CN112633619A - Risk assessment method and device - Google Patents

Risk assessment method and device Download PDF

Info

Publication number
CN112633619A
CN112633619A CN201910950463.7A CN201910950463A CN112633619A CN 112633619 A CN112633619 A CN 112633619A CN 201910950463 A CN201910950463 A CN 201910950463A CN 112633619 A CN112633619 A CN 112633619A
Authority
CN
China
Prior art keywords
rule
risk
target
evaluation
policy set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910950463.7A
Other languages
Chinese (zh)
Inventor
沙磊磊
周佳敏
冯云乐
卜一
黄俊春
戴恩晨
葛卫忠
孙杰雄
旷代明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201910950463.7A priority Critical patent/CN112633619A/en
Publication of CN112633619A publication Critical patent/CN112633619A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities

Abstract

The embodiment of the application provides a risk assessment method and device. Wherein at least one rule policy set is provided; the rule policy set comprises at least one evaluation rule; determining at least one target rule strategy set corresponding to a target service party from the at least one rule strategy set; and according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a risk evaluation result of the object to be evaluated. The technical scheme provided by the embodiment of the application improves the reliability and accuracy of risk assessment.

Description

Risk assessment method and device
Technical Field
The embodiment of the application relates to the technical field of computer application, in particular to a risk assessment method and device.
Background
With economic development, more and more enterprises emerge, and enterprise cooperation also becomes a common operation mode, so that how to perform reliable and accurate risk assessment on the enterprises has very important significance.
Disclosure of Invention
The embodiment of the application provides a risk assessment method and device.
In a first aspect, an embodiment of the present application provides a risk assessment method, including:
providing at least one rule policy set; the rule policy set comprises at least one evaluation rule;
determining at least one target rule strategy set corresponding to a target service party from the at least one rule strategy set;
and according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a risk evaluation result of the object to be evaluated.
In a second aspect, an embodiment of the present application provides a risk assessment method, including:
providing a display interface;
displaying a rule strategy set selection prompt message in the display interface; the rule policy set comprises at least one evaluation rule;
determining at least one target rule policy set selected for a target business party;
and sending a risk assessment instruction to a server based on the at least one target rule policy set, wherein the risk assessment instruction is used for instructing the server to perform risk assessment on the object to be assessed according to the assessment rules in the at least one target rule policy set.
In a third aspect, an embodiment of the present application provides a risk assessment method, including:
receiving a risk evaluation request triggered by a user, and determining an object to be evaluated;
determining at least one evaluation rule;
according to the at least one evaluation rule, performing risk evaluation on the object to be evaluated to obtain a risk evaluation result;
and outputting risk prompt information based on the risk assessment result.
In a fourth aspect, an embodiment of the present application provides a risk assessment method, including:
acquiring risk data of an object to be evaluated;
determining at least one evaluation rule corresponding to the risk data;
performing risk assessment on the risk data according to the at least one assessment rule to obtain a risk assessment result of the object to be assessed;
and outputting risk prompt information based on the risk assessment result.
In a fifth aspect, an embodiment of the present application provides a risk assessment apparatus, including:
the policy providing module is used for providing at least one rule policy set; the rule policy set comprises at least one evaluation rule;
the rule determining module is used for determining at least one target rule strategy set corresponding to a target service party from the at least one rule strategy set;
and the evaluation processing module is used for performing risk evaluation on the related data of the object to be evaluated according to the evaluation rules in the at least one target rule strategy set to obtain a risk evaluation result of the object to be evaluated.
In a sixth aspect, an embodiment of the present application provides a risk assessment apparatus, including:
the interface providing module is used for providing a display interface;
the display module is used for displaying rule strategy set selection prompt information in the display interface; the rule policy set comprises at least one evaluation rule;
the selection module is used for determining at least one target rule strategy set selected aiming at a target service party;
and the indicating module is used for sending a risk assessment indication to the server side based on the at least one target rule policy set, wherein the risk assessment indication is used for indicating the server side to carry out risk assessment on the object to be assessed according to the assessment rule in the at least one target rule policy set.
In a seventh aspect, an embodiment of the present application provides a computing device, including a processing component and a storage component;
the storage component stores one or more computer instructions; the one or more computer instructions to be invoked for execution by the processing component;
the processing component is to:
providing at least one rule policy set; the rule policy set comprises at least one evaluation rule;
determining at least one target rule strategy set corresponding to a target service party from the at least one rule strategy set;
and according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a risk evaluation result of the object to be evaluated.
In an eighth aspect, an embodiment of the present application provides a terminal, including a display component, a processing component, and a storage component;
the storage component stores one or more computer instructions; the one or more computer instructions to be invoked for execution by the processing component;
the processing component is to:
providing a display interface through the display component;
displaying a rule strategy set selection prompt message in the display interface; the rule policy set comprises at least one evaluation rule;
determining at least one target rule policy set selected for a target business party;
and sending a risk assessment instruction to a server based on the at least one target rule policy set, wherein the risk assessment instruction is used for instructing the server to perform risk assessment on the object to be assessed according to the assessment rules in the at least one target rule policy set.
In the embodiment of the application, at least one rule strategy set is provided; wherein the rule policy set comprises at least one evaluation rule; determining at least one target rule strategy set of a target service party from the at least one rule strategy set; and according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a risk evaluation result of the object to be evaluated. By providing the pre-configured rule strategy set, at least one target rule strategy set corresponding to a target service party can be selected from the rule strategy sets, and according to the evaluation rule, when risk evaluation is carried out on an object to be evaluated, the risk evaluation is standardized through the pre-configured evaluation rule, and only a proper rule strategy set needs to be selected, risk judgment can be carried out on the object to be evaluated according to the specified evaluation rule, so that a risk evaluation result is obtained, and the reliability, convenience and accuracy of the risk evaluation are improved.
These and other aspects of the present application will be more readily apparent from the following description of the embodiments.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart illustrating one embodiment of a risk assessment method provided herein;
FIG. 2 illustrates a flow diagram of yet another embodiment of a risk assessment method provided herein;
FIGS. 3-7 each illustrate at least a partial display schematic of a display interface in an embodiment of the present application;
FIG. 8 is an interactive diagram illustrating risk assessment implemented in one practical application according to an embodiment of the present application;
FIG. 9 is a flow chart illustrating a further embodiment of a risk assessment method provided herein;
FIG. 10 is a flow chart illustrating yet another embodiment of a risk assessment method provided herein;
FIG. 11 is a schematic structural diagram illustrating one embodiment of a risk assessment device provided herein;
FIG. 12 is a schematic structural diagram of a risk assessment device according to yet another embodiment of the present application;
FIG. 13 is a schematic structural diagram illustrating yet another embodiment of a risk assessment device provided herein;
FIG. 14 is a schematic structural diagram of a risk assessment device according to yet another embodiment of the present application;
FIG. 15 illustrates a schematic structural diagram for one embodiment of a computing device provided herein;
fig. 16 is a schematic structural diagram illustrating an embodiment of a terminal provided in the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
In some of the flows described in the specification and claims of this application and in the above-described figures, a number of operations are included that occur in a particular order, but it should be clearly understood that these operations may be performed out of order or in parallel as they occur herein, the number of operations, e.g., 101, 102, etc., merely being used to distinguish between various operations, and the number itself does not represent any order of performance. Additionally, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel. It should be noted that, the descriptions of "first", "second", etc. in this document are used for distinguishing different messages, devices, modules, etc., and do not represent a sequential order, nor limit the types of "first" and "second" to be different.
The technical scheme of the embodiment of the application is mainly applied to a risk assessment scene, particularly to a risk assessment scene for an enterprise.
At present, some organizations, especially large enterprises, often cooperate with multiple enterprises in different cooperation scenarios during operation, for example, according to different cooperation scenarios, the cooperating enterprises may be divided into suppliers, investors, channel suppliers, trusted parties, and the like, so that risk assessment is performed on the enterprises to ensure the successful and safe proceeding of cooperation, which is a technical problem to be solved at present.
In the prior art, enterprise risk assessment is usually performed by combining the operation data of enterprises and the like, and the assessment result is not accurate.
In order to improve the reliability and accuracy of risk assessment, the inventor finds that, in a research, a human assessment mode is influenced by subjective factors, and risk assessment results obtained by different people may be different. For a large organization, a plurality of business parties are generally divided, each business party has enterprise cooperation requirements, and many cooperation scenes exist.
Accordingly, the inventor proposes a technical solution of the present application, and in an embodiment of the present application, at least one rule policy set is provided; wherein the rule policy set comprises at least one evaluation rule; determining at least one target rule policy set from the at least one rule policy set; and according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a risk evaluation result of the object to be evaluated. In the embodiment of the application, at least one target rule policy set corresponding to a target service party can be selected from the preset rule policy sets, and according to the evaluation rules, when the risk evaluation is performed on the object to be evaluated, the risk evaluation is standardized through the preset evaluation rules, and only the proper rule policy set needs to be selected, so that the risk judgment can be performed on the object to be evaluated according to the specified evaluation rules, and the risk evaluation result is obtained, thereby improving the reliability and accuracy of the risk evaluation.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a flowchart of an embodiment of a risk assessment method provided in an embodiment of the present application, where the method may include the following steps:
101: at least one rule policy set is provided.
Wherein each rule policy set comprises at least one evaluation rule. Each rule policy set may be stored in the form of a data packet, and therefore, the rule policy set may refer to a rule policy packet.
Wherein, different rule strategy sets can be divided according to different cooperation scenes, different risk dimensions or different business parties, and the like. The evaluation rules can be selected to form a rule strategy set by combining different cooperation scenes, different risk dimensions or risk preferences and tolerances of different business parties. Of course, the division of the rule policy set may not be limited thereto.
The evaluation rule may be configured in advance in combination with the data category, and since the evaluation rule is used for evaluating the risk data, for convenience of evaluation, the evaluation rule may be configured in combination with the data category of the risk data, for example, the data category is "establishment time", and the corresponding evaluation rule may be "establishment time is less than 3 months and is high risk, establishment time is greater than 6 months and is low risk, and establishment time is greater than 3 months and is less than 6 months and is medium risk", and the like. The evaluation rules may be set and updated in conjunction with the actual needs of the organization or business parties in the organization.
102: and determining at least one target rule strategy set corresponding to the target service party from the at least one rule strategy set.
Since for some organizations, multiple business parties may be partitioned, at least one target rule package may be selected from any business party for which a risk assessment is desired based on the at least one rule policy set provided. Therefore, according to the technical scheme, different business parties can conveniently carry out risk assessment on different objects.
Optionally, the method may further include:
and determining a target service party according to the service party identifier provided by the user.
The service party selection prompt information may be output in a display interface of the client, and the client may determine the service party identifier provided by the user in response to the user operation.
The service party selection prompt message may include a pull-down selection box of at least one service party, or an identification input box, etc. so as to facilitate the user to select or input the service party identification.
In addition, determining at least one target rule policy set corresponding to the target business party from the at least one rule policy set may include:
outputting selection prompt information aiming at the at least one rule strategy set;
and determining at least one target rule policy set selected for the target service party from the at least one rule policy set based on a second selection request triggered by the user.
Optionally, the outputting selection prompt information for the at least one rule policy set may include:
determining at least one candidate rule strategy set corresponding to the target business party from the at least one rule strategy set according to the corresponding relation between the business party and the rule strategy set;
outputting selection prompt information aiming at the at least one candidate rule strategy set;
the determining, based on a second selection request triggered by the user, at least one target rule policy set selected for the target service party from the at least one rule policy set may include:
determining at least one target rule policy set selected from the at least one candidate rule policy set based on a user-triggered second selection request.
That is, rule policy sets corresponding to different service parties can be configured in advance, so that users can conveniently select the rule policy sets.
In addition, in order to further ensure the reliability of risk assessment, at least one target rule policy set selected by the user at least needs to include a specific rule policy set, the specific rule policy set is formed by specific rule assessment rules, the specific assessment rules are indispensable assessment rules, and the specific assessment rules can be necessary assessment rules for ensuring the normal operation of an organization.
Accordingly, the determining at least one target rule policy set selected for the target business party from the at least one rule policy set based on the second user-based selection request may include:
and determining at least one target rule policy set corresponding to the target service party according to the specific rule policy set and a second selection request triggered by the user. The at least one target rule policy set includes the particular rule policy set, which may include at least one particular evaluation rule.
103: and according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a risk evaluation result of the object to be evaluated.
The object to be evaluated can be any object associated with the target business party, such as any object with a cooperative relationship or an object intentionally developing a cooperative relationship.
Optionally, the corresponding object to be evaluated may be determined according to an object name provided by the user, and the method may further include:
the object evaluation prompt information may be displayed in a display interface of the client, and the object evaluation prompt information may include an input box, so that a user may input an object name of an object to be evaluated, and the like.
In an optional implementation, the method may further include:
receiving an object evaluation request triggered by a user; the object evaluation request may include an object name; the object evaluation request may be generated by the client in response to a triggering operation for the object evaluation prompt information, that is, after the user inputs an object name, the object evaluation request may be triggered to be generated, the object evaluation prompt information may include a triggering control, and the triggering operation may be specifically executed for the triggering control.
Based on the object name, the object to be evaluated can be determined, so that the operation of step 103 can be performed again.
In addition, the object evaluation request may further include a set name of the at least one target rule policy set, so as to determine the at least one target rule policy set; of course, the object evaluation request may further include a service party identifier, so as to determine a target service party, and the like.
In some embodiments, the determining, from the at least one rule policy set, at least one target rule policy set corresponding to a target business party may include:
determining target identity information of the user;
and determining at least one target rule policy set matched with the target service party and the target identity information from the at least one rule policy set.
Since the identities of different users in an organization are different, for example, the identities may refer to positions, and the like, so that risks that users with different identities need to know are different, for example, when an object to be evaluated is an enterprise, for a CFO (Chief financial Officer), risks in financial aspects of the enterprise are more concerned, and for a CLO (Chief legal Officer), risks in legal aspects such as enterprise litigation and dispute are more concerned, a target rule policy set may be determined in combination with identity information of a user who initiates an object evaluation request, so as to determine which data categories of risk data are targeted, and risk evaluation is performed on the object to be evaluated, and the like.
The method comprises the steps that a target business party is selected, a target rule strategy set is obtained, the target business party is selected according to the target rule strategy set, and the target business party is selected according to the target rule strategy set.
Of course, the at least one target rule policy set may also be selected in combination with the object to be evaluated, and the like.
In one implementation, the risk assessment result may include a risk level, which may be classified as low risk, medium risk, high risk, and the like.
In addition, the risk assessment is carried out on the related data of the object to be assessed on the basis of each assessment rule. Therefore, optionally, the performing risk assessment on the relevant data of the object to be assessed according to the assessment rule in the at least one target rule policy set, and obtaining a risk assessment result of the object to be assessed includes:
and according to the evaluation rule in the at least one target rule strategy set, evaluating the related data related to the data category corresponding to the evaluation rule in the object to be evaluated to obtain a risk evaluation result of the object to be evaluated.
Namely, according to the data category corresponding to each evaluation rule, the risk data belonging to the data category in the object to be evaluated is evaluated.
Therefore, the data evaluation results of the object to be evaluated corresponding to different data categories can be obtained based on different evaluation rules, and therefore, the risk evaluation results may also include data evaluation results corresponding to different data categories. Each data evaluation result comprises a data evaluation grade, and the data evaluation grade can be divided into low risk, medium risk, high risk and the like, and is determined according to whether different evaluation conditions in the evaluation rule are met.
The risk assessment result may be determined by comprehensively processing data assessment results corresponding to the plurality of data categories, for example, when the data assessment results larger than a certain number are high risk, the risk assessment results are high risk, and the like.
In this embodiment, in combination with the actual requirement of the target business party, at least one target rule policy set may be selected from the at least one rule policy set, so that risk assessment may be performed on relevant data of the object to be assessed according to each assessment rule in the at least one target rule policy set, and a risk assessment result of the object to be assessed for the target business party may be obtained. By providing the pre-configured rule strategy set, at least one target rule strategy set corresponding to a target service party can be selected from the rule strategy sets, and according to the evaluation rule, when risk evaluation is performed on the object to be evaluated, the risk evaluation is standardized through the pre-configured evaluation rule, and only by selecting the appropriate rule strategy set, risk judgment can be performed on the object to be evaluated according to the specified evaluation rule, so that a risk evaluation result is obtained, and the reliability and the accuracy of the risk evaluation are improved.
After obtaining the risk assessment result of the object to be assessed, as an optional mode:
the method may further comprise:
and outputting third risk prompt information based on the risk assessment result.
Optionally, the third risk tip information may include the risk assessment result.
Optionally, the third risk prompt message may be displayed in a display interface of the client.
In addition, basic information of the object to be evaluated can be output, so that the user can know the basic information conveniently, for example, when the object to be evaluated is an enterprise, the basic information can include an enterprise name, business registration information, legal person information and the like.
As another alternative, the method may further include:
determining risk processing suggestion information based on the risk assessment result;
and outputting the risk processing suggestion information.
Wherein the risk handling recommendation information may be pre-set based on different risk levels.
Further, the determining risk processing advice information based on the risk assessment result may be:
and determining risk processing suggestion information based on data evaluation results of the objects to be evaluated corresponding to different data types. The risk processing advice information corresponding to the data evaluation results of different data types may also be preset.
For example, when the data category is "time to live", and it is determined that there is a high risk based on the evaluation rule, the risk processing recommendation information corresponding to the high risk may be "recommendation cleaning", and the like.
In addition, basic information of the object to be evaluated can be output, so that the user can know the basic information conveniently, for example, when the object to be evaluated is an enterprise, the basic information can include an enterprise name, business registration information, legal person information and the like.
As yet another alternative, the method may further comprise:
and sending first risk prompt information to the target business party based on the risk assessment result.
The first risk prompting message may include the risk assessment result, and may also include risk processing suggestion information, etc. to achieve the purpose of notifying the target business party.
Optionally, the first risk prompt message may be sent to a relevant person belonging to the target business party, where the relevant person may be, for example, a manager or the like.
The first risk prompt message may be sent in a short message, an instant messaging message, or an email.
Optionally, in order to ensure validity of the information to be conveyed, the sending, to the target business party, first risk prompting information based on the risk assessment result may include:
and if the risk assessment result meets a risk assessment condition, sending first risk prompt information to at least one business party associated with the object to be assessed.
The risk assessment condition may be, for example, a risk level of medium risk or high risk, etc.
In addition, since the object to be evaluated may have an association relationship with each of a plurality of business parties in the organization, for example, may have a cooperative relationship with the object to be evaluated or an intentional cooperative relationship to the business parties, as yet another optional manner, the method may further include:
and sending second risk prompt information to at least one service party associated with the object to be evaluated based on the risk evaluation result. The at least one business party may include the target business party.
The first risk prompting message may include the risk assessment result, risk processing suggestion information, and the like, so as to achieve the purpose of notifying the target business party.
Optionally, in order to ensure validity of the information to be conveyed, the sending, to the target business party, first risk prompting information based on the risk assessment result may include:
and if the risk assessment result meets a risk assessment condition, sending second risk prompt information to at least one business party associated with the object to be assessed.
In addition, as yet another alternative, the risk assessment result may be output while first risk prompting information is sent to a target business party and/or second risk prompting information is sent to at least one business party associated with the object to be assessed.
Since in practical applications there may be many collaboration scenarios with different risk requirements, in some embodiments, the method may further include:
providing at least one collaboration scenario;
determining a target cooperation scene from the at least one cooperation scene;
the determining, from the at least one rule policy set, at least one target rule policy set corresponding to a target service party includes:
determining at least one target rule strategy set corresponding to a target service party in the target cooperation scene from the at least one rule strategy set;
the performing risk assessment on the relevant data of the object to be assessed according to the assessment rule in the at least one target rule policy set to obtain a risk assessment result of the object to be assessed includes:
and according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a risk evaluation result of the object to be evaluated in the target cooperation scene.
That is, at least one target rule policy set corresponding to the target service party in the target cooperation scenario may be determined according to the target cooperation scenario, so that a risk assessment result of the object to be assessed in the target cooperation scenario may be achieved.
Wherein determining a target collaboration scenario from the at least one collaboration scenario may comprise:
outputting scene selection prompt information for at least one collaboration scene;
and determining a target cooperation scene based on the scene selection request of the user.
To facilitate determining a target policy set in a target collaboration scenario, in some embodiments, the determining, from the at least one rule policy set, at least one target rule policy set corresponding to a target business party in the target collaboration scenario may include:
determining at least one candidate rule strategy set corresponding to the target cooperation scene from the at least one rule strategy set according to the corresponding relation between the cooperation scene and the rule strategy set;
outputting selection prompt information aiming at the at least one candidate rule strategy set;
determining at least one target rule policy set selected from the at least one candidate rule policy set based on a user-triggered first selection request.
Of course, at least one candidate rule policy set may also be determined from the correspondence between the service party and the rule policy set and the correspondence between the cooperation scenario and the rule policy set.
In addition, for a large organization, an object may have an association relationship with different business parties, and therefore, in some embodiments, the performing risk assessment on the related data of the object to be assessed according to the assessment rule in the at least one target rule policy set, and obtaining a risk assessment result of the object to be assessed may include:
according to the evaluation rule in the at least one target rule strategy set, carrying out risk evaluation on the related data of the object to be evaluated to obtain a candidate evaluation result of the object to be evaluated;
acquiring a risk evaluation result of the object to be evaluated corresponding to at least one business party different from the target business party;
and comprehensively processing the risk evaluation result of the at least one business party and the candidate evaluation result to obtain a risk evaluation result of the object to be evaluated corresponding to the target business party.
The comprehensive processing mode may be implemented in a plurality of possible implementation modes, for example, if the candidate evaluation result is a low risk or a medium risk, and if there is a high risk in the risk evaluation result corresponding to at least one service party, the risk evaluation result of the object to be evaluated in the target cooperation scenario is a high risk, and the like.
Of course, the risk assessment result of the target business party corresponding to the object to be assessed may include the candidate assessment result and the corresponding prompt information of the risk assessment result corresponding to the at least one business party.
For example, the candidate evaluation result is a medium risk, while a high risk exists in the risk evaluation result corresponding to at least one business party, and the corresponding prompt information may be, for example, "the object to be evaluated and the XX business party have a high risk when cooperating".
In addition, an object may have an association relationship with different business parties in different cooperation scenarios, or with the same business party in different cooperation scenarios. Therefore, in some embodiments, the performing risk assessment on the relevant data of the object to be assessed according to the assessment rule in the at least one target rule policy set, and obtaining a risk assessment result of the object to be assessed in the target business scenario may include:
according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a candidate evaluation result of the object to be evaluated in the target cooperation scene;
acquiring a risk evaluation result of the object to be evaluated in at least one cooperation scene different from the target cooperation scene;
and comprehensively processing the risk evaluation result and the candidate evaluation result in the at least one cooperation scene to obtain the risk evaluation result of the object to be evaluated in the target cooperation scene.
The comprehensive processing mode may be implemented in a plurality of possible implementation modes, for example, if the candidate evaluation result is a medium risk, and the risk evaluation result in at least one cooperation scenario has a high risk, the risk evaluation result of the object to be evaluated in the target cooperation scenario may also be a high risk.
For another example, if the candidate evaluation result is a low risk, and the risk evaluation results of at least one cooperation scenario are also low risks, it may be determined that the risk evaluation result of the object to be evaluated in the target cooperation scenario may also be a low risk, otherwise, if the risk evaluation result of at least one cooperation scenario is high risk, it may be determined that the risk evaluation result of the object to be evaluated in the target cooperation scenario is also a high risk, and if the risk evaluation result of at least one cooperation scenario is medium risk, it may be determined that the risk evaluation result of the object to be evaluated in the target cooperation scenario is also a medium risk.
Of course, the risk assessment result may also include the candidate assessment result and corresponding prompt information of the risk assessment result in at least one cooperation scenario.
For example, the candidate evaluation result is a medium risk, and the risk evaluation result corresponding to at least one business party has a high risk, and the corresponding prompt information may be, for example, "the object to be evaluated and the XX business party have a high risk when cooperating in the XX cooperation scene", or the like.
In some embodiments, after determining at least one target rule policy set corresponding to a target service party from the at least one rule policy set, the method further includes:
and receiving a policy set updating request aiming at the at least one target rule policy set, and updating the at least one target rule policy set.
The policy set updating request is used for adding or deleting a target rule policy set, so that at least one target rule policy set is updated.
Optionally, the policy set update request may include a user identifier.
The updating the at least one target rule policy set may be:
judging whether the user identification has an updating authority;
and if so, updating the at least one target rule strategy set.
That is, a user with an update right can update at least one target rule policy set to ensure the uniformity of the evaluation criteria. In practical application, related personnel in the target business party can configure at least one target rule policy set corresponding to the target business party in a target cooperation scene, after a common user selects the target business party and the target cooperation scene, the at least one target rule policy set can be automatically determined, the common user only needs to provide an object name of an object to be evaluated, an object evaluation request of the object to be evaluated can be initiated, and therefore the server side can carry out risk evaluation on the object to be evaluated according to the at least one target rule policy set. Only the relevant personnel of the target business party is allowed to initiate a policy set updating request for the at least one target policy set.
In some embodiments, after determining at least one target rule policy set corresponding to a target service party from the at least one rule policy set, the method further includes:
receiving a rule updating request aiming at any target rule policy set, and updating the evaluation rules in the target rule policy set.
The rule update request is used to add, delete or modify an evaluation rule in the target rule policy set.
Optionally, a viewing request for any kind of target rule policy set may be further received, at least one evaluation rule in the any kind of target rule policy set may be output, and further, rule prompt information may be further output. The rule prompt information is used for prompting to update the evaluation rule in the target rule policy set, and the like.
In some embodiments, the rule update request includes a user identification;
the updating the evaluation rules in the target rule policy set comprises:
judging whether the user identification has an updating authority;
and if so, updating the evaluation rule in the target rule policy set.
That is, a user with an update right can update at least one target rule policy set to ensure the uniformity of the evaluation standard and the reliability of the risk evaluation.
Wherein the receiving an update request for any one of the target rule policy sets, and updating the evaluation rules in the target rule policy set may include:
determining update contents based on the rule modification request for any one of the evaluation rules;
and if the updating content meets the updating requirement corresponding to the evaluation rule, updating the evaluation rule.
If one evaluation rule can set a plurality of evaluation conditions, for example, an evaluation rule corresponding to a data category of "holding time" can be "holding time less than 3 months is high risk, holding time greater than 6 months is low risk, and holding time greater than 3 months less than 6 months is medium risk", wherein the rule modification request can be directed to the evaluation conditions, such as modification holding time greater than 7 months is high risk, and the like.
The update request may limit a change range of the evaluation condition, etc. to ensure reliability of the risk evaluation, for example, a high risk is obtained when the establishment time is less than 3 months, and a high risk is obtained when the update request is established for more than 6 months at least.
In addition, the policy set update and the rule update may be performed on the target rule policy set, and then the at least one rule policy set may be updated.
In certain embodiments, the method may further comprise:
and receiving a policy set updating request aiming at the at least one rule policy set, and updating the at least one rule policy set.
The policy set updating request is used for adding or deleting a rule policy set, so that at least one rule policy set is updated.
In certain embodiments, the method may further comprise:
receiving a rule updating request aiming at any rule policy set, and updating the evaluation rules in the rule policy set.
The rule update request is used to add, delete or modify any evaluation rule of the rule policy set.
Wherein the receiving an update request for any rule policy set, and updating the evaluation rules in the rule policy set may include:
determining update contents based on the rule modification request for any one of the evaluation rules;
and if the updating content meets the updating requirement corresponding to the evaluation rule, updating the evaluation rule.
Wherein the at least one rule policy set may be pre-configured to be generated, and therefore in some embodiments, the method may further include:
and receiving a configuration request triggered by a user, and determining a rule and policy set generated by configuration.
Optionally, configuration prompt information may be displayed on a display interface of the client;
displaying a rule strategy set configuration page based on the trigger operation of the configuration prompt information;
the configuration request is generated based on a configuration operation of a user in the policy set configuration page.
In the policy set configuration page, a user may create a rule policy set and configure at least one evaluation rule included in the rule policy set.
When the risk evaluation is performed on the object to be evaluated, the risk is performed on the related data in the object to be evaluated according to the data type corresponding to the evaluation rule, so that the risk data of different evaluation objects can be obtained in advance, the risk evaluation is performed on the object to be evaluated, and only the related data corresponding to the object to be evaluated needs to be searched from the database.
In certain embodiments, the method may further comprise:
acquiring risk data of different evaluation objects;
classifying and storing the risk data of different evaluation objects according to the data types corresponding to different evaluation rules;
the acquired risk data can determine corresponding data types, and accordingly the acquired risk data are stored corresponding to the respective data types.
The performing risk assessment on the relevant data of the object to be assessed according to the assessment rule in the at least one target rule policy set, and obtaining a risk assessment result of the object to be assessed may include:
and according to the evaluation rule in the at least one target rule strategy set, evaluating the related data related to the data category corresponding to the evaluation rule in the object to be evaluated to obtain a risk evaluation result of the object to be evaluated.
In some embodiments, the obtaining risk data of different assessment subjects comprises:
acquiring external risk data and internal risk data of different evaluation objects, wherein the external risk data comprise related output data of an official agency aiming at the evaluation objects, and the internal risk data are related output data of the target business aiming at the evaluation objects.
In the embodiment of the application, not only the external risk data but also the internal risk data can be acquired. The evaluation rules comprise evaluation rules aiming at the internal risk data, and the accurate evaluation of the object to be evaluated can be realized by combining the internal risk data.
The external risk data may include, for example, business data, litigation judgment data, tax penalty data, intellectual property dispute data, news messages, etc., and the internal risk data may include business process data for evaluation objects in an organization, administrative affair data, etc.
In some embodiments, the performing risk assessment on the relevant data of the object to be assessed according to the assessment rule in the at least one target rule policy set, and obtaining a risk assessment result of the object to be assessed includes:
responding to an object evaluation request aiming at the object to be evaluated;
and according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a risk evaluation result of the object to be evaluated.
As can be seen from the above description, the object name of the object to be evaluated may be provided by the user to trigger the object evaluation request, so as to trigger the risk evaluation of the object to be evaluated, and therefore, as an alternative, the method may further include:
and receiving the object evaluation request triggered by the user aiming at the object to be evaluated.
The object evaluation request may include an object name provided by a user, so as to determine a corresponding object to be evaluated.
In a practical application, after a user selects a target service party, a target cooperation scene and a target rule strategy set through a client, an object name of an object to be evaluated can be provided to trigger an object evaluation request, and after the server receives the object evaluation request, the server can detect that the object to be evaluated is positioned at a target service node, and periodically perform risk evaluation and the like on the object to be evaluated.
As another alternative, the method may further include:
and detecting that the object to be evaluated meets the checking condition, and generating the object evaluation request.
Optionally, detecting that the object to be evaluated satisfies the ping condition, and generating the object evaluation request may include:
and periodically generating a target evaluation request for the target to be evaluated based on the periodic scanning strategy for the target to be evaluated.
I.e. the examination conditions comprise said periodical scanning strategy, thereby periodically triggering the generation of an object evaluation request.
In order to predict an evaluation object with a risk in time and avoid occurrence of a cooperative negative effect or even capital loss, a periodic scanning strategy may be set for the object to be evaluated, where the periodic scanning strategy may include a periodic time duration, for example, the periodic time duration may be 30 days, and an object evaluation request for the object to be evaluated is generated every 30 days, so as to respond to the object evaluation request for the object to be evaluated, that is, the object to be evaluated may be subjected to risk evaluation according to an evaluation rule in at least one target rule policy set, so as to find out a risk abnormal condition in time.
Optionally, detecting that the object to be evaluated satisfies the ping condition, and generating the object evaluation request may include:
and detecting that the object to be evaluated is positioned at a target service node, and generating the object evaluation request.
The target service node may be, for example, a contract signing node, a credit granting admission node, or other key service nodes. Therefore, risk assessment can be carried out on the object to be assessed on the target service node so as to ensure the safe operation of the service.
In addition, the examination condition may also refer to that, in the object to be evaluated, related data related to the evaluation rule in the at least one target rule policy set is updated. Wherein, the related data related to the evaluation rule can be determined based on the data category corresponding to the evaluation rule.
In an actual application, after a user selects a target business party, a target cooperation scene and a target rule policy set through a client, an object name and an inspection condition of an object to be evaluated can be provided, then a risk evaluation instruction can be sent to a server through the client, and after the server receives the risk evaluation instruction, the object to be evaluated can be periodically subjected to risk evaluation and the like when the detection object meets the inspection condition.
Thus, in certain embodiments, the method may further comprise:
and receiving the checking condition provided by the user for the evaluation object.
As can be seen from the above description, after the risk assessment result is obtained, the risk assessment result may be output, or risk prompt information may be sent to the business party. After the target service party obtains the risk assessment result, corresponding feedback can be given.
Thus, in certain embodiments, the method may further comprise:
receiving risk feedback content fed back by the target business party based on a risk evaluation result;
and taking the risk feedback content as the risk data of the object to be evaluated.
Alternatively, it may be specific to the intra-pair risk data of the subject to be evaluated.
In some embodiments, after receiving the risk feedback content fed back by the target business party based on the risk assessment result, the method may further include:
and if the risk evaluation result meets the risk evaluation condition, sending risk feedback prompt information to the target business party.
The risk feedback content may be triggered by the target business party based on the risk hint information. The risk feedback prompt information may include content types, formats and the like of risk feedback contents, so that the risk feedback contents may be normalized and may be used as internal risk data of an object to be evaluated.
The risk assessment condition may be, for example, a high risk or a medium risk, and the risk feedback content may include, for example, risk confirmation information of the target business party and related data of the existing risk. For example, the evaluation rule "the establishment time is less than 3 months and is high risk", and assuming that the object to be evaluated satisfies the evaluation rule, "the establishment time" is high risk, the risk feedback content of the target business party may include the specific establishment time of the object to be evaluated, for example, the risk feedback content may be "the establishment time is determined as high risk, and the establishment time is 1 month".
In addition, for convenience of risk analysis and the like of a user, evaluation rules may be set corresponding to different risk dimensions, for example, the data category "formation time" belongs to the "basic frequent risk" dimension, and the like.
Thus, in some embodiments, the rule policy set includes evaluation rules corresponding to different risk dimensions;
the performing risk assessment on the relevant data of the object to be assessed according to the assessment rule in the at least one target rule policy set, and obtaining a risk assessment result of the object to be assessed may include:
and according to the evaluation rules corresponding to different risk dimensions in the at least one target rule strategy set, performing risk evaluation on the object to be evaluated in different risk dimensions by combining the related data of the object to be evaluated, and obtaining risk evaluation results corresponding to different risk dimensions.
The risk assessment result corresponding to each risk dimension can be determined by comprehensively processing the data assessment result corresponding to each risk dimension. In addition, the risk assessment result corresponding to each risk dimension may include obtaining a data assessment result according to the assessment rule corresponding to each risk dimension, and the like.
Optionally, the method may further include:
and outputting risk evaluation results of different risk dimensions.
Further, in certain embodiments, the method may further comprise:
and obtaining a comprehensive evaluation result based on the risk evaluation results of different risk dimensions.
At this time, the comprehensive evaluation result may also be output.
For example, if the risk assessment result of more than a certain number of risk dimensions is high risk, the comprehensive assessment result is high risk, and if the risk assessment result of less than a certain number of risk dimensions is low risk, the comprehensive assessment result is low risk, and the like, otherwise, the comprehensive assessment result may be considered as medium risk, and the like.
Of course, the specific comprehensive processing mode may be preset in combination with the actual application situation.
In certain embodiments, the method may further comprise:
and if the risk evaluation result meets a risk evaluation condition and the target business party receives the object to be evaluated, sending early warning information to the target business party.
The risk assessment condition may be, for example, a high risk level or a medium risk level, and if the target business party accepts the object to be assessed, for example, performs business cooperation with the object to be assessed, an early warning message may be sent to the target business party at this time to warn the target business party that the object to be assessed has a risk.
The early warning information may include a risk assessment result of the object to be assessed, in addition, processing measures of other business parties when the object to be assessed meets a risk assessment condition, and the like, and specific contents in the early warning information may be set in combination with actual requirements.
Fig. 2 is a flowchart of another embodiment of a risk assessment method provided in an embodiment of the present application, where the method may include:
201: and providing a display interface.
202: and displaying rule strategy set selection prompt information in the display interface.
Wherein the rule policy set includes at least one evaluation rule.
The rule policy set selection prompt message may include at least one policy set name of the rule policy set.
203: at least one target rule policy set selected for the target business party is determined.
Based on the user selection operation, at least one target rule policy set selected for the target business party may be determined.
Wherein, as a possible implementation manner, the system can provide at least one rule strategy set which is pre-configured.
The displaying of the rule policy set selection prompt information in the display interface may be:
and displaying selection prompt information aiming at the at least one rule and strategy set in the display interface.
At least one target rule policy set selected by the user can be determined in response to the selection operation of the selection prompt message aiming at the at least one rule policy set, and a second selection request can be sent to the server.
The selection prompt information for the at least one rule policy set may include a policy set name of the at least one rule policy set for a user to select, and the policy set name of the at least one rule policy set may be displayed in a form of a drop-down selection box, which is not specifically limited in this application.
As another possible implementation manner, displaying the rule policy set selection prompt information in the display interface may be:
and displaying selection prompt information of at least one candidate rule strategy set corresponding to the target service party in the display interface, wherein the at least one candidate rule strategy set is determined by the server side aiming at the target service party.
At least one target rule policy set selected by the user can be determined in response to the selection operation of the selection prompt message aiming at the at least one candidate rule policy set, and a second selection request can be sent to the server.
The selection prompt information for the at least one candidate rule policy set may include a policy set name of the at least one candidate rule policy set for a user to select, and the policy set name of the at least one candidate rule policy set may be displayed in a form of a drop-down selection box, which is not specifically limited in this application.
In addition, since there are many collaboration scenarios in practical applications, in some embodiments, the method may further include:
displaying selection prompt information for at least one collaboration scene in the display interface;
determining a target cooperation scene selected for a target service party;
as another possible implementation manner, the displaying of the rule policy set selection prompt information in the display interface may be:
and displaying selection prompt information of at least one candidate rule strategy set corresponding to the target cooperation scene in the display interface, wherein the at least one candidate rule strategy set is determined by the server side aiming at the target cooperation scene.
At least one target rule policy set selected by the user can be determined in response to the selection operation of the selection prompt message aiming at the at least one candidate rule policy set, and a first selection request can be sent to the server.
In addition, before displaying the rule policy set selection prompt information in the display interface, the method may further include:
and displaying the set prompt information in the display interface, so that the rule strategy set selection prompt information can be displayed in the display interface according to the trigger operation of the set prompt information.
204: and sending a risk assessment indication to a server side based on the at least one target rule strategy set.
The risk assessment instruction may instruct the server to perform risk assessment on the object to be assessed according to the assessment rule in the at least one target rule policy set.
The specific manner of performing risk assessment can be detailed in the embodiment shown in fig. 1, and is not described herein again.
Alternatively, the server performs the risk assessment method described in the embodiment shown in fig. 1, and may perform the risk assessment method in the presence of the risk assessment indication.
In certain embodiments, the method may further comprise:
displaying prompt information selected by a service party on the display interface;
and acquiring the service party identification provided by the user.
The service party selection prompt message may include a service party identification entry box for a user to enter a service party identification.
In addition, the service party selection prompt may include a service party identifier of at least one service party for user selection and the like, and the service party identifier of the at least one service party may be displayed in a form of a drop-down selection box and the like.
Sending a risk assessment indication to the server based on the at least one target rule policy set may comprise:
and sending a risk assessment instruction to a server side based on the at least one target rule strategy set and the business party identification.
The risk assessment indication may include the business party identifier and the policy set name of the at least one target rule policy set
And the server specifically evaluates the risk of the object to be evaluated aiming at the target business party corresponding to the business party identifier according to the evaluation rule in the at least one target rule policy set.
In certain embodiments, the method may further comprise:
displaying selection prompt information for at least one collaboration scene in the display interface;
determining a target cooperation scene selected for a target service party;
the sending a risk assessment indication to a server based on the at least one target rule policy set comprises:
and sending a risk assessment instruction to a server side based on the at least one target rule policy set and the target cooperation scene, wherein the risk assessment instruction specifically instructs the server side to perform risk assessment on the object to be assessed in the target cooperation scene according to the assessment rule in the at least one target rule policy set.
The selection prompt information for the at least one collaboration scene may include a scene name of the at least one collaboration scene for the user to select, and the scene name of the at least one collaboration scene may be displayed in a form of a drop-down selection box, which is not specifically limited in the present application.
In one practical application, business party selection prompt information, selection prompt information aiming at least one rule strategy set and selection prompt information aiming at least one cooperation scene can be displayed in a display interface.
Optionally, the setting prompt information may be displayed in a display interface, so that for the trigger operation of the setting prompt information, the business party selection prompt information, the selection prompt information for the at least one rule policy set, and the selection prompt information for the at least one collaboration scenario may be displayed in the display interface.
For convenience of understanding, as shown in fig. 3, a schematic diagram is displayed for a part of a display interface, and the display interface includes business party selection prompt information 301, selection prompt information 302 for at least one rule policy set, selection prompt information 303 for at least one collaboration scenario, and the like.
The selection prompt information aiming at least one rule strategy set comprises a necessary specific rule strategy set.
Setting prompt information can also be displayed in the display interface, and for the trigger operation of the setting prompt information, setting prompt boxes can be displayed, such as the business party selection prompt information 301, the selection prompt information 302 for at least one rule policy set, and the selection prompt information 303 for at least one collaboration scenario shown in fig. 3, can be displayed in the setting prompt box 30.
In certain embodiments, the method may further comprise:
displaying object checking prompt information in the display interface;
receiving an object name of an object to be evaluated, which is provided by a user;
the sending a risk assessment indication to the server based on the at least one target rule policy set comprises:
and sending a risk evaluation indication to the server side based on the at least one target rule strategy set and the object name.
Optionally, a risk assessment indication may be sent to the server based on the at least one target rule policy set, the target collaboration scenario, and the object name.
The user can provide an object name and the like for at least one object to be evaluated, the at least one object name can be input in a text input box form or obtained through uploading a file containing the object name, and the server identifies and obtains the object name from the text.
As shown in fig. 3, object ping prompt information 304 may also be displayed in the display interface, which may include a file upload box or the like so that a file containing the object name may be uploaded.
And sending a risk assessment instruction to the server side based on the at least one target rule policy set and the object name. The risk assessment indication may include the policy set name and the object name of the target rule policy set.
The server receives the risk assessment instruction, and may perform risk assessment on the object to be assessed after receiving the object assessment request.
The object evaluation request may be generated by determining whether the object to be evaluated satisfies the inspection condition or the like.
Thus, in certain embodiments, the method may further comprise:
and receiving a checking condition provided by a user and aiming at the object to be evaluated.
Specifically, a risk assessment indication is sent to the server based on the at least one target rule policy set, the object name and the inspection condition.
The server may perform risk assessment on the object to be assessed when the object to be assessed satisfies the inspection condition.
The checking condition may refer to a periodic scanning policy or a condition that meets a target service node, so that the server may perform risk assessment on the object to be assessed periodically or when detecting that the object to be assessed is located at the target service node.
In certain embodiments, the method may further comprise:
displaying object evaluation prompt information in the display interface;
responding to the trigger operation aiming at the object evaluation prompt information, and sending an object evaluation request to a server; the object evaluation request comprises an object name of an object to be evaluated; and after receiving the object evaluation request, the server side performs risk evaluation on the object to be evaluated according to the evaluation rule in the at least one target rule policy set.
After determining the at least one rule policy set, object evaluation prompt information may also be displayed in a display interface, such as object evaluation prompt information 401 in at least a partial schematic diagram of the display interface shown in fig. 4.
The object evaluation prompt message may include an input box 41 and a trigger control 42, and the user may input the object name in the input box 41 and then operate the trigger control 42, i.e. may request the server for object evaluation.
In one possible implementation, the risk assessment indication may be a request for an assessment of the subject. Therefore, in response to the trigger operation for the object evaluation prompt information, a risk evaluation indication may be sent to the server based on the at least one target rule policy set and the object name provided by the user, and the server receives the risk evaluation indication, that is, the risk evaluation may be immediately performed on the object to be evaluated.
In some embodiments, before sending the risk assessment indication to the server based on the at least one target rule policy set, the method may further include:
and responding to a policy set updating operation aiming at the at least one target rule policy set, and sending a policy set updating request to a server side so that the server side can update the at least one target rule policy set.
The policy set updating operation can be triggered and implemented by aiming at the selection prompt information of at least one rule policy set in the setting prompt box so as to reselect the target rule policy set.
After at least one target rule policy set is determined, the setting prompt information can be updated to the adjustment prompt information, so that the setting prompt box can be displayed aiming at the trigger operation of the adjustment prompt information, and the updating of the target rule policy set, the target service party or the target cooperation scene and the like can be realized.
In addition, a policy set update prompt message for the at least one target rule policy set may be displayed in the display interface. Of course, the rule update prompt information may be displayed in the setting prompt information, and the like.
Thus, in certain embodiments, the method may further comprise:
and responding to the updating operation aiming at the target service party, and sending a service party updating request to the server, wherein the service party updating request comprises a service party identifier to be updated.
In certain embodiments, the method may further comprise:
and responding to the updating operation aiming at the target cooperation scene, and sending a scene updating request to a server side, wherein the service side updating request comprises a scene identifier to be updated and the like.
In some embodiments, before sending the risk assessment indication to the server based on the at least one target rule policy set, the method may further include:
displaying rule update prompt information aiming at the at least one target rule strategy set in the display interface;
and responding to a rule updating operation aiming at any target rule policy set, and sending a rule updating request to a server side so that the server side can update the evaluation rule in any target rule policy set.
The rule update operation may include an add, delete, or modify operation, etc.
After the target rule policy set is determined, prompt information of the target rule policy set can be displayed in a display interface. And aiming at the triggering operation of the prompt message of any target rule policy set, displaying at least one evaluation rule in any target rule policy set. Such that a rule update operation or the like can be initiated based on the at least one evaluation rule.
In certain embodiments, the method may further comprise:
displaying strategy set configuration prompt information in the display interface;
generating a policy set configuration request based on trigger operation aiming at the policy set configuration prompt message;
sending the policy set configuration request to a server side so that the server side can store a rule policy set generated by configuration;
as shown in fig. 5, the policy set configuration prompt message may include a policy set name input prompt message 51, an evaluation rule selection prompt message 52, a business party name input prompt message 53, a collaboration scenario name input prompt message 54, etc., may further include a policy set principal input prompt message, etc., may further include a confirmation control, etc., so as to trigger the confirmation control and generate a policy set configuration request, and may of course include other operation controls for implementing some necessary operations, which is not particularly limited in this application.
Therefore, the policy set configuration request may include a policy set name, a rule name of at least one evaluation rule included in the policy set configuration request, and a business party name and/or a collaboration scene name, so that a rule policy set for a certain business party or a certain collaboration scene may be generated, and a corresponding relationship between an evaluation rule and a business party or a collaboration scene may be established.
The first prompt message may be displayed in a display interface, and based on a trigger operation for the first prompt message, the policy set configuration prompt message may be displayed in the display interface, as shown in fig. 5.
Further, in certain embodiments, the method may further comprise:
displaying rule configuration prompt information in the display interface;
generating a rule configuration request based on a trigger operation aiming at the rule configuration prompt information;
and sending the rule configuration request to a server side, so that the server side can store the evaluation rule generated by configuration.
The rule configuration prompt information may include rule name input prompt information, evaluation condition input prompt information, risk level input prompt information, risk processing suggestion input prompt information, and the like, so that a user may input a rule name, set an evaluation condition, a risk level corresponding to the evaluation condition, risk processing suggestion information corresponding to different risk levels, and the like.
Therefore, the rule configuration request may include a rule name, an evaluation condition, and risk processing suggestion information, so that the evaluation rule may be configured and generated.
The second prompt information can be displayed in the display interface, and based on the trigger operation for the second prompt information, the rule configuration prompt information can be displayed in the display interface.
As shown in fig. 6, a possible schematic diagram of the rule configuration prompt information is shown.
Optionally, after the rule update prompting information for the at least one target rule policy set is displayed in the display interface, if the rule update operation is an addition operation or a modification operation, in response to a trigger operation of updating the prompting information for a rule corresponding to any target rule policy set, rule configuration prompting information may be output, as shown in fig. 6. The rule updating operation for any target rule policy set may also be an input operation for configuring prompt information for the rule.
In certain embodiments, the method may further comprise:
displaying strategy set updating prompt information aiming at least one rule strategy set in the display interface;
and responding to a policy set updating operation aiming at the at least one target rule policy set, and sending a policy set updating request to a server side so that the server side can update the at least one target rule policy set.
In certain embodiments, the method may further comprise:
displaying rule update prompt information aiming at the at least one rule strategy set in the display interface;
and responding to the rule updating operation aiming at any rule policy set, and sending a rule updating request to a server side so that the server side can update the evaluation rule in any target rule policy set.
Alternatively, if the rule updating operation is an adding operation or a modifying operation, the rule configuration prompt information may be output based on a trigger operation of updating the prompt information for the rule corresponding to any rule policy set, as shown in fig. 6. The rule update operation for any rule policy set may refer to a trigger operation for configuring the hint information for the rule.
In certain embodiments, the method may further comprise:
acquiring a risk evaluation result sent by the server;
and displaying the risk assessment result.
In addition, the rule policy set includes evaluation rules corresponding to different risk dimensions, so that the risk evaluation result of the object to be evaluated may include risk evaluation results corresponding to different risk dimensions, and thus, in some embodiments, the method may further include:
acquiring risk evaluation results of different risk dimensions corresponding to an object to be evaluated;
and displaying the risk evaluation results corresponding to the different risk dimensions.
The risk assessment results corresponding to different risk dimensions include risk levels or risk warning information, optionally, data assessment results corresponding to different assessment rules under different risk dimensions may be included, and the data assessment results may include the data assessment levels or the risk warning information, and the like.
As shown in fig. 7, the display interface shown includes risk assessment results 701 corresponding to different risk dimensions, and specific identification information and the like may be set for the high risk dimension.
When any risk dimension is viewed, the risk detail information corresponding to the risk dimension can be displayed, and the risk detail information can include different evaluation rules corresponding to the risk dimension, namely data evaluation results for different data categories and the like.
In addition, in some embodiments, generating risk processing recommendation information for the risk assessment result may also be obtained.
And displaying the risk processing suggestion information.
Wherein the risk processing advice information generated for the risk assessment result is acquired. The risk processing recommendation information corresponding to different risk dimensions may be specifically acquired.
Optionally, the obtaining risk processing recommendation information corresponding to different risk dimensions may be:
and when the viewing operation aiming at any risk dimension is responded, risk processing suggestion information corresponding to different risk dimensions is acquired.
As illustrated in fig. 7, risk detail 702 of the first risk dimension is shown, including the risk processing recommendation information 703.
Wherein the risk handling recommendation information may be generated only for high risk data categories.
In addition, basic information of the object to be evaluated can be output in the display interface, for example, when the rule to be evaluated is a business, the business name, the establishment time, the registered capital and the like can be included.
In addition, the server side comprehensively processes risk evaluation results of different risk dimensions, and can also obtain the comprehensive evaluation results and generate risk processing suggestion information corresponding to the comprehensive evaluation results. Therefore, the comprehensive evaluation result and the like, such as the comprehensive evaluation result 704 shown in fig. 6 and the risk processing advice information 705 corresponding to the comprehensive evaluation result, may also be displayed in the display interface.
The technical scheme of the application can be applied to an enterprise risk assessment scene, namely, the object to be assessed can be an enterprise to be assessed, for a large organization, a plurality of business parties are usually divided, and each business party has enterprise cooperation requirements. In order to ensure operation safety and the like, risk assessment needs to be performed on enterprises.
In a practical application, by using the technical solution of the embodiment of the present application, as shown in fig. 8, relevant personnel such as managers of a target service party can select at least one target rule policy set for the target service party or a target cooperation scenario through a client 801, and notify a server 802. The server 802 may store the at least one target rule policy set corresponding to a target business party or a target collaboration scenario.
A common user may select a target service party or a target collaboration scenario through the client 803, and the server 802 may determine at least one corresponding target rule policy set.
An ordinary user inputs an enterprise name of an enterprise to be evaluated through the client 803 to trigger an enterprise evaluation request, and sends the enterprise evaluation request to the server 802, at this time, the server 802 can perform risk evaluation on the enterprise to be evaluated according to the evaluation rule in the at least one target rule policy set to obtain a risk evaluation result, and can send third risk prompt information generated based on the risk evaluation result to the client 803, and the client 803 outputs the third risk prompt information for the user to view.
In addition, the administrator may also set a periodic scanning policy for the enterprise to be evaluated through the client 802, so that the server 802 may periodically perform risk assessment on the enterprise to be evaluated according to the at least one target rule policy set. Of course, the server 802 may also perform risk assessment on the enterprise to be assessed according to the at least one target rule policy set when the enterprise to be assessed is located at the target business node.
Based on the risk assessment result, the server 802 may send risk prompting information to the target business party 804 or at least one associated business party 805 associated with the enterprise to be assessed (where the associated business party refers to a business manner that the enterprise to be assessed has an association relationship, and specifically may have a cooperative relationship with the enterprise to be assessed or intentionally develop a cooperative relationship, or have a cooperative relationship with the enterprise to be assessed in a target cooperative scenario or intentionally develop a cooperative relationship with the enterprise to be assessed) and the like.
In addition, the server 802 may also periodically obtain risk data of different enterprises, and store the risk data of each enterprise into the risk database 806 according to different data categories. Therefore, when risk assessment is carried out on the enterprise to be assessed, relevant data can be directly obtained from the risk database.
The technical scheme of the embodiment of the application can also be applied to risk assessment scenes of organizations such as finance, banks, insurance or securities and the like so as to carry out risk assessment on lenders, trusted parties, policemen, ticket purchasers and the like. The object to be evaluated may be a lender, a trusted party, a policyholder, a ticket purchaser, which may be a business, a group, or an independent person, etc.
In addition, the technical scheme of the embodiment of the application can be applied to enterprise litigation scenes, so that whether litigation is performed or not can be determined by combining risk evaluation results, and of course, whether litigation is performed or not can be used as risk processing suggestion information.
Fig. 9 is a flowchart of another embodiment of a risk assessment method provided in the embodiment of the present application, which may include the following steps:
901: and receiving a risk evaluation request triggered by a user, and determining an object to be evaluated.
The risk assessment request may include an object name provided by a user, so that the object to be assessed identified by the object name may be determined according to the object name.
902: at least one evaluation rule is determined.
Optionally, at least one target rule policy set may be determined from at least one rule policy set, and each target rule policy set includes at least one evaluation rule.
Optionally, the at least one evaluation rule may also be a pre-configured evaluation rule applicable to all objects.
Furthermore, as an alternative:
at least one evaluation rule corresponding to the object to be evaluated may be determined.
The evaluation rules corresponding to different object types can be preset, so that at least one corresponding evaluation rule can be determined according to the object type of the object to be evaluated. The object type may be divided in connection with the actual situation.
As another alternative:
may be target identity information identifying the user; and determining at least one evaluation rule corresponding to the target identity information.
Alternatively, the identity information may refer to job information or the like, for example. In a scenario of risk assessment for a business in an organization, users in the organization may initiate a risk assessment request, and because different users have different identities in the organization, the directions of risks that they need to know are different. Each evaluation rule corresponds to a data category and is used for performing risk evaluation on the risk data of the corresponding data category, so that the evaluation rules corresponding to different identity information can be preset to perform risk evaluation on the risk data of different data categories in combination with different identity information, and risk evaluation results obtained by users with different identities are possibly different.
For example, when the object to be evaluated is an enterprise, the risk in the financial aspect is more concerned about the CFO in the organization, so the evaluation rule for the financial data category can be selected; for CLO, legal risks and the like are more concerned, and therefore, evaluation rules for litigation, dispute categories, and the like may be selected.
903: and according to the at least one evaluation rule, performing risk evaluation on the object to be evaluated to obtain a risk evaluation result.
Optionally, risk assessment may be performed on the risk data of the data category corresponding to the at least one assessment rule related to the object to be assessed according to at least one assessment rule, so as to obtain a risk assessment result.
904: and outputting risk prompt information based on the risk assessment result.
Wherein, the risk prompt message may include the risk assessment result.
Further, determining at least one evaluation rule may be determining evaluation rules corresponding to different risk dimensions.
Then, according to the at least one evaluation rule, performing risk evaluation on the object to be evaluated, so as to obtain risk evaluation results corresponding to different risk dimensions, where the risk prompt information may include the risk evaluation results corresponding to the different risk dimensions. In addition, risk assessment results of different risk dimensions can be comprehensively processed to obtain a comprehensive risk assessment result, and the comprehensive risk assessment result can be further obtained in the risk prompt information.
Wherein, an evaluation rule corresponding to at least one risk dimension related to the target identity information can be determined according to the target identity information.
In certain embodiments, the method may further comprise:
generating risk processing suggestion information according to the risk evaluation result;
and outputting the risk processing suggestion information.
Optionally, since the user identity information may be identified, in some embodiments, the risk processing suggestion information may be generated according to the risk assessment result and the target identity information.
Namely, target identity information is combined to generate targeted risk processing suggestion information and the like.
The technical scheme of the embodiment of the application can be applied to organizations such as finance, banks, insurance or securities and the like, and organizations such as large groups and the like, and can be used for carrying out risk assessment on enterprises. In addition, the method can also be applied to asset evaluation scenes, such as family asset evaluation scenes.
Therefore, in some embodiments, the performing risk assessment on the object to be assessed according to the at least one assessment rule, and obtaining a risk assessment result includes:
determining the target assets expected to be consumed by the object to be evaluated;
and performing risk assessment on the object to be assessed according to the at least one assessment rule by combining the target asset to obtain a risk assessment result.
The object to be evaluated may specifically refer to a certain family expense transaction, such as a commodity expected to be purchased, for example. The target property of the object to be evaluated may be provided by a user or determined based on market conditions.
The at least one evaluation rule may include an asset evaluation rule, which may specifically be a risk evaluation for the object to be evaluated in combination with the remaining assets and the target assets. For example, the asset assessment rule may indicate that the difference between the remaining asset and the target asset is less than a predetermined value, and the risk assessment result is high risk. In addition, risk processing suggestion information can be output according to the risk assessment result, for example, the risk processing suggestion information corresponding to high risk can be, for example, suggestion purchase or suggestion cancellation purchase plan for X months recently, and the like.
In addition, corresponding to the risk assessment method shown in fig. 9, from the perspective of execution by a client, an embodiment of the present application further provides a risk assessment method, including:
providing a display interface;
displaying object evaluation prompt information in the display interface;
responding to the trigger operation aiming at the object evaluation prompt information, sending an object evaluation request to a server side, so that the server side can determine an object to be evaluated, determine at least one evaluation rule, and carry out risk evaluation on the object to be evaluated according to the at least one evaluation rule to obtain a risk evaluation result;
and displaying risk prompt information. And the risk prompt information is generated by the server side based on the risk assessment result.
In addition, the method can further comprise the following steps:
and displaying risk processing suggestion information. And the risk processing suggestion information is generated by the server side based on the risk assessment result.
The object evaluation prompt information may include an input box, so that a user may input an object name of an object to be evaluated, and the like, where the object evaluation request includes the object name, so that the server determines the object to be evaluated identified by the object name, and the like.
Fig. 10 is a flowchart of another embodiment of a risk assessment method provided in the embodiment of the present application, which may include the following steps:
1001: and acquiring the risk data of the object to be evaluated.
1002: and determining at least one evaluation rule corresponding to the risk data.
Optionally, at least one target rule policy set corresponding to the risk data may be determined from at least one rule policy set, where the target rule policy set includes at least one evaluation rule.
Further, the risk data may include relevant data of at least one data category; thus, it is also possible to determine the corresponding at least one evaluation rule in connection with at least one data category to which the risk data relates.
1003: and performing risk assessment on the risk data according to the at least one assessment rule to obtain a risk assessment result of the object to be assessed.
1004: and outputting risk prompt information based on the risk assessment result.
Wherein, the risk prompt message may include the risk assessment result.
Furthermore, risk processing advice information and the like may also be output based on the risk assessment result.
The risk data of the object to be evaluated can be obtained in real time or periodically, or when an object evaluation request aiming at the object to be evaluated is received, the risk data of the object to be evaluated is obtained, so that risk prediction can be realized.
The risk data may include data related to at least one data category, and for an enterprise as the object to be assessed, the risk data may be obtained from an official agency, such as a business agency, a court agency, a media agency, or the like.
Furthermore, in some embodiments, obtaining risk data for the subject to be assessed may include:
acquiring risk data of an object to be evaluated at the current moment and historical risk data, wherein the historical risk data can comprise risk data and the like produced within a certain time length range from the current moment. Therefore, the risk evaluation can be specifically performed on the risk data at the current moment and the historical risk data according to at least one evaluation rule, and a risk evaluation result and the like can be obtained.
Through the technical scheme of the embodiment, when the risk data is output, risk prediction can be made in time, and risk prompt information, risk processing suggestion information and the like are output.
Fig. 11 is a schematic structural diagram of an embodiment of a risk assessment apparatus provided in an embodiment of the present application, where the apparatus may include:
a policy providing module 1101 for providing at least one rule policy set; the rule policy set comprises at least one evaluation rule;
a rule determining module 1102, configured to determine at least one target rule policy set corresponding to a target service party from the at least one rule policy set;
the evaluation processing module 1103 is configured to perform risk evaluation on the related data of the object to be evaluated according to the evaluation rule in the at least one target rule policy set, so as to obtain a risk evaluation result of the object to be evaluated.
In some embodiments, the apparatus may further comprise:
a scenario providing module for providing at least one collaboration scenario;
a scene determination module for determining a target collaboration scene from the at least one collaboration scene;
the rule determining module is specifically configured to determine, from the at least one rule policy set, at least one target rule policy set corresponding to a target service provider in the target collaboration scenario;
the evaluation processing module is specifically configured to perform risk evaluation on the relevant data of the object to be evaluated according to the evaluation rule in the at least one target rule policy set, so as to obtain a risk evaluation result of the object to be evaluated in the target service scenario.
In some embodiments, the evaluation processing module is specifically configured to determine, from the at least one rule policy set, at least one candidate rule policy set corresponding to the target collaboration scenario according to a correspondence between a collaboration scenario and the rule policy set; outputting selection prompt information aiming at the at least one candidate rule strategy set; determining at least one target rule policy set selected from the at least one candidate rule policy set based on a user-triggered first selection request.
In some embodiments, the evaluation processing module is specifically configured to perform risk evaluation on related data of an object to be evaluated according to an evaluation rule in the at least one target rule policy set, so as to obtain a candidate evaluation result of the object to be evaluated in the target cooperation scenario; acquiring a risk evaluation result of the object to be evaluated in at least one cooperation scene different from the target cooperation scene; and comprehensively processing the risk evaluation result and the candidate evaluation result in the at least one cooperation scene to obtain the risk evaluation result of the object to be evaluated in the target cooperation scene.
In some embodiments, the apparatus may further comprise:
and the service party determining module is used for determining a target service party according to the service party identifier provided by the user.
In some embodiments, the rule determination module is specifically configured to output selection prompt information for at least one rule policy set; and determining at least one target rule policy set selected for the target service party from the at least one rule policy set based on a second selection request triggered by the user.
In some embodiments, the rule determining module determines, based on a second user-triggered selection request, at least one target rule policy set selected for the target business party from the at least one rule policy set, including: and determining at least one target rule policy set corresponding to the target service party according to the specific rule policy set and a second selection request triggered by the user.
In some embodiments, the evaluation processing module is specifically configured to perform risk evaluation on the relevant data of the object to be evaluated according to the evaluation rule in the at least one target rule policy set, so as to obtain a candidate evaluation result of the object to be evaluated; acquiring risk evaluation results of the object to be evaluated corresponding to at least one business party different from the target business party respectively; and comprehensively processing the risk evaluation result of the at least one business party and the candidate evaluation result to obtain a risk evaluation result of the object to be evaluated corresponding to the target business party.
In some embodiments, the apparatus may further comprise:
the first policy set updating module is used for receiving a policy set updating request aiming at the at least one target rule policy set and updating the at least one target rule policy set.
In some embodiments, the apparatus may further comprise:
and the first rule updating module is used for receiving a rule updating request aiming at any target rule policy set and updating the evaluation rules in the target rule policy set.
In some embodiments, the rule update request includes a user identification;
the first rule updating module updates the evaluation rules in the target rule policy set by: judging whether the user identification has an updating authority; and if so, updating the evaluation rule in the target rule policy set.
In some embodiments, the first rule update module is specifically configured to determine the update content based on a rule modification request for any one of the evaluation rules; and if the updating content meets the updating requirement corresponding to the evaluation rule, updating the evaluation rule.
In some embodiments, the apparatus may further comprise:
and the second policy set updating module is used for receiving a policy set updating request aiming at the at least one rule policy set and updating the at least one rule policy set.
In some embodiments, the apparatus may further comprise:
and the second rule updating module is used for receiving a rule updating request aiming at any rule policy set and updating the evaluation rules in the rule policy set.
In some embodiments, the apparatus may further comprise:
the data acquisition module is used for acquiring risk data of different evaluation objects; classifying and storing the risk data of different evaluation objects according to the data types corresponding to different evaluation rules;
the evaluation processing module is specifically configured to evaluate, according to an evaluation rule in the at least one target rule policy set, related data related to a data category corresponding to the evaluation rule in an object to be evaluated, and obtain a risk evaluation result of the object to be evaluated.
In some embodiments, the data obtaining module obtaining risk data of different assessment subjects includes:
acquiring external risk data and internal risk data of different evaluation objects, wherein the external risk data comprise related output data of an official agency aiming at the evaluation objects, and the internal risk data are related output data of the target business aiming at the evaluation objects.
In some embodiments, the evaluation processing module is specifically configured to respond to a subject evaluation request for the subject to be evaluated; and according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a risk evaluation result of the object to be evaluated.
In some embodiments, the apparatus may further comprise:
the first request generation module is used for periodically generating an object evaluation request for the object to be evaluated based on the periodic scanning strategy for the object to be evaluated.
In some embodiments, the apparatus may further comprise:
and the second request generation module is used for receiving an object evaluation request triggered by a user aiming at the object to be evaluated.
In some embodiments, the apparatus may further comprise:
and the third request generation module is used for detecting that the object to be evaluated is positioned at the target service node and generating the object evaluation request.
In some embodiments, the apparatus may further comprise:
the first processing module is used for generating risk processing suggestion information based on the risk assessment result; and outputting the risk evaluation result and the risk processing suggestion information.
In some embodiments, the apparatus may further comprise:
and the second processing module is used for sending first risk prompt information to the target business party based on the risk assessment result.
In some embodiments, the apparatus may further comprise:
and the third processing module is used for sending second risk prompt information to at least one business party associated with the object to be evaluated based on the risk evaluation result.
In some embodiments, the third processing module is specifically configured to send, based on the risk assessment result, second risk prompt information to at least one service party associated with the object to be assessed in the target cooperation scenario.
In some embodiments, the apparatus may further comprise:
the feedback processing module is used for receiving risk feedback contents fed back by the target business party based on a risk evaluation result; and taking the risk feedback content as the risk data of the object to be evaluated.
In some embodiments, the rule policy set includes evaluation rules corresponding to different risk dimensions;
the evaluation processing module is specifically configured to perform risk evaluation on the object to be evaluated in different risk dimensions according to the evaluation rules corresponding to different risk dimensions in the at least one target rule policy set in combination with the relevant data of the object to be evaluated, so as to obtain risk evaluation results corresponding to different risk dimensions.
In some embodiments, the apparatus may further comprise:
and the fourth processing module is used for obtaining a comprehensive evaluation result based on the risk evaluation results of different risk dimensions.
In some embodiments, the apparatus may further comprise:
and the fifth processing module is used for sending early warning information to the target business party if the risk evaluation result meets the risk evaluation condition and the target business party receives the object to be evaluated.
The risk assessment apparatus shown in fig. 11 may execute the risk assessment method shown in the embodiment shown in fig. 1, and the implementation principle and the technical effect are not repeated. The specific manner in which each module and unit of the risk assessment device in the above embodiments perform operations has been described in detail in the embodiments related to the method, and will not be described in detail herein.
Fig. 12 is a schematic structural diagram of an embodiment of a risk assessment apparatus according to the present application, where the apparatus may include:
an interface providing module 1201, configured to provide a display interface;
a display module 1202, configured to display rule policy set selection prompt information in the display interface; the rule policy set comprises at least one evaluation rule;
a selecting module 1203, configured to determine at least one target rule policy set selected for a target service party;
an indicating module 1204, configured to send a risk assessment indication to the server based on the at least one target rule policy set, where the risk assessment indication is used to indicate the server to perform risk assessment on the object to be assessed according to the assessment rule in the at least one target rule policy set.
In some embodiments, the display module is further configured to display a service party selection prompt message on the display interface; acquiring a service party identifier provided by a user;
the indication module is specifically configured to send a risk assessment indication to the server based on the at least one target rule policy set and the service party identifier.
In some embodiments, the display module is further configured to display selection prompt information for at least one collaboration scene in the display interface; determining a target cooperation scene selected for a target service party;
the indicating module is specifically configured to send a risk assessment indication to a server based on the at least one target rule policy set and the target cooperation scenario, where the risk assessment indication specifically indicates that the server performs risk assessment on an object to be assessed in the target cooperation scenario according to an assessment rule in the at least one target rule policy set.
In some embodiments, the display module is further configured to display a policy set update hint information for the at least one target rule policy set in the display interface;
the apparatus may further include:
and the policy set updating request module is used for responding to a policy set updating operation aiming at the at least one target rule policy set and sending a policy set updating request to the server so that the server can update the at least one target rule policy set.
In some embodiments, the display module is further configured to display a rule update prompt message for the at least one target rule policy set in the display interface;
the apparatus may further include:
and the rule updating request module is used for responding to the rule updating operation aiming at any target rule policy set and sending a rule updating request to the server so that the server can update the evaluation rule in any target rule policy set.
In some embodiments, the display module is further configured to display configuration prompt information in the display interface;
the apparatus may further include:
the rule configuration module is used for displaying a strategy set configuration page based on the trigger operation of the configuration prompt information; and sending a configuration request to a server side based on the configuration operation in the policy set configuration page so that the server side can store the rule policy set generated by configuration.
In some embodiments, the display module is further configured to display an object assessment prompt in the display interface;
the apparatus may further include:
the object evaluation request module is used for responding to the trigger operation aiming at the object evaluation prompt information and sending an object evaluation request to the server; the object evaluation request comprises an object name of an object to be evaluated; and after receiving the object evaluation request, the server side performs risk evaluation on the object to be evaluated according to the evaluation rule in the at least one target rule policy set.
In some embodiments, the display module is further configured to obtain a risk assessment result sent by the server; and displaying the risk assessment result.
In some embodiments, the rule policy set includes evaluation rules corresponding to different risk dimensions, and the display module is further configured to: acquiring risk evaluation results of different risk dimensions corresponding to an object to be evaluated; and displaying the risk evaluation results corresponding to the different risk dimensions.
In some embodiments, the display module is further configured to obtain risk processing recommendation information generated for the risk assessment result; and displaying the risk processing suggestion information.
The risk assessment apparatus shown in fig. 12 may execute the risk assessment method shown in the embodiment shown in fig. 2, and the implementation principle and the technical effect are not repeated. The specific manner in which each module and unit of the risk assessment device in the above embodiments perform operations has been described in detail in the embodiments related to the method, and will not be described in detail herein.
Fig. 13 is a schematic structural diagram of an embodiment of a risk assessment apparatus according to the present application, where the apparatus may include:
a request receiving module 1301, configured to receive a risk assessment request triggered by a user, and determine an object to be assessed;
a first determining module 1302 for determining at least one evaluation rule;
the first processing module 1303 is configured to perform risk assessment on the object to be assessed according to the at least one assessment rule, so as to obtain a risk assessment result;
and a first prompt module 1304, configured to output risk prompt information based on the risk assessment result.
The risk assessment apparatus shown in fig. 13 may execute the risk assessment method shown in the embodiment shown in fig. 9, and the implementation principle and the technical effect are not repeated.
Fig. 14 is a schematic structural diagram of an embodiment of a risk assessment apparatus according to the present application, where the apparatus may include:
a data obtaining module 1401, configured to obtain risk data of an object to be evaluated;
a second determining module 1402, configured to determine at least one evaluation rule corresponding to the risk data;
a second processing module 1403, configured to perform risk assessment on the risk data according to the at least one assessment rule, so as to obtain a risk assessment result of the object to be assessed;
and a second prompt module 1404, configured to output risk prompt information based on the risk assessment result.
The risk assessment apparatus shown in fig. 14 may execute the risk assessment method shown in the embodiment shown in fig. 10, and the implementation principle and the technical effect are not repeated.
In one possible design, the risk assessment apparatus of the embodiment shown in fig. 11 may be implemented as a computing device, which may include a storage component 1501 and a processing component 1502 as shown in fig. 15;
the storage component 1501 stores one or more computer instructions for execution by the processing component calls 1502.
The processing component 1502 is configured to:
providing at least one rule policy set; the rule policy set comprises at least one evaluation rule;
determining at least one target rule strategy set corresponding to a target service party from the at least one rule strategy set;
and according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a risk evaluation result of the object to be evaluated.
Of course, a computing device may also necessarily include other components, such as input/output interfaces, communication components, and so forth.
The input/output interface provides an interface between the processing components and peripheral interface modules, which may be output devices, input devices, etc.
The communication component is configured to facilitate wired or wireless communication between the computing device and other devices, and the like.
As used herein, a "computing device" may be a remote web server, a computer networking device, a chipset, a desktop computer, a notebook computer, a workstation, or any other processing device or equipment.
The computing device may be a physical device or an elastic computing host provided by a cloud computing platform, and the computing device may be a cloud server, and the processing component, the storage component, and the like may be a basic server resource rented or purchased from the cloud computing platform.
An embodiment of the present application further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a computer, the risk assessment method according to the embodiment shown in fig. 1 may be implemented.
In one possible design, the risk assessment device of the embodiment shown in fig. 12 may be implemented as a terminal, as shown in fig. 16, which may include a storage component 1601, a display component 1602, and a processing component 1603;
the storage component 1601 stores one or more computer instructions, where the one or more computer instructions are invoked for execution by the processing component 1603.
The processing component 1603 is to:
providing a display interface via the display component 1602;
displaying a rule strategy set selection prompt message in the display interface; the rule policy set comprises at least one evaluation rule;
determining at least one target rule policy set selected for a target business party;
and sending a risk assessment instruction to a server based on the at least one target rule policy set, wherein the risk assessment instruction is used for instructing the server to perform risk assessment on the object to be assessed according to the assessment rules in the at least one target rule policy set.
Of course, the terminal may of course also comprise other components, such as input/output interfaces, communication components, etc.
The input/output interface provides an interface between the processing components and peripheral interface modules, which may be output devices, input devices, etc.
The communication component is configured to facilitate wired or wireless communication between the terminal and other devices, and the like.
The terminal can refer to a mobile phone, a tablet computer, a personal computer and the like in practical application,
an embodiment of the present application further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a computer, the method for risk assessment according to the embodiment shown in fig. 2 may be implemented.
In one possible design, the risk assessment apparatus of the embodiment shown in FIG. 13 may be implemented as a computing device, which may include a storage component and a processing component;
the storage component stores one or more computer instructions, wherein the one or more computer instructions are for execution invoked by the processing component.
The processing component is to:
receiving a risk evaluation request triggered by a user, and determining an object to be evaluated;
determining at least one evaluation rule;
according to the at least one evaluation rule, performing risk evaluation on the object to be evaluated to obtain a risk evaluation result;
and outputting risk prompt information based on the risk assessment result.
An embodiment of the present application further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a computer, the risk assessment method according to the embodiment shown in fig. 9 may be implemented.
In one possible design, the risk assessment apparatus of the embodiment shown in FIG. 14 may be implemented as a computing device, which may include a storage component and a processing component;
the storage component stores one or more computer instructions, wherein the one or more computer instructions are for execution invoked by the processing component.
The processing component is to:
acquiring risk data of an object to be evaluated;
determining at least one evaluation rule corresponding to the risk data;
performing risk assessment on the risk data according to the at least one assessment rule to obtain a risk assessment result of the object to be assessed;
and outputting risk prompt information based on the risk assessment result.
An embodiment of the present application further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a computer, the risk assessment method according to the embodiment shown in fig. 10 may be implemented.
The processing components referred to herein may include one or more processors executing computer instructions to perform all or part of the steps of the methods described above. Of course, the processing elements may also be implemented as one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components configured to perform the above-described methods.
The storage components referred to herein may be configured to store various types of data to support operations at the respective devices. The memory components may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The display element referred to herein may be an Electroluminescent (EL) element, a liquid crystal display or a micro display having a similar structure, or a laser scanning type display in which the retina can directly display or the like.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (51)

1. A method of risk assessment, comprising:
providing at least one rule policy set; the rule policy set comprises at least one evaluation rule;
determining at least one target rule strategy set corresponding to a target service party from the at least one rule strategy set;
and according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a risk evaluation result of the object to be evaluated.
2. The method of claim 1, further comprising:
providing at least one collaboration scenario;
determining a target collaboration scene from the at least one collaboration scene;
the determining, from the at least one rule policy set, at least one target rule policy set corresponding to a target service party includes:
determining at least one target rule strategy set corresponding to a target service party in the target cooperation scene from the at least one rule strategy set;
the performing risk assessment on the relevant data of the object to be assessed according to the assessment rule in the at least one target rule policy set to obtain a risk assessment result of the object to be assessed includes:
and according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a risk evaluation result of the object to be evaluated in the target business scene.
3. The method of claim 2, wherein the determining, from the at least one rule policy set, at least one target rule policy set corresponding to a target business party in the target collaboration scenario comprises:
determining at least one candidate rule strategy set corresponding to the target cooperation scene from the at least one rule strategy set according to the corresponding relation between the cooperation scene and the rule strategy set;
outputting selection prompt information aiming at the at least one candidate rule strategy set;
determining at least one target rule policy set selected from the at least one candidate rule policy set based on a user-triggered first selection request.
4. The method according to claim 2, wherein the performing risk assessment on the relevant data of the object to be assessed according to the assessment rule in the at least one target rule policy set, and obtaining a risk assessment result of the object to be assessed in the target business scenario includes:
according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a candidate evaluation result of the object to be evaluated in the target cooperation scene;
acquiring a risk evaluation result of the object to be evaluated in at least one cooperation scene different from the target cooperation scene;
and comprehensively processing the risk evaluation result and the candidate evaluation result in the at least one cooperation scene to obtain the risk evaluation result of the object to be evaluated in the target cooperation scene.
5. The method of claim 1, further comprising:
and determining a target service party according to the service party identifier provided by the user.
6. The method of claim 1, wherein the determining, from the at least one rule policy set, at least one target rule policy set corresponding to a target business party comprises:
outputting selection prompt information aiming at least one rule strategy set;
and determining at least one target rule policy set selected for the target service party from the at least one rule policy set based on a second selection request triggered by the user.
7. The method of claim 6, wherein the determining, based on a second user-triggered selection request, at least one target rule policy set selected for the target business party from the at least one rule policy set comprises:
and determining at least one target rule policy set corresponding to the target service party according to the specific rule policy set and a second selection request triggered by the user.
8. The method according to claim 1, wherein the performing risk assessment on the relevant data of the object to be assessed according to the assessment rule in the at least one target rule policy set, and obtaining a risk assessment result of the object to be assessed comprises:
according to the evaluation rule in the at least one target rule strategy set, carrying out risk evaluation on the related data of the object to be evaluated to obtain a candidate evaluation result of the object to be evaluated;
acquiring risk evaluation results of the object to be evaluated corresponding to at least one business party different from the target business party respectively;
and comprehensively processing the risk evaluation result of the at least one business party and the candidate evaluation result to obtain a risk evaluation result of the object to be evaluated corresponding to the target business party.
9. The method according to claim 1, wherein after determining at least one target rule policy set corresponding to a target service party from the at least one rule policy set, further comprising:
and receiving a policy set updating request aiming at the at least one target rule policy set, and updating the at least one target rule policy set.
10. The method according to claim 1, wherein after determining at least one target rule policy set corresponding to a target service party from the at least one rule policy set, further comprising:
receiving a rule updating request aiming at any target rule policy set, and updating the evaluation rules in the target rule policy set.
11. The method of claim 10, wherein the rule update request includes a user identification;
the updating the evaluation rules in the target rule policy set comprises:
judging whether the user identification has an updating authority;
and if so, updating the evaluation rule in the target rule policy set.
12. The method of claim 10, wherein receiving a rule update request for any one of the target rule policy sets, wherein updating the evaluation rules in the target rule policy set comprises:
determining update content based on a rule modification request for any evaluation rule in any target rule policy set;
and if the updating content meets the updating requirement corresponding to the evaluation rule, updating the evaluation rule.
13. The method of claim 1, further comprising:
and receiving a policy set updating request aiming at the at least one rule policy set, and updating the at least one rule policy set.
14. The method of claim 1, further comprising:
receiving a rule updating request aiming at any rule policy set, and updating the evaluation rules in the rule policy set.
15. The method of claim 1, further comprising:
acquiring risk data of different evaluation objects;
classifying and storing the risk data of different evaluation objects according to the data types corresponding to different evaluation rules;
the performing risk assessment on the relevant data of the object to be assessed according to the assessment rule in the at least one target rule policy set to obtain a risk assessment result of the object to be assessed includes:
and according to the evaluation rule in the at least one target rule strategy set, evaluating the related data related to the data category corresponding to the evaluation rule in the object to be evaluated to obtain a risk evaluation result of the object to be evaluated.
16. The method of claim 15, wherein obtaining risk data for different subjects comprises:
acquiring external risk data and internal risk data of different evaluation objects, wherein the external risk data comprise related output data of an official agency aiming at the evaluation objects, and the internal risk data are related output data of the target business aiming at the evaluation objects.
17. The method according to claim 1, wherein the performing risk assessment on the relevant data of the object to be assessed according to the assessment rule in the at least one target rule policy set, and obtaining a risk assessment result of the object to be assessed comprises:
responding to an object evaluation request aiming at the object to be evaluated;
and according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a risk evaluation result of the object to be evaluated.
18. The method of claim 17, further comprising:
and receiving an object evaluation request triggered by the user aiming at the object to be evaluated.
19. The method of claim 18, wherein the determining, from the at least one rule policy set, at least one target rule policy set corresponding to a target business party comprises:
determining target identity information of the user;
and determining at least one target rule policy set matched with the target service party and the target identity information from the at least one rule policy set.
20. The method of claim 17, further comprising:
and detecting that the object to be evaluated meets the checking condition, and generating the object evaluation request.
21. The method of claim 20, wherein detecting that the object to be evaluated satisfies a ping condition, and wherein generating the object evaluation request comprises:
and periodically generating a target evaluation request for the target to be evaluated based on the periodic scanning strategy for the target to be evaluated.
22. The method of claim 20, wherein detecting that the object to be evaluated satisfies a ping condition, and wherein generating the object evaluation request comprises:
and detecting that the object to be evaluated is positioned at a target service node, and generating the object evaluation request.
23. The method of claim 1, further comprising:
generating risk processing suggestion information based on the risk assessment result;
and outputting the risk processing suggestion information.
24. The method of claim 1, further comprising:
and sending first risk prompt information to the target business party based on the risk assessment result.
25. The method of claim 1, further comprising:
and sending second risk prompt information to at least one service party associated with the object to be evaluated based on the risk evaluation result.
26. The method of claim 25, wherein sending second risk alert information to at least one business party associated with the object to be assessed comprises:
and sending second risk prompt information to at least one business party associated with the object to be evaluated in the target cooperation scene based on the risk evaluation result.
27. The method of claim 12, further comprising:
receiving risk feedback content fed back by the target business party based on a risk evaluation result;
and taking the risk feedback content as the risk data of the object to be evaluated.
28. The method of claim 1, wherein the rule policy set includes evaluation rules corresponding to different risk dimensions;
the performing risk assessment on the relevant data of the object to be assessed according to the assessment rule in the at least one target rule policy set to obtain a risk assessment result of the object to be assessed includes:
and according to the evaluation rules corresponding to different risk dimensions in the at least one target rule strategy set, performing risk evaluation on the object to be evaluated in different risk dimensions by combining the related data of the object to be evaluated, and obtaining risk evaluation results corresponding to different risk dimensions.
29. The method of claim 28, further comprising:
and obtaining a comprehensive evaluation result based on the risk evaluation results of different risk dimensions.
30. The method of claim 1, further comprising:
and if the risk evaluation result meets a risk evaluation condition and the target business party receives the object to be evaluated, sending early warning information to the target business party.
31. A method of risk assessment, comprising:
providing a display interface;
displaying a rule strategy set selection prompt message in the display interface; the rule policy set comprises at least one evaluation rule;
determining at least one target rule policy set selected for a target business party;
and sending a risk assessment instruction to a server based on the at least one target rule policy set, wherein the risk assessment instruction is used for instructing the server to perform risk assessment on the object to be assessed according to the assessment rules in the at least one target rule policy set.
32. The method of claim 31, further comprising:
displaying prompt information selected by a service party on the display interface;
acquiring a service party identifier provided by a user;
the sending a risk assessment indication to the server based on the at least one target rule policy set comprises:
and sending a risk assessment instruction to a server side based on the at least one target rule strategy set and the business party identification.
33. The method of claim 31, further comprising:
displaying selection prompt information for at least one collaboration scene in the display interface;
determining a target cooperation scene selected for a target service party;
the sending a risk assessment indication to a server based on the at least one target rule policy set comprises:
and sending a risk assessment instruction to a server side based on the at least one target rule policy set and the target cooperation scene, wherein the risk assessment instruction specifically instructs the server side to perform risk assessment on the object to be assessed in the target cooperation scene according to the assessment rule in the at least one target rule policy set.
34. The method of claim 31, further comprising:
displaying strategy set updating prompt information aiming at the at least one target rule strategy set in the display interface;
and responding to a policy set updating operation aiming at the at least one target rule policy set, and sending a policy set updating request to a server side so that the server side can update the at least one target rule policy set.
35. The method of claim 31, further comprising:
displaying rule update prompt information aiming at the at least one target rule strategy set in the display interface;
and responding to a rule updating operation aiming at any target rule policy set, and sending a rule updating request to a server side so that the server side can update the evaluation rule in any target rule policy set.
36. The method of claim 31, further comprising:
displaying configuration prompt information in the display interface;
displaying a policy set configuration page based on the trigger operation of the configuration prompt information;
and sending a configuration request to a server side based on the configuration operation in the policy set configuration page so that the server side can store the rule policy set generated by configuration.
37. The method of claim 31, further comprising:
displaying object evaluation prompt information in the display interface;
responding to the trigger operation aiming at the object evaluation prompt information, and sending an object evaluation request to a server; the object evaluation request comprises an object name of an object to be evaluated; and after receiving the object evaluation request, the server side performs risk evaluation on the object to be evaluated according to the evaluation rule in the at least one target rule policy set.
38. The method of claim 31, further comprising:
displaying object checking prompt information in the display interface;
receiving an object name of an object to be evaluated, which is provided by a user;
the sending a risk assessment indication to the server based on the at least one target rule policy set comprises:
and sending a risk assessment instruction to a server side based on the at least one target rule strategy set and the object name.
39. The method of claim 31, further comprising:
acquiring third risk prompt information which is sent by the server and generated based on a risk evaluation result;
and displaying the third risk prompt message.
40. The method of claim 31, wherein the rule policy set includes evaluation rules corresponding to different risk dimensions, and further comprising:
acquiring risk evaluation results of different risk dimensions corresponding to an object to be evaluated;
and displaying the risk evaluation results corresponding to the different risk dimensions.
41. The method of claim 31 or 39, further comprising:
acquiring risk processing suggestion information generated aiming at the risk assessment result;
and displaying the risk processing suggestion information.
42. A method of risk assessment, comprising:
receiving a risk evaluation request triggered by a user, and determining an object to be evaluated;
determining at least one evaluation rule;
according to the at least one evaluation rule, performing risk evaluation on the object to be evaluated to obtain a risk evaluation result;
and outputting risk prompt information based on the risk assessment result.
43. The method of claim 42, wherein determining at least one evaluation rule comprises:
identifying target identity information of the user;
and determining at least one evaluation rule corresponding to the target identity information.
44. The method of claim 43, further comprising:
generating risk processing suggestion information according to the risk evaluation result and the target identity information;
and outputting the risk processing suggestion information.
45. The method of claim 42, wherein the risk assessment request includes a user-entered name of the object;
the determining the object to be evaluated comprises:
and determining the object to be evaluated identified by the object name.
46. The method according to claim 42, wherein said performing risk assessment on said object to be assessed according to said at least one assessment rule, and obtaining a risk assessment result comprises:
determining the target assets expected to be consumed by the object to be evaluated;
and performing risk assessment on the object to be assessed according to the at least one assessment rule by combining the target asset to obtain a risk assessment result.
47. A method of risk assessment, comprising:
acquiring risk data of an object to be evaluated;
determining at least one evaluation rule corresponding to the risk data;
performing risk assessment on the risk data according to the at least one assessment rule to obtain a risk assessment result of the object to be assessed;
and outputting risk prompt information based on the risk assessment result.
48. A risk assessment device, comprising:
the policy providing module is used for providing at least one rule policy set; the rule policy set comprises at least one evaluation rule;
the rule determining module is used for determining at least one target rule strategy set corresponding to a target service party from the at least one rule strategy set;
and the evaluation processing module is used for performing risk evaluation on the related data of the object to be evaluated according to the evaluation rules in the at least one target rule strategy set to obtain a risk evaluation result of the object to be evaluated.
49. A risk assessment device, comprising:
the interface providing module is used for providing a display interface;
the display module is used for displaying rule strategy set selection prompt information in the display interface; the rule policy set comprises at least one evaluation rule;
the selection module is used for determining at least one target rule strategy set selected aiming at a target service party;
and the indicating module is used for sending a risk assessment indication to the server side based on the at least one target rule policy set, wherein the risk assessment indication is used for indicating the server side to carry out risk assessment on the object to be assessed according to the assessment rule in the at least one target rule policy set.
50. A computing device comprising a processing component and a storage component;
the storage component stores one or more computer instructions; the one or more computer instructions to be invoked for execution by the processing component;
the processing component is to:
providing at least one rule policy set; the rule policy set comprises at least one evaluation rule;
determining at least one target rule strategy set corresponding to a target service party from the at least one rule strategy set;
and according to the evaluation rule in the at least one target rule strategy set, performing risk evaluation on the related data of the object to be evaluated to obtain a risk evaluation result of the object to be evaluated.
51. A terminal is characterized by comprising a display component, a processing component and a storage component;
the storage component stores one or more computer instructions; the one or more computer instructions to be invoked for execution by the processing component;
the processing component is to:
providing a display interface through the display component;
displaying a rule strategy set selection prompt message in the display interface; the rule policy set comprises at least one evaluation rule;
determining at least one target rule policy set selected for a target business party;
and sending a risk assessment instruction to a server based on the at least one target rule policy set, wherein the risk assessment instruction is used for instructing the server to perform risk assessment on the object to be assessed according to the assessment rules in the at least one target rule policy set.
CN201910950463.7A 2019-10-08 2019-10-08 Risk assessment method and device Pending CN112633619A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910950463.7A CN112633619A (en) 2019-10-08 2019-10-08 Risk assessment method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910950463.7A CN112633619A (en) 2019-10-08 2019-10-08 Risk assessment method and device

Publications (1)

Publication Number Publication Date
CN112633619A true CN112633619A (en) 2021-04-09

Family

ID=75283070

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910950463.7A Pending CN112633619A (en) 2019-10-08 2019-10-08 Risk assessment method and device

Country Status (1)

Country Link
CN (1) CN112633619A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113256408A (en) * 2021-07-06 2021-08-13 中证信用云科技(深圳)股份有限公司 Risk control method and system based on consumption finance and computer equipment
CN115858319A (en) * 2022-12-09 2023-03-28 中电金信软件有限公司 Stream data processing method and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130311224A1 (en) * 2012-04-16 2013-11-21 Richard W. Heroux System and Method for Automated Standards Compliance
CN109034660A (en) * 2018-08-22 2018-12-18 平安科技(深圳)有限公司 Based on the determination method and relevant apparatus of the risk control strategy of prediction model
CN109409892A (en) * 2017-08-15 2019-03-01 凡普互金有限公司 Methods of risk assessment and system
CN109636091A (en) * 2018-10-26 2019-04-16 阿里巴巴集团控股有限公司 A kind of requirement documents Risk Identification Method and device
CN109685635A (en) * 2018-09-11 2019-04-26 深圳平安财富宝投资咨询有限公司 Methods of risk assessment, air control server-side and the storage medium of financial business
CN109711973A (en) * 2018-11-09 2019-05-03 深圳壹账通智能科技有限公司 Methods of risk assessment and device, storage medium, computer equipment
CN109949150A (en) * 2019-03-27 2019-06-28 深圳乐信软件技术有限公司 A kind of user's credit method, apparatus, server and storage medium based on scene
JP2019125336A (en) * 2018-08-07 2019-07-25 株式会社日本アルマック Risk evaluation analysis method using risk evaluation analysis system
CN110059920A (en) * 2019-03-08 2019-07-26 阿里巴巴集团控股有限公司 Application of risk decision method and device
CN110162976A (en) * 2019-02-20 2019-08-23 腾讯科技(深圳)有限公司 Methods of risk assessment, device and terminal

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130311224A1 (en) * 2012-04-16 2013-11-21 Richard W. Heroux System and Method for Automated Standards Compliance
CN109409892A (en) * 2017-08-15 2019-03-01 凡普互金有限公司 Methods of risk assessment and system
JP2019125336A (en) * 2018-08-07 2019-07-25 株式会社日本アルマック Risk evaluation analysis method using risk evaluation analysis system
CN109034660A (en) * 2018-08-22 2018-12-18 平安科技(深圳)有限公司 Based on the determination method and relevant apparatus of the risk control strategy of prediction model
CN109685635A (en) * 2018-09-11 2019-04-26 深圳平安财富宝投资咨询有限公司 Methods of risk assessment, air control server-side and the storage medium of financial business
CN109636091A (en) * 2018-10-26 2019-04-16 阿里巴巴集团控股有限公司 A kind of requirement documents Risk Identification Method and device
CN109711973A (en) * 2018-11-09 2019-05-03 深圳壹账通智能科技有限公司 Methods of risk assessment and device, storage medium, computer equipment
CN110162976A (en) * 2019-02-20 2019-08-23 腾讯科技(深圳)有限公司 Methods of risk assessment, device and terminal
CN110059920A (en) * 2019-03-08 2019-07-26 阿里巴巴集团控股有限公司 Application of risk decision method and device
CN109949150A (en) * 2019-03-27 2019-06-28 深圳乐信软件技术有限公司 A kind of user's credit method, apparatus, server and storage medium based on scene

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113256408A (en) * 2021-07-06 2021-08-13 中证信用云科技(深圳)股份有限公司 Risk control method and system based on consumption finance and computer equipment
CN115858319A (en) * 2022-12-09 2023-03-28 中电金信软件有限公司 Stream data processing method and device
CN115858319B (en) * 2022-12-09 2023-11-28 中电金信软件有限公司 Stream data processing method and device

Similar Documents

Publication Publication Date Title
US10769303B2 (en) Data processing systems for central consent repository and related methods
US10783256B2 (en) Data processing systems for data transfer risk identification and related methods
US11308435B2 (en) Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US11023616B2 (en) Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US10289867B2 (en) Data processing systems for webform crawling to map processing activities and related methods
US20210168150A1 (en) Systems and Methods for Understanding Identity and Organizational Access to Applications within an Enterprise Environment
US11550924B2 (en) Automated and continuous risk assessment related to a cyber liability insurance transaction
US9020831B2 (en) Information tracking system and method
US9692601B2 (en) Automatically preventing unauthorized signatories from executing electronic documents for organizations
US20200106793A1 (en) Methods, systems, and computer program products for continuous cyber risk monitoring
US10454973B2 (en) Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US20170024581A1 (en) Personally Identifiable Information (PII) Disclosure Detection
US11388195B1 (en) Information security compliance platform
US11038925B2 (en) Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11277448B2 (en) Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11070593B2 (en) Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11336697B2 (en) Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US20190050766A1 (en) Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US20190180050A1 (en) Data processing systems for processing data subject access requests
US20200012978A1 (en) Data processing systems for automatic preparation for remediation and related methods
US20230161906A1 (en) Data processing systems for data transfer risk identification and related methods
US20200314147A1 (en) Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US20220201045A1 (en) Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
CN112633619A (en) Risk assessment method and device
US11438386B2 (en) Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination