CN115564571A - Application information auditing method, system and computer equipment - Google Patents

Application information auditing method, system and computer equipment Download PDF

Info

Publication number
CN115564571A
CN115564571A CN202211252389.XA CN202211252389A CN115564571A CN 115564571 A CN115564571 A CN 115564571A CN 202211252389 A CN202211252389 A CN 202211252389A CN 115564571 A CN115564571 A CN 115564571A
Authority
CN
China
Prior art keywords
user information
target user
credit granting
result
sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211252389.XA
Other languages
Chinese (zh)
Inventor
魏广帅
林选伟
尹佳琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shuhe Information Technology Co Ltd
Original Assignee
Shanghai Shuhe Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Shuhe Information Technology Co Ltd filed Critical Shanghai Shuhe Information Technology Co Ltd
Priority to CN202211252389.XA priority Critical patent/CN115564571A/en
Publication of CN115564571A publication Critical patent/CN115564571A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses an application information auditing method, a system and computer equipment, wherein the method comprises the following steps: acquiring a target user information set; sending a target user information set to a main business credit granting terminal and receiving a credit granting result of each piece of target user information returned by the main business credit granting terminal; if the credit granting result is failure, sending the target user information to a diversion credit granting end for auditing based on a preset diversion audit sending strategy; the user information is transferred to the corresponding sponsor to be audited according to the preset diversion audit delivery strategy, and the type of audit flow is completely determined by the strategy, so that the audit delivery flexibility is effectively improved, and the audit flow is optimized.

Description

Application information auditing method, system and computer equipment
Technical Field
The invention relates to the field of information processing, in particular to an application information auditing method, an application information auditing system and computer equipment.
Background
In the financial credit industry, the loan-aid overall business development has three business lines: credit granting, borrowing and repayment services; the three services will also vary with company size, policy changes, service verification planning, and diverse customer needs. Crediting refers to the act of guaranteeing the credit of the customer in the economic activity concerned to a third party, i.e. the assessment of the user's credit. Credit plays an important role as the first step of the overall loan aid business.
The traditional credit granting process is rigid, the user credit information can only be sent to a single-dimensional sponsor at one time, and the user credit information cannot be flexibly sent to sponsors with multiple dimensions for auditing, so that the credit granting process is long, the efficiency is low, the situation that the user credit information cannot be sent to other dimensionalities due to refusal of one dimensionality sponsor after a long-time process to cause credit granting failure is easy to occur, and the credit granting efficiency and the success rate of the user are seriously influenced.
Disclosure of Invention
The invention aims to: an application information auditing method, system and computer equipment are provided.
The technical scheme of the invention is as follows: in a first aspect, the present invention provides an application information auditing method, including:
acquiring a target user information set;
sending the target user information set to a main business credit granting terminal and receiving a credit granting result of each piece of target user information returned by the main business credit granting terminal;
and if the credit granting result is failure, sending the target user information to a diversion credit granting terminal for auditing based on a preset diversion audit sending strategy.
In a preferred embodiment, before obtaining the target user information set, the method further includes:
acquiring a user information set to be audited, wherein the user information set to be audited comprises user information to be audited with a flow guide identifier;
and screening the user information to be checked based on the flow guide identification to obtain a target user information set and an API user information set.
In a preferred embodiment, after the sending the target user information set to a main service authorization terminal and receiving a authorization result of each piece of target user information returned by the main service authorization terminal, the method further includes:
and if the credit granting result is successful, opening an account of the quota and opening an account of the pricing account based on the information of the target user.
In a preferred embodiment, the sending the target user information to a diversion credit terminal for auditing based on a preset diversion audit-sending policy includes:
obtaining a lubrication dividing and fishing-back message;
auditing the target user information based on a preset lubrication distributing submission strategy and the lubrication distributing and fetching message to obtain an auditing result;
and if the checking result is rejection, sending the target user information to a light asset credit terminal.
In a preferred embodiment, the sending the target user information to a diversion credit terminal for auditing based on a preset diversion audit-sending policy further includes:
if the audit result is passed, sending the target user information to a credit granting end of the moisture-sharing sponsor for credit granting processing based on a preset moisture-sharing sponsor routing strategy;
obtaining the credit granting result of the sub-moist sponsor and obtaining the credit granting result of the sponsor based on the credit granting result of the sub-moist sponsor and a preset sub-moist credit granting auditing strategy;
and if the credit granting result of the sponsor is refusal, sending the target user information to the light asset credit granting terminal.
In a preferred embodiment, the trust result of the divided lubrication sponsor at least comprises limit information and pricing information;
the method further comprises the following steps:
and if the credit granting result of the sponsor is passed, opening an account of the quota and opening an account of the pricing account based on the quota information and the pricing information.
In a preferred embodiment, the method further comprises:
and if the credit granting result of the sponsor is passed, identifying the target user information based on a preset passenger group label rule.
In a preferred embodiment, after sending the target user information to the light asset credit terminal, the method further comprises:
acquiring a light asset crediting result of the target user information based on a preset light asset routing sponsor strategy, or marking the target user information as verification failure and storing the verification failure;
if the light asset crediting result is passed, opening an account of a quota and opening an account of a pricing account based on the target user information;
and if the result of the light asset crediting is refusal, marking the target user information as audit failure and storing.
In a second aspect, the present invention further provides an application information auditing system, including:
the first acquisition module is used for acquiring a target user information set;
the sending and receiving module is used for sending the target user information set to a main business crediting terminal and receiving a crediting result of each piece of target user information returned by the main business crediting terminal;
and the sending and auditing module is used for sending the target user information to a diversion credit granting terminal for auditing based on a preset diversion audit policy when the credit granting result received by the sending and receiving module is failure.
In a third aspect, the present invention also provides a computer apparatus, the apparatus comprising:
one or more processors;
and a memory associated with the one or more processors for storing program instructions which, when read and executed by the one or more processors, perform the application information auditing method of any one of the first aspects.
The invention has the advantages that: the method comprises the following steps: acquiring a target user information set; sending a target user information set to a main business credit terminal and receiving a credit granting result of each piece of target user information returned by the main business credit terminal; if the credit granting result is failure, sending target user information to a diversion credit granting terminal for auditing based on a preset diversion audit sending strategy; the user information is transferred to the corresponding sponsor to be audited according to the preset diversion audit delivery strategy, and the type of audit flow to be carried out is completely determined by the strategy, so that the flexibility of audit delivery is effectively improved, and the audit flow is optimized.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flow chart illustrating the operation of an application information auditing architecture provided by the present application;
FIG. 2 is a first flowchart of a method for auditing application information provided by the present application;
FIG. 3 is a second flowchart of an application information auditing method provided by the present application;
fig. 4 is a structural diagram of an application information auditing system provided in the embodiment of the present application;
fig. 5 is a diagram of a computer device architecture provided by an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
As described in the background art, a credit granting process in the prior art is very rigid, and only user credit information can be sent to a single auditing sponsor end at one time, if auditing by the auditing sponsor end does not pass, the user information is retained at the auditing sponsor end and cannot be sent to other sponsors for auditing for a long time, and after a credit granting failure, the user information is often blindly sent to other sponsors for auditing and credit granting, which seriously affects user credit granting efficiency and success rate.
In order to solve the problems, the application information auditing method, system and computer equipment are creatively provided, and target user information is sent to a diversion credit terminal for auditing based on a preset diversion audit sending strategy; the user information is transferred to the corresponding sponsor to be audited according to the preset diversion audit delivery strategy, and the type of audit flow to be carried out is completely determined by the strategy, so that the flexibility of audit delivery is effectively improved, and the audit flow is optimized.
The embodiments of the present application will be described in detail below with reference to the drawings and various embodiments.
The first embodiment is as follows: the present embodiment introduces an architecture for applying for information auditing in the present application.
Specifically, referring to fig. 1, the framework includes a matrix platform, the matrix platform is realized by bizflow, and the bizflow is streamlined so that the matrix platform is clear at a glance and easy to maintain; meanwhile, the matrix platform uses a large number of retries, whether the retries of the strategy or the auditing of the waiting party, and the scenes are all suitable to be completed by using a bizflow retry mechanism. The method has good expansibility for the subsequently added service, only a simple service flow adding process needs to be developed, and corresponding processing is carried out according to the particularity of the service, so that the required development time and labor cost are greatly reduced.
Example two: based on the structure of application information auditing introduced in the first embodiment, the present embodiment introduces an application information auditing process in the present application with reference to fig. 1 to 3.
Specifically, this embodiment provides an application information auditing method, where the method includes:
and SA10, acquiring a user information set to be audited, wherein the user information set to be audited comprises the user information to be audited carrying the flow guide identification.
Specifically, a user information set to be audited is obtained from the front end, and risk identification is performed on the user information to be audited in the user information set to be audited in the front end, so that flow guide identification is performed.
S310, acquiring a target user information set.
In one embodiment, the method comprises the steps of:
and screening the user information to be checked based on the flow guide identification to obtain a target user information set and an API user information set.
Specifically, the information to be audited is classified according to the diversion identifier, the users are divided into API clients and main business clients, and correspondingly, the user information set to be audited is divided into an API user information set and a target user information set.
And performing risk identification on each piece of API user information in the API user information set, and if the risk identification is passed, sending the API user information to a light asset credit granting terminal for light asset credit granting verification.
S320, sending the target user information set to the main business credit terminal and receiving a credit result of each piece of target user information returned by the main business credit terminal.
And if the credit granting result is failure, the step S330 is entered.
Specifically, the target user information at least includes heavy asset information, light asset information, and branch information, and in one example, the main business trust end performs heavy asset information auditing. Heavy assets refer to physical assets such as personal property, production lines, equipment held by enterprises, and the like.
And S330, sending the target user information to a diversion credit granting terminal for auditing based on a preset diversion audit sending strategy.
In one example, the diversion trust end at least comprises a sub-lubrication trust end and a light asset trust end.
In one embodiment, the method comprises the steps of:
s331, obtaining the message of separately lubricating and fishing back.
S332, auditing the target user information to obtain an auditing result based on a preset lubrication submission strategy and the lubrication salvage message.
Specifically, after the credit granting result of the main business credit granting end is obtained as failure, indicating that the heavy asset credit granting of the user is rejected, calling a preset sub-wetting submission strategy, and auditing the obtained sub-wetting salvage message and the target user information. The divided-lubrication credit approval refers to the approval of information such as user cooperation mechanisms, cooperation relationships, cooperation contents, cooperation years and the like, and the evaluation of the risk bearing capacity of the user.
If the checking result is rejection, the step S333 is entered; if the result of the verification is pass, the process proceeds to S334.
And S333, sending the target user information to a light asset credit terminal.
And S334, sending the target user information to a credit granting end of the moisture-sharing sponsor to perform credit granting processing based on a preset moisture-sharing sponsor routing strategy.
And (4) carrying out lubrication submission and review by the users with the rejected heavy assets, wherein the submission and review can be credited on the matrix platform and is informed of risk review after the submission and review are passed, and the difference of the submission and review lies in whether the account is opened by the risk or not.
And S335, obtaining the credit granting result of the sub-moist sponsor, and obtaining the credit granting result of the sponsor based on the credit granting result of the sub-moist sponsor and a preset sub-moist credit granting auditing strategy.
And if the credit granting result of the sponsor is refusal, sending the target user information to the light asset credit granting terminal.
In one embodiment, the credit result of the divided sponsor comprises at least quota information and pricing information; and if the credit granting result of the sponsor is passed, the step S136 is entered.
S336, opening an account of the quota account and opening an account of the pricing account based on the quota information and the pricing information.
In one embodiment, if the credit granting result of the sponsor is passed, the method further comprises:
s337, identifying the target user information based on a preset guest group tag rule.
Specifically, if the credit granting result of the sponsor is passed, the guest group label marking is carried out on the target user information.
In one embodiment, after the sending the target user information to the light asset credit terminal, the method further comprises:
and S338, acquiring a light asset authorization result of the target user information based on a preset light asset routing sponsor strategy, or marking the target user information as audit failure and storing the audit failure.
Specifically, whether the target user has the sponsor is judged based on the called preset light asset routing sponsor strategy and the target user information;
if the judgment result is yes, namely the target user has a sponsor, sending the target user information to a light asset credit granting terminal for auditing and acquiring a light asset credit granting result; the credit of the light assets is a main submission mode after the heavy asset users are refused, the rear of the light assets comprises a plurality of parties, so that a large number of users can be borne, and the submission of the light assets comprises two categories of pre-loan submission and mid-loan submission. After the light assets are sent to the qualification party, the matrix platform opens an account. The light asset industry generally represents soft-strength assets, such as intangible assets of an enterprise: such as experience, management, governance systems, relational resources, enterprise brands, human resources, enterprise culture, etc., and heavy ones of these intangible assets occupy less capital, and are therefore both light and flexible.
If the judgment result is negative, namely the target user does not have a sponsor, the default target user information is rejected, the final verification result is verification failure, and the target user information and the verification result are stored.
If the result of the credit authorization of the light assets is passed, opening an account of a quota and an account of a pricing account based on the information of the target user;
and if the result of the light asset crediting is refusal, marking the target user information as audit failure and storing.
In one embodiment, after sending the target user information set to a main business authorization terminal and receiving a trust granting result of each piece of target user information returned by the main business authorization terminal, if the trust granting result is successful, the method further includes:
and SA20, opening a quota account and a pricing account based on the target user information.
According to the application information auditing method provided by the embodiment, target user information is sent to a diversion credit granting end for auditing based on a preset diversion audit submitting strategy; the user information is transferred to the corresponding sponsor for submission according to the preset diversion submission strategy, the time cost of technical development can be greatly reduced by the strategic control of the flow identification of the guide, the success rate of credit granting of the user can be improved, the quota is granted to the user more accurately, the whole credit granting flow is very clear by the process method, and the maintenance of subsequent projects is more convenient.
Example three: corresponding to the first to second embodiments, the application information auditing system provided by the present application will be described with reference to fig. 4. The system may be implemented by hardware or software, or by a combination of hardware and software, and the present application is not limited thereto.
In one example, the present application provides an application information auditing system, including:
a first obtaining module 410, configured to obtain a target user information set;
a sending and receiving module 420, configured to send the target user information set to a main business authorization terminal and receive a trust result of each piece of target user information returned by the main business authorization terminal;
and a sending and auditing module 430, configured to send the target user information to a diversion credit granting terminal for auditing based on a preset diversion audit policy when the credit granting result received by the sending and receiving module is a failure.
In one embodiment, the system further comprises:
a second obtaining module 440, configured to obtain a to-be-checked user information set before the first obtaining module 410 obtains a target user information set, where the to-be-checked user information set includes to-be-checked user information carrying a flow guide identifier;
the first obtaining module 410 is specifically configured to filter the to-be-checked user information based on the flow guide identifier to obtain a target user information set and an API user information set.
Preferably, the system further comprises:
an account opening module 450, configured to, after the sending and receiving module 420 sends the target user information set to a main business authorization terminal and receives a trust result of each piece of target user information returned by the main business authorization terminal,
and if the credit granting result is successful, opening an account of the quota and an account of the pricing based on the target user information.
More preferably, the sending auditing module 430 includes:
a first obtaining unit 431, configured to obtain a diff-run salvage message;
an auditing unit 432, configured to audit the target user information based on a preset triage submission policy and the triage salvage message to obtain an auditing result;
a first sending unit 433, configured to send the target user information to a light asset credit terminal when the audit result obtained by the audit unit 432 is a rejection.
More preferably, the sending auditing module 430 further includes:
a second sending unit 434, configured to send the target user information to a moist sponsor credit granting terminal for credit granting processing based on a preset moist sponsor routing policy when the audit result obtained by the audit unit 432 is passed;
a second obtaining unit 435, configured to obtain the credit granting result of the moist sponsor, and obtain the credit granting result of the sponsor based on the moist sponsor credit granting result and a preset moist credit granting auditing policy;
a third sending unit 436, configured to send the target user information to the light asset credit granting terminal when the credit granting result of the sponsor acquired by the second acquiring unit 435 is a rejection.
More preferably, the credit granting result of the divided and moist sponsor at least comprises quota information and pricing information;
and if the credit granting result of the sponsor passes, entering the account opening module 450 to open an account of the quota account and an account of the pricing account based on the quota information and the pricing information.
More preferably, the system further comprises:
a first identification module 460, configured to identify the target user information based on a preset guest group tag rule when the credit granting result of the sponsor passes.
More preferably, the system further comprises:
an obtaining and marking module 470, configured to obtain a light asset crediting result of the target user information based on a preset light asset routing sponsor policy after the third sending unit 436 sends the target user information to the light asset crediting end, or mark the target user information as an audit failure and store the target user information;
if the result of the credit authorization of the light asset is passed, entering the account opening module 450 to open an account of a quota and an account of a pricing based on the information of the target user;
and if the result of the light asset authorization is rejection, entering a second identification module 480, where the second identification module is used to mark the target user information as an audit failure and store the target user information.
Example four: corresponding to the first to third embodiments, the computer device provided by the present application will be described with reference to fig. 5. As shown in fig. 5 in one example, the present application provides a computer device comprising:
one or more processors;
and memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform operations comprising:
acquiring a target user information set;
sending the target user information set to a main business credit granting terminal and receiving a credit granting result of each piece of target user information returned by the main business credit granting terminal;
and if the credit granting result is failure, sending the target user information to a diversion credit granting end for auditing based on a preset diversion audit sending strategy.
The program instructions, when read and executed by the one or more processors, further perform the following:
acquiring a user information set to be checked, wherein the user information set to be checked comprises user information to be checked carrying a flow guide identifier;
and screening the user information to be checked based on the flow guide identification to obtain a target user information set and an API user information set.
The program instructions, when read and executed by the one or more processors, further perform the following:
and if the credit granting result is successful, opening an account of the quota and an account of the pricing based on the target user information.
The program instructions, when read and executed by the one or more processors, further perform the following:
obtaining a separate lubrication fishing-back message;
auditing the target user information based on a preset lubrication distributing submission strategy and the lubrication distributing and fetching message to obtain an auditing result;
and if the checking result is rejection, sending the target user information to a light asset credit terminal.
The program instructions, when read and executed by the one or more processors, further perform the following:
if the verification result is passed, sending the target user information to a sub-moist sponsor credit granting terminal for credit granting processing based on a preset sub-moist sponsor routing strategy;
obtaining the credit granting result of the sub-moist sponsor and obtaining the credit granting result of the sponsor based on the credit granting result of the sub-moist sponsor and a preset sub-moist credit granting auditing strategy;
and if the credit granting result of the sponsor is refusal, sending the target user information to the light asset credit granting end.
The program instructions, when read and executed by the one or more processors, further perform the following:
and if the credit granting result of the sponsor is passed, opening an account of the quota account and opening an account of the pricing account based on the quota information and the pricing information.
The program instructions, when read and executed by the one or more processors, further perform the following:
and if the credit granting result of the sponsor is passed, identifying the target user information based on a preset passenger group label rule.
The program instructions, when read and executed by the one or more processors, further perform the following:
acquiring a light asset crediting result of the target user information based on a preset light asset routing sponsor strategy, or marking the target user information as an auditing failure and storing;
if the result of the credit authorization of the light assets is passed, opening an account of a quota and an account of a pricing account based on the information of the target user;
and if the light asset crediting result is refusal, marking the target user information as audit failure and storing.
When the program instructions are read and executed by the one or more processors, operations corresponding to the steps in the foregoing method embodiments may also be executed, which may refer to the above description and are not described herein again. Referring to fig. 5, an exemplary architecture of a computer device is shown that may include, in particular, a processor 510, a video display adapter 511, a disk drive 512, an input/output interface 513, a network interface 514, and a memory 520. The processor 510, the video display adapter 511, the disk drive 512, the input/output interface 513, the network interface 514, and the memory 520 may be communicatively connected by a communication bus 530.
The processor 510 may be implemented by a general Central Processing Unit (CPU), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solution provided in the present Application.
The Memory 520 may be implemented in the form of a Read Only Memory (ROM), a Random Access Memory (RAM), a static storage device, a dynamic storage device, or the like. The memory 520 may store an operating system 521 for controlling the operation of the computer device 500, and a Basic Input Output System (BIOS) 522 for controlling low-level operations of the computer device 500. In addition, a web browser 523, a data storage manager 524, an icon font processing system 525, and the like may also be stored. The icon font processing system 525 may be an application program that implements the operations of the foregoing steps in this embodiment of the application. In summary, when the technical solution provided in the present application is implemented by software or firmware, the relevant program codes are stored in the memory 520 and called to be executed by the processor 510.
The input/output interface 513 is used for connecting an input/output module to realize information input and output. The i/o module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
The network interface 514 is used for connecting a communication module (not shown in the figure) to realize communication interaction between the device and other devices. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, bluetooth and the like).
Bus 530 includes a path that transfers information between the various components of the device, such as processor 510, video display adapter 511, disk drive 512, input/output interface 513, network interface 514, and memory 520.
In addition, the computer apparatus 500 may also obtain information of specific pickup conditions from the virtual resource object pickup condition information database 541 for performing condition judgment, and the like.
It should be noted that although the computer device 500 is shown with only the processor 510, the video display adapter 511, the disk drive 512, the input/output interface 513, the network interface 514, the memory 520, the bus 530, etc., in a specific implementation, the computer device may also include other components necessary for normal operation. Furthermore, it will be understood by those skilled in the art that the apparatus described above may also include only the components necessary to implement the solution of the present application, and not necessarily all of the components shown in the figures.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, or the like, and includes several instructions for enabling a computer device (which may be a personal computer, a cloud server, or a network device) to execute the method according to the embodiments or some parts of the embodiments of the present application.
All the embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the apparatus embodiment, since it is substantially similar to the method embodiment, it is relatively simple to describe, and reference may be made to some descriptions of the method embodiment for relevant points. The above-described embodiments of the apparatus are merely illustrative, wherein the modules described as separate parts may or may not be physically separate, and the parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
In addition, it is to be understood that: the terms "first" and "second" in this application are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature.
It should be understood that the above-mentioned embodiments are only illustrative of the technical concepts and features of the present invention, and are intended to enable those skilled in the art to understand the contents of the present invention and implement the present invention, and not to limit the scope of the present invention. All modifications made according to the spirit of the main technical scheme of the invention are covered in the protection scope of the invention.

Claims (10)

1. An application information auditing method is characterized by comprising the following steps:
acquiring a target user information set;
sending the target user information set to a main business credit granting terminal and receiving a credit granting result of each piece of target user information returned by the main business credit granting terminal;
and if the credit granting result is failure, sending the target user information to a diversion credit granting terminal for auditing based on a preset diversion audit sending strategy.
2. The application information auditing method according to claim 1, where before obtaining the target user information set, the method further comprises:
acquiring a user information set to be audited, wherein the user information set to be audited comprises user information to be audited with a flow guide identifier;
and screening the user information to be checked based on the flow guide identification to obtain a target user information set and an API user information set.
3. The application information auditing method of claim 2, after sending the target user information set to a main business credit terminal and receiving a credit granting result of each piece of target user information returned by the main business credit terminal, the method further comprises:
and if the credit granting result is successful, opening an account of the quota and an account of the pricing based on the target user information.
4. The application information auditing method of claim 3, where sending the target user information to a diversion credit terminal for auditing based on a preset diversion audit policy comprises:
obtaining a separate lubrication fishing-back message;
auditing the target user information based on a preset sub-lubrication submission strategy and the sub-lubrication salvage message to obtain an auditing result;
and if the checking result is rejection, sending the target user information to a light asset credit terminal.
5. The application information auditing method according to claim 4, where sending the target user information to a diversion credit terminal for auditing based on a preset diversion audit policy further comprises:
if the verification result is passed, sending the target user information to a sub-moist sponsor credit granting terminal for credit granting processing based on a preset sub-moist sponsor routing strategy;
obtaining the credit granting result of the sub-moist sponsor and obtaining the credit granting result of the sponsor based on the credit granting result of the sub-moist sponsor and a preset sub-moist credit granting auditing strategy;
and if the credit granting result of the sponsor is refusal, sending the target user information to the light asset credit granting terminal.
6. The application information auditing method of claim 5 where the moisturizing sponsor crediting results include at least quota information and pricing information;
the method further comprises the following steps:
and if the credit granting result of the sponsor is passed, opening an account of the quota and opening an account of the pricing account based on the quota information and the pricing information.
7. An application information auditing method according to claim 6, the method further comprising:
and if the credit granting result of the sponsor is passed, identifying the target user information based on a preset passenger group label rule.
8. The application information auditing method according to claim 7, where after the sending of the target user information to the light asset credit terminal, the method further comprises:
acquiring a light asset crediting result of the target user information based on a preset light asset routing sponsor strategy, or marking the target user information as verification failure and storing the verification failure;
if the result of the credit authorization of the light assets is passed, opening an account of a quota and an account of a pricing account based on the information of the target user;
and if the result of the light asset crediting is refusal, marking the target user information as audit failure and storing.
9. An application information auditing system, characterized in that the system comprises:
the first acquisition module is used for acquiring a target user information set;
the sending and receiving module is used for sending the target user information set to a main business authorization terminal and receiving an authorization result of each piece of target user information returned by the main business authorization terminal;
and the sending and auditing module is used for sending the target user information to a diversion credit granting terminal for auditing based on a preset diversion audit policy when the credit granting result received by the sending and receiving module is failure.
10. A computer device, the device comprising:
one or more processors;
and a memory associated with the one or more processors for storing program instructions which, when read and executed by the one or more processors, perform an application information auditing method according to any one of claims 1-8.
CN202211252389.XA 2022-10-13 2022-10-13 Application information auditing method, system and computer equipment Pending CN115564571A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211252389.XA CN115564571A (en) 2022-10-13 2022-10-13 Application information auditing method, system and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211252389.XA CN115564571A (en) 2022-10-13 2022-10-13 Application information auditing method, system and computer equipment

Publications (1)

Publication Number Publication Date
CN115564571A true CN115564571A (en) 2023-01-03

Family

ID=84745710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211252389.XA Pending CN115564571A (en) 2022-10-13 2022-10-13 Application information auditing method, system and computer equipment

Country Status (1)

Country Link
CN (1) CN115564571A (en)

Similar Documents

Publication Publication Date Title
CN110428240B (en) Automatic suspicious transaction identification and processing method, terminal and server
CN107967607A (en) A kind of processing method, device, server and the storage medium of transaction credit amount
CN109815039A (en) Test method and device, storage medium, the computer equipment of business software
EP4358000A1 (en) Digital currency-based payment method, platform, terminal, and payment system
CN111899111A (en) Capital matching method, device, server and storage medium
CN107895260B (en) Reservation and staging method for bank, storage medium and electronic equipment
CN111145031A (en) Insurance business customization method, device and system
CN110336872B (en) Method, device and system for acquiring third-party data
CN111367776A (en) Recording method, device, equipment and storage medium of resource transfer service
CN115564571A (en) Application information auditing method, system and computer equipment
CN107408121A (en) Attached personal identification and account are withholdd
CN114913026A (en) Insurance front-end system, equipment and medium
CN113592450A (en) Invoice checking method and device based on central platform invoice center, storage medium and electronic equipment
CN110490500B (en) Batch generation method, device and system of data
CN113506161A (en) Invoice checking method and device, storage medium and electronic equipment
CN113792533A (en) Data processing method, data processing device, storage medium and electronic equipment
CN110599333A (en) Loan transaction processing method and device based on bank difference and electronic equipment
CN113706045B (en) Funds payment method, apparatus, device, medium and program product
CN116797341B (en) Method, device, equipment and medium for generating and managing points based on operation platform
US20220366425A1 (en) Service management system for processing a request
CN115495453A (en) Method and device for generating message, computing equipment and storage medium
CN115170260A (en) Financial certification making method and device, storage medium and computer equipment
CN113313424A (en) Method and device for processing accounting data
CN115034892A (en) Fund verification method, apparatus, electronic device, medium, and program product
CN117391845A (en) Transaction data processing method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination