CN113592625A - Credit report generation method and device and electronic equipment - Google Patents

Credit report generation method and device and electronic equipment Download PDF

Info

Publication number
CN113592625A
CN113592625A CN202110850454.8A CN202110850454A CN113592625A CN 113592625 A CN113592625 A CN 113592625A CN 202110850454 A CN202110850454 A CN 202110850454A CN 113592625 A CN113592625 A CN 113592625A
Authority
CN
China
Prior art keywords
credit investigation
investigation report
data
application
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110850454.8A
Other languages
Chinese (zh)
Other versions
CN113592625B (en
Inventor
黄宝祥
刘剑秋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jingdong Technology Holding Co Ltd
Original Assignee
Jingdong Technology Holding Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jingdong Technology Holding Co Ltd filed Critical Jingdong Technology Holding Co Ltd
Priority to CN202110850454.8A priority Critical patent/CN113592625B/en
Publication of CN113592625A publication Critical patent/CN113592625A/en
Application granted granted Critical
Publication of CN113592625B publication Critical patent/CN113592625B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/186Templates

Abstract

The application provides a credit investigation report generation method, a credit investigation report generation device and electronic equipment, and belongs to the technical field of computer application. The credit investigation report generation method comprises the following steps: acquiring a credit investigation report application request sent by a user, wherein the credit investigation report application request comprises a first user identifier; acquiring borrowing data of a user according to the first user identification, wherein the borrowing data comprises borrowing service opening data, real name information, borrowing consumption data, borrowing debt data and third party credit investigation data; verifying the loan data to determine an application type; and filling and signing the occupied fields in the credit investigation report template file corresponding to the application types according to the loan data to generate a credit investigation report. Therefore, by the credit investigation report generation method, different types of credit investigation reports are generated according to the actual loan condition of the user, so that the labor cost is saved, the efficiency is high, and the timeliness and the accuracy of the credit investigation reports are ensured.

Description

Credit report generation method and device and electronic equipment
Technical Field
The present application relates to the field of computer application technologies, and in particular, to a method and an apparatus for generating a credit investigation report, and an electronic device.
Background
When using a small loan product, a user usually needs a credit company to issue a credit settlement report to show whether a person has credit information such as debt and overdue. Credit companies typically manually print paper credit reports with user information and mail them to the user. However, the manual method of presenting credit report is not only inefficient, but also has poor real-time performance, which affects user experience.
Disclosure of Invention
The credit investigation report generation method, the credit investigation report generation device, the electronic equipment and the storage medium are used for solving the problems that in the related art, the efficiency is low, the real-time performance is poor and the user experience is influenced in a manual credit investigation report providing mode.
An embodiment of an aspect of the present application provides a method for generating a credit investigation report, including: acquiring a credit investigation report application request sent by a user, wherein the credit investigation report application request comprises a first user identifier; acquiring loan data of the user according to the first user identification, wherein the loan data comprises loan service opening data, real name information, loan consumption data, loan debt data and third party credit investigation data; verifying the loan data to determine an application type; and filling and signing the occupied fields in the credit investigation report template file corresponding to the application type according to the loan data to generate a credit investigation report.
Another embodiment of the present application provides an apparatus for generating a credit investigation report, including: the first acquisition module is used for acquiring a credit investigation report application request sent by a user, wherein the credit investigation report application request comprises a first user identifier; the second obtaining module is used for obtaining loan data of the user according to the first user identification, wherein the loan data comprise loan service opening data, real name information, loan consumption data, loan debt data and third-party credit investigation data; the first determining module is used for verifying the loan data to determine the application type; and the generating module is used for filling and signing the occupied fields in the credit investigation report template file corresponding to the application type according to the loan data so as to generate a credit investigation report.
An embodiment of another aspect of the present application provides an electronic device, which includes: memory, processor and computer program stored on the memory and operable on the processor, wherein the processor implements the method for generating a credit report as described above when executing the program.
A computer-readable storage medium is provided, on which a computer program is stored, wherein the program is implemented to implement the method for generating a credit report as described above when executed by a processor.
According to the credit investigation report generation method, the credit investigation report generation device, the electronic equipment and the computer readable storage medium, when a credit investigation report application request sent by a user is obtained, loan data of the user are obtained according to the credit investigation report application request including a first user identifier, the loan data are verified to determine an application type, and then an occupation field in a credit investigation report template file corresponding to the application type is filled and signed according to the loan data to generate a credit investigation report. Therefore, the loan data of the user are automatically verified to generate credit investigation reports of different types according to the actual loan situation of the user, so that the labor cost is saved, the efficiency is high, and the timeliness and the accuracy of the credit investigation reports are ensured.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flowchart illustrating a method for generating a credit investigation report according to an embodiment of the present application;
Fig. 2 is a process diagram of another credit investigation report generation method provided in the embodiment of the present application;
fig. 3 is a flowchart illustrating a method for generating a credit investigation report according to an embodiment of the present application;
fig. 4 is a schematic flowchart of a method for generating a credit investigation report according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an apparatus for generating a credit investigation report according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the like or similar elements throughout. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
The embodiment of the application provides a generation method of a credit investigation report aiming at the problems that in the related art, the efficiency is low, the real-time performance is poor and the user experience is influenced by manually issuing the credit investigation report.
According to the credit investigation report generation method provided by the embodiment of the application, when a credit investigation report application request sent by a user is obtained, borrowing data of the user is obtained according to the first user identification included in the credit investigation report application request, the borrowing data is verified to determine the application type, and then the occupied fields in a credit investigation report template file corresponding to the application type are filled and signed according to the borrowing data to generate the credit investigation report. Therefore, the loan data of the user are automatically verified to generate credit investigation reports of different types according to the actual loan situation of the user, so that the labor cost is saved, the efficiency is high, and the timeliness and the accuracy of the credit investigation reports are ensured.
The method, apparatus, electronic device, storage medium, and computer program for generating a credit investigation report provided by the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart illustrating a method for generating a credit investigation report according to an embodiment of the present application.
As shown in fig. 1, the method for generating a credit report includes the following steps:
step 101, obtaining a credit investigation report application request sent by a user, wherein the credit investigation report application request comprises a first user identifier.
The credit investigation report generation method according to the embodiment of the present application may be executed by the credit investigation report generation device according to the embodiment of the present application. The credit investigation report generation device in the embodiment of the present application may be configured in any electronic device to execute the credit investigation report generation method in the embodiment of the present application. For example, the credit investigation report generation device according to the embodiment of the present application may be disposed in any server of the loan system or the credit investigation system to provide a service of generating a credit investigation report to a user of the loan system or the credit investigation system.
The credit investigation report application request may be transmitted from the user to a server provided with a credit investigation report generation device through the client. The client may be a web page or an application installed in the user terminal. For example, when the credit investigation report generation method according to the embodiment of the present application is applied to a server of a loan application, the client may be the loan application installed in the user terminal.
The first user identification is the only identity authentication information of the user needing to obtain the credit investigation report currently. For example, the first user identifier may be an identity card number, a mobile phone number, a registered account number, and the like of a user who needs to obtain a credit report at present, which is not limited in this embodiment of the application.
In the embodiment of the application, a credit investigation report application interface can be provided in the client, so that a user can input necessary application information through the credit investigation report application interface, and the client generates a credit investigation report application request according to the necessary application information input by the user and sends the request to the server. After the server obtains the credit investigation report application request, the server may analyze the credit investigation report application request to obtain a first user identifier included in the credit investigation report application request.
It should be noted that the credit investigation report application interface of the client may only include a "submit application" control, and when it is monitored that the user clicks the control, it is determined that the user has input necessary application information, and then a registered account currently logged in the client (or information such as a mobile phone number and an identification number corresponding to the registered account) is used as a first user identifier, and a request for applying a credit investigation report is generated and sent to the server. Or, the credit investigation report application interface of the client can allow the user to input identity information such as name, mobile phone number, identification card number, communication address, mailbox address and the like, and when it is monitored that the user clicks the 'submit application' control, the first user identifier is determined according to the information input by the user, and a credit investigation report generation request is generated according to the first user identifier and sent to the server.
And step 102, obtaining borrowing data of the user according to the first user identification, wherein the borrowing data comprises borrowing service opening data, real name information, borrowing consumption data, borrowing debt data and third party credit investigation data.
The loan service provisioning data may be used to indicate whether the user has provisioned a loan service.
The real-name information may include real-name authentication information that has been input by a user in the system, such as a name, an identification card number, an identification card image, face data in the identification card image, and the like, which is not limited in this embodiment of the present application.
The loan consumption data can be used for indicating whether a loan behavior occurs after the loan service is opened by the user; may include a record of the debit or credit transaction that the user has taken place.
The debit/credit debt data can be used for indicating whether the user has settled the debt currently, and can be determined according to the debit/credit consumption data and the repayment data of the user, namely the debit/credit debt data of the user can be determined according to the difference value between the repayment amount and the debit/credit amount of the user.
The third-party credit investigation data can be used for indicating whether the user reports the credit investigation report on the third-party platform. It should be noted that, when the user reports the credit investigation report of the third-party platform, the third-party credit investigation data may further include the third-party credit investigation report reported by the user.
In the embodiment of the application, after the credit investigation report application request is obtained, the loan data matched with the first user identifier may be obtained from the database storing the user data according to the first user identifier in the credit investigation report application request, and whether the user meets the condition of applying the credit investigation report or not and the application type of the generated credit investigation report may be determined according to the obtained loan data.
Furthermore, in order to prevent a malicious user from maliciously obtaining the credit investigation report and ensure the information security of the user, the frequency of applying the credit investigation report by the user can be limited. That is, in a possible implementation manner of this embodiment of the application, before the step 102, the method may further include:
acquiring credit investigation report application times of a first user identifier in a preset time period;
and determining that the credit investigation report application times are less than or equal to the application time threshold.
As a possible implementation manner, in order to prevent malicious acquisition of the credit investigation report and ensure information security of the user, before acquiring loan data of the user, it may be determined whether the user is a malicious user. Therefore, the credit investigation report application times of the user in a preset time period can be determined according to the first user identifier, if the application times of the credit investigation report is less than or equal to the application time threshold, the user can be determined to be a legal user, and the operation of the subsequent steps can be continued to provide the credit investigation report for the user; if the application times of the credit investigation report is larger than the application time threshold, the user can be determined to be an illegal user who maliciously obtains the credit investigation report, the credit investigation report application request can be rejected, and prompt information of 'the application times are out of limit' is sent to the user.
For example, assuming that the preset time period is 1 natural month and the application time threshold is 3, if it is determined that the user sends the credit investigation report application request for the first time in the current natural month according to the first user identifier, it may be determined that the credit investigation report application time of the user is less than the application time threshold, and then the credit investigation report may be presented to the user.
It should be noted that the above examples are only illustrative and should not be construed as limiting the present application. In actual use, specific values of the preset time period and the application time threshold value can be determined according to actual needs and specific application scenarios, which are not limited in the embodiments of the present application.
In step 103, the loan data is verified to determine the application type.
In the embodiment of the application, the debit and credit data of the user can be verified to determine the information of the user such as the arrearage condition, the repayment condition and the like, and whether the user meets the condition of applying the credit investigation report or not and the application type of the credit investigation report which can be issued to the user are determined according to the verification result.
As a possible implementation, it may be determined whether a credit report can be presented and what type of credit report can be presented according to whether the user opens the loan service and whether the debt is settled. That is, in a possible implementation manner of the embodiment of the present application, the application types include: no transaction certification, settlement certification and settlement certification containing third-party credit data; accordingly, the step 103 may include:
Determining the application type as no transaction certificate under the condition that the loan service is opened and the loan consumption data does not contain the loan consumption record;
determining the application type as a clearing certification under the condition that the loan service is opened and the loan debt data is cleared;
and determining the application type as a settlement certification containing the credit data of the third party under the conditions that the loan service is opened, the loan debt data is settled and the credit data of the third party exists.
In the embodiment of the application, after the debit and credit data of the user are verified, if it is determined that the debit and credit service of the user is opened and the debit and credit consumption data does not contain the debit and credit consumption record, that is, the user does not make a debit, it is determined that the application type does not have the transaction certificate, and the application type enters the non-transaction certificate page through the page routing to generate the credit investigation report corresponding to the non-transaction certificate. If the loan service of the user is determined to be opened and the loan debt data is settled, that is, the user borrows through the loan service and settles all the debts, a credit report of settled debts can be issued to the user, that is, the application type can be determined as settlement evidence, and the credit report corresponding to the settlement evidence is generated by entering a settlement evidence page through page routing. If the loan service of the user is determined to be opened, the loan debt data is settled, and the loan data comprises third-party credit investigation data reported by the user, namely the user has requested all debts generated by the loan service and uploaded credit investigation reports on a third-party platform before the debts are settled, the user can be provided with the credit investigation report containing the settled debts of the third-party credit investigation data, namely the application type can be determined to be the settlement evidence of the third-party credit investigation data, and the third-party credit investigation data settlement page is entered through page routing to generate the credit investigation report corresponding to the settlement evidence containing the third-party credit investigation data.
Further, in the case where the user does not open the loan service and the debt is not cleared, a credit report cannot be issued to the user. That is, in a possible implementation manner of the embodiment of the present application, after the step 103, the method may further include:
and sending a prompt message that a credit investigation report cannot be provided temporarily to the user under the condition that the loan service is not opened or the loan debt data is not settled.
As a possible implementation manner, if it is determined that the user does not open the loan service when the loan data of the user is verified, the credit investigation report can be refused to be made for the user, and a prompt message of 'the unopened loan service cannot be made up for the credit investigation report' is sent to the user; if the user is determined to open the loan service but the loan arrears data are not settled, that is, the user does not request all the arrears yet, the user can also refuse to make a credit investigation report for the user and send a prompt message of 'the debts are not settled and the credit investigation report can not be provided temporarily' to the user.
And 104, filling and signing the occupied fields in the credit investigation report template file corresponding to the application types according to the loan data to generate a credit investigation report.
In the embodiment of the application, after it is determined that a credit investigation report can be provided for a user and an application type corresponding to the credit investigation report is determined, a credit investigation report application message body can be sent to a credit investigation report sending service by a routing page corresponding to the application type, so that the credit investigation report sending service obtains a credit investigation report template file corresponding to the application type according to the application type in the credit investigation report application message body, fills a place-occupying field in the obtained credit investigation report template file according to loan data of the user to generate a credit investigation report to be signed, and then calls a signature service to sign the credit investigation report to be signed to generate the credit investigation report and send the credit investigation report to the user.
As a possible implementation manner, because the information that needs to be included in credit investigation report types of different application types is different, template files corresponding to the application types can be generated in advance, so that when a credit investigation report is generated, a complete credit investigation report can be generated only by completely supplementing the place-occupied fields in the template files according to the loan data of the user. For example, when the application type includes a no transaction certificate, a settlement certificate, and a settlement certificate including third party credit data, template files corresponding to the no transaction certificate, the settlement certificate, and the settlement certificate including the third party credit data may be generated in advance.
It should be noted that the placeholder fields included in different types of template files may also be different. For example, the placeholder fields in the template file corresponding to the clearing certification may include: the user's real name, identification number, date on which the loan occurred, amount of the loan, settlement date of the loan, etc., which are not limited in the embodiments of the present application.
Optionally, as a possible implementation manner, after the credit investigation report is generated, the server may send the credit investigation report to the client of the user according to the first user identifier; or the server can also search a mobile phone number reserved in the system by the user according to the first user identification, and then send the credit investigation report or the download link of the credit investigation report to the mobile phone of the user; or the server can also send the credit investigation report to the mailbox of the user according to the mailbox address input by the user when sending the credit investigation report application request.
It should be noted that the sending of the credit report to the user may include, but is not limited to, the above-listed situations. In actual use, at least one mode can be adopted to send a credit investigation report to a user according to actual needs and specific application scenes.
Further, some lending institutions may not have the authority of issuing credit investigation reports, and need to obtain authority as authorization, so in the embodiment of the present application, the authorized pages of the authority may be sent to the user according to the user requirements, so as to ensure the credibility of the credit investigation reports. That is, in a possible implementation manner of the embodiment of the present application, after the step 104, the method may further include:
obtaining an authorized page obtaining request sent by a user;
the authorized book pages are sent to the user.
The authorized page acquisition request may be sent by the user after acquiring the credit investigation report, or may be sent by the user simultaneously when sending the request for applying the credit investigation report.
As a possible implementation manner, if the user needs to obtain the authorized book page after obtaining the credit investigation report or when the credit investigation report is not successfully made due to the fact that the condition for making the credit investigation report is not met, the client may send an authorized book page obtaining request to the server separately, and then the server may send the authorized book page to the user according to the user identifier in the authorized book page obtaining request.
As a possible implementation manner, an option of whether the pages need to be authorized or not may be provided in the credit investigation report application page of the client, so that the user may send an authorized page acquisition request while sending the credit investigation report application request. Specifically, if the credit investigation report application request indicates that the authorized page does not need to be acquired, the server can determine that the user does not need the authorized page, and can not send the authorized page to the user when sending the credit investigation report; if the credit investigation report application request indicates that the authorized book page needs to be acquired, the server can determine to acquire the authorized book page acquisition request and can send the authorized book page to the user while sending the credit investigation report.
It should be noted that, in actual use, the sending method of the authorized book page may be the same as the sending method of the credit report, and details are not described here.
According to the credit investigation report generation method provided by the embodiment of the application, when a credit investigation report application request sent by a user is obtained, borrowing data of the user is obtained according to the first user identification included in the credit investigation report application request, the borrowing data is verified to determine the application type, and then the occupied fields in a credit investigation report template file corresponding to the application type are filled and signed according to the borrowing data to generate the credit investigation report. Therefore, the loan data of the user are automatically verified to generate credit investigation reports of different types according to the actual loan situation of the user, so that the labor cost is saved, the efficiency is high, and the timeliness and the accuracy of the credit investigation reports are ensured.
In a possible implementation form of the method and the device, the real identity of the user obtaining the credit investigation report can be verified in the modes of short message verification codes, face recognition and the like, so that the personal information safety of the user is guaranteed.
The method for generating the credit investigation report provided in the embodiment of the present application is further described below with reference to fig. 2.
Fig. 2 is a flowchart illustrating another method for generating an credit investigation report according to an embodiment of the present application.
As shown in fig. 2, the method for generating the credit report includes the following steps:
step 201, a credit investigation report application request sent by a user is obtained, wherein the credit investigation report application request includes a first user identifier.
Step 202, obtaining loan data of the user according to the first user identifier, wherein the loan data comprises loan service opening data, real name information, loan consumption data, loan arrearage data and third party credit investigation data.
At step 203, the loan data is verified to determine the application type.
The detailed implementation process and principle of the steps 201-203 can refer to the detailed description of the above embodiments, and are not described herein again.
Step 204, an identity verification instruction is sent to the user, wherein the identity verification instruction includes identity verification information for verifying the identity of the user.
The specific form of the identity verification information is related to a specific identity verification mode. For example, if the authentication mode is authentication code authentication, the authentication information may be an authentication code sent to the user; if the identity authentication mode is face recognition, the identity verification information may be a face image in an identity card image stored in the server, and the like, which is not limited in the embodiment of the present application.
In the embodiment of the application, the loan data of the user is checked, the credit investigation report can be provided for the user, the application type corresponding to the credit investigation report is determined, and after the credit investigation report enters the routing page corresponding to the application, the real identity of the user can be verified through the identity verification service, so that the credit investigation report can be prevented from being falsely submitted by other people, and the personal information safety of the user can be ensured.
As a possible implementation manner, the identity verification can be performed by means of a verification code. Therefore, the server can send an authentication instruction to the client of the user according to the first user identifier, acquire the contact way (mobile phone number, mailbox, and the like) of the user according to the first user identifier, and further send the randomly generated authentication code (i.e., the authentication information) to the user according to the contact way of the user, so that the client of the user can display an authentication page when acquiring the authentication instruction, and the user can input the received authentication code in the authentication page.
As a possible implementation manner, identity verification can be performed in a face verification manner. Therefore, the server can send an authentication instruction to the client of the user according to the first user identifier, so that when the client of the user acquires the authentication instruction, an authentication page for acquiring the face image is displayed, and the user can acquire the face image in the authentication page in real time.
Step 205, obtaining the identity confirmation information returned by the user, and determining that the identity confirmation information is matched with the identity verification information.
Wherein, the specific form of the identity confirmation information is related to the specific authentication mode. For example, if the authentication mode is authentication code authentication, the identity confirmation information may be an authentication code returned by the user; if the identity authentication mode is face recognition, the identity confirmation information may be a face image acquired and returned by the user in real time after the user acquires the identity authentication instruction, which is not limited in the embodiment of the present application.
In the embodiment of the application, after the server acquires the identity confirmation information returned by the user, whether the identity verification of the user succeeds or not can be determined through the matching degree between the identity confirmation information returned by the user and the identity verification information, so that a credit investigation report is prevented from being falsely issued by other people, and the personal information safety of the user is ensured.
As a possible implementation manner, when performing identity verification in the form of a verification code, after the user inputs and submits the verification code on the authentication page of the client, the server may perform identity verification on the user according to the verification code (i.e., identity confirmation information) returned by the user.
Specifically, if the matching degree of the verification code returned by the user and the verification code sent by the server to the user is greater than or equal to the matching degree threshold, the identity confirmation information can be determined to be matched with the identity verification information, so that the identity verification of the user can be determined to be successful, and a credit investigation report can be continuously generated for the user; for example, if the verification code returned by the user is the same as the verification code sent to the user, it can be determined that the user identity verification is successful. If the matching degree of the verification code returned by the user and the verification code sent to the user by the server is smaller than the matching degree threshold value, the identity confirmation information can be determined to be not matched with the identity verification information, so that the identity verification failure of the user can be determined, a credit investigation report can be suspended from being generated for the user, and prompt information of the identity verification failure is sent to the user.
As a possible implementation manner, when performing identity verification in a face verification manner, the server may verify the identity of the user according to a face image (i.e., identity confirmation information) returned by the user.
Specifically, if the matching degree between the face image returned by the user and the face image in the user identity card image stored by the server is greater than or equal to the matching degree threshold, the identity confirmation information can be determined to be matched with the identity verification information, so that the user identity verification can be determined to be successful, and a credit investigation report can be continuously generated for the user; if the matching degree of the face image returned by the user and the face image in the user identity card image stored by the server is smaller than the matching degree threshold value, the identity confirmation information can be determined to be not matched with the identity verification information, so that the identity verification failure of the user can be determined, the generation of a credit report for the user can be suspended, and prompt information of the identity verification failure is sent to the user.
And step 206, filling and signing the occupied fields in the credit investigation report template file corresponding to the application types according to the loan data to generate a credit investigation report.
The detailed implementation process and principle of the step 206 may refer to the detailed description of the above embodiments, and are not described herein again.
According to the credit investigation report generation method provided by the embodiment of the application, when a credit investigation report application request sent by a user is obtained, borrowing data of the user is obtained according to the fact that the credit investigation report application request comprises a first user identification, the borrowing data is verified to determine the application type, an identity verification instruction is further sent to the user, and when identity confirmation information returned by the user is matched with identity verification information, occupied fields in a credit investigation report template file corresponding to the application type are filled and signed according to the borrowing data, so that a credit investigation report is generated. Therefore, the loan data of the user is automatically verified to generate different types of credit investigation reports according to the actual loan situation of the user, and the real identity of the user is verified before the credit investigation report is generated, so that the labor cost is saved, the efficiency is high, the timeliness and the accuracy of the credit investigation report are ensured, and the personal information safety of the user is ensured.
In a possible implementation form of the application, after the user loan data passes verification, corresponding credit investigation report application flow data can be generated and stored in a credit investigation report application flow database, so that whether the current loan data is consistent with the loan data at the time of sending the application or not can be further verified when the credit investigation report is generated, and the accuracy and the timeliness of the credit investigation report can be further improved.
The method for generating the credit investigation report provided in the embodiment of the present application is further described below with reference to fig. 3.
Fig. 3 is a flowchart illustrating a method for generating a credit investigation report according to an embodiment of the present application.
As shown in fig. 3, the method for generating the credit report includes the following steps:
step 301, obtaining a credit investigation report application request sent by a user, wherein the credit investigation report application request includes a first user identifier.
Step 302, obtaining the loan data of the user according to the first user identifier, wherein the loan data comprises loan service opening data, real name information, loan consumption data, loan arrearage data and third party credit investigation data.
Step 303, the loan data is verified to determine the application type.
The detailed implementation process and principle of the steps 301-303 can refer to the detailed description of the above embodiments, and are not described herein again.
Step 304, generating first credit investigation report application running data corresponding to the credit investigation report application request, wherein the first credit investigation report application running data comprises a first user identifier, an application running number, an application type, loan data and an application state, and the application state is in application.
And 305, storing the first credit investigation report application running data into a credit investigation report application running database.
In the embodiment of the present application, since a new loan operation may be performed after the user issues a credit investigation report application request, the difference between the loan data generated when the credit investigation report is generated and the loan data verification is performed may be generated, and thus the generated credit investigation report is inaccurate. Therefore, after the debit and credit data of the user are verified, a credit investigation report can be issued for the user and the application type is determined, first credit investigation report application running data corresponding to the credit investigation report application request is generated and stored in a credit investigation report application running database, so that when the template file is filled to generate a credit investigation report, the debit and credit data at the current moment are compared with the debit and credit data in the first credit investigation report application running data, and the user is prevented from borrowing again after sending the credit investigation report application request, so that the generated credit investigation report is inconsistent with the actual debit and credit data of the user.
As a possible implementation manner, the server may generate an application serial number corresponding to the credit investigation report generation request according to a preset application serial number generation manner, for example, the application serial number may be generated according to the time of the acquired credit investigation report generation request, the first user identifier, and the like, and further store information such as the first user identifier, the application serial number, the application type, whether to activate a loan service, loan consumption data, loan arrears data, third-party credit investigation data, and the like, which are related to the determination of the application type, and the application state, as a record in the credit investigation report application serial database.
It should be noted that, when the first credit investigation report application flow data corresponding to the credit investigation report application request is generated, the application process of the credit investigation report corresponding to the credit investigation report application request is not completed yet, so that when the first credit investigation report application flow data is stored, the application state included in the first credit investigation report application flow data may be determined as the application state for representing the actual processing stage where the credit investigation report application request is located.
And step 306, obtaining the loan data of the user at the current moment according to the first user identification.
In the embodiment of the application, after the loan data of the user is successfully verified and the first credit investigation report application running data corresponding to the credit investigation report application request is stored in the credit investigation report application running database, a credit investigation report application message body can be sent to the credit investigation report sending service by a routing page corresponding to the application type, wherein the credit investigation report application message body can include information such as an application running number and an application type, so that the credit investigation report sending service can further verify whether the user currently meets the opening condition of the credit investigation report according to the information in the credit investigation report application message body, and generate and send a corresponding credit investigation report to the user.
As a possible implementation manner, after obtaining the credit investigation report application message body, the credit investigation report sending service may obtain the loan data of the user again according to the first user identifier corresponding to the credit investigation report application request, that is, the loan data of the user at the current time, and then compare the loan data at the current time with the first credit investigation report application running data in the credit investigation report application running database, so as to determine whether the user still meets the opening conditions of the credit investigation report at present.
And 307, acquiring first credit investigation report application running data corresponding to the credit investigation report application request from the credit investigation report application running database according to the application running number corresponding to the credit investigation report application request.
In this embodiment of the application, the credit investigation report sending service may query the credit investigation report application running database according to the application running number in the credit investigation report application message body to obtain the first credit investigation report application running data corresponding to the current credit investigation report application request, that is, the credit investigation report application running data including the application running number in the credit investigation report application running database may be determined as the first credit investigation report application running data.
And 308, under the condition that the loan data at the current moment are matched with the first credit investigation report application running data, filling and signing the occupied fields in the credit investigation report template file corresponding to the application types according to the first credit investigation report application running data to generate a credit investigation report.
In the embodiment of the application, if the loan data of the user at the current time is the same as the loan data in the first credit investigation report application running data, it may be determined that the loan data of the user at the current time matches the first credit investigation report application running data, that is, the user does not issue a new loan operation and still meets the issuing conditions of the credit investigation report, so that the place-occupying fields in the credit investigation report template file corresponding to the application types may be filled and signed according to the loan data and other information in the first credit investigation report application running data to generate the credit investigation report.
Correspondingly, if the loan data of the user at the current moment is different from the loan data in the first credit investigation report application pipelining data, the loan data of the user at the current moment can be determined to be not matched with the first credit investigation report application pipelining data, that is, the user may send out a new loan operation and does not accord with the issuing condition of the credit investigation report, so that the credit investigation report can be refused to be continuously generated, and the promotion information of the failure in generating the credit investigation report is sent to the user.
It should be noted that, for the specific implementation process and principle of generating the credit report in step 308, reference may be made to the detailed description of the foregoing embodiments, and details are not described here again.
According to the credit investigation report generation method provided by the embodiment of the application, when a credit investigation report application request sent by a user is obtained, borrowing data of the user is obtained according to the fact that the credit investigation report application request comprises a first user identification, the borrowing data is verified to determine the application type, then first credit investigation report application running data corresponding to the credit investigation report application request is generated and stored in a credit investigation report application running database, then when a credit investigation report is generated, the first credit investigation report application running data is compared with the borrowing data at the current moment, and when the first credit investigation report application running data is matched with the borrowing data at the current moment, the credit investigation report is continuously generated. Therefore, the credit investigation report of different types is generated according to the actual credit investigation situation of the user by automatically checking the credit investigation data of the user, and the credit investigation data of the user at the current moment is checked again according to the stored credit investigation report application running data when the credit investigation report is generated, so that the change of the credit investigation data when the user applies for the credit investigation report and when the credit investigation report is generated is prevented, the labor cost is saved, the efficiency is high, and the timeliness and the accuracy of the credit investigation report are further improved.
In a possible implementation form of the application, after the credit investigation report is generated, the credit investigation report can be encrypted and stored in the cloud storage database for backup while being sent to the user, so that verification and reissue are facilitated under the condition that the credit investigation report is sent incorrectly or fails, and the reliability of generation of the credit investigation report is further improved.
The method for generating the credit investigation report provided in the embodiment of the present application is further described below with reference to fig. 4.
Fig. 4 is a flowchart illustrating a method for generating a credit investigation report according to an embodiment of the present application.
As shown in fig. 4, the method for generating the credit report includes the following steps:
step 401, a credit investigation report application request sent by a user is obtained, wherein the credit investigation report application request includes a first user identifier.
Step 402, obtaining loan data of the user according to the first user identifier, wherein the loan data comprises loan service opening data, real name information, loan consumption data, loan arrearage data and third party credit investigation data.
At step 403, the loan data is verified to determine the application type.
Step 404, generating first credit investigation report application running data corresponding to the credit investigation report application request, wherein the first credit investigation report application running data comprises a first user identifier, an application running number, an application type, loan data and an application state, and the application state is in application.
And 405, storing the first credit investigation report application running data into a credit investigation report application running database.
And 406, filling and signing the occupied fields in the credit investigation report template file corresponding to the application types according to the loan data to generate a credit investigation report.
The detailed implementation process and principle of the steps 401 and 406 can refer to the detailed description of the above embodiments, and are not described herein again.
Step 407, sending the credit report to the user.
Optionally, after generating the credit investigation report, the server may send the credit investigation report to the client of the user according to the first user identifier.
Optionally, the server may further search, according to the first user identifier, a mobile phone number reserved in the system by the user, and then send the credit investigation report or a download link of the credit investigation report to the mobile phone of the user.
Optionally, the request for applying for the credit investigation report may further include a mailbox address, and the server may further send the credit investigation report to a mailbox of the user according to the mailbox address. It should be noted that, when the credit investigation report is sent to the user in a mailbox manner, the user may be allowed to input a mailbox address for receiving the credit investigation report in a credit investigation report application interface of the client, so that the server may obtain a mail address for receiving the credit investigation report after obtaining a credit investigation report application request, and send information such as an application serial number, an application type, a mailbox address and the like to the credit investigation report sending service through a credit investigation report application message body after the debit and credit data check of the user is passed, so that the credit investigation report sending service may send the credit investigation report to a mailbox of the user according to the obtained mailbox address after generating the credit investigation report.
It should be noted that the sending of the credit report to the user may include, but is not limited to, the above-listed situations. In actual use, at least one mode can be adopted to send a credit investigation report to a user according to actual needs and specific application scenes.
And step 408, encrypting the credit investigation report, and storing the encrypted credit investigation report to a cloud storage database.
In the embodiment of the application, in order to acquire the generated credit investigation report at any time for management or use after the credit investigation report is generated and sent to the user, the generated credit investigation report can be encrypted and then stored in the cloud storage database, so that the user data is prevented from being tampered by an encryption technology while the credit investigation report is stored, and the personal information security of the user is ensured.
It should be noted that, in actual use, a suitable encryption algorithm may be selected to encrypt the credit investigation report according to actual needs and a specific application scenario, which is not limited in this embodiment of the present application. For example, the credit report may be encrypted by Advanced Encryption Standard (AES) Encryption technology.
Step 409, storing the encrypted credit investigation report in a storage address of the cloud storage database in the first credit investigation report application flow data.
In this embodiment of the application, after the encrypted credit investigation report is stored in the cloud storage database, the credit investigation report sending service may store the storage address of the encrypted credit investigation report in the cloud storage database in the first credit investigation report application flow data, so that the corresponding credit investigation report may be obtained from the cloud storage database by querying the storage address in the credit investigation report application flow data.
And step 410, updating the application state in the first credit investigation report application pipelining data to be successful in sending.
In the application embodiment, after the credit investigation report sending service sends the credit investigation report to the user and stores the credit investigation report in the cloud storage database, it may be considered that the current credit investigation report application request is processed, so that the application state in the first credit investigation report application flow data corresponding to the credit investigation report application request may be updated to be successful in sending, and the real-time processing state of each credit investigation report application request is indicated in the credit investigation report application flow database.
Furthermore, the credit investigation report may be failed to be sent due to network failure or a change in a receiving mode of a user, so that the credit investigation report can be reissued through backup data in the cloud storage database, and reliability and practicability of sending the credit investigation report are further improved. That is, in a possible implementation manner of this embodiment of the application, after the step 410, the method may further include:
Acquiring a credit investigation report reissue request, wherein the credit investigation report reissue request comprises a second user identifier and a mailbox address;
acquiring second credit investigation report application running data corresponding to the second user identification from the credit investigation report application running database according to the second user identification;
acquiring a credit investigation report to be reissued from a cloud storage database according to a storage address included in the second credit investigation report application flow data;
carrying out decryption processing on the credit investigation report to be reissued so as to generate a decrypted credit investigation report;
and sending the decrypted credit investigation report according to the mailbox address.
In the embodiment of the application, if the user fails to receive the credit investigation report due to network failure or change of the receiving address, the client may send a credit investigation report reissue request, and the server may query the credit investigation report application flow database according to a second user identifier included in the credit investigation report reissue request. If the credit investigation report application running data containing the second user identification exists in the credit investigation report application running database, the credit investigation report application running data can be determined as a second credit investigation report to be applied to the running data, further, a credit investigation report to be sent again can be obtained from the cloud storage database according to a storage address in the second credit investigation report application running data, the credit investigation report to be sent again is decrypted, and further, the decrypted credit investigation report is sent to a mailbox of a user according to a mailbox address in the credit investigation report reissue request.
It should be noted that, if the credit investigation report application flow database does not have the credit investigation report application flow data matched with the second user identifier, it may be determined that no credit investigation report has been generated for the user, so that a prompt message of reimbursement failure may be sent to the user.
The credit investigation report generation method provided by the embodiment of the application can obtain the credit investigation report application request sent by the user, obtaining the loan data of the user according to the credit investigation report application request including the first user identification, and checking the loan data, to determine the application type, then generating a first credit investigation report application running data corresponding to the credit investigation report application request and storing the first credit investigation report application running data in a credit investigation report application running database, further, after the credit investigation report is generated, the credit investigation report is sent to the user, and the encrypted credit investigation report is stored in a cloud storage database, further, the corresponding credit investigation report application running data is updated according to the storage address of the credit investigation report, the application state in the corresponding credit investigation report application running data is updated to be successful in sending, and when the credit investigation report reissue request is obtained, obtaining a corresponding credit investigation report from the cloud storage database and reissuing the credit investigation report to the user. Therefore, the loan data of the user is automatically verified to generate different types of credit investigation reports according to the actual loan situation of the user, and the credit investigation reports are encrypted and stored after being generated so as to be convenient for management and reissue of the credit investigation reports, so that the labor cost is saved, the efficiency is high, and the reliability of generation of the credit investigation reports is further improved.
In order to implement the above embodiments, the present application further provides a credit investigation report generation device.
Fig. 5 is a schematic structural diagram of an apparatus for generating a credit investigation report according to an embodiment of the present application.
As shown in fig. 5, the credit report generation device 50 includes:
a first obtaining module 51, configured to obtain a credit investigation report application request sent by a user, where the credit investigation report application request includes a first user identifier;
the second obtaining module 52 is configured to obtain loan data of the user according to the first user identifier, where the loan data includes loan service provisioning data, real name information, loan consumption data, loan arrearage data, and third-party credit data;
a first determining module 53, configured to verify the loan data to determine the application type.
And the first generating module 54 is used for filling and signing the occupied fields in the credit investigation report template file corresponding to the application types according to the loan data so as to generate the credit investigation report.
In practical use, the credit investigation report generation device provided in the embodiment of the present application may be configured in any electronic device to execute the method for generating the credit investigation report.
According to the credit investigation report generation device provided by the embodiment of the application, when a credit investigation report application request sent by a user is obtained, borrowing data of the user is obtained according to the credit investigation report application request including a first user identifier, the borrowing data is verified to determine the application type, and then the occupied fields in the credit investigation report template file corresponding to the application type are filled and signed according to the borrowing data to generate the credit investigation report. Therefore, the loan data of the user are automatically verified to generate credit investigation reports of different types according to the actual loan situation of the user, so that the labor cost is saved, the efficiency is high, and the timeliness and the accuracy of the credit investigation reports are ensured.
In one possible implementation form of the present application, the above application types include: no transaction certification, settlement certification and settlement certification containing third-party credit data; accordingly, the first determining module 53 includes:
the first determining unit is used for determining the application type as no transaction certificate under the condition that the loan service is opened and the loan consumption data does not contain the loan consumption record;
the second determining unit is used for determining the application type as a settlement proof under the condition that the loan service is opened and the loan arrearage data is settled;
and the third determining unit is used for determining the application type as the settlement proof containing the third-party credit investigation data under the conditions that the loan service is opened, the loan debt data is settled and the third-party credit investigation data exists.
Further, in another possible implementation form of the present application, the apparatus 50 for generating a credit report further includes:
and the first sending module is used for sending a prompt message that the credit investigation report cannot be provided temporarily to the user under the condition that the loan service is not opened or the loan arrearage data is not settled.
Further, in another possible implementation form of the present application, the apparatus 50 for generating a credit report further includes:
The second sending module is used for sending an identity verification instruction to the user, wherein the identity verification instruction comprises identity verification information used for verifying the identity of the user;
and the third acquisition module is used for acquiring the identity confirmation information returned by the user and determining that the identity confirmation information is matched with the identity verification information.
Further, in another possible implementation form of the present application, the apparatus 50 for generating a credit report further includes:
the second generation module is used for generating first credit investigation report application running data corresponding to the credit investigation report application request, wherein the first credit investigation report application running data comprises a first user identifier, an application running number, an application type, loan data and an application state, and the application state is in application;
and the first storage module is used for storing the first credit investigation report application running data to a credit investigation report application running database.
Further, in another possible implementation form of the present application, the first generating module 54 includes:
the first obtaining unit is used for obtaining the loan data of the user at the current moment according to the first user identification;
a second obtaining unit, configured to obtain, from a credit investigation report application running database, first credit investigation report application running data corresponding to a credit investigation report application request according to an application running number corresponding to the credit investigation report application request;
And the generating unit is used for filling and signing the occupied fields in the credit investigation report template file corresponding to the application types according to the first credit investigation report application running data under the condition that the loan data at the current moment is matched with the first credit investigation report application running data so as to generate the credit investigation report.
Further, in another possible implementation form of the present application, the apparatus 50 for generating a credit report further includes:
the third sending module is used for sending the credit investigation report to the user;
the second storage module is used for encrypting the credit investigation report and storing the encrypted credit investigation report to the cloud storage database;
the third storage module is used for storing the encrypted credit investigation report in the storage address of the cloud storage database in the first credit investigation report application running data;
and the updating module is used for updating the application state in the first credit investigation report application pipelining data to be successful in sending.
Further, in another possible implementation form of the present application, the third sending module includes:
and the sending unit is used for sending the credit investigation report to the mailbox of the user according to the mailbox address.
Further, in another possible implementation form of the present application, the apparatus 50 for generating a credit report further includes:
The fourth acquisition module is used for acquiring a credit investigation report reissue request, wherein the credit investigation report reissue request comprises a second user identifier and a mailbox address;
a fifth obtaining module, configured to obtain, according to the second user identifier, second credit investigation report application running data corresponding to the second user identifier from a credit investigation report application running database;
the sixth acquisition module is used for acquiring the credit investigation report to be reissued from the cloud storage database according to the storage address included in the second credit investigation report application running data;
the decryption module is used for decrypting the credit investigation report to be reissued so as to generate a decrypted credit investigation report;
and the fourth sending module is used for sending the decrypted credit investigation report according to the mailbox address.
Further, in another possible implementation form of the present application, the apparatus 50 for generating a credit report further includes:
a seventh obtaining module, configured to obtain credit investigation report application times of the first user identifier within a preset time period;
and the second determining module is used for determining that the credit investigation report application times are less than or equal to the application time threshold.
Further, in another possible implementation form of the present application, the apparatus 50 for generating a credit report further includes:
The eighth acquiring module is used for acquiring an authorized book page acquiring request sent by a user;
and the fifth sending module is used for sending the authorized book pages to the user.
The above explanation of the embodiment of the method for generating a credit report shown in fig. 1, 2, 3, and 4 is also applicable to the apparatus 50 for generating a credit report of this embodiment, and will not be repeated here.
The credit investigation report generation device provided by the embodiment of the application can obtain the credit investigation report application request sent by the user, obtaining the loan data of the user according to the credit investigation report application request including the first user identification, and checking the loan data, to determine the application type, then generating a first credit investigation report application running data corresponding to the credit investigation report application request and storing the first credit investigation report application running data in a credit investigation report application running database, further, after the credit investigation report is generated, the credit investigation report is sent to the user, and the encrypted credit investigation report is stored in a cloud storage database, further, the corresponding credit investigation report application running data is updated according to the storage address of the credit investigation report, the application state in the corresponding credit investigation report application running data is updated to be successful in sending, and when the credit investigation report reissue request is obtained, obtaining a corresponding credit investigation report from the cloud storage database and reissuing the credit investigation report to the user. Therefore, the loan data of the user is automatically verified to generate different types of credit investigation reports according to the actual loan situation of the user, and the credit investigation reports are encrypted and stored after being generated so as to be convenient for management and reissue of the credit investigation reports, so that the labor cost is saved, the efficiency is high, and the reliability of generation of the credit investigation reports is further improved.
In order to implement the above embodiments, the present application further provides an electronic device.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
As shown in fig. 6, the electronic device 200 includes:
a memory 210 and a processor 220, a bus 230 connecting different components (including the memory 210 and the processor 220), wherein the memory 210 stores a computer program, and when the processor 220 executes the program, the method for generating the credit investigation report according to the embodiment of the present application is realized.
Bus 230 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Electronic device 200 typically includes a variety of electronic device readable media. Such media may be any available media that is accessible by electronic device 200 and includes both volatile and nonvolatile media, removable and non-removable media.
Memory 210 may also include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)240 and/or cache memory 250. The electronic device 200 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 260 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 6, commonly referred to as a "hard drive"). Although not shown in FIG. 6, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 230 by one or more data media interfaces. Memory 210 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the application.
A program/utility 280 having a set (at least one) of program modules 270, including but not limited to an operating system, one or more application programs, other program modules, and program data, each of which or some combination thereof may comprise an implementation of a network environment, may be stored in, for example, the memory 210. The program modules 270 generally perform the functions and/or methodologies of the embodiments described herein.
Electronic device 200 may also communicate with one or more external devices 290 (e.g., keyboard, pointing device, display 291, etc.), with one or more devices that enable a user to interact with electronic device 200, and/or with any devices (e.g., network card, modem, etc.) that enable electronic device 200 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 292. Also, the electronic device 200 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 293. As shown, the network adapter 293 communicates with the other modules of the electronic device 200 via the bus 230. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 200, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processor 220 executes various functional applications and data processing by executing programs stored in the memory 210.
It should be noted that, for the implementation process and the technical principle of the electronic device of the embodiment, reference is made to the foregoing explanation of the method for generating a credit report in the embodiment of the present application, and details are not described here again.
The electronic device provided by the embodiment of the application can execute the method for generating the credit investigation report as described above, and when a credit investigation report application request sent by a user is obtained, the debit and credit data of the user is obtained according to the credit investigation report application request including the first user identifier, the debit and credit data is verified to determine the application type, and then the placeholder fields in the credit investigation report template file corresponding to the application type are filled and signed according to the debit and credit data to generate the credit investigation report. Therefore, the loan data of the user are automatically verified to generate credit investigation reports of different types according to the actual loan situation of the user, so that the labor cost is saved, the efficiency is high, and the timeliness and the accuracy of the credit investigation reports are ensured.
In order to implement the above embodiments, the present application also proposes a computer-readable storage medium.
The computer-readable storage medium stores thereon a computer program, and the computer program is executed by a processor to implement the method for generating the credit report according to the embodiment of the present application.
In order to implement the foregoing embodiments, a further embodiment of the present application provides a computer program, which when executed by a processor, implements the method for generating a credit report according to the embodiments of the present application.
In an alternative implementation, the embodiments may be implemented in any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the consumer electronic device, partly on the consumer electronic device, as a stand-alone software package, partly on the consumer electronic device and partly on a remote electronic device, or entirely on the remote electronic device or server. In the case of remote electronic devices, the remote electronic devices may be connected to the consumer electronic device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external electronic device (e.g., through the internet using an internet service provider).
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (14)

1. A method for generating a credit report, comprising:
acquiring a credit investigation report application request sent by a user, wherein the credit investigation report application request comprises a first user identifier;
acquiring loan data of the user according to the first user identification, wherein the loan data comprises loan service opening data, real name information, loan consumption data, loan debt data and third party credit investigation data;
Verifying the loan data to determine an application type;
and filling and signing the occupied fields in the credit investigation report template file corresponding to the application type according to the loan data to generate a credit investigation report.
2. The method of claim 1, wherein the application type comprises: the method comprises the following steps of verifying loan data to determine the application type, wherein the verifying step comprises the following steps of:
determining the application type as no transaction evidence under the condition that a loan service is opened and the loan consumption data does not contain loan consumption records;
determining the application type as a clearing certification if the loan service has been opened and the loan debt data is cleared;
and determining the application type as a settlement proof containing third-party credit investigation data under the conditions that the loan service is opened, the loan debt data is settled and the third-party credit investigation data exists.
3. The method of claim 2, wherein said verifying said loan data to determine a type of application further comprises:
And sending a prompt message that a credit investigation report cannot be provided temporarily to the user under the condition that the loan service is not opened or the loan arrearage data is not settled.
4. The method of claim 1, wherein before filling and signing the placeholder fields in the credit investigation template file corresponding to the application type according to the loan data to generate the credit investigation report, the method further comprises:
sending an identity verification instruction to the user, wherein the identity verification instruction comprises identity verification information used for verifying the identity of the user;
and acquiring the identity confirmation information returned by the user, and determining that the identity confirmation information is matched with the identity verification information.
5. The method of claim 1, wherein before filling and signing the placeholder fields in the credit investigation template file corresponding to the application type according to the loan data to generate the credit investigation report, the method further comprises:
generating first credit investigation report application running data corresponding to the credit investigation report application request, wherein the first credit investigation report application running data comprises the first user identification, the application running number, the application type, the loan data and an application state, and the application state is in application;
And storing the first credit investigation report application running data to a credit investigation report application running database.
6. The method of claim 5, wherein the filling and signing the placeholder fields in the credit investigation report template file corresponding to the application type according to the loan data to generate the credit investigation report comprises:
acquiring loan data of the user at the current moment according to the first user identification;
acquiring first credit investigation report application running data corresponding to the credit investigation report application request from the credit investigation report application running database according to an application running number corresponding to the credit investigation report application request;
and under the condition that the loan data at the current moment are matched with the first credit investigation report application running data, filling and signing the occupied fields in the credit investigation report template file corresponding to the application types according to the first credit investigation report application running data to generate a credit investigation report.
7. The method of claim 5, wherein after filling and signing the placeholder fields in the credit investigation template file corresponding to the application type according to the loan data to generate the credit investigation report, the method further comprises:
Sending the credit investigation report to the user;
encrypting the credit investigation report, and storing the encrypted credit investigation report to a cloud storage database;
storing the encrypted credit investigation report in a storage address of the cloud storage database in the first credit investigation report application flow data;
and updating the application state in the first credit investigation report application pipelining data to be successful in sending.
8. The method of claim 7, wherein the request for applying for the credit report further includes a mailbox address, and the sending the credit report to the user comprises:
and sending the credit investigation report to the mailbox of the user according to the mailbox address.
9. The method of claim 7, wherein after the updating the application status in the first credit investigation report application pipelining data to a successful transmission, the method further comprises:
acquiring a credit investigation report reissue request, wherein the credit investigation report reissue request comprises a second user identifier and a mailbox address;
acquiring second credit investigation report application running data corresponding to the second user identification from the credit investigation report application running database according to the second user identification;
Acquiring a credit investigation report to be reissued from the cloud storage database according to a storage address included in the second credit investigation report application flow data;
decrypting the credit investigation report to be reissued to generate a decrypted credit investigation report;
and sending the decrypted credit investigation report according to the mailbox address.
10. The method of any of claims 1-9, wherein prior to obtaining loan data for the user based on the first user identification, further comprising:
acquiring the credit investigation report application times of the first user identification in a preset time period;
and determining that the credit investigation report application times are less than or equal to an application time threshold.
11. The method according to any one of claims 1 to 9, wherein, after filling and signing the placeholder fields in the credit investigation template file corresponding to the application type according to the loan data to generate a credit investigation report, the method further comprises:
obtaining an authorized page obtaining request sent by the user;
and sending the authorized book page to the user.
12. An apparatus for generating a credit report, comprising:
the first acquisition module is used for acquiring a credit investigation report application request sent by a user, wherein the credit investigation report application request comprises a first user identifier;
The second obtaining module is used for obtaining loan data of the user according to the first user identification, wherein the loan data comprise loan service opening data, real name information, loan consumption data, loan debt data and third-party credit investigation data;
the first determining module is used for verifying the loan data to determine the application type;
and the first generation module is used for filling and signing the occupied fields in the credit investigation report template file corresponding to the application type according to the loan data so as to generate a credit investigation report.
13. An electronic device, comprising: memory, processor and program stored on the memory and executable on the processor, characterized in that the processor implements the method for credit report generation according to any of claims 1-10 when executing the program.
14. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a method of generating an credit report according to any one of claims 1 to 10.
CN202110850454.8A 2021-07-27 2021-07-27 Credit report generation method and device and electronic equipment Active CN113592625B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110850454.8A CN113592625B (en) 2021-07-27 2021-07-27 Credit report generation method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110850454.8A CN113592625B (en) 2021-07-27 2021-07-27 Credit report generation method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN113592625A true CN113592625A (en) 2021-11-02
CN113592625B CN113592625B (en) 2024-04-05

Family

ID=78250555

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110850454.8A Active CN113592625B (en) 2021-07-27 2021-07-27 Credit report generation method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN113592625B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8694420B1 (en) * 2001-12-05 2014-04-08 Experian Information Solutions, Inc. System and method for outputting a credit risk report based on debit data
CN104680324A (en) * 2015-03-05 2015-06-03 东汇征信有限公司南京分公司 CMS credit information sharing management system and method
CN106789436A (en) * 2016-12-29 2017-05-31 深圳微众税银信息服务有限公司 A kind of reference report-generating method and system
CN108171600A (en) * 2018-01-19 2018-06-15 深圳前海大数金融服务有限公司 Reference report analytic method, server and storage medium
CN108564462A (en) * 2018-03-15 2018-09-21 平安普惠企业管理有限公司 Acquisition methods, terminal device and the medium of collage-credit data
CN108734566A (en) * 2018-04-03 2018-11-02 平安普惠企业管理有限公司 Collage-credit data querying method, terminal device and medium
CN109325850A (en) * 2018-09-27 2019-02-12 苏宁消费金融有限公司 Consumer finance reference management platform system
CN112051992A (en) * 2020-09-02 2020-12-08 天元大数据信用管理有限公司 Data processing method and system based on credit investigation report generation
CN112785411A (en) * 2020-12-29 2021-05-11 平安消费金融有限公司 Credit investigation data processing method, system, equipment and computer readable storage medium
CN113139869A (en) * 2021-05-19 2021-07-20 中国建设银行股份有限公司 Credit investigation authorization query processing method and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8694420B1 (en) * 2001-12-05 2014-04-08 Experian Information Solutions, Inc. System and method for outputting a credit risk report based on debit data
CN104680324A (en) * 2015-03-05 2015-06-03 东汇征信有限公司南京分公司 CMS credit information sharing management system and method
CN106789436A (en) * 2016-12-29 2017-05-31 深圳微众税银信息服务有限公司 A kind of reference report-generating method and system
CN108171600A (en) * 2018-01-19 2018-06-15 深圳前海大数金融服务有限公司 Reference report analytic method, server and storage medium
CN108564462A (en) * 2018-03-15 2018-09-21 平安普惠企业管理有限公司 Acquisition methods, terminal device and the medium of collage-credit data
CN108734566A (en) * 2018-04-03 2018-11-02 平安普惠企业管理有限公司 Collage-credit data querying method, terminal device and medium
CN109325850A (en) * 2018-09-27 2019-02-12 苏宁消费金融有限公司 Consumer finance reference management platform system
CN112051992A (en) * 2020-09-02 2020-12-08 天元大数据信用管理有限公司 Data processing method and system based on credit investigation report generation
CN112785411A (en) * 2020-12-29 2021-05-11 平安消费金融有限公司 Credit investigation data processing method, system, equipment and computer readable storage medium
CN113139869A (en) * 2021-05-19 2021-07-20 中国建设银行股份有限公司 Credit investigation authorization query processing method and device

Also Published As

Publication number Publication date
CN113592625B (en) 2024-04-05

Similar Documents

Publication Publication Date Title
US20190190723A1 (en) Authentication system and method, and user equipment, authentication server, and service server for performing same method
CN113190822B (en) Identity authentication method, personal security kernel node and electronic equipment
TW202008290A (en) Blockchain-based service rental methods and devices
CN108540449B (en) Intelligent seal control method and system and computer storage medium
CN110348853B (en) Block chain off-line transaction method and system based on identification authentication
US20020038290A1 (en) Digital notary system and method
US20110289318A1 (en) System and Method for Online Digital Signature and Verification
CN108763898A (en) A kind of information processing method and system
CN106529938A (en) Virtual card issuing method, device and terminal
CN113472720B (en) Digital certificate key processing method, device, terminal equipment and storage medium
CN109560934B (en) Data tamper-proof method and device, computer equipment and storage medium
CN110599290A (en) Data processing method and system for cross-border transaction
CN110392043B (en) Method and system for endowing electronic contract notarization with mandatory execution effect
CN111861415A (en) Approval chain setting method and device, electronic equipment and storage medium
CN112307728A (en) Automatic form completion from a set of federated data providers
CN110690971A (en) Data processing method and system based on USBKey
CN113592625B (en) Credit report generation method and device and electronic equipment
CN113114615A (en) Device, system, method, storage medium, and program product for preventing data hijacking
CN107566410A (en) A kind of data save message request treating method and apparatus from damage
CN112926047A (en) Authorization control method and device for localized deployment product, electronic equipment and medium
CN107483210B (en) Data verification method and system
CN111415148A (en) Method and device for non-inductive payment, electronic equipment and storage medium
CN110690973A (en) Identity verification method, identity verification device, identity verification medium and electronic equipment
CN111401889A (en) Credit data processing method, device, equipment and medium based on block chain
CN113452528B (en) Request processing method, system, computer device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant