CN112765213A - Second-generation credit investigation automation query method, system and computer equipment - Google Patents
Second-generation credit investigation automation query method, system and computer equipment Download PDFInfo
- Publication number
- CN112765213A CN112765213A CN202011642174.XA CN202011642174A CN112765213A CN 112765213 A CN112765213 A CN 112765213A CN 202011642174 A CN202011642174 A CN 202011642174A CN 112765213 A CN112765213 A CN 112765213A
- Authority
- CN
- China
- Prior art keywords
- target
- query request
- report
- target query
- query
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000011835 investigation Methods 0.000 title claims abstract description 25
- 238000012545 processing Methods 0.000 claims abstract description 55
- 238000004458 analytical method Methods 0.000 claims abstract description 51
- 238000012544 monitoring process Methods 0.000 claims description 34
- 230000002159 abnormal effect Effects 0.000 claims description 12
- 230000000007 visual effect Effects 0.000 claims description 9
- 230000005856 abnormality Effects 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 2
- 206010000117 Abnormal behaviour Diseases 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 238000012800 visualization Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
- G06F16/24564—Applying rules; Deductive queries
- G06F16/24565—Triggers; Constraints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
- G06F16/24552—Database cache management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
- G06F16/24553—Query execution of query operations
- G06F16/24558—Binary matching operations
- G06F16/2456—Join operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/248—Presentation of query results
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computational Linguistics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides a second-generation credit investigation automation query method, a system and computer equipment, which automatically configure information according to a target query request and in combination with a strategy so as to generate a target strategy, automatically configure a corresponding processing queue to process the target query request, select a corresponding target query mode to generate a target query report, analyze the target query report according to the report to obtain a target analysis report, and then return the target analysis report. The scheme realizes automatic inquiry of the second generation credit investigation, and improves the inquiry efficiency and stability.
Description
Technical Field
The invention relates to the technical field of credit investigation and inquiry, in particular to a second-generation credit investigation automation inquiry method, a system and computer equipment.
Background
Currently, most of financial and security companies holding cards evaluate the admission, credit, quota evaluation and other wind control scenes of clients based on credit investigation reports. Meanwhile, most companies do not have the right to directly connect with the credit investigation system interface of the people's bank, so the credit investigation intermediate system is generated by operation.
However, in the prior art, the credit investigation report is mainly acquired based on a pedestrian interface or crawler mode in a one-to-one asynchronous rotation training mode, so that the efficiency is low and the stability is poor.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a second generation credit investigation automation query method, system and computer device.
A second generation credit investigation automation query method, the method comprises: receiving a target query request, generating a target strategy used by the query request according to the target query request by combining strategy configuration information, and storing the target strategy into a cache database; judging the element time delay scene of the target query request, and selecting a processing queue for the target query request to enter according to the element time delay scene to process the target query request, wherein the processing queue comprises a priority processing queue and a common processing queue; determining a target query mode of the target query request according to the target strategy, and generating a target query report, wherein the target query mode comprises interface query and webpage crawler query; analyzing the target query report according to an analysis mode corresponding to the target query mode to obtain a target analysis report; and determining a returning mode of the target analysis report according to the target strategy, and returning the target analysis report.
In one embodiment, the policy configuration information includes system configuration parameters, query request parameters, and current query conditions.
In one embodiment, the determining the element delay scenario of the target query request and selecting a processing queue into which the target query request enters according to the element delay scenario to process the target query request, where the processing queue includes a priority processing queue and a common processing queue, specifically: judging whether the target query request is in a low-delay scene; when the target query request is in a low-delay scene, entering a priority processing queue for priority processing; and when the target query request is not in a low-delay scene, entering a common processing queue for batch processing.
In one embodiment, the return mode comprises MQ push, interface callback and access side active query.
In one embodiment, after the determining, according to the target policy, a return manner of the target analysis report and returning the target analysis report to the step, the method further includes: collecting and recording the running logs of the steps from receiving the target query request to obtaining the target analysis report.
In one embodiment, after the determining, according to the target policy, a return manner of the target analysis report and returning the target analysis report to the step, the method further includes: monitoring each step from receiving a target query request to obtaining a target analysis report in real time, and monitoring whether an abnormality exists; and displaying the real-time monitoring condition on a page display end in real time.
In one embodiment, the real-time monitoring the steps from receiving the target query request to obtaining the target resolution report, and after the step of monitoring whether there is an exception, further includes: and when an abnormal condition exists, sending abnormal early warning, wherein the abnormal early warning comprises but is not limited to short message early warning, telephone early warning, mail early warning and custom access early warning.
The second-generation credit investigation automation query system comprises a policy generator, a scheduling executor, a task batch processor, a report parser and a report returner, wherein: the strategy generator is used for receiving a target query request, generating a target strategy used by the query request according to the target query request by combining strategy configuration information, and storing the target strategy into a cache database; the task batch processor is used for judging the element time delay scene of the target query request, selecting a processing queue for the target query request to enter according to the element time delay scene, and processing the target query request, wherein the processing queue comprises a priority processing queue and a common processing queue; the scheduling executor is used for determining a target query mode of the target query request according to the target strategy and generating a target query report, wherein the target query mode comprises interface query and webpage crawler query; the report analyzer is used for analyzing the target query report according to the analysis mode corresponding to the target query mode to obtain a target analysis report; and the report returner is used for determining the return mode of the target analysis report according to the target strategy and returning the target analysis report.
In one embodiment, the device further comprises an auxiliary module, wherein the auxiliary module is divided into a log recording module, a visual monitoring module and an anomaly early warning module: the log recording module is used for collecting and recording the running logs of each step from receiving the target query request to obtaining the target analysis report; the visual monitoring module is used for monitoring various steps from receiving a target query request to obtaining a target analysis report in real time and monitoring whether an abnormality exists; the visual monitoring module is also used for displaying the real-time monitoring condition on a page display end in real time; the abnormity early warning module is used for sending abnormity early warning when abnormity occurs, wherein the abnormity early warning comprises but is not limited to short message early warning, telephone early warning, mail early warning and custom access early warning.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the program to implement the steps of one of the two generation credit automation query methods described in the above embodiments.
According to the second-generation automatic inquiry method, the second-generation automatic inquiry system and the computer equipment, the target strategy is generated by automatically inquiring the request according to the target and combining the strategy configuration information, the corresponding processing queue is automatically configured to process the target inquiry request, the corresponding target inquiry mode is selected to generate a target inquiry report, the target analysis report is obtained according to the report analysis, and then the target analysis report is returned. Therefore, the second-generation credit investigation is automatically inquired, and the efficiency and the stability are improved.
Drawings
Fig. 1 is an application scenario diagram of a second generation credit investigation automation query method in an embodiment;
FIG. 2 is a flow diagram illustrating a second generation credit investigation automation method in one embodiment;
FIG. 3 is a block diagram of an embodiment of a second generation credit investigation system;
FIG. 4 is a block diagram of the structure of an auxiliary module in one embodiment;
FIG. 5 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings by way of specific embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The second-generation credit investigation automation query method provided by the application can be applied to the application environment shown in fig. 1. The second-generation credit investigation automatic query method provided by the scheme is realized by depending on a system, the system is arranged on the terminal 2, the terminal 2 is externally connected with the people bank credit investigation system 3 in a wireless or wired network mode, and the terminal 2 receives a target query request of the user 1 at the same time. The terminal 2 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the people bank credit investigation system 3 is essentially in the form of a server, and may be implemented by an independent server or a server cluster formed by a plurality of servers.
In one embodiment, as shown in fig. 2, there is provided a second generation credit automatic query method, including the following steps:
s110, receiving the target query request, generating a target strategy used by the query request according to the target query request and combining the strategy configuration information, and storing the target strategy in a cache database.
Specifically, a target query request input by a user is received, and a target policy used by a proper query request is generated according to the target query request and by combining the existing policy configuration information, and the target policy is stored in a cache database for later processing and use.
In one embodiment, the policy configuration information in step S110 includes system configuration parameters, query request parameters, and current query conditions. Specifically, the policy configuration information includes a system configuration parameter, a query request parameter and a current query condition, and the policy used by the query request is generated by acquiring the system configuration parameter, the service party request parameter and the current system query condition.
S120, judging the element time delay scene of the target query request, and selecting a processing queue for the target query request to enter according to the element time delay scene to process the target query request, wherein the processing queue comprises a priority processing queue and a common processing queue.
Specifically, the element time delay scene of the target query request is judged, and whether a priority processing queue or a common processing queue is adopted for processing is determined according to the judgment result.
In one embodiment, step S120 specifically includes: judging whether the target query request is in a low-delay scene; when the target query request is in a low-delay scene, entering a priority processing queue for priority processing; and when the target query request is not in a low-delay scene, entering a common processing queue for batch processing. Specifically, whether the target query request is in a low-delay scene is judged, and if so, the target query request is subjected to priority processing directly by adopting a priority processing queue.
S130, determining a target query mode of the target query request according to the target strategy, and generating a target query report, wherein the target query mode comprises interface query and webpage crawler query.
Specifically, a target query mode of the target query request is determined according to the target strategy, and a target query report is generated, wherein the target query mode comprises interface query and webpage crawler query.
S140, analyzing the target query report according to the analysis mode corresponding to the target query mode to obtain a target analysis report.
Specifically, the analyzers corresponding to different reports are different from the query method, and therefore, the target query report needs to be analyzed according to the analysis method corresponding to the target query method to obtain the target analysis report.
S150, determining a returning mode of the target analysis report according to the target strategy, and returning the target analysis report.
Specifically, when a return mode, a target query mode in the previous step and an analysis mode are selected, a target strategy is generated according to a target query request and is determined well, so that the return mode of a target analysis report is determined directly according to the target strategy, and the target analysis report is returned.
In one embodiment, the return means in step S150 includes MQ push, interface callback, and access-side unsolicited query. Specifically, the target analysis report may be returned in various manners, such as MQ pushing, interface callback, and access side active query.
In one embodiment, after step S150, the method further includes: collecting and recording the running logs of the steps from receiving the target query request to obtaining the target analysis report. Specifically, the operation collection and recording are performed for steps S110 to S150.
In one embodiment, after step S150, the method further includes: monitoring each step from receiving a target query request to obtaining a target analysis report in real time, and monitoring whether an abnormality exists; and displaying the real-time monitoring condition on a page display end in real time. Specifically, query volumes are monitored according to different dimensions, including monitoring query conditions such as query volumes of access parties, query success rate and the like according to time dimensions, cross-platform separation is performed at the front end and the rear end of the web technology, mobile terminals can be disposed at the PC terminal, the query conditions are monitored, and accordingly visual monitoring is achieved.
In one embodiment, the steps from receiving the target query request to obtaining the target resolution report are monitored in real time, and after the monitoring whether the abnormality exists, the method further includes: and when the abnormal condition exists, sending abnormal early warning, wherein the abnormal early warning comprises but is not limited to short message early warning, telephone early warning, mail early warning and custom access early warning. Specifically, when an abnormal condition is found, the abnormal condition needs to be pre-warned in time, configurable pre-warning levels, pre-warning times and pre-warning intervals are realized, and pre-warning modes can be divided into short message pre-warning, telephone pre-warning and mail pre-warning, and various access modes are realized in a self-defined mode.
In the embodiment, a target strategy is generated by automatically configuring the corresponding processing queue to process the target query request and selecting the corresponding target query mode to generate a target query report according to the target query request and combining the strategy configuration information, and the target query report is obtained by analyzing the report and then returned; and the proceeding situation of the query step is monitored in real time, and the external prompt is carried out once the abnormal situation occurs. Therefore, the second-generation automatic credit investigation method which is unattended, visually monitored, safe, low in time delay and multi-channel and can perform early warning on abnormal behaviors is realized.
In one embodiment, as shown in fig. 3, a second generation credit automation query system 200 is provided, which comprises a policy generator 210, a task batching processor 220, a schedule executor 230, a report parser 240 and a report returner 250, wherein:
the policy generator 210 is configured to receive a target query request, generate a target policy used by the query request according to the target query request and by combining policy configuration information, and store the target policy in the cache database;
the task batch processor 220 is configured to determine an element delay scenario of the target query request, and select a processing queue into which the target query request enters according to the element delay scenario to process the target query request, where the processing queue includes a priority processing queue and a common processing queue;
the scheduling executor 230 is configured to determine a target query mode of the target query request according to the target policy, and generate a target query report, where the target query mode includes interface query and web crawler query;
the report analyzer 240 is configured to analyze the target query report according to an analysis manner corresponding to the target query manner to obtain a target analysis report;
the report returner 250 is configured to determine a return manner of the target analysis report according to the target policy, and return the target analysis report.
In one embodiment, as shown in fig. 4, the apparatus further includes an auxiliary module 260, wherein the auxiliary module 260 is divided into a logging module 261, a visualization monitoring module 262, and an anomaly early warning module 263:
the log recording module 261 is configured to collect and record operation logs of each step from receiving the target query request to obtaining the target analysis report;
the visual monitoring module 262 is used for monitoring the steps from receiving the target query request to obtaining the target analysis report in real time and monitoring whether the abnormality exists;
the visual monitoring module 262 is also used for displaying the real-time monitoring condition on the page display end in real time;
the anomaly early warning module 263 is configured to send an anomaly early warning when an anomaly exists, where the anomaly early warning includes, but is not limited to, a short message early warning, a telephone early warning, a mail early warning, and a custom access early warning.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 5. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing the configuration template and also used for storing target webpage data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to realize a second generation credit investigation automation query method.
Those skilled in the art will appreciate that the architecture shown in fig. 5 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
It will be apparent to those skilled in the art that the modules or steps of the invention described above may be implemented in a general purpose computing device, they may be centralized on a single computing device or distributed across a network of computing devices, and optionally they may be implemented in program code executable by a computing device, such that they may be stored on a computer storage medium (ROM/RAM, magnetic disks, optical disks) and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The foregoing is a more detailed description of the present invention that is presented in conjunction with specific embodiments, and the practice of the invention is not to be considered limited to those descriptions. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.
Claims (10)
1. A second-generation credit investigation automatic query method is characterized by comprising the following steps:
receiving a target query request, generating a target strategy used by the query request according to the target query request by combining strategy configuration information, and storing the target strategy into a cache database;
judging the element time delay scene of the target query request, and selecting a processing queue for the target query request to enter according to the element time delay scene to process the target query request, wherein the processing queue comprises a priority processing queue and a common processing queue;
determining a target query mode of the target query request according to the target strategy, and generating a target query report, wherein the target query mode comprises interface query and webpage crawler query;
analyzing the target query report according to an analysis mode corresponding to the target query mode to obtain a target analysis report;
and determining a returning mode of the target analysis report according to the target strategy, and returning the target analysis report.
2. The method of claim 1, wherein the policy configuration information includes system configuration parameters, query request parameters, and current query conditions.
3. The method according to claim 1, wherein the determining of the element delay scenario of the target query request selects a processing queue entered by the target query request according to the element delay scenario to process the target query request, the processing queue includes a priority processing queue and a normal processing queue, and specifically includes:
judging whether the target query request is in a low-delay scene;
when the target query request is in a low-delay scene, entering a priority processing queue for priority processing;
and when the target query request is not in a low-delay scene, entering a common processing queue for batch processing.
4. The method of claim 1, wherein the return means comprises MQ push, interface callback, and access-side proactive query.
5. The method of claim 1, wherein after determining a return manner of the target resolution report according to the target policy and returning the target resolution report to the step, further comprising:
collecting and recording the running logs of the steps from receiving the target query request to obtaining the target analysis report.
6. The method of claim 1, wherein after determining a return manner of the target resolution report according to the target policy and returning the target resolution report to the step, further comprising:
monitoring each step from receiving a target query request to obtaining a target analysis report in real time, and monitoring whether an abnormality exists;
and displaying the real-time monitoring condition on a page display end in real time.
7. The method of claim 6, wherein the steps of monitoring in real time from receiving a target query request to obtaining a target resolution report further comprise, after the step of monitoring whether an anomaly exists:
and when an abnormal condition exists, sending abnormal early warning, wherein the abnormal early warning comprises but is not limited to short message early warning, telephone early warning, mail early warning and custom access early warning.
8. The second-generation credit investigation automation query system comprises a policy generator, a scheduling executor, a task batch processor, a report parser and a report returner, wherein:
the strategy generator is used for receiving a target query request, generating a target strategy used by the query request according to the target query request by combining strategy configuration information, and storing the target strategy into a cache database;
the task batch processor is used for judging the element time delay scene of the target query request, selecting a processing queue for the target query request to enter according to the element time delay scene, and processing the target query request, wherein the processing queue comprises a priority processing queue and a common processing queue;
the scheduling executor is used for determining a target query mode of the target query request according to the target strategy and generating a target query report, wherein the target query mode comprises interface query and webpage crawler query;
the report analyzer is used for analyzing the target query report according to the analysis mode corresponding to the target query mode to obtain a target analysis report;
and the report returner is used for determining the return mode of the target analysis report according to the target strategy and returning the target analysis report.
9. The system of claim 8, further comprising an auxiliary module, wherein the auxiliary module is divided into a logging module, a visual monitoring module and an anomaly early warning module:
the log recording module is used for collecting and recording the running logs of each step from receiving the target query request to obtaining the target analysis report;
the visual monitoring module is used for monitoring various steps from receiving a target query request to obtaining a target analysis report in real time and monitoring whether an abnormality exists;
the visual monitoring module is also used for displaying the real-time monitoring condition on a page display end in real time;
the abnormity early warning module is used for sending abnormity early warning when abnormity occurs, wherein the abnormity early warning comprises but is not limited to short message early warning, telephone early warning, mail early warning and custom access early warning.
10. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1 to 7 are implemented when the computer program is executed by the processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011642174.XA CN112765213A (en) | 2020-12-31 | 2020-12-31 | Second-generation credit investigation automation query method, system and computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011642174.XA CN112765213A (en) | 2020-12-31 | 2020-12-31 | Second-generation credit investigation automation query method, system and computer equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112765213A true CN112765213A (en) | 2021-05-07 |
Family
ID=75698540
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011642174.XA Pending CN112765213A (en) | 2020-12-31 | 2020-12-31 | Second-generation credit investigation automation query method, system and computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112765213A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114219437A (en) * | 2021-12-14 | 2022-03-22 | 中国建设银行股份有限公司 | Credit report query method, device, server and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107943854A (en) * | 2017-11-03 | 2018-04-20 | 深圳前海微众银行股份有限公司 | Reference service inquiry method, apparatus and computer-readable recording medium |
CN109714312A (en) * | 2018-11-19 | 2019-05-03 | 中国科学院信息工程研究所 | A kind of acquisition strategies generation method and system based on outside threat |
CN109871266A (en) * | 2018-12-15 | 2019-06-11 | 中国平安人寿保险股份有限公司 | Task delay process method, apparatus, computer installation and storage medium |
CN110765484A (en) * | 2019-10-17 | 2020-02-07 | 中信银行股份有限公司 | Credit investigation data processing method and electronic equipment |
CN111782696A (en) * | 2020-06-29 | 2020-10-16 | 广东粤财金融云科技股份有限公司 | Credit investigation data processing method and device |
CN111814024A (en) * | 2020-08-14 | 2020-10-23 | 北京斗米优聘科技发展有限公司 | Distributed data acquisition method, system and storage medium |
-
2020
- 2020-12-31 CN CN202011642174.XA patent/CN112765213A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107943854A (en) * | 2017-11-03 | 2018-04-20 | 深圳前海微众银行股份有限公司 | Reference service inquiry method, apparatus and computer-readable recording medium |
CN109714312A (en) * | 2018-11-19 | 2019-05-03 | 中国科学院信息工程研究所 | A kind of acquisition strategies generation method and system based on outside threat |
CN109871266A (en) * | 2018-12-15 | 2019-06-11 | 中国平安人寿保险股份有限公司 | Task delay process method, apparatus, computer installation and storage medium |
CN110765484A (en) * | 2019-10-17 | 2020-02-07 | 中信银行股份有限公司 | Credit investigation data processing method and electronic equipment |
CN111782696A (en) * | 2020-06-29 | 2020-10-16 | 广东粤财金融云科技股份有限公司 | Credit investigation data processing method and device |
CN111814024A (en) * | 2020-08-14 | 2020-10-23 | 北京斗米优聘科技发展有限公司 | Distributed data acquisition method, system and storage medium |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114219437A (en) * | 2021-12-14 | 2022-03-22 | 中国建设银行股份有限公司 | Credit report query method, device, server and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107992398B (en) | Monitoring method and monitoring system of service system | |
CN110428127B (en) | Automatic analysis method, user equipment, storage medium and device | |
CN110442712B (en) | Risk determination method, risk determination device, server and text examination system | |
CN114185708A (en) | Data analysis method and device based on distributed link tracking and electronic equipment | |
CN111866016A (en) | Log analysis method and system | |
CN111552633A (en) | Interface abnormal call testing method and device, computer equipment and storage medium | |
CN110278201B (en) | Security policy evaluation method and device, computer readable medium and electronic device | |
CN108156141B (en) | Real-time data identification method and device and electronic equipment | |
US7840523B2 (en) | Method and system for time-sliced aggregation of data that monitors user interactions with a web page | |
CN111198797B (en) | Operation monitoring method and device and operation analysis method and device | |
CN109409948B (en) | Transaction abnormity detection method, device, equipment and computer readable storage medium | |
CN112612680A (en) | Message warning method, system, computer equipment and storage medium | |
CN109711849B (en) | Ether house address portrait generation method and device, electronic equipment and storage medium | |
CN111382944A (en) | Job behavior risk identification method and device, computer equipment and storage medium | |
CN112765213A (en) | Second-generation credit investigation automation query method, system and computer equipment | |
CN112347457A (en) | Abnormal account detection method and device, computer equipment and storage medium | |
CN110262955A (en) | Application performance monitoring tools based on pinpoint | |
CN111784176A (en) | Data processing method, device, server and medium | |
CN116991675A (en) | Abnormal access monitoring method and device, computer equipment and storage medium | |
CN114282940A (en) | Method and apparatus for intention recognition, storage medium, and electronic device | |
CN114240476A (en) | Abnormal user determination method, device, equipment and storage medium | |
CN114422186A (en) | Attack detection method and device, electronic equipment and storage medium | |
CN112508207A (en) | Fault detection method, device, equipment and storage medium | |
CN111598159B (en) | Training method, device, equipment and storage medium of machine learning model | |
CN118013446B (en) | Safety monitoring method for fire-fighting examination system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210507 |