CN116883150B - Quick identification and safety response method for gold-eliminating wind control information - Google Patents

Quick identification and safety response method for gold-eliminating wind control information Download PDF

Info

Publication number
CN116883150B
CN116883150B CN202310814580.7A CN202310814580A CN116883150B CN 116883150 B CN116883150 B CN 116883150B CN 202310814580 A CN202310814580 A CN 202310814580A CN 116883150 B CN116883150 B CN 116883150B
Authority
CN
China
Prior art keywords
credit investigation
asset
wind control
background server
credit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310814580.7A
Other languages
Chinese (zh)
Other versions
CN116883150A (en
Inventor
权瑞
许洪泉
吕正远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Ningyin Consumer Finance Co ltd
Original Assignee
Zhejiang Ningyin Consumer Finance Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Ningyin Consumer Finance Co ltd filed Critical Zhejiang Ningyin Consumer Finance Co ltd
Priority to CN202310814580.7A priority Critical patent/CN116883150B/en
Publication of CN116883150A publication Critical patent/CN116883150A/en
Application granted granted Critical
Publication of CN116883150B publication Critical patent/CN116883150B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Development Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The utility model relates to a quick identification and safe response method of anti-cash wind control information, which can finish credit and asset auditing of consumer users on a background server of a financial service company, wherein the consumer users only need to upload materials according to a guiding rule issued by the background server of the financial service company, execute credit and asset auditing on the background server, issue credit results T and asset auditing results S to a consumer terminal, can quickly calculate the comprehensive risk W of the consumer users, and carry out anti-cash wind control decisions according to the comprehensive risk W. By adopting the scheme, the wind control information can be rapidly identified and safely responded through the gold-eliminating wind control mode, the gold-eliminating wind control flow time is greatly saved, the market circulation efficiency of gold elimination is improved, and the circulation quantity of gold elimination in the market is accelerated.

Description

Quick identification and safety response method for gold-eliminating wind control information
Technical Field
The disclosure relates to the technical field of finance, in particular to a method and a device for rapidly identifying and safely responding gold-eliminating wind control information and electronic equipment.
Background
Consumer finances refer to modern financial services in which consumer loans are provided by consumers of various groups, and generally include personal durable consumer loans and general purpose personal consumer loans, credit property transfer and peer loans, issuing financial bonds, and the like.
At present, the wind control of consumers is mainly focused on credit investigation and property verification of the consumers, the credit verification and verification is generally performed through public security authorities or third party credit investigation institutions, and the property wind control generally enables the consumers to provide corresponding property certificates. In actual financial consumption, the consumer finance company can provide identity documents for verification according to the identity documents, and the credit investigation result can be obtained after a few days; if credit investigation is not performed, property problems of consumers, such as house property certificates, bank running water and the like, are investigated, and all links need to be processed after credit investigation reports are obtained. Because credit has problems, the subsequent payouts (no payouts or low payouts) are affected. In the process of wind control investigation and verification of providing financial services for consumers by a financial service company, the consumers provide identity documents for the financial service company, the identity documents of the financial service company carry out credit investigation and verification on third parties, property investigation is carried out according to credit investigation and verification results, and loans are paid after the investigation results, so that the process can last for a plurality of days, the consumed time is relatively large, and the turnover time and the financial flow efficiency of the financial services are affected. The current gold eliminating market has faster flow and longer wind control time, which affects market quantity, so that it is necessary to provide a gold eliminating wind control mode which has a certain wind control capability in time and can respond quickly.
Disclosure of Invention
In order to solve the problems, the application provides a method, a device and electronic equipment for rapidly identifying and safely responding gold-eliminating wind control information.
In one aspect of the application, a method for rapidly identifying and safely responding to gold-eliminating wind control information is provided, which comprises the following steps:
logging in a background server of a financial service company through a consumption end, and uploading user identity information at the same time;
the background server records and stores the identity ID of the consumer user, forwards the user identity information to a credit investigation mechanism and an asset auditing platform, and waits for the response of the credit investigation mechanism and the asset auditing platform;
the credit investigation mechanism and the asset auditing platform respectively receive and audit the user identity information, respectively make a credit investigation result T and an asset auditing result S, and feed back to a background server;
the background server rapidly calculates the comprehensive risk W of the consumer user according to the credit investigation result T and the asset auditing result S, and carries out a gold elimination wind control decision according to the comprehensive risk W:
W≥kT α *S β
k is an offset coefficient, when consumer users consume the individual, the value range of k is 0.5-1.0, and when consumer users consume the enterprise, the value range of k is 1.0-2.0;
alpha and beta are fractional exponentiations of credit and asset respectively, and the values are 0.20-0.35 and 0.30-0.50 respectively;
t and S are positive numbers;
if T is 0, W is 0; if S is 0, W is greater than or equal to kT α
As an optional embodiment of the present application, optionally, before logging into the background server of the financial service company, the method further includes:
acquiring access ports of the credit investigation mechanism and the asset auditing platform;
based on a port mapping technology, the access ports of the credit investigation mechanism and the asset auditing platform are respectively mapped on the background server in a mirror image mode, and access port addresses of the credit investigation mechanism and the asset auditing platform are respectively stored on the background server;
and when user auditing is carried out, respectively initiating a wind control access request to the credit investigation mechanism and the asset auditing platform through the access port address stored in the background server.
As an optional embodiment of the present application, optionally, before logging into the background server of the financial service company, the method further includes:
the background server initiates access to the credit investigation mechanism through the access port address of the credit investigation mechanism and requests to acquire credit investigation wind control rules;
the background server initiates access to the asset auditing platform through the access port address of the asset auditing platform, and requests to acquire asset auditing wind control rules;
the credit investigation mechanism and the asset auditing platform respectively respond to the request and synchronously feed back the credit investigation wind control rule and the asset auditing wind control rule to a background server;
and the background server receives and stores the credit investigation wind control rule and the asset auditing wind control rule.
As an optional embodiment of the present application, optionally after logging into the background server of the financial service company, the method further includes:
the background server automatically recommends the credit investigation wind control rule and the asset auditing wind control rule to a consumption terminal, and guides a consumer user to upload the user identity information meeting the credit investigation wind control rule and the asset auditing wind control rule;
and the consumption terminal receives and displays the credit investigation wind control rule and the asset verification wind control rule, and respectively uploads corresponding user identity information according to the credit investigation wind control rule and the asset verification wind control rule.
As an optional embodiment of the present application, optionally, before forwarding the user identity information to a credit bureau and an asset auditing platform, the method further comprises:
the background server respectively utilizes the credit investigation wind control rule and the asset verification wind control rule to carry out initial verification on the user identity information:
storing the user identity information into a background database if the rule requirement is met, adding the user identity information into a message queue, and waiting for reporting the credit investigation mechanism and the asset auditing platform;
if the rule requirement is not met, prompt information which does not meet the requirement is issued to a consumer side, and a consumer is prompted to correct.
As an optional implementation manner of the present application, optionally, the credit investigation mechanism and the asset auditing platform respectively receive and audit the user identity information, respectively make a credit investigation result T and an asset auditing result S, and feed back to a background server, including:
the credit investigation mechanism receives and examines the user identity information, and if the examination passes, a credit investigation result T is generated and a credit investigation verification label of the credit investigation mechanism is marked; generating a corresponding first identification mark for the credit investigation result T with the credit investigation verification tag, and feeding back the first identification mark to a background server;
the asset auditing platform receives and audits the user identity information respectively, and generates an asset auditing result S and marks a qualification approval label of the asset auditing platform if the auditing is passed; generating a corresponding second identification mark for the asset auditing result S with the qualification approval label, and feeding back the second identification mark to a background server;
the background server receives the first identification mark and the second identification mark respectively, and stores the first identification mark and the second identification mark under the identity ID of the consumer user;
and the consumer user logs in and scans the first identification mark or the second identification mark stored on the background server through the consumer terminal, accesses the credit investigation mechanism or the asset auditing platform through the background, and retrieves and checks the credit investigation result T with the credit investigation approval label or the asset auditing result S with the qualification approval label.
As an optional embodiment of the present application, optionally, further comprising:
financial limit P estimates: p=p 0 *W
P 0 Is an initial credit value.
As an optional embodiment of the present application, optionally, further comprising:
issuing the credit investigation result T, the asset auditing result S, the comprehensive risk W and the financial limit P to a consumption end through a background server;
and the consumption end receives and displays the credit investigation result T, the asset auditing result S, the comprehensive risk W and the financial limit P.
In another aspect of the present application, a device for implementing the method for rapidly identifying and safely responding to the gold-eliminating wind control information is provided, including:
the consumption end is used for logging in a background server of the financial service company and uploading user identity information at the same time;
the background server is used for recording and storing the identity ID of the consumer user, forwarding the user identity information to a credit investigation mechanism and an asset auditing platform, and waiting for the response of the credit investigation mechanism and the asset auditing platform; the method comprises the steps of,
according to the credit investigation result T and the asset auditing result S, the comprehensive risk W of the consumer user is rapidly calculated, and a gold eliminating wind control decision is carried out according to the comprehensive risk W:
W≥kT α *S β
k is an offset coefficient, when consumer users consume the individual, the value range of k is 0.5-1.0, and when consumer users consume the enterprise, the value range of k is 1.0-2.0;
alpha and beta are fractional exponentiations of credit and asset respectively, and the values are 0.20-0.35 and 0.30-0.50 respectively;
t and S are positive numbers;
if T is 0, W is 0; if S is 0, W is greater than or equal to kT α
In another aspect of the present application, an electronic device is further provided, including:
a processor;
a memory for storing processor-executable instructions;
the processor is configured to implement the method for rapidly identifying and safely responding the anti-gold wind control information when executing the executable instructions.
The invention has the technical effects that:
logging in a background server of a financial service company through a consumption end, and uploading user identity information at the same time; the background server records and stores the identity ID of the consumer user, forwards the user identity information to a credit investigation mechanism and an asset auditing platform, and waits for the response of the credit investigation mechanism and the asset auditing platform; the credit investigation mechanism and the asset auditing platform respectively receive and audit the user identity information, respectively make a credit investigation result T and an asset auditing result S, and feed back to a background server; and the background server rapidly calculates the comprehensive risk W of the consumer user according to the credit investigation result T and the asset auditing result S, and carries out a gold eliminating wind control decision according to the comprehensive risk W. The credit and asset auditing method can finish credit and asset auditing of the consumer user on the background server of the financial service company, the consumer user only needs to upload materials according to the guiding rules issued by the background server of the financial service company, credit and asset auditing is performed on the background server, credit results T and asset auditing results S are issued to the consumer terminal, the comprehensive risk W of the consumer user can be rapidly calculated, and a gold-eliminating wind control decision is performed according to the comprehensive risk W. By adopting the scheme, the wind control information can be rapidly identified and safely responded through the gold-eliminating wind control mode, the gold-eliminating wind control flow time is greatly saved, the market circulation efficiency of gold elimination is improved, and the circulation quantity of gold elimination in the market is accelerated.
Other features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate exemplary embodiments, features and aspects of the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 shows a schematic diagram of an existing credit investigation audit;
FIG. 2 is a schematic diagram showing the implementation flow of the method for rapidly identifying and responding security information of the present invention;
FIG. 3 is a schematic diagram of an application system for a mirrored port of the present invention;
fig. 4 shows a schematic application diagram of the electronic device of the invention.
Detailed Description
Various exemplary embodiments, features and aspects of the disclosure will be described in detail below with reference to the drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Although various aspects of the embodiments are illustrated in the accompanying drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
In addition, numerous specific details are set forth in the following detailed description in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present disclosure may be practiced without some of these specific details. In some instances, well known means, elements, and circuits have not been described in detail so as not to obscure the present disclosure.
Example 1
As shown in fig. 2, in one aspect of the present application, a method for quickly identifying and safely responding to anti-gold wind control information is provided, which includes the following steps:
s1, logging in a background server of a financial service company through a consumption end, and uploading user identity information at the same time;
s2, the background server records and stores the identity ID of the consumer user, forwards the user identity information to a credit investigation mechanism and an asset auditing platform, and waits for the credit investigation mechanism and the asset auditing platform to respond;
s3, the credit investigation mechanism and the asset auditing platform respectively receive and audit the user identity information, respectively make a credit investigation result T and an asset auditing result S, and feed back to a background server;
s4, the background server rapidly calculates the comprehensive risk W of the consumer user according to the credit investigation result T and the asset auditing result S, and carries out gold elimination wind control decision according to the comprehensive risk W:
W≥kT α *S β
k is an offset coefficient, when consumer users consume the individual, the value range of k is 0.5-1.0, and when consumer users consume the enterprise, the value range of k is 1.0-2.0;
alpha and beta are fractional exponentiations of credit and asset respectively, and the values are 0.20-0.35 and 0.30-0.50 respectively;
t and S are positive numbers;
if T is 0, W is 0; if S is 0, W is greater than or equal to kT α
As shown in fig. 3, the scheme adopts an intelligent wind control system, and the background server of the financial service company is in communication connection with the consumer end where the consumer user is located, so that corresponding financial service software can be installed on the consumer end, and the background server can be logged in through the financial service software. And mirroring the access ports of the credit investigation mechanism and the asset evaluation and verification platform through a mirror image port mapping technology, and deploying the access ports on a background server to enable the access ports of the credit investigation mechanism and the asset evaluation and verification platform to be deployed on the background server at the same time.
Therefore, the wind control information processing of the consumer user is carried out on a background server of the financial service company, so that the consumer user does not frequently come and go to the financial service company or credit investigation mechanism or the asset assessment platform any more, and the consumer user can carry out information interaction with the financial service company, credit investigation or asset assessment and audit platform through a consumer terminal such as a smart phone, thereby realizing wind control assessment of the consumer user and carrying out quick identification and safety response.
The credit investigation application or the asset investigation module of the credit investigation mechanism or the asset investigation platform can be transmitted and deployed on the background server through the port mapping mode, so that the financial service company can uniformly process the user identity information of the consumer user and interface the credit investigation mechanism and the asset investigation platform.
Through the port mirror image mapping technology, a virtual access port can be deployed on a background server, so that a financial service company simultaneously has a credit investigation mechanism and a virtual access port of an asset auditing platform, and meanwhile, based on the virtual access port, an application or a program corresponding to a credit investigation system of the credit investigation mechanism or an asset auditing system of the asset auditing platform can be issued and deployed on the background server through the access port, and an application request and access for credit investigation or asset evaluation can be performed on the background server of the financial service company. And the method is equivalent to indirectly initiating access to a server of a credit investigation mechanism or an asset auditing platform and processing data.
The scheme also sets the comprehensive risk W of the consumer user to be calculated rapidly, and carries out the gold elimination wind control decision according to the comprehensive risk W:
W≥kT α *S β
the public decision calculation mode of the scheme is different for individuals or enterprise users, if the public decision calculation mode is different, the offset coefficient cannot exceed 1, and specifically, corresponding decisions are required to be carried out according to the asset auditing result of the individuals, for example, the asset assessment exceeds 100 ten thousand, and the offset coefficient can be set to be 0.8 or 1. For an enterprise, an enterprise asset assessment similar process may take between 1.0 and 2.0. If the credit result is zero, the wind control treatment of the enterprise is abandoned, and the wind W is taken to be zero. The lower credit corresponds to lower credit or lower asset assessment, and the product of the two corresponds to the determination of the user's wind control coefficient.
The lower the value of the integrated risk pneumatic decision result W, the lower the asset payout coefficient or amount for that user. If the credit is zero, giving up the money release to the user; however, if the credit has a certain credit, the property is small or zero, the corresponding fund loan is correspondingly issued according to the credit result. The credit investigation and the credit investigation of the asset are prioritized, the air control of the credit investigation is larger than that of the asset, if the credit investigation result T value is larger than that of the S index, the credit investigation is higher than that of the weight, for example, the fractional exponent of the credit investigation is lower than that of the asset, and the credit investigation is also equivalent to that the weight of the credit investigation is larger.
According to the technical scheme, credit and asset auditing of the consumer user are completed on the background server of the financial service company, the consumer user only needs to upload materials according to the guiding rules issued by the background server of the financial service company, credit and asset auditing is executed on the background server, credit results T and asset auditing results S are issued to the consumer terminal, the comprehensive risk W of the consumer user can be rapidly calculated, and a financial pneumatic control decision can be performed according to the comprehensive risk W. By adopting the scheme, the wind control information can be rapidly identified and safely responded through the gold-eliminating wind control mode, the gold-eliminating wind control flow time is greatly saved, the market circulation efficiency of gold elimination is improved, and the circulation quantity of gold elimination in the market is accelerated.
As an optional embodiment of the present application, optionally, before logging into the background server of the financial service company, the method further includes:
acquiring access ports of the credit investigation mechanism and the asset auditing platform;
based on a port mapping technology, the access ports of the credit investigation mechanism and the asset auditing platform are respectively mapped on the background server in a mirror image mode, and access port addresses of the credit investigation mechanism and the asset auditing platform are respectively stored on the background server;
and when user auditing is carried out, respectively initiating a wind control access request to the credit investigation mechanism and the asset auditing platform through the access port address stored in the background server.
As shown in fig. 3, the access port of the credit investigation system of the credit investigation mechanism and the access port of the background investigation system of the asset investigation platform are connected with the background server through the switch by the mirror technology. The port mapping technology is not described in detail in this embodiment, and the adopted switch is not limited as well. An exchange may be provided between the financial services system and the credit bureau and asset auditing platform. The virtual mirror port can be set through the switch, the background server can initiate access with a corresponding credit investigation mechanism or asset auditing platform through an access port address configured by the virtual mirror port, and the communication port can be communicated with a consumer. When credit investigation or asset auditing is carried out, the background server reports the credit investigation certificate information and the asset authentication information in the user identity information uploaded by the user to the corresponding credit investigation system and the asset background investigation system through the corresponding access ports respectively.
The deployment modes of the switch and the mirror image port are not limited in this embodiment, and the virtual mirror image port of the existing switch or router can be set and placed.
As an optional embodiment of the present application, optionally, before logging into the background server of the financial service company, the method further includes:
the background server initiates access to the credit investigation mechanism through the access port address of the credit investigation mechanism and requests to acquire credit investigation wind control rules;
the background server initiates access to the asset auditing platform through the access port address of the asset auditing platform, and requests to acquire asset auditing wind control rules;
the credit investigation mechanism and the asset auditing platform respectively respond to the request and synchronously feed back the credit investigation wind control rule and the asset auditing wind control rule to a background server;
and the background server receives and stores the credit investigation wind control rule and the asset auditing wind control rule.
The credit investigation wind control rules are specifically set by credit investigation institutions, and the asset auditing wind control rules are specifically set by asset auditing platforms and stored in respective background databases. When the background of the financial service system initiates access to the credit investigation mechanism or the background of the asset auditing platform through the virtual mirror port, the credit investigation mechanism or the background of the asset auditing platform processes the access request initiated by the financial service background and feeds back the corresponding wind control rule to the financial service system background. And the background of the financial service system acquires and stores credit investigation wind control rules and asset auditing wind control rules and stores the credit investigation wind control rules and the asset auditing wind control rules in a background database of the financial service background.
As an optional embodiment of the present application, optionally after logging into the background server of the financial service company, the method further includes:
the background server automatically recommends the credit investigation wind control rule and the asset auditing wind control rule to a consumption terminal, and guides a consumer user to upload the user identity information meeting the credit investigation wind control rule and the asset auditing wind control rule;
and the consumption terminal receives and displays the credit investigation wind control rule and the asset verification wind control rule, and respectively uploads corresponding user identity information according to the credit investigation wind control rule and the asset verification wind control rule.
The financial service background (background server of financial service company) can use the stored wind control rule to carry out preliminary audit and evaluation on the information of the user when the consumption end carries out access login to the background management system of the financial service institution, can synchronously issue the wind control rule to the consumption end, remind the consumer that the user should pay attention to the requirement of uploading data, and prepare corresponding credit or asset evaluation materials according to the rule and upload.
As an optional embodiment of the present application, optionally, before forwarding the user identity information to a credit bureau and an asset auditing platform, the method further comprises:
the background server respectively utilizes the credit investigation wind control rule and the asset verification wind control rule to carry out initial verification on the user identity information:
storing the user identity information into a background database if the rule requirement is met, adding the user identity information into a message queue, and waiting for reporting the credit investigation mechanism and the asset auditing platform;
if the rule requirement is not met, prompt information which does not meet the requirement is issued to a consumer side, and a consumer is prompted to correct.
When a user uploads a corresponding information file through a consumption terminal, a background server can conduct initial verification on user identity information by utilizing credit and asset verification wind control rules, initial verification is conducted on credit pictures or credit certificates in the user identity information by utilizing the credit wind control rules during verification, verification is conducted on asset evidence files such as houses, securities or bank tickets in the uploaded user identity information by utilizing the asset verification wind control rules, and the background manager or the configured automatic verification rules can conduct initial verification. If the user identity information meets the rule, storing the uploaded user identity information in a background, binding the user identity information under the user identity ID, respectively adding the user identity information into a message queue middleware such as Kafka, and orderly reporting the user identity information uploaded by the current user to a credit investigation mechanism and an asset auditing platform by the middleware according to the sequence number. If the information is not satisfied, corresponding prompts are issued to the consumer end for correction, and the consumer is required to correct the information according to the correct rules. Message middleware, and message queuing mechanisms can be seen in the existing message queuing mechanism Kafka.
As an optional implementation manner of the present application, optionally, the credit investigation mechanism and the asset auditing platform respectively receive and audit the user identity information, respectively make a credit investigation result T and an asset auditing result S, and feed back to a background server, including:
the credit investigation mechanism receives and examines the user identity information, and if the examination passes, a credit investigation result T is generated and a credit investigation verification label of the credit investigation mechanism is marked; generating a corresponding first identification mark for the credit investigation result T with the credit investigation verification tag, and feeding back the first identification mark to a background server;
the asset auditing platform receives and audits the user identity information respectively, and generates an asset auditing result S and marks a qualification approval label of the asset auditing platform if the auditing is passed; generating a corresponding second identification mark for the asset auditing result S with the qualification approval label, and feeding back the second identification mark to a background server;
the background server receives the first identification mark and the second identification mark respectively, and stores the first identification mark and the second identification mark under the identity ID of the consumer user;
and the consumer user logs in and scans the first identification mark or the second identification mark stored on the background server through the consumer terminal, accesses the credit investigation mechanism or the asset auditing platform through the background, and retrieves and checks the credit investigation result T with the credit investigation approval label or the asset auditing result S with the qualification approval label.
The financial service background can utilize a credit investigation system and an asset investigation system which are issued through a mirror image service port in advance and are installed on a financial service background server to carry out investigation and evaluation on the identity information of a user (address access is carried out through a virtual mirror image port), and in the credit investigation system and the asset investigation system, an investigation mechanism and a corresponding investigation rule which are deployed by a credit investigation mechanism and an investigation asset investigation platform are arranged, on the financial service background, the user identity information can be subjected to the investigation by utilizing the investigation rules or the mechanisms of the systems, and after the investigation, the investigation mechanism can be fed back to the corresponding mechanism or platform, and a corresponding investigation result and a corresponding verification label are generated. For example, after the credit information auditing system audits the credit information of the user, the audit result T is generated by auditing, and the credit information auditing result T can be an audit report and can be automatically generated by the credit information auditing system. After the verification is passed, a verification label of the verification mechanism, such as an audit electronic signature label of the verification mechanism, is marked on the audit report of the verification mechanism, a corresponding two-dimensional code identifier is generated for the audit report, the two-dimensional code identifier is fed back to a financial service background, and the financial service background can automatically scan based on the verification two-dimensional code identifier and acquire a corresponding verification audit report. Simultaneously, the credit two-dimension code identification can be synchronously issued to the consumption end through the financial service background, and a consumer user can log in the financial service background through the consumption end, check the credit two-dimension code identification, scan and acquire a corresponding credit report.
The auditing result T contains credit score T of the consumer user, and wind control calculation can be further carried out.
The asset auditing result S can be referred to an auditing mechanism of the credit auditing result. And will not be described in detail here. As an optional embodiment of the present application, optionally, further comprising:
financial limit P estimates: p=p 0 *W
P 0 Is an initial credit value.
As an optional embodiment of the present application, optionally, further comprising:
issuing the credit investigation result T, the asset auditing result S, the comprehensive risk W and the financial limit P to a consumption end through a background server;
and the consumption end receives and displays the credit investigation result T, the asset auditing result S, the comprehensive risk W and the financial limit P.
After the financial service background carries out the wind control audit, the credit investigation result score and the evaluation score of the asset audit result can be obtained, and the wind control result of the consumer user can be obtained based on the score.
Evaluating an initial value P of a loan of a consumption amount to a consumer based on the integrated risk W to the consumer user 0 Refer to the forehead value P 0 And the integrated risk W is used as the financial limit P issued by the consumer user. The synchronization then issues T, S, W, P these several values to the consumer after the corresponding credit report is generated.
The subsequent loan-consuming and other issuing work is completed by the financial service system, and the present embodiment is not limited and considered.
By adopting the scheme, the wind control information can be rapidly identified and safely responded through the gold-eliminating wind control mode, the gold-eliminating wind control flow time is greatly saved, the market circulation efficiency of gold elimination is improved, and the circulation quantity of gold elimination in the market is accelerated.
It should be apparent to those skilled in the art that implementing all or part of the above-described embodiments may be accomplished by computer programs to instruct related hardware, and the programs may be stored in a computer readable storage medium, which when executed may include the processes of the embodiments of the controls described above. It will be appreciated by those skilled in the art that implementing all or part of the above-described embodiments may be accomplished by computer programs to instruct related hardware, and the programs may be stored in a computer readable storage medium, which when executed may include the processes of the embodiments of the controls described above. The storage medium may be a magnetic disk, an optical disc, a Read-only memory (ROM), a random access memory (RandomAccessMemory, RAM), a flash memory (flash memory), a hard disk (HDD), or a Solid State Drive (SSD); the storage medium may also comprise a combination of memories of the kind described above.
Example 2
Based on the implementation principle of embodiment 1, in another aspect of the present application, a device for implementing the method for quickly identifying and safely responding to the gold-eliminating wind control information is provided, where the device includes:
the consumption end is used for logging in a background server of the financial service company and uploading user identity information at the same time;
the background server is used for recording and storing the identity ID of the consumer user, forwarding the user identity information to a credit investigation mechanism and an asset auditing platform, and waiting for the response of the credit investigation mechanism and the asset auditing platform; the method comprises the steps of,
according to the credit investigation result T and the asset auditing result S, the comprehensive risk W of the consumer user is rapidly calculated, and a gold eliminating wind control decision is carried out according to the comprehensive risk W:
W≥kT α *S β
k is an offset coefficient, when consumer users consume the individual, the value range of k is 0.5-1.0, and when consumer users consume the enterprise, the value range of k is 1.0-2.0;
alpha and beta are fractional exponentiations of credit and asset respectively, and the values are 0.20-0.35 and 0.30-0.50 respectively;
t and S are positive numbers;
if T is 0, W is 0; if S is 0, W is greater than or equal to kT α
The functions and interactions between the respective application bodies described above are specifically referred to the description of embodiment 1.
The modules or steps of the invention described above may be implemented in a general-purpose computing device, they may be centralized in a single computing device, or distributed across a network of computing devices, or they may alternatively be implemented in program code executable by a computing device, such that they may be stored in a memory device and executed by a computing device, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps within them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
Example 3
As shown in fig. 4, in another aspect, the present application further proposes an electronic device, including:
a processor;
a memory for storing processor-executable instructions;
the processor is configured to implement the method for rapidly identifying and safely responding the gold-eliminating wind control information when executing the executable instructions.
Embodiments of the present disclosure provide for an electronic device that includes a processor and a memory for storing processor-executable instructions. The processor is configured to execute the executable instructions to implement any one of the foregoing rapid identification and security response methods for the anti-gold wind control information.
Here, it should be noted that the number of processors may be one or more. Meanwhile, in the electronic device of the embodiment of the disclosure, an input device and an output device may be further included. The processor, the memory, the input device, and the output device may be connected by a bus, or may be connected by other means, which is not specifically limited herein.
The memory is a computer-readable storage medium that can be used to store software programs, computer-executable programs, and various modules, such as: the embodiment of the disclosure provides a program or a module corresponding to a method for rapidly identifying and safely responding gold-eliminating wind control information. The processor executes various functional applications and data processing of the electronic device by running software programs or modules stored in the memory.
The input device may be used to receive an input number or signal. Wherein the signal may be a key signal generated in connection with user settings of the device/terminal/server and function control. The output means may comprise a display device such as a display screen.
The foregoing description of the embodiments of the present disclosure has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the various embodiments described. The terminology used herein was chosen in order to best explain the principles of the embodiments, the practical application, or the technical improvement of the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (4)

1. The quick identification and safety response method for the gold-eliminating wind control information is characterized by comprising the following steps of:
access ports of a credit investigation mechanism and an asset auditing platform are obtained;
based on a port mapping technology, the access ports of the credit investigation mechanism and the asset auditing platform are respectively mapped on a background server in a mirror image mode, and access port addresses of the credit investigation mechanism and the asset auditing platform are respectively stored on the background server;
when user auditing is carried out, respectively initiating a wind control access request to the credit investigation mechanism and the asset auditing platform through the access port address stored on the background server;
the background server initiates access to the credit investigation mechanism through the access port address of the credit investigation mechanism and requests to acquire credit investigation wind control rules;
the background server initiates access to the asset auditing platform through the access port address of the asset auditing platform, and requests to acquire asset auditing wind control rules;
the credit investigation mechanism and the asset auditing platform respectively respond to the request and synchronously feed back the credit investigation wind control rule and the asset auditing wind control rule to a background server;
the background server receives and stores the credit investigation wind control rule and the asset auditing wind control rule;
logging in a background server of a financial service company through a consumption end, and uploading user identity information at the same time;
the background server records and stores the identity ID of the consumer user, forwards the user identity information to a credit investigation mechanism and an asset auditing platform, and waits for the response of the credit investigation mechanism and the asset auditing platform;
the credit investigation mechanism and the asset auditing platform respectively receive and audit the user identity information, respectively make a credit investigation result T and an asset auditing result S, and feed back to a background server;
the background server rapidly calculates the comprehensive risk W of the consumer user according to the credit investigation result T and the asset auditing result S, and carries out a gold elimination wind control decision according to the comprehensive risk W:
W≥k T α *S β
k is an offset coefficient, when consumer users consume the individual, the value range of k is 0.5-1.0, and when consumer users consume the enterprise, the value range of k is 1.0-2.0;
alpha and beta are fractional exponentiations of credit and asset respectively, and the values are 0.20-0.35 and 0.30-0.50 respectively;
t and S are positive numbers;
if T is 0, W is 0; if S is 0, W is greater than or equal to k T α
After logging into the background server of the financial service company, the method further comprises:
the background server automatically recommends the credit investigation wind control rule and the asset auditing wind control rule to a consumption terminal, and guides a consumer user to upload the user identity information meeting the credit investigation wind control rule and the asset auditing wind control rule;
the consumption terminal receives and displays the credit investigation wind control rule and the asset verification wind control rule, and corresponding user identity information is uploaded respectively according to the credit investigation wind control rule and the asset verification wind control rule;
before forwarding the user identity information to a credit bureau and an asset auditing platform, the method further comprises:
the background server respectively utilizes the credit investigation wind control rule and the asset verification wind control rule to carry out initial verification on the user identity information:
storing the user identity information into a background database if the rule requirement is met, adding the user identity information into a message queue, and waiting for reporting the credit investigation mechanism and the asset auditing platform;
if the rule requirement is not met, sending prompt information which does not meet the requirement to a consumption end, and prompting a consumer user to correct;
the credit investigation mechanism and the asset auditing platform respectively receive and audit the user identity information, respectively make a credit investigation result T and an asset auditing result S, and feed back to a background server, and comprise the following steps:
the credit investigation mechanism receives and examines the user identity information, and if the examination passes, a credit investigation result T is generated and a credit investigation verification label of the credit investigation mechanism is marked; generating a corresponding first identification mark for the credit investigation result T with the credit investigation verification tag, and feeding back the first identification mark to a background server;
the asset auditing platform receives and audits the user identity information respectively, and generates an asset auditing result S and marks a qualification approval label of the asset auditing platform if the auditing is passed; generating a corresponding second identification mark for the asset auditing result S with the qualification approval label, and feeding back the second identification mark to a background server;
the background server receives the first identification mark and the second identification mark respectively, and stores the first identification mark and the second identification mark under the identity ID of the consumer user;
the consumer user logs in and scans the first identification mark or the second identification mark stored on the background server through the consumer terminal, accesses the credit investigation mechanism or the asset auditing platform through the background, and retrieves and checks the credit investigation result T with the credit investigation approval label or the asset auditing result S with the qualification approval label;
further comprises:
financial limit P estimates: p=p 0 *W
P 0 Is an initial credit value.
2. The method for quickly identifying and responding to security of gold-eliminating wind control information according to claim 1, further comprising:
issuing the credit investigation result T, the asset auditing result S, the comprehensive risk W and the financial limit P to a consumption end through a background server;
and the consumption end receives and displays the credit investigation result T, the asset auditing result S, the comprehensive risk W and the financial limit P.
3. An apparatus for implementing the method for rapidly identifying and safely responding to the gold-eliminating wind control information according to claim 2, comprising:
the consumption end is used for logging in a background server of the financial service company and uploading user identity information at the same time;
the background server is used for recording and storing the identity ID of the consumer user, forwarding the user identity information to a credit investigation mechanism and an asset auditing platform, and waiting for the response of the credit investigation mechanism and the asset auditing platform; the method comprises the steps of,
according to the credit investigation result T and the asset auditing result S, the comprehensive risk W of the consumer user is rapidly calculated, and a gold eliminating wind control decision is carried out according to the comprehensive risk W:
W≥k T α *S β
k is an offset coefficient, when consumer users consume the individual, the value range of k is 0.5-1.0, and when consumer users consume the enterprise, the value range of k is 1.0-2.0;
alpha and beta are fractional exponentiations of credit and asset respectively, and the values are 0.20-0.35 and 0.30-0.50 respectively;
t and S are positive numbers;
if T is 0, W is 0; if S is 0, W is greater than or equal to k T α
4. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to implement a method of fast identification and secure response of degaussing wind control information as claimed in claim 2 when executing the executable instructions.
CN202310814580.7A 2023-07-05 2023-07-05 Quick identification and safety response method for gold-eliminating wind control information Active CN116883150B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310814580.7A CN116883150B (en) 2023-07-05 2023-07-05 Quick identification and safety response method for gold-eliminating wind control information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310814580.7A CN116883150B (en) 2023-07-05 2023-07-05 Quick identification and safety response method for gold-eliminating wind control information

Publications (2)

Publication Number Publication Date
CN116883150A CN116883150A (en) 2023-10-13
CN116883150B true CN116883150B (en) 2024-04-05

Family

ID=88256112

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310814580.7A Active CN116883150B (en) 2023-07-05 2023-07-05 Quick identification and safety response method for gold-eliminating wind control information

Country Status (1)

Country Link
CN (1) CN116883150B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20180075895A (en) * 2016-12-27 2018-07-05 조영호 System and method for networking and reservation managing of accommodations of grand scale event
CN109858757A (en) * 2018-12-28 2019-06-07 合肥凯捷技术有限公司 A kind of Financial Lease Risks rating system
CN114331719A (en) * 2021-12-24 2022-04-12 苏州汇千数据科技有限公司 Transaction wind control index intelligent analysis system based on big data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20180075895A (en) * 2016-12-27 2018-07-05 조영호 System and method for networking and reservation managing of accommodations of grand scale event
CN109858757A (en) * 2018-12-28 2019-06-07 合肥凯捷技术有限公司 A kind of Financial Lease Risks rating system
CN114331719A (en) * 2021-12-24 2022-04-12 苏州汇千数据科技有限公司 Transaction wind control index intelligent analysis system based on big data

Also Published As

Publication number Publication date
CN116883150A (en) 2023-10-13

Similar Documents

Publication Publication Date Title
WO2019237565A1 (en) Loan service processing method and apparatus, computer device and readable storage medium
CN110458543B (en) Data processing method, related device and medium
CN107808289B (en) Electronic payment platform, control method and device
CN109544335B (en) Transaction data processing method, device, equipment and storage medium based on blockchain
CN107403385B (en) Insurance information auditing method and device
US11106767B2 (en) Decentralized name verification using recursive attestation
WO2019104892A1 (en) Remote face-to-face signing agent matching method, electronic device, and computer-readable storage medium
CN102231200A (en) Method for transacting bankcard application through mobile intelligent terminal
CN112200673A (en) Method, device and equipment for cashless bank right and readable storage medium
CN113312649A (en) Message processing method, device, equipment, system and storage medium
US20190095922A1 (en) Cooperative fraud-detection processing
CN108510398A (en) Annuity method for processing business, system, server and storage medium
US20130325682A1 (en) Systems For Associating Temporary Payment Cards With Financial Accounts
US11488178B2 (en) Systems and methods for verifying digital payments
CN113687800A (en) File printing processing method and device, computer equipment and storage medium
CN116883150B (en) Quick identification and safety response method for gold-eliminating wind control information
CN111553788A (en) Capital business processing method and device based on big data, electronic equipment and medium
WO2020126791A1 (en) A method, apparatus and computer program product for exchanging messages across a network
CN116346362A (en) Electronic fidelity verification method and system based on blockchain technology
CN111445325B (en) Credit card information processing method, device, system and storage medium
CN109272296A (en) A kind of self-service brush face does loan method and system
CN108805690A (en) System and method for comparing and recommending suitable loaning bill business
CN112330288A (en) Intelligent enterprise verification and marketing system and verification and marketing method thereof
US10216830B2 (en) Multicomputer processing of client device request data using centralized event orchestrator and link discovery engine
CN113011962A (en) Resource allocation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant