user to be credited passes the crediting;
and the second processing unit is used for stopping continuously transacting the credit business which is transacted or carrying out advanced payment urging processing on the credit business which is transacted if the auditing result identifies that the user to be transacted fails to transact the credit business.
Further, the service processing module 40 further includes:
and the third processing unit is used for detecting the financial account associated with the credit service and managing and controlling the financial account if the auditing result identifies that the user to be verified has the malicious attack intention.
The function implementation of each module in the anti-fraud device for credit service corresponds to each step in the anti-fraud method embodiment for credit service, and the function and implementation process are not described in detail here.
The invention also provides a computer storage medium having stored thereon an anti-fraud program for a credit service, the anti-fraud program for a credit service when executed by a processor implementing the steps of the anti-fraud method for a credit service as described in any one of the above embodiments.
The specific embodiment of the computer storage medium of the present invention is basically the same as the embodiments of the above-mentioned credit business fraud prevention method, and is not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. An anti-fraud method for credit services, characterized in that it comprises:
acquiring historical behavior data of a user to be checked in real time when the credit business needs to be checked;
if the need of face recognition is determined according to the historical behavior data, face data of the user to be subjected to the core body is collected for recognition, and a face recognition result is obtained;
analyzing the face recognition result, outputting an asynchronous auditing mode, and receiving an auditing result for identity verification of the user to be verified according to the asynchronous auditing mode;
and performing corresponding processing on the credit service according to the auditing result.
2. The method of credit transaction anti-fraud according to claim 1, further comprising, after the steps of analyzing the face recognition result and outputting an asynchronous auditing manner, and receiving an auditing result for identity verification of the user to be verified according to the asynchronous auditing manner:
if the auditing result is not received after the preset time length is exceeded, detecting the overall risk degree of the credit business;
and if the overall risk degree is lower than a preset risk degree threshold value, the credit business is started to be transacted by verifying the identity of the user to be verified.
3. The method of credit transaction for fraud prevention according to claim 1, wherein said step of collecting historical behavioral data of the user to be credited in determining that said credit transaction requires identity verification comprises:
if the credit business is detected to belong to the preset high-risk financial business, judging that the credit business needs identity verification;
and marking the user initiating the service transaction request aiming at the credit service as a user to be checked, and collecting the historical behavior data of the user to be checked.
4. The method of credit service fraud prevention of claim 1, further comprising, after the step of collecting historical behavioral data of the user to be credited, the steps of:
determining whether the face recognition of the user to be subjected to the core body is needed or not according to the historical behavior data;
the step of determining whether the face recognition needs to be performed on the user to be subjected to the core body according to the historical behavior data comprises the following steps:
if negative behavior data exist in the historical behavior data, determining that face recognition needs to be carried out on the user to be subjected to the body checking;
and if negative behavior data do not exist in the historical behavior data, determining that face recognition is not needed for the user to be subjected to the body checking.
5. The anti-fraud method for credit services of claim 1, characterized in that the asynchronous auditing means include: asynchronous auditing is not needed, the auditing is carried out after the first auditing and the first auditing is carried out after the first auditing is carried out,
the step of analyzing the face recognition result and outputting an asynchronous auditing mode comprises the following steps:
if the authentication index value mapped by the face recognition result is high after analysis, outputting the non-asynchronous audit;
if the authentication index value mapped by the face recognition result is obtained through analysis, outputting the first pass and the second pass;
and if the authentication index value mapped by the face recognition result obtained by analysis is low, outputting the verification before passing.
6. The credit service antifraud method according to claim 1, wherein the step of performing corresponding processing on the credit service according to the audit result comprises:
if the auditing result identifies that the user to be credited passes the crediting operation, starting to transact the credit business;
and if the auditing result indicates that the user to be credited does not pass the crediting process, stopping continuously transacting the credit business started to be transacted, or performing advanced payment urging process on the credit business transacted and completed.
7. The credit service fraud prevention method of claim 1, wherein the step of performing corresponding processing on the credit service according to the audit result further comprises:
and if the auditing result identifies that the user to be verified has a malicious attack intention, detecting the financial account associated with the credit service, and managing and controlling the financial account.
8. An anti-fraud arrangement for credit services, characterized in that it comprises:
the data acquisition module is used for acquiring historical behavior data of the user to be credited in real time when the credit business needs identity verification;
the data processing module is used for collecting the face data of the user to be subjected to the body checking for recognition and acquiring a face recognition result if the need of face recognition is determined according to the historical behavior data;
the auditing and allocating module is used for analyzing the face recognition result, outputting an asynchronous auditing mode and receiving an auditing result for identity verification of the user to be verified according to the asynchronous auditing mode;
and the business processing module is used for executing corresponding processing on the credit business according to the auditing result.
9. A terminal device, characterized in that the terminal device comprises: memory, a processor and an anti-fraud program of a credit service stored on said memory and executable on said processor, said anti-fraud program of a credit service implementing the steps of the anti-fraud method of a credit service according to any one of claims 1 to 7 when executed by said processor.
10. A computer storage medium, characterized in that the computer storage medium has stored thereon an anti-fraud program of a credit service, which when executed by a processor implements the steps of the anti-fraud method of a credit service according to any one of claims 1 to 7.
CN202010545897.1A 2020-06-15 2020-06-15 Anti-fraud method, device, terminal equipment and storage medium for credit business Active CN111652596B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010545897.1A CN111652596B (en) 2020-06-15 2020-06-15 Anti-fraud method, device, terminal equipment and storage medium for credit business

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010545897.1A CN111652596B (en) 2020-06-15 2020-06-15 Anti-fraud method, device, terminal equipment and storage medium for credit business

Publications (2)

Publication Number Publication Date
CN111652596A true CN111652596A (en) 2020-09-11
CN111652596B CN111652596B (en) 2024-08-13

Family

ID=72347135

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010545897.1A Active CN111652596B (en) 2020-06-15 2020-06-15 Anti-fraud method, device, terminal equipment and storage medium for credit business

Country Status (1)

Country Link
CN (1) CN111652596B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116308748A (en) * 2023-03-19 2023-06-23 二十六度数字科技(广州)有限公司 Knowledge graph-based user fraud judgment system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105590257A (en) * 2015-12-22 2016-05-18 深圳前海微众银行股份有限公司 Bank remote account opening security processing method and device
CN107872433A (en) * 2016-09-27 2018-04-03 腾讯科技(深圳)有限公司 A kind of auth method and its equipment
WO2018090839A1 (en) * 2016-11-16 2018-05-24 阿里巴巴集团控股有限公司 Identity verification system, method, device, and account verification method
CN109146670A (en) * 2018-08-27 2019-01-04 深圳前海微众银行股份有限公司 It provides a loan anti-rogue processes method, apparatus and readable storage medium storing program for executing
CN109670968A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 Processing method, device, equipment and the computer storage medium of insurance data
CN110766442A (en) * 2019-09-06 2020-02-07 中国平安财产保险股份有限公司 Client information verification method, device, computer equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105590257A (en) * 2015-12-22 2016-05-18 深圳前海微众银行股份有限公司 Bank remote account opening security processing method and device
CN107872433A (en) * 2016-09-27 2018-04-03 腾讯科技(深圳)有限公司 A kind of auth method and its equipment
WO2018090839A1 (en) * 2016-11-16 2018-05-24 阿里巴巴集团控股有限公司 Identity verification system, method, device, and account verification method
CN108076018A (en) * 2016-11-16 2018-05-25 阿里巴巴集团控股有限公司 Identity authorization system, method, apparatus and account authentication method
CN109146670A (en) * 2018-08-27 2019-01-04 深圳前海微众银行股份有限公司 It provides a loan anti-rogue processes method, apparatus and readable storage medium storing program for executing
CN109670968A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 Processing method, device, equipment and the computer storage medium of insurance data
CN110766442A (en) * 2019-09-06 2020-02-07 中国平安财产保险股份有限公司 Client information verification method, device, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
严立新等: "《反洗钱基础教程》", 31 May 2008, 复旦大学出版社, pages: 89 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116308748A (en) * 2023-03-19 2023-06-23 二十六度数字科技(广州)有限公司 Knowledge graph-based user fraud judgment system
CN116308748B (en) * 2023-03-19 2023-10-20 二十六度数字科技(广州)有限公司 Knowledge graph-based user fraud judgment system

Also Published As

Publication number Publication date
CN111652596B (en) 2024-08-13

Similar Documents

Publication Publication Date Title
US11017406B2 (en) Multi factor authentication rule-based intelligent bank cards
CN107292150B (en) User identity confirmation method and device in security information processing
US20150220933A1 (en) Methods and systems for making secure online payments
CN110096244B (en) Information sharing method based on data processing and related equipment
CN111049659B (en) Service verification method, device and system based on handwriting signature recognition
WO2021012904A1 (en) Data updating method and related device
WO2020233070A1 (en) Payment risk verification method and apparatus, computer device, and storage medium
WO2013034025A1 (en) Self-service transaction and automatic emergency hedge system
CN111125772B (en) Method and device for dynamically setting security policy and mobile device
CN113687800B (en) File printing processing method, device, computer equipment and storage medium
CN111652596B (en) Anti-fraud method, device, terminal equipment and storage medium for credit business
CN107742344A (en) Access control method, system and storage medium
WO2024148905A1 (en) Data quantum computing management and control method and apparatus, device, and computer medium
CN110807630B (en) Payment method and device based on face recognition, computer equipment and storage medium
US20220046128A1 (en) Method and system for remote interaction between at least one user and a human operator and between at least one user and at least one automated agent
CN110969440A (en) Remote authorization method and device
CN111640007B (en) Bank account opening method, device, terminal and storage medium
CN115034882A (en) Credit card limit adjusting method and device based on 5G message
CN112272187A (en) Service forced passing method and system based on auxiliary channel verification
CN111768190A (en) Safe use method and device of self-service equipment and computer equipment
CN114866302B (en) Financial data evidence storing method and system based on block chain
CN115222414A (en) Banking business data processing method, device and system based on edge calculation
CN109785163B (en) Claim settlement request processing method, server and computer readable storage medium
RU2678655C1 (en) Method and system of transaction implementation using reversal mechanism
CN115439091A (en) Claims settlement wind control method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant