CN115147209A - Credit investigation authorization bookmark deployment method, system, equipment and storage medium - Google Patents

Credit investigation authorization bookmark deployment method, system, equipment and storage medium Download PDF

Info

Publication number
CN115147209A
CN115147209A CN202210860823.6A CN202210860823A CN115147209A CN 115147209 A CN115147209 A CN 115147209A CN 202210860823 A CN202210860823 A CN 202210860823A CN 115147209 A CN115147209 A CN 115147209A
Authority
CN
China
Prior art keywords
credit investigation
signing
investigation authorization
bookmark
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210860823.6A
Other languages
Chinese (zh)
Inventor
寻港
朱泽壮
杨婷婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Commercial Factoring Co ltd
Original Assignee
Ping An Commercial Factoring Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Commercial Factoring Co ltd filed Critical Ping An Commercial Factoring Co ltd
Priority to CN202210860823.6A priority Critical patent/CN115147209A/en
Publication of CN115147209A publication Critical patent/CN115147209A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services

Landscapes

  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Technology Law (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to a credit investigation authorization bookmark deployment method, system, device and storage medium. The credit investigation authorization bookmark deployment method comprises the following steps: the method comprises the steps of obtaining a credit investigation authorization signing request of a target client, determining identity information of the target client according to the credit investigation authorization signing request, judging whether the identity information of the target client meets preset credit investigation authorization bookmark signing conditions, if so, loading a credit investigation authorization bookmark signing interface through an obtained WeChat link, sending the credit investigation authorization bookmark signing interface to a client for displaying, receiving signing information aiming at the displayed credit investigation authorization bookmark signing interface sent by the client, and generating a credit investigation authorization book based on the signing information, so that the generation of the credit investigation authorization book is convenient and rapid, the time cost is saved, particularly, the credit investigation authorization bookmark signing interface is loaded and displayed through the obtained WeChat link, the dependence on manual operation is reduced, and the generation efficiency of the credit investigation authorization book is greatly improved.

Description

Credit investigation authorization bookmark deployment method, system, equipment and storage medium
Technical Field
The present application relates to the field of computer and data processing technologies, and more particularly, to a credit investigation authorization bookmark deployment method, system, device, and storage medium.
Background
In recent years, credit investigation and authorization are applied more, and various financial risks can be evaluated for financers. The credit investigation authorization means that an individual or an organization is authorized to access the credit investigation system and view the credit investigation report of the enterprise or the individual. Some signing means may be involved in obtaining the credit report.
However, in the existing signing mode, the mobile phone number of the signer is mostly registered by other persons, but the signer submits the registration, short message verification of the mobile phone number on hand is not performed, real name authentication is not performed on the submitted signer login mobile phone number, a condition of submission error occurs sometimes, and the working process of generating the credit investigation authorization book relies on manual operation too much, so that the processing efficiency is low, and a series of problems of low efficiency of a subsequent credit granting process, inaccurate processed data and the like are influenced.
Disclosure of Invention
Based on the technical problem, the invention aims to load a credit investigation authorization bookmark deployment interface through the acquired WeChat link, send the credit investigation authorization bookmark deployment interface to the client for display, receive signing information aiming at the displayed credit investigation authorization book signing interface sent by the client, and finally generate the credit investigation authorization book based on the signing information.
The invention provides a credit investigation authorization bookmark deployment method in a first aspect, which comprises the following steps:
acquiring a credit investigation authorization signing request of a target client;
determining the identity information of the target client according to the credit investigation authorization signing request;
judging whether the identity information of the target client meets the preset credit investigation authorization bookmark deployment condition or not;
if the answer is yes, loading a credit investigation authorization bookmark deployment interface through the acquired WeChat link, and sending the credit investigation authorization bookmark deployment interface to a client for display;
receiving signing information aiming at the displayed credit investigation authorization bookmark deployment interface sent by a client;
and generating a credit investigation authorization book based on the signing information.
In some embodiments of the present invention, the determining identity information of the target client according to the credit investigation authorization signing request includes:
analyzing the credit investigation authorization signing request;
and determining the identity information of the target client according to the analysis result.
In some embodiments of the present invention, the loading a credit investigation authorization bookmark deployment interface through the obtained wechat link, and sending the credit investigation authorization bookmark deployment interface to a client for display includes:
acquiring a WeChat link;
judging whether the WeChat link meets the preset condition of data safety or not;
and if the credit investigation result accords with the credit investigation result, loading a credit investigation authorization bookmark deployment interface through the WeChat link, and sending the credit investigation authorization bookmark deployment interface to a client for display.
In some embodiments of the present invention, the generating a credit investigation authorization based on the signing information comprises:
acquiring an electronic seal required for generating a credit investigation authorization book;
and fusing the electronic seal and the signing information to generate a credit investigation authorization book.
In some embodiments of the present invention, the obtaining the electronic seal used for generating the credit investigation authorization book includes:
judging whether the electronic seal required to be used is an old electronic seal, if so, acquiring the old electronic seal;
if not, a new electronic seal is made.
In some embodiments of the invention, said making a new electronic seal comprises:
and making the new electronic seal based on the received identity authentication information.
In some embodiments of the invention, the fusing the electronic seal and the signing information to generate a credit investigation authorization book includes:
receiving an identity card photo matched with the signing information;
performing living body detection on the target client;
if the identity card picture and the living body detection result accord with a preset verification condition, obtaining verification information of a used seal;
if the seal verification information is correct, enabling the electronic seal to sign the signing information;
and taking the signed signing information as the credit investigation authorization book.
A second aspect of the present invention provides a credit investigation authorization document signing system, which comprises:
the acquisition module is used for acquiring a credit investigation authorization signing request of a target client;
the determining module is used for determining the identity information of the target client according to the credit investigation authorization signing request;
the judging module is used for judging whether the identity information of the target client meets the preset credit investigation authorization bookmark deployment condition or not;
the display module is used for loading and displaying a credit investigation authorization bookmark deployment interface through the acquired WeChat link when the signing conditions of the preset credit investigation authorization book are met;
the receiving module is used for receiving signing information aiming at the displayed credit investigation authorization bookmark deploying interface sent by a client;
and the generating module is used for generating a credit investigation authorization book based on the signing information.
A third aspect of the invention provides a computer device comprising a memory and a processor, the memory having stored therein computer-readable instructions which, when executed by the processor, cause the processor to perform the steps of:
acquiring a credit investigation authorization signing request of a target client;
determining the identity information of the target client according to the credit investigation authorization signing request;
judging whether the identity information of the target client meets the preset credit investigation authorization bookmark deployment condition or not;
if the answer is yes, loading a credit investigation authorization bookmark deployment interface through the acquired WeChat link, and sending the credit investigation authorization bookmark deployment interface to a client for display;
receiving signing information aiming at the displayed credit investigation authorization bookmark deploying interface sent by a client;
and generating a credit investigation authorization book based on the signing information.
A fourth aspect of the present invention provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of:
acquiring a credit investigation authorization signing request of a target client;
determining the identity information of the target client according to the credit investigation authorization signing request;
judging whether the identity information of the target client meets the preset credit investigation authorization bookmark deployment condition or not;
if the answer is yes, loading a credit investigation authorization bookmark deployment interface through the acquired WeChat link, and sending the credit investigation authorization bookmark deployment interface to a client for display;
receiving signing information aiming at the displayed credit investigation authorization bookmark deploying interface sent by a client;
and generating a credit investigation authorization book based on the signing information.
The technical scheme provided in the embodiment of the application at least has the following technical effects or advantages:
the method comprises the steps of firstly obtaining a credit investigation authorization signing request of a target client, determining identity information of the target client according to the credit investigation authorization signing request, judging whether the identity information of the target client meets preset credit investigation authorization bookmark signing conditions, loading a credit investigation authorization bookmark signing interface through an obtained WeChat link if the identity information of the target client meets the preset credit investigation authorization bookmark signing conditions, sending the credit investigation authorization bookmark signing interface to a client for displaying, receiving signing information aiming at the displayed credit investigation authorization signing interface sent by the client, and finally generating a credit investigation authorization book based on the signing information, so that the credit investigation authorization book is signed conveniently and quickly, the time cost is saved, and the credit investigation authorization book signing efficiency is improved. Particularly, the credit investigation authorization book signing interface is loaded through the acquired WeChat link and is sent to the client side for displaying, so that excessive dependence on manual operation is reduced, the data processing efficiency of related application scenes is improved, the service quality is improved, the customer satisfaction is improved, the customer manager service time is greatly reduced, the number of small credits submitted by the customer manager in unit time is increased, the efficiency of business development of the customer manager is improved, and the method is a tool for promoting business.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the application. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a diagram illustrating steps of a credit investigation authorization bookmark deployment method in an exemplary embodiment of the present application;
FIG. 2 is a schematic diagram illustrating a screen shot of a cell phone after clicking a WeChat link in an exemplary embodiment of the present application;
fig. 3 is a schematic diagram illustrating a screen shot of a mobile phone for uploading a signature personal identity photo on a credit authorization form signing interface in an exemplary embodiment of the application;
fig. 4 shows a schematic structural diagram of a credit investigation authorization signing system in an exemplary embodiment of the application;
fig. 5 shows a schematic structural diagram of a computer device according to an exemplary embodiment of the present application.
Detailed Description
Hereinafter, embodiments of the present application will be described with reference to the accompanying drawings. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present application. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present application. It will be apparent to one skilled in the art that the present application may be practiced without one or more of these details. In other instances, well-known features of the art have not been described in order to avoid obscuring the present application.
It should be noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments according to the present application. As used herein, the singular is intended to include the plural unless the context clearly dictates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Exemplary embodiments according to the present application will now be described in more detail with reference to the accompanying drawings. These exemplary embodiments may, however, be embodied in many different forms and should not be construed as limited to only the embodiments set forth herein. The figures are not drawn to scale, wherein certain details may be exaggerated and omitted for clarity. The shapes of the various regions, layers and their relative sizes, positional relationships are shown in the drawings as examples only, and in practice deviations due to manufacturing tolerances or technical limitations are possible, and a person skilled in the art may additionally design regions/layers with different shapes, sizes, relative positions according to the actual needs.
Several examples are given below in conjunction with the description of figures 1-5 to describe exemplary embodiments according to the present application. It should be noted that the following application scenarios are merely illustrated for the convenience of understanding the spirit and principles of the present application, and the embodiments of the present application are not limited in this respect. Rather, embodiments of the present application may be applied to any scenario where applicable.
Example 1:
the embodiment provides a credit investigation authorization bookmark signing method, as shown in fig. 1, the method includes:
s1, acquiring a credit investigation authorization signing request of a target client;
s2, determining the identity information of the target client according to the credit investigation authorization signing request;
s3, judging whether the identity information of the target client meets the preset credit investigation authorization bookmark deployment condition or not;
s4, if the answer is up, loading a credit investigation authorization bookmark deployment interface through the acquired WeChat link, and sending the credit investigation authorization bookmark deployment interface to a client for display;
s5, receiving signing information aiming at the displayed credit investigation authorization bookmark deploying interface sent by the client;
and S6, generating a credit investigation authorization book based on the signing information.
Specifically, the target client in the credit investigation authorization signing request of the target client obtained in S1 may be various types of enterprises, including companies with great stakeholders, and also including individual users, and certainly also including users to be detected, such as signers. And S2, sending the identity information of the target client to a service system according to the credit investigation authorization signing request, wherein the identity information comprises business license, legal representative and capital identity card information.
In a specific implementation manner, loading a credit investigation authorization bookmark deployment interface through an acquired wechat link, and sending the credit investigation authorization bookmark deployment interface to a client for display includes: acquiring a WeChat link; judging whether the WeChat link meets the preset condition of data safety or not; and if so, loading a credit investigation authorization bookmark deployment interface through the WeChat link, and sending the credit investigation authorization bookmark deployment interface to a client for display. Here, the WeChat link may be a WeChat link shared by the signer by the manager, but whatever WeChat link is first checked to see if it is safe, such as Trojan killing, etc. As a changeable implementation mode, the wechat link can be a short message link, and only the credit investigation authorization bookmark deployment interface is loaded and sent to the client for display. The client can be a mobile terminal such as a mobile phone of a client, and can also be a computer and the like.
In a specific implementation, the generating a credit investigation authorization book based on the signing information includes: acquiring an electronic seal required for generating a credit investigation authorization book; and fusing the electronic seal and the signing information to generate a credit investigation authorization book. The electronic seal used for acquiring and generating the credit investigation authorization book comprises: judging whether the electronic seal required to be used is an old electronic seal, if so, acquiring the old electronic seal; if not, a new electronic seal is made. The new electronic seal manufacturing method comprises the following steps: and making the new electronic seal based on the received identity authentication information.
As a convertible implementation manner, in a specific implementation manner, the signature of the target credit investigation authorization book can be performed on the credit investigation authorization bookmark deployment interface based on the identification number of the signer, the client ID is called in the business system according to the identification number of the signer, the credit investigation authorization protocol corresponding to the client ID is obtained, whether a new electronic seal needs to be made in the credit investigation authorization protocol is judged, if so, the new electronic seal is made, the made new electronic seal is used for signing the credit investigation authorization protocol, and finally the signed protocol is used as the target credit investigation authorization book. If the new electronic seal does not need to be made, the valid electronic seal already stored in the business system is used, and the valid electronic seal already stored in the business system is used for completing the signing of the target credit investigation authorization.
In a specific implementation manner, the method for manufacturing the new electronic seal comprises the following steps: and making a new electronic seal based on the verification code of the mobile phone number pre-registered in the service system. And if the mobile phone number pre-registered in the service system is inconsistent with the current mobile phone number of the signer, the mobile phone number registered in the service system is revised as the current mobile phone number of the signer.
In a specific implementation manner, an identity card photo matched with the signing information is received, living body detection is performed on the target client, seal verification information is obtained if the identity card photo and the living body detection result meet preset verification conditions, the electronic seal is started to sign the signing information if the seal verification information is correct, and finally the signed signing information is used as the credit investigation authorization.
The credit investigation authorization bookmark deployment method greatly reduces time of submitting credit by a user, can help to improve service quality, improves customer satisfaction, greatly reduces service time of a customer manager, improves the number of small credit submitted by the customer manager in unit time, improves service development efficiency of the customer manager, and is a tool for improving service.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Example 2:
the embodiment provides a credit investigation authorization bookmark signing method, and the steps of the method are described in detail as follows.
The first step is to obtain the credit investigation authorization signing request of the target client.
The target client can be various types and scales of enterprises, including large, medium and small enterprises, companies with large stockholders and individual households, and all types of enterprises have financing requirements. In a practical application scenario, before a specific financing operation is performed, various pre-steps are required, such as logging in a national credit investigation system to query detailed credit information and status of a target client, so that a corresponding credit investigation authorization is required, but a credit investigation authorization signing request is required to be firstly made by the target client to perform a subsequent series of operations. For example, the subsequent financial institution gives credit based on the credit investigation of the target customer, i.e. the financial institution gives the non-financial institution the direct funds, or guarantees about the possible compensation and payment responsibility of the customer in the economic activities, the credit giving mode includes single credit giving and circulating credit giving, the single credit is the credit giving for a loan service or other services (such as insurance, acceptance, etc.), the circulating credit is the credit giving for an enterprise in a package, such as 1 billion credit amount to an enterprise, and the enterprise can make a loan, make acceptance, insurance, etc., as long as the credit giving is not more than 1 billion. It is understood that the target client may be a natural person, and when the natural person has a loan requirement, the natural person may sign a credit investigation authorization to perform a series of subsequent loan requirements. For example, a bank reviews a personal credit report, which is the most basic product provided by a personal credit investigation system, records the history information of credit transactions between citizens and banks, and once a customer transacts credit business such as credit card, loan guarantee for others in a bank, the customer enters the personal credit investigation system through data report of a commercial bank, thereby forming a credit report.
And secondly, determining the identity information of the target client according to the credit investigation authorization signing request.
If the target client is an enterprise, especially an enterprise with a large shareholder, the target client requires to upload an enterprise license of the enterprise to the business system, and then inputs legal representative and large shareholder identification card information including but not limited to positive and negative photos of the identification card and identification numbers of corresponding members in the business system. If the target customer is a natural person, the income certificate and the ID card photo of the natural person can be directly uploaded. These operations are to determine whether the target client is eligible for credit investigation authorization signing.
And thirdly, judging whether the identity information of the target client meets the preset credit investigation authorization bookmark deployment condition or not.
The predetermined signing condition of the credit investigation authorization may be to identify whether the corresponding identity information of the target client is true or false, such as to verify whether the business license of the enterprise is true or false, to verify whether the registration information of the enterprise is consistent with the corresponding identity information, for example, whether the identity information of the legal representative is consistent, and so on.
And fourthly, if the answer is up, loading a credit investigation authorization bookmark deployment interface through the acquired WeChat link, and sending the credit investigation authorization bookmark deployment interface to the client for display.
In specific implementation, a wechat link is obtained first, whether the wechat link meets the preset condition of data security is judged, if yes, a credit investigation authorization bookmark deployment interface is loaded through the wechat link, and the credit investigation authorization bookmark deployment interface is sent to a client for display. Here, the wechat link may be a wechat link shared by the sponsor, but whatever wechat link is first checked to see if it is safe, such as Trojan killing, etc. As a changeable implementation mode, the wechat link can be a short message link, and only the credit investigation authorization bookmark deployment interface is loaded and sent to the client for display. The client can be a mobile terminal such as a mobile phone of a client, and can also be a computer and the like. The client is in communication connection with a server or a background terminal (aiming at a business system), when the server receives the WeChat link, a mapping relation which is associated with the WeChat link and points to a credit investigation authorization book signing interface is formed in the server, based on the mapping relation, the server loads the credit investigation authorization book signing interface and sends the credit investigation authorization book signing interface to the client for displaying, and the loaded credit investigation authorization book signing interface comprises a protocol template to be signed.
In an actual application scenario, signing is often performed by a sponsor, the mobile phone number of a signer is not registered by the sponsor, but the signer submits registration, short message verification that the mobile phone number is on hand is not performed, and real-name authentication is not performed on the submitted signer login mobile phone number. However, due to the conditions of mobile phone number change and the like, certain trouble is caused to the client and a client manager for assisting the client in credit authorization, and the time for assisting the client in credit authorization is relatively prolonged. Therefore, in a preferred embodiment, as shown in fig. 2, the sponsor sends the WeChat link to the server, and the server loads the credit investigation authorization bookmark deployment interface and sends the credit investigation authorization bookmark deployment interface to the client for display, which is convenient and fast.
And fifthly, receiving signing information aiming at the displayed credit investigation authorization bookmark deploying interface sent by the client.
And sixthly, generating a credit investigation authorization book based on the signing information.
In a specific implementation, the generating a credit investigation authorization book based on the signing information includes: acquiring an electronic seal required for generating a credit investigation authorization book; and fusing the electronic seal and the signing information to generate a credit investigation authorization book. The electronic seal used for acquiring the credit investigation authorization book comprises: judging whether the electronic seal required to be used is an old electronic seal, if so, acquiring the old electronic seal; if not, a new electronic seal is made. Wherein, making new electronic seal includes: and making the new electronic seal based on the received identity authentication information.
In a specific implementation manner, the fusing the electronic seal and the signing information to generate a credit investigation authorization book includes: receiving an identity card photo matched with the signing information; performing living body detection on the target client; if the identity card photo and the living body detection result accord with preset verification conditions, obtaining verification information of a used seal; if the seal verification information is correct, enabling the electronic seal to sign the signing information; and taking the signed signing information as the credit investigation authorization book.
In a specific implementation manner, the signing of the target credit investigation authorization book can be further performed on the credit investigation authorization bookmark signing interface based on the identification card number of the signer, which specifically includes: calling a client ID in a service system according to the identification card number of the signer; acquiring a credit investigation authorization protocol corresponding to a client ID; judging whether a credit investigation authorization protocol needs to manufacture a new electronic seal or not, and if so, manufacturing the new electronic seal; and signing the credit investigation authorization agreement by using the manufactured new electronic seal, and taking the signed agreement as a target credit investigation authorization book. The new electronic seal can be manufactured based on the verification code of the mobile phone number registered in the service system in advance, the interface displays the keywords in a reverse mode during manufacturing, and after the verification of the mobile phone number verification code, the seal manufacturing information corresponding to the client ID is packaged and sent to the seal manufacturing module of the service system, so that the new electronic seal of the target client is manufactured. And if the mobile phone number pre-registered in the service system is inconsistent with the current mobile phone number of the signer, the mobile phone number registered in the service system is modified into the current mobile phone number of the signer. Referring to fig. 3, real-name authentication is required for the change, namely, the change is performed by uploading an identification card picture and live body detection. As shown in fig. 3, the liveness detection may be dynamic face recognition or recorded voice detection. Note that fig. 2 and 3 are only schematic, and some of the writing in the drawings is unclear and does not affect the schematic functions thereof.
In another specific implementation manner, the signature of the credit investigation authorization agreement is signed by using the prepared new electronic seal, and as further shown in fig. 3, the method includes: uploading the identity card photo of the signer to a business system; performing living body detection on the signer; if the identity card photo of the signer and the living body detection result meet the verification condition, acquiring a seal verification code; if the seal verification code is correct, the manufactured new electronic seal is started to sign the credit investigation authorization protocol. The method is characterized in that the service system uploads the identity card photo of the signer and performs living body detection on the signer, which is equivalent to the real-name authentication process of the signer, and the living body detection can not only record voice detection, but also recognize human face actions, such as blinking, turning left, turning right and the like. In specific implementation, a server sends a living body detection request to a client, receives first reference data sent by the client, namely a user to be detected, guides the user to be detected to watch a reference point through prompt information, collects a plurality of images in the process of executing a preset action, determines head posture information and fixation point information of the user to be detected in each image, determines that the fixation point information of the user to be detected in the plurality of images meets a first preset condition, and the head posture information of the user to be detected meets a second preset condition, so that the user to be detected passes the living body detection. Here, the first reference data may be a first acquired image meeting a predetermined criterion, and the first predetermined condition and the second predetermined condition may be blinking, turning left, turning right, or the like.
In another specific implementation manner, if a new electronic seal does not need to be made, an effective electronic seal stored in the business system is used; and completing the signing of the target credit investigation authorization book by using a valid electronic seal which is stored in the business system. In other words, it can be queried in the business system whether there are available electronic chapters according to the client ID, and the available and valid electronic chapters are not expired yet. In the specific implementation, a customer ID is input to an inquiry module of a business system for inquiry, the business system judges whether an old electronic seal corresponding to the customer ID exceeds a preset time, such as more than one year, if so, the old electronic seal is called from a storage module, a server verifies whether a key field of the electronic seal is matched with a target customer, and if so, the old electronic seal is enabled to sign the signing information to generate the credit investigation authorization book.
The method comprises the steps of firstly obtaining a credit investigation authorization signing request of a target client, determining identity information of the target client according to the credit investigation authorization signing request, judging whether the identity information of the target client meets preset credit investigation authorization bookmark signing conditions, loading a credit investigation authorization bookmark signing interface through an obtained WeChat link if the identity information of the target client meets the preset credit investigation authorization bookmark signing conditions, sending the credit investigation authorization bookmark signing interface to a client for displaying, receiving signing information aiming at the displayed credit investigation authorization signing interface sent by the client, and finally generating a credit investigation authorization book based on the signing information, so that the credit investigation authorization book is signed conveniently and quickly, the time cost is saved, and the credit investigation authorization book signing efficiency is improved. Particularly, the credit investigation authorization book signing interface is loaded through the acquired WeChat link and is sent to the client for displaying, so that excessive dependence on manual operation is reduced, the data processing efficiency of related application scenes is improved, the service quality is improved, the customer satisfaction is improved, the service time of a customer manager is greatly reduced, the number of small credits submitted by the customer manager in unit time is increased, the efficiency of business development of the customer manager is improved, and the method is a tool for promoting business.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Example 3:
the present embodiment provides a credit investigation authorization document signing system, as shown in fig. 4, the system includes:
the acquisition module is used for acquiring a credit investigation authorization signing request of a target client;
the determining module is used for determining the identity information of the target client according to the credit investigation authorization signing request;
the judging module is used for judging whether the identity information of the target client meets the preset credit investigation authorization bookmark deployment condition or not;
the display module is used for loading and displaying a credit investigation authorization bookmark deployment interface through the acquired WeChat link when the signing conditions of the preset credit investigation authorization book are met;
the receiving module is used for receiving signing information aiming at the displayed credit investigation authorization bookmark deploying interface sent by the client;
and the generation module is used for generating a credit investigation authorization book based on the signing information.
It is to be understood that the presentation module may also send the credit investigation authorization signing interface to the client for presentation. In addition, the credit investigation authorization book signing system can also be provided with a query module and a storage module, can be independent of the service system, and can also be embedded into the service system to be used as a subsystem in the service system and specially sign the credit investigation authorization book of a target client.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
It is further emphasized that the system provided in the embodiments of the present application may be based on artificial intelligence techniques for obtaining and processing relevant data. Among them, artificial Intelligence (AI) is a theory, method, technique and application system that simulates, extends and expands human Intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, acquires knowledge and uses the knowledge to obtain the best result. The artificial intelligence base technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and the like.
Reference is now made to fig. 5, which is a diagram illustrating a computer device, in accordance with some embodiments of the present application. As shown in fig. 5, the computer device 2 includes: the system comprises a processor 200, a memory 201, a bus 202 and a communication interface 203, wherein the processor 200, the communication interface 203 and the memory 201 are connected through the bus 202; the memory 201 stores a computer program that can be executed on the processor 200, and the processor 200 executes the signature authorization bookmark signing method provided in any of the foregoing embodiments when executing the computer program.
The Memory 201 may include a high-speed Random Access Memory (RAM) and may further include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 203 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, and the like may be used.
Bus 202 can be an ISA bus, PCI bus, EISA bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. The memory 201 is used for storing a program, and the processor 200 executes the program after receiving an execution instruction, and the method for signing the credit authorization token disclosed in any of the foregoing embodiments of the present application may be applied to the processor 200, or implemented by the processor 200.
The processor 200 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 200. The Processor 200 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 201, and the processor 200 reads the information in the memory 201 and completes the steps of the method in combination with the hardware thereof.
The present invention also provides a computer-readable storage medium corresponding to the credit investigation authorization bookmark deployment method provided in the foregoing embodiments, wherein the computer program is stored thereon, and when being executed by a processor, the computer program executes the credit investigation authorization bookmark deployment method provided in any of the foregoing embodiments.
In addition, examples of the computer-readable storage medium may further include, but are not limited to, a phase change memory (PRAM), a Static Random Access Memory (SRAM), a Dynamic Random Access Memory (DRAM), other types of Random Access Memories (RAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a flash memory, or other optical and magnetic storage media, which are not described in detail herein.
The computer-readable storage medium provided by the above-mentioned embodiment of the present application and the quantum key distribution channel allocation method in the spatial division multiplexing optical network provided by the embodiment of the present application have the same inventive concept, and have the same beneficial effects as the method adopted, run, or implemented by the application program stored in the computer-readable storage medium.
The present application further provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the method for signing a credit investigation authorization bookmark provided in any of the foregoing embodiments is implemented, including: acquiring a credit investigation authorization signing request of a target client; determining the identity information of the target client according to the credit investigation authorization signing request; judging whether the identity information of the target client meets the preset credit investigation authorization bookmark deployment condition or not; if the answer is yes, loading a credit investigation authorization bookmark deployment interface through the acquired WeChat link, and sending the credit investigation authorization bookmark deployment interface to a client for display; receiving signing information aiming at the displayed credit investigation authorization bookmark deploying interface sent by a client; and generating a credit investigation authorization book based on the signing information.
It should be noted that: the algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose devices may be used with the teachings herein. The required structure for constructing such a device will be apparent from the description above. In addition, this application is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present application as described herein, and any descriptions of specific languages are provided above to disclose the best mode of use of the present application. In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the application may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the application, various features of the application are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the application and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: this application is intended to cover such departures from the present disclosure as come within known or customary practice in the art to which this invention pertains. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this application.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components in the embodiments may be combined into one module or unit or component, and furthermore, may be divided into a plurality of sub-modules or sub-units or sub-components. Each feature disclosed in this specification may be replaced by an alternative feature serving the same, equivalent or similar purpose, unless expressly stated otherwise.
The various component embodiments of the present application may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components in the creation apparatus of a virtual machine according to embodiments of the present application. The present application may also be embodied as an apparatus or device program for carrying out a portion or all of the methods described herein. A program implementing the application may be stored on a computer readable medium or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
The above description is only for the preferred embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A credit investigation authorization bookmark deployment method is characterized by comprising the following steps:
acquiring a credit investigation authorization signing request of a target client;
determining the identity information of the target client according to the credit investigation authorization signing request;
judging whether the identity information of the target client meets a preset credit investigation authorization bookmark deployment condition or not;
if the answer is yes, loading a credit investigation authorization bookmark deployment interface through the acquired WeChat link, and sending the credit investigation authorization bookmark deployment interface to a client for display;
receiving signing information aiming at the displayed credit investigation authorization bookmark deployment interface sent by a client;
and generating a credit investigation authorization book based on the signing information.
2. The credit investigation authorization bookmark signing method of claim 1, wherein the determining the identity information of the target client according to the credit investigation authorization signing request comprises:
analyzing the credit investigation authorization signing request;
and determining the identity information of the target client according to the analysis result.
3. The credit investigation authorization bookmark signing method of claim 1, wherein the loading of the credit investigation authorization bookmark signing interface through the acquired wechat link and the sending of the credit investigation authorization bookmark signing interface to the client for presentation comprises:
acquiring a WeChat link;
judging whether the WeChat link meets the preset condition of data safety or not;
and if so, loading a credit investigation authorization bookmark deployment interface through the WeChat link, and sending the credit investigation authorization bookmark deployment interface to a client for display.
4. The credit investigation authorization bookmark signing method of claim 3, wherein the generating of the credit investigation statement based on the signing information comprises:
acquiring an electronic seal required for generating a credit investigation authorization book;
and fusing the electronic seal and the signing information to generate a credit investigation authorization book.
5. The credit investigation authorization bookmark signing method of claim 4, wherein the obtaining of the electronic seal required for generating the credit investigation authorization book comprises:
judging whether the electronic seal required to be used is an old electronic seal, if so, acquiring the old electronic seal;
if not, a new electronic seal is made.
6. The credit investigation authorization bookmark signing method of claim 5, wherein the making of the new electronic seal comprises:
and making the new electronic seal based on the received identity authentication information.
7. The credit investigation authorization bookmark signing method of claim 4, wherein the fusing the electronic seal and the signing information to generate a credit investigation authorization book comprises:
receiving an identity card photo matched with the signing information;
performing living body detection on the target client;
if the identity card picture and the living body detection result accord with a preset verification condition, obtaining verification information of a used seal;
if the seal verification information is correct, enabling the electronic seal to sign the signing information;
and taking the signed signing information as the credit investigation authorization book.
8. A credit authorization document signing system, the system comprising:
the acquisition module is used for acquiring a credit investigation authorization signing request of a target client;
the determining module is used for determining the identity information of the target client according to the credit investigation authorization signing request;
the judging module is used for judging whether the identity information of the target client meets the preset credit investigation authorization bookmark deployment condition or not;
the display module is used for loading and displaying a credit investigation authorization bookmark deployment interface through the acquired WeChat link when the signing conditions of the preset credit investigation authorization book are met;
the receiving module is used for receiving signing information aiming at the displayed credit investigation authorization bookmark deploying interface sent by a client;
and the generation module is used for generating a credit investigation authorization book based on the signing information.
9. A computer device comprising a memory and a processor, wherein computer readable instructions are stored in the memory, which computer readable instructions, when executed by the processor, cause the processor to perform the steps of the method of any of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN202210860823.6A 2022-07-21 2022-07-21 Credit investigation authorization bookmark deployment method, system, equipment and storage medium Pending CN115147209A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210860823.6A CN115147209A (en) 2022-07-21 2022-07-21 Credit investigation authorization bookmark deployment method, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210860823.6A CN115147209A (en) 2022-07-21 2022-07-21 Credit investigation authorization bookmark deployment method, system, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115147209A true CN115147209A (en) 2022-10-04

Family

ID=83411755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210860823.6A Pending CN115147209A (en) 2022-07-21 2022-07-21 Credit investigation authorization bookmark deployment method, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115147209A (en)

Similar Documents

Publication Publication Date Title
US20200151310A1 (en) Method and apparatus for identity authentication
WO2019237565A1 (en) Loan service processing method and apparatus, computer device and readable storage medium
CN107679861B (en) Resource transfer method, fund payment method, device and electronic equipment
CN109389723B (en) Visitor management method and device using face recognition and computer equipment
CN109815803B (en) Face examination risk control method and device, computer equipment and storage medium
US10187366B2 (en) Systems and methods of user authentication for data services
CN109800953B (en) Method, device, computer equipment and storage medium for checking rented application
CN111600716B (en) Authentication method and device and electronic equipment
CN110392041B (en) Electronic authorization method, device, storage equipment and storage medium
CN111275448A (en) Face data processing method and device and computer equipment
CN110033365A (en) A kind of loan on personal security approval system and method
CN112712429A (en) Remittance service auditing method, remittance service auditing device, computer equipment and storage medium
CN113888299A (en) Wind control decision method and device, computer equipment and storage medium
CN110378811B (en) Arbitration information processing method, apparatus, computer device and storage medium
CN111709413A (en) Certificate verification method and device based on image recognition, computer equipment and medium
US20160098548A1 (en) Setting an authorization level at enrollment
CN111047146B (en) Risk identification method, device and equipment for enterprise users
CN112488823A (en) Document data processing method and device in loan business and computer equipment
CN112184428A (en) Processing method and system for operation and flow of financing requester
CN115147209A (en) Credit investigation authorization bookmark deployment method, system, equipment and storage medium
CN111931152B (en) Block chain-based electronic signature verification method and device and block chain-based electronic signature verification device and device
CN109377213B (en) Self-service card activation method and device, computer equipment and storage medium
CN113673946A (en) Commercial vehicle online service method, system, terminal and storage medium
CN112990940A (en) Enterprise authentication method and device
CN113449716B (en) Field positioning and classifying method, text image recognition method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination