TW201944336A - Method and device for processing available resources for service - Google Patents

Method and device for processing available resources for service Download PDF

Info

Publication number
TW201944336A
TW201944336A TW108104722A TW108104722A TW201944336A TW 201944336 A TW201944336 A TW 201944336A TW 108104722 A TW108104722 A TW 108104722A TW 108104722 A TW108104722 A TW 108104722A TW 201944336 A TW201944336 A TW 201944336A
Authority
TW
Taiwan
Prior art keywords
user
evaluation information
credibility
application
available
Prior art date
Application number
TW108104722A
Other languages
Chinese (zh)
Inventor
趙婷婷
丁國祥
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW201944336A publication Critical patent/TW201944336A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Abstract

Provided are a method and device for evaluating the credibility of a user applying for available resources of a service and a method and device for processing available resources for the service, the method for evaluating credibility comprising: acquiring application data of a user for available resources; determining first evaluation information according to the application data, the first evaluation information corresponding to an abnormality of the application data; acquiring historical behavior data of the user; determining second evaluation information according to the historical behavior data, the second evaluation information corresponding to attribute features of the user; and combining the first evaluation information and the second evaluation information to evaluate the credibility of the user applying for the available resources of the service.

Description

處理業務的可用資源的方法和裝置Method and device for processing available resources of business

本說明書實施例涉及資料處理技術領域,更具體地,涉及一種評估用戶申請業務可用資源的可信度的方法和裝置,以及一種處理業務的可用資源的方法和裝置。The embodiments of the present specification relate to the field of data processing technology, and more specifically, to a method and device for evaluating the credibility of resources available to a user for applying for a service, and a method and device for processing available resources for a service.

隨著網際網路技術的發展,越來越多的傳統業務有了對應的線上解決方案。然而,傳統的健康醫療保險業務目前還是基本處於人工處理紙質材料的階段。在健康醫療相關的保險領域,理賠的時效性和風險控制一直是行業的難題,理賠欺詐包括帶病投保、憑證造假、就診資訊虛假等情況。尤其是,其中的門診險屬於高頻場景,更需要快速準確地在理賠環節判斷風險並控制風險。因此,需要一種更有效的業務風險控制方案以及核賠方案,以滿足上述需求。With the development of Internet technology, more and more traditional businesses have corresponding online solutions. However, the traditional health and medical insurance business is still basically at the stage of manual processing of paper materials. In the field of health care related insurance, the timeliness and risk control of claims has always been a problem in the industry. Claims fraud includes insurance with illness, false credentials, and false medical information. In particular, the outpatient insurance is a high-frequency scenario, and it is necessary to quickly and accurately judge and control risks in the claims process. Therefore, there is a need for a more effective business risk control scheme and a compensation scheme to meet the above needs.

本說明書實施例旨在提供一種更有效的處理業務可用資源的方法,以解決現有技術中的不足。
為實現上述目的,本說明書一個方面提供一種評估用戶申請業務可用資源的可信度的方法,所述方法由所述業務所在的系統執行,包括:獲取所述用戶對所述可用資源的申請資料;根據所述申請資料,確定第一評估資訊,所述第一評估資訊對應於所述申請資料的異常性;獲取所述用戶的歷史行為資料;根據所述歷史行為資料,確定第二評估資訊,所述第二評估資訊對應於所述用戶的屬性特徵;以及結合所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度。
在一個實施例中,在上述評估用戶申請業務可用資源的可信度的方法中,所述業務為醫療保險業務,所述申請資料至少包括:就診人姓名、就診人身份標識證件圖片、就診時間、就診醫院、就診科室、醫生姓名、症狀、發票圖片和病歷圖片。
在一個實施例中,在上述評估用戶申請業務可用資源的可信度的方法中,根據所述申請資料,確定第一評估資訊包括,透過確定以下至少一項而確定所述第一評估資訊:
對應的圖片庫中是否存在與所述憑證圖片相似的圖片;
所述申請資料相比於用戶的歷史申請資料是否存在異常;
所述申請資料與所述用戶的系統好友的申請資料是否存在聚集性;
與所述就診醫院相關的申請資料是否存在聚集性;
與所述就診科室相關的申請資料是否存在聚集性;
與所述醫生相關的申請資料是否存在聚集性;以及
用戶終端的地理位置資訊是否與所述就診醫院相符。
在一個實施例中,在上述評估用戶申請業務可用資源的可信度的方法中,所述申請資料還包括以下至少一項:治療藥品名稱、治療藥品價格、處方圖片、醫囑圖片以及收費票據圖片,其中根據所述申請資料,確定第一評估資訊包括,透過基於健康險相關知識圖譜確定以下至少一項:所述治療藥品的療效是否與所述症狀對應、以及所述治療藥品價格是否符合市場價格,從而確定所述第一評估資訊。
在一個實施例中,在上述評估用戶申請業務可用資源的可信度的方法中,所述業務針對其用戶設定的可用資源與所述用戶透過所述系統進行的線下交易相關聯,其中,所述歷史行為資料為所述用戶在預定時段內透過所述系統進行線下交易的交易資料,以及,所述第二評估資訊對應於所述用戶在所述預定時段內透過所述系統進行的虛假線下交易次數相比於所述用戶在所述預定時段內透過所述系統進行的線下交易總次數的百分比。
在一個實施例中,上述評估用戶申請業務可用資源的可信度的方法還包括:在獲取所述用戶對所述可用資源的申請資料之前,獲取所述用戶的帳戶資訊,根據所述帳戶資訊,確定所述用戶的身份評估資訊,以及,其中,結合所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度包括,結合所述身份評估資訊、所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度。
在一個實施例中,在上述評估用戶申請業務可用資源的可信度的方法中,所述帳戶資訊包括以下至少一項:註冊時間、註冊時長、操作頻率、操作時間、登錄設備、綁定電話、資金情況、密碼修改記錄以及地理位置。
在一個實施例中,上述評估用戶申請業務可用資源的可信度的方法還包括:在獲取所述用戶對所述可用資源的申請資料之前,獲取所述用戶的帳戶評級資訊,以及,其中,結合所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度包括,結合所述帳戶評級資訊、所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度。
在一個實施例中,上述評估用戶申請業務可用資源的可信度的方法還包括:在確定第二評估資訊之後,獲取所述用戶與所述線下交易相關的歷史資料,以及,根據所述歷史資料,確定第三評估資訊,所述第三評估資訊用於評估用戶對所述線下交易的經營狀況,以及,其中,結合所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度包括,結合所述第一評估資訊、所述第二評估資訊和所述第三評估資訊,評估所述用戶申請業務可用資源的可信度。
本說明書另一方面提供一種處理業務的可用資源的方法,所述方法由所述業務所在的系統執行,包括:獲取用戶對業務的可用資源的申請資料;判斷所述申請資料是否滿足預定基本規則;在所述申請資料滿足所述預定基本規則的情況下,獲取透過上述評估可信度的方法評估的用戶申請業務可用資源的可信度;以及根據所述可信度,對所述可用資源進行處理。
在一個實施例中,在上述處理業務的可用資源的方法中,所述業務為醫療保險業務,所述預定基本規則包括以下至少一項:需本人就診、就診時間在保障期限內、就診疾病為非免責疾病、就診醫院為約定醫院、報案發票未重複使用、以及就診類型是保險業務的約定類型。
在一個實施例中,在上述處理業務的可用資源的方法中,根據所述可信度,對所述可用資源進行處理包括,在所述可信度大於預定閾值的情況下,向所述用戶快速轉移所述可用資源。
在一個實施例中,在上述處理業務的可用資源的方法中,向所述用戶快速轉移所述可用資源包括,透過調用規則引擎,根據預定賠付規則,結合用戶所述索賠金額,計算用戶的賠付金額,並進行賠付。
在一個實施例中,在上述處理業務的可用資源的方法中,根據所述可信度,對所述可用資源進行處理包括,在所述可信度小於預定閾值的情況下,將所述申請資料發送給所述業務的業務人員進行處理。
本說明書另一方面提供一種評估用戶申請業務可用資源的可信度的裝置,所述裝置由所述業務所在的系統實施,包括:申請資料獲取單元,配置為,獲取所述用戶對所述可用資源的申請資料;第一確定單元,配置為,根據所述申請資料,確定第一評估資訊,所述第一評估資訊對應於所述申請資料的異常性;行為資料獲取單元,配置為,獲取所述用戶的歷史行為資料;第二確定單元,配置為,根據所述歷史行為資料,確定第二評估資訊,所述第二評估資訊對應於所述用戶的屬性特徵;以及評估單元,配置為,結合所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度。
在一個實施例中,在上述評估用戶申請業務可用資源的可信度的裝置中,所述第一確定單元還配置為,透過確定以下至少一項而確定所述第一評估資訊:
對應的圖片庫中是否存在與所述憑證圖片相似的圖片;
所述申請資料相比於用戶的歷史申請資料是否存在異常;
所述申請資料與所述用戶的系統好友的申請資料是否存在聚集性;
與所述就診醫院相關的申請資料是否存在聚集性;
與所述就診科室相關的申請資料是否存在聚集性;
與所述醫生相關的申請資料是否存在聚集性;以及
用戶終端的地理位置資訊是否與所述就診醫院相符。
在一個實施例中,上述評估用戶申請業務可用資源的可信度的裝置還包括:帳戶資訊獲取單元,配置為,在獲取所述用戶對所述可用資源的申請資料之前,獲取所述用戶的帳戶資訊;第三確定單元,配置為,根據所述帳戶資訊,確定所述用戶的身份評估資訊,以及,其中,所述評估單元還配置為,結合所述身份評估資訊、所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度。
在一個實施例中,上述評估用戶申請業務可用資源的可信度的裝置還包括:帳戶評級資訊獲取單元,配置為,在獲取所述用戶對所述可用資源的申請資料之前,獲取所述用戶的帳戶評級資訊,以及,所述評估單元還配置為,結合所述帳戶評級資訊、所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度。
在一個實施例中,上述評估用戶申請業務可用資源的可信度的裝置還包括:歷史資料獲取單元,配置為,在確定第二評估資訊之後,獲取所述用戶與所述線下交易相關的歷史資料,以及,第四確定單元,配置為,根據所述歷史資料,確定第三評估資訊,所述第三評估資訊用於評估用戶對所述線下交易的經營狀況,以及,其中,所述評估單元還配置為,結合所述第一評估資訊、所述第二評估資訊和所述第三評估資訊,評估所述用戶申請業務可用資源的可信度。
本說明書另一方面提供一種處理業務的可用資源的裝置,所述裝置由所述業務所在的系統實施,包括:申請資料獲取單元,配置為,獲取用戶對業務的可用資源的申請資料;判斷單元,配置為,判斷所述申請資料是否滿足預定基本規則;可信度獲取單元,配置為,在所述申請資料滿足所述預定基本規則的情況下,獲取透過上述評估可信度的方法評估的用戶申請業務可用資源的可信度;以及處理單元,配置為,根據所述可信度,對所述可用資源進行處理。
在一個實施例中,在上述處理業務的可用資源的裝置中,所述處理單元還配置為,在所述可信度大於預定閾值的情況下,向所述用戶快速轉移所述可用資源。
在一個實施例中,在上述處理業務的可用資源的裝置中,所述處理單元還配置為,透過調用規則引擎,根據預定賠付規則,結合用戶所述索賠金額,計算用戶的賠付金額,並進行賠付。
在一個實施例中,在上述處理業務的可用資源的裝置中,所述處理單元還配置為,在所述可信度小於預定閾值的情況下,將所述申請資料發送給所述業務的業務人員進行處理。
本說明書另一方面提供一種計算機可讀的儲存媒體,其上儲存有指令代碼,所述指令代碼在計算機中執行時,令計算機執行上述方法。
透過根據本說明書實施例的處理業務可用資源的方法,有效平衡了用戶體驗、理賠時效性和風險控制。一方面,大大減輕人工投入,並且提高用戶體驗。另一方面,有效控制風險,從各個角度識別可能騙保和欺詐的風險。
The embodiments of the present specification are intended to provide a more effective method for processing service available resources to solve the deficiencies in the prior art.
In order to achieve the above purpose, one aspect of the present specification provides a method for evaluating the credibility of a user's application for a service available resource. The method is executed by a system where the service is located, and includes: obtaining the user's application data for the available resource. Determining first evaluation information according to the application data, the first evaluation information corresponding to the abnormality of the application data; obtaining historical behavior data of the user; determining second evaluation information based on the historical behavior data The second evaluation information corresponds to the attribute characteristics of the user; and combining the first evaluation information and the second evaluation information to evaluate the credibility of the resources available for the user to apply for the service.
In one embodiment, in the above method for assessing the credibility of the resources available to a user for applying for a service, the service is a medical insurance service, and the application data includes at least: the name of the visitor, the picture of the identity certificate of the visitor, and the time of the visit , Visiting hospital, visiting department, doctor's name, symptoms, invoice picture and medical record picture.
In one embodiment, in the above method for evaluating the credibility of a user's application for available resources for the service, determining the first evaluation information according to the application data includes determining the first evaluation information by determining at least one of the following:
Whether a picture similar to the voucher picture exists in the corresponding picture library;
Whether the application data is abnormal compared with the historical application data of the user;
Whether the application data is aggregated with the application data of the system friend of the user;
Whether the application data related to the visiting hospital is aggregated;
Whether the application data related to the consultation department is aggregated;
Whether the application data related to the doctor is aggregated; and whether the geographic location information of the user terminal is consistent with the visiting hospital.
In one embodiment, in the above method for evaluating the credibility of the resources available to the user for applying for the service, the application data further includes at least one of the following: the name of the treatment drug, the price of the treatment drug, a picture of the prescription, a picture of the doctor's order, and a picture of the bill , Wherein determining the first evaluation information based on the application data includes determining at least one of the following: based on a health insurance related knowledge map, whether the therapeutic effect of the therapeutic drug corresponds to the symptoms, and whether the therapeutic drug price is in line with the market Price, thereby determining the first evaluation information.
In one embodiment, in the above method for evaluating the credibility of the resources available to a user for applying for a service, the available resources set by the service for its user are associated with offline transactions conducted by the user through the system, where: The historical behavior data is transaction data of the user conducting offline transactions through the system within a predetermined period of time, and the second evaluation information corresponds to that of the user performing through the system during the predetermined period of time. The percentage of false offline transactions compared to the total number of offline transactions conducted by the user through the system during the predetermined period.
In one embodiment, the method for evaluating the credibility of a user's application for available resources further includes: before obtaining the user's application information for the available resources, obtaining account information of the user, and according to the account information To determine the identity evaluation information of the user, and, in combination with the first evaluation information and the second evaluation information, evaluating the credibility of the resources available for the user to apply for the service includes combining the identity evaluation information, The first evaluation information and the second evaluation information evaluate the credibility of the resources available for the user to apply for a service.
In one embodiment, in the above method for evaluating the credibility of the resources available to the user for applying for the service, the account information includes at least one of the following: registration time, registration time, operation frequency, operation time, login device, binding Phone number, funding status, password modification history, and geographic location.
In one embodiment, the method for evaluating the credibility of a user's application for available resources further includes: before obtaining the user's application information for the available resources, obtaining account rating information of the user, and, Combining the first evaluation information and the second evaluation information to evaluate the credibility of the resources available for the user to apply for the service includes combining the account rating information, the first evaluation information, and the second evaluation information, Evaluate the credibility of the resources available to the user for business applications.
In one embodiment, the method for evaluating the credibility of the resources available to the user for applying for the service further includes: after determining the second evaluation information, obtaining historical data related to the user and the offline transaction, and according to the Historical data to determine third evaluation information, the third evaluation information is used to evaluate a user's operating status of the offline transaction, and, in combination with the first evaluation information and the second evaluation information, an office is evaluated The credibility of the user-available service application resources includes evaluating the credibility of the user-available service application resources in combination with the first evaluation information, the second evaluation information, and the third evaluation information.
Another aspect of the present specification provides a method for processing available resources of a service. The method is executed by a system where the service is located, and includes: obtaining a user's application data for available resources of the service; and determining whether the application data meets predetermined basic rules. Obtaining the credibility of the resources available to the user to apply for the service evaluated by the method for assessing credibility in the case that the application data meets the predetermined basic rules; and according to the credibility, the available resources are evaluated For processing.
In one embodiment, in the above method for processing available resources of a business, the business is a medical insurance business, and the predetermined basic rule includes at least one of the following: the medical treatment is required, the medical treatment time is within the guarantee period, and the medical treatment is Non-exempt diseases, the visiting hospital is the agreed hospital, the report invoice is not reused, and the type of visit is the agreed type of insurance business.
In one embodiment, in the above method for processing available resources of a service, processing the available resources according to the credibility includes, if the credibility is greater than a predetermined threshold, sending the request to the user Quickly transfer the available resources.
In one embodiment, in the above-mentioned method for processing available resources of a service, quickly transferring the available resources to the user includes calculating a user's compensation by invoking a rule engine according to a predetermined compensation rule in combination with the user's claim amount. Amount and make a payment.
In one embodiment, in the above method for processing available resources of a service, processing the available resources according to the credibility includes, if the credibility is less than a predetermined threshold, applying the application The data is sent to the business personnel of the business for processing.
Another aspect of this specification provides a device for evaluating the credibility of a resource available to a user for applying for a service. The device is implemented by a system in which the service is located, and includes: an application data obtaining unit configured to obtain the user's access to the available Resource application data; a first determination unit configured to determine first evaluation information according to the application data, the first evaluation information corresponding to the abnormality of the application data; a behavior data acquisition unit configured to acquire Historical behavior data of the user; a second determination unit configured to determine second evaluation information based on the historical behavior data, the second evaluation information corresponding to the attribute characteristics of the user; and an evaluation unit configured to Combining the first evaluation information and the second evaluation information to evaluate the credibility of the resources available for the user to apply for the service.
In one embodiment, in the above-mentioned device for evaluating the credibility of a user's application for a service available resource, the first determining unit is further configured to determine the first evaluation information by determining at least one of the following:
Whether a picture similar to the voucher picture exists in the corresponding picture library;
Whether the application data is abnormal compared with the historical application data of the user;
Whether the application data is aggregated with the application data of the system friend of the user;
Whether the application data related to the visiting hospital is aggregated;
Whether the application data related to the consultation department is aggregated;
Whether the application data related to the doctor is aggregated; and whether the geographic location information of the user terminal is consistent with the visiting hospital.
In one embodiment, the above-mentioned apparatus for evaluating the credibility of a user's application for available resources further includes: an account information acquisition unit configured to obtain the user's application information before acquiring the user's application information for the available resources. Account information; a third determination unit configured to determine the identity evaluation information of the user according to the account information, and wherein the evaluation unit is further configured to combine the identity evaluation information and the first evaluation The information and the second evaluation information to evaluate the credibility of the resources available for the user to apply for the service.
In one embodiment, the above-mentioned apparatus for evaluating the credibility of a user's application for available resources further includes: an account rating information acquisition unit configured to acquire the user before acquiring the user's application information for the available resources. And the evaluation unit is further configured to evaluate the credibility of the resources available for the user to apply for the service in combination with the account rating information, the first evaluation information, and the second evaluation information.
In one embodiment, the above-mentioned device for evaluating the credibility of the resources available to the user for applying for the service further includes: a historical data acquisition unit configured to obtain, after determining the second evaluation information, the user's related to the offline transaction. Historical data, and a fourth determination unit configured to determine a third evaluation information based on the historical data, the third evaluation information being used to evaluate a user's operating status of the offline transaction, and The evaluation unit is further configured to evaluate the credibility of the resources available to the user to apply for a service in combination with the first evaluation information, the second evaluation information, and the third evaluation information.
Another aspect of the present specification provides a device for processing available resources of a service. The device is implemented by a system in which the service is located, and includes: an application data acquisition unit configured to acquire a user's application data for available resources of the service; a judgment unit Is configured to determine whether the application data meets a predetermined basic rule; a credibility acquisition unit is configured to obtain, when the application data meets the predetermined basic rule, an The user applies for the credibility of the available resources of the service; and a processing unit configured to process the available resources according to the credibility.
In one embodiment, in the above-mentioned device for processing available resources of a service, the processing unit is further configured to quickly transfer the available resources to the user if the credibility is greater than a predetermined threshold.
In one embodiment, in the above-mentioned device for processing available resources of a service, the processing unit is further configured to calculate a user's compensation amount by invoking a rule engine according to a predetermined compensation rule in combination with the user's claim amount, and perform Pay.
In an embodiment, in the above-mentioned device for processing available resources of a service, the processing unit is further configured to send the application data to a service of the service when the credibility is less than a predetermined threshold. Personnel for processing.
Another aspect of the present specification provides a computer-readable storage medium having stored therein an instruction code that, when executed in a computer, causes the computer to execute the above method.
The method for processing available resources of a service according to the embodiments of the present specification effectively balances user experience, timeliness of claims settlement, and risk control. On the one hand, it greatly reduces manual investment and improves user experience. On the other hand, effectively control risks and identify possible risks of fraud and fraud from various angles.

下面將結合附圖描述本說明書實施例。
圖1示出了根據本說明書實施例的處理業務的可用資源的系統100的示意圖。在一個實例中,所述業務例如為支付寶中的多收多保門診險業務,在該業務中,線下小商家(業務目標用戶)只需要使用支付寶收錢碼收款就可免費獲得門診險保額,收款越多保額越高。在該實施例中,系統100即該門診險業務的理賠系統。當然,本說明書實施例中所述業務不限於上述門診險業務,其可以是其它需要處理業務可用資源的業務,例如,所述業務也可以是貸款業務等。
如圖1所示,系統100包括預判單元11、可信度評估單元12和理算單元13。例如在上述實例中,用戶在門診險業務中提交報案憑證,例如身份證圖片、發票圖片和病歷圖片。系統透過人工智慧或第三方從所述圖片中提取報案資訊,例如就診人姓名、就診時間、就診醫院等,在判斷報案資訊完整的情況下,將所述報案資訊和所述憑證圖片作為報案資料一起發送給系統100的預判單元11。預判單元11在獲取所述報案資料之後,判斷所述報案資料是否滿足基本規則,例如,是否本人就診、就診時間是否在保障期限內、就診疾病是否為非免責疾病等等。在所述報案資料不滿足基本規則的情況下,系統100對所述用戶終端發送拒絕賠付的提示。在所述報案資料滿足基本規則的情況下,預判單元11將所述報案資料發送給可信度評估單元12。
可信度評估單元12中包括一個評分模型,其可從多個維度對所述報案資料進行評分,以評估該報案資料的可信度。例如,透過結合對報案資料的異常性的評估和對用戶的屬性特徵(例如用戶在預定時段內進行虛假線下交易的占比)的評估,來評估該報案資料的可信度。另外,還可以結合用戶的身份評估資訊、黑名單資訊、用戶的經營狀況資訊等,來綜合評估報案資料的可信度。在所述可信度小於預定閾值的情況下,將所述申資料發送給所述業務的業務人員進行處理。在所述可信度大於預定閾值的情況下,可信度評估單元12將報案資料發送給理算單元13進行快賠處理。
理算單元13透過調用規則引擎,根據預定賠付規則,結合用戶所述索賠金額,計算用戶的賠付金額,並進行賠付,從而可實現小時級、甚至分鐘級的快速理賠。
圖2示出了根據本說明書實施例的一種評估用戶申請業務可用資源的可信度的方法的流程圖。所述方法由所述業務所在的系統執行,包括:在步驟S21,獲取所述用戶對所述可用資源的申請資料;在步驟S22,根據所述申請資料,確定第一評估資訊,所述第一評估資訊對應於所述申請資料的異常性;在步驟S23,獲取所述用戶的歷史行為資料;在步驟S24,根據所述歷史行為資料,確定第二評估資訊,所述第二評估資訊對應於所述用戶的屬性特徵;以及在步驟S25,結合所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度。
首先,在步驟S21,獲取所述用戶對所述可用資源的申請資料。例如,所述業務是醫療保險業務,例如上述門診險。在該情況中,所述申請資料至少包括:就診人姓名、就診人身份標識證件圖片、就診時間、就診醫院、就診科室、醫生姓名、症狀、發票圖片和病歷圖片。所述申請資料不限於上述資料,例如,還可以另外包括藥品名稱資訊、藥品價格資訊、醫囑圖片、處方圖片、收費票據圖片等。其中,透過由用戶直接上傳獲取發票圖片、病歷圖片、處方圖片等憑證圖片。在一個實施例中,透過由用戶對所述憑證進行現場拍攝獲取所述憑證圖片。透過由人工智慧或第三方對所述憑證圖片進行文字識別處理,從而獲取其中包括的就診人姓名、就診時間、就診醫院、就診科室、就診醫生、藥品資訊、藥品價格資訊等。在一個實施例中,可以從用戶的自述文本資訊中獲取上述文字資訊。
步驟S22,根據所述申請資料,確定第一評估資訊,所述第一評估資訊對應於所述申請資料的異常性。該第一評估資訊例如可以是表示是否存在異常性的分值,例如,當存在異常性時,將第一評估資訊設定為1,當沒有異常性時,將第一評估資訊設定為0。在一個實施例中,該第一評估資訊也可以是表示存在異常性的概率。
在一個實施例中,根據所述申請資料,確定第一評估資訊包括,透過確定以下至少一項而確定所述第一評估資訊:對應的圖片庫中是否存在與所述憑證圖片相似的圖片;所述申請資料相比於用戶的歷史申請資料是否存在異常;所述申請資料與所述用戶的系統好友的申請資料是否存在聚集性;與所述就診醫院相關的申請資料是否存在聚集性;與所述就診科室相關的申請資料是否存在聚集性;與所述醫生相關的申請資料是否存在聚集性;用戶終端的地理位置資訊是否與所述就診醫院相符;所述治療藥品的療效是否與所述症狀對應;以及所述治療藥品價格是否符合市場價格。可以理解,用於確定第一評估資訊的資訊不限於上述資訊,在實際應用中,還存在多種其它異常情況,在此不一一列出。
例如,對於用戶上傳的病歷圖片,如果在對應的病歷圖片庫中存在與該病歷圖片相似度非常高的圖片,則用戶上傳的病歷圖片有可能是盜圖,從而,該報案資料可能是虛假報案資料,從而可相應地確定第一評估資訊。
例如,在用戶的報案資料與其支付寶好友的報案資料異常聚集的情況中,例如,其診療醫生都是同一個醫生,或者其就診時間都是相同的時間等,則該報案資料中存在醫患聯合作弊、或者團夥聯合作弊的可能性較高,從而可相應地確定第一評估資訊。
再例如,在根據健康險相關知識圖譜確定治療藥品的療效與所述症狀基本不對應的情況中,例如,症狀為高血壓,但是治療藥品為治療腳氣的藥,則該報案資料為虛假報案資料的可能性較高,從而可相應地確定第一評估資訊。
在一個實施例中,結合多項資訊確定第一評估資訊,例如,根據所述申請資料,可同時確定:對應的病歷圖片庫中存在與該病歷圖片相似度非常高的圖片、用戶的報案資料與其支付寶好友的報案資料異常聚集、以及治療藥品的療效與所述症狀基本不對應。在該情況中,可獲取各項資訊對應的評分,並將其乘以各自的預設權重並相加,從而獲得綜合評分作為第一評估資訊。例如,假設各項資訊對應的評分為1,其各自的權重為1/4,1/3和1/3,則獲得的第一評估資訊為11/12。在該情況中,用於確定異常性的資訊項越多,所述報案資料的異常性越大。
在步驟S23,獲取所述用戶的歷史行為資料。在一個實施例中,所述業務針對其用戶設定的可用資源與所述用戶透過所述系統進行的線下交易相關聯,其中,所述歷史行為資料為所述用戶在預定時段內透過所述系統進行線下交易的交易資料。例如,所述業務是上述多收多保門診險業務,在該業務中,線下小商家只需要使用支付寶收錢碼收款就可免費獲得門診險保額,收款越多保額越高。在該實例中,用戶的歷史行為資料為用戶在預定時段內透過收錢碼收款的線下交易資料。所述預定時段例如為三個月內、六個月內等。該交易資料例如包括以下至少一項資料:交易雙方各自的網路環境、交易雙方各自的設備、交易雙方關係、交易地理位置、交易金額和交易頻次。例如,可從系統儲存歷史交易資料的資料庫中獲取與所述交易相關的資料。
在步驟S24,根據所述歷史行為資料,確定第二評估資訊,所述第二評估資訊對應於所述用戶的屬性特徵。例如,在上述門診險實例中,根據所述預定時段內的線下交易資料,確定第二評估資訊,所述第二評估資訊對應於所述用戶在所述預定時段內透過所述系統進行的虛假線下交易次數相比於所述用戶在所述預定時段內透過所述系統進行的線下交易總次數的百分比。對於每次線下交易,可透過判斷模型對上述交易資料進行綜合判斷,從而確定該線下交易是否為虛假線下交易。例如,當交易雙方各自的網路環境長期相同時,例如,都是長期相同的wifi環境,認為該筆交易為虛假交易的可能性較大。當交易雙方各自的設備為相同設備時,認為該筆交易為虛假交易的可能性較大。透過大資料分析確定交易雙方的關係為親密關係(例如家人)或好友、親戚關係時,認為該筆交易為虛假交易的可能性較大。當交易地理位置相比於該用戶其他交易差異較大時,認為該筆交易為虛假交易的可能性較大。當交易的頻次較大,例如十分鐘刷好多次,並且交易金額較低時,認為該筆交易為虛假交易的可能性較大。
在步驟S25,結合所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度。例如,在上述門診險實例中,第一評估資訊對應於報案資料的異常性,第二評估資訊對應於用戶在預定時段內進行虛假線下交易的占比。可分別為第一評估資訊和第二評估資訊設定對應的權重,例如,在一個實施例中,確定第一評估資訊相對於所述可信度更重要,因此,將第一評估資訊的權重設為大於所述第二評估資訊的權重。之後,透過將第一評估資訊和第二評估資訊分別乘以各自的權重並相加,從而可獲得綜合評估資訊,可透過第一評估資訊和第二評估資訊與可信度的對應關係,將所述綜合評估資訊轉換為可信度的分值。
在一個實施例中,上述評估可信度的方法還包括:在獲取所述用戶對所述可用資源的申請資料之前,獲取所述用戶的帳戶資訊,根據所述帳戶資訊,確定所述用戶的身份評估資訊,以及,其中,結合所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度包括,結合所述身份評估資訊、所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度。其中,所述帳戶資訊包括以下至少一項:註冊時間、註冊時長、操作頻率、操作時間、登錄設備、綁定電話、資金情況、密碼修改記錄以及地理位置。透過綜合這些資訊,可確定第一用戶的帳戶是本人使用還是他人冒用。例如,如果確定多個帳戶的註冊時間是相同的時間,並且登陸設備相同,可認為這些帳戶存在身份冒用的可能較大。在一個實施例中,可將用戶帳戶資訊輸入分類模型,以確定該帳戶是本人使用還是他人冒用。從而,可將該身份評估資訊作為一個因子用於綜合評估所述可信度。
在一個實施例中,上述評估可信度的方法還包括:在獲取所述用戶對所述可用資源的申請資料之前,獲取所述用戶的帳戶評級資訊,以及,結合所述帳戶評級資訊、所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度。這裡,獲取所述用戶的帳戶評級資訊包括,例如確定所述用戶帳戶是否在保險黑名單、線下交易黑名單、身份冒用黑名單、薅羊毛用戶黑名單中等等。從而可將該帳戶評級資訊作為一個因子用於綜合評估所述可信度。
在一個實施例中,上述評估可信度的方法還包括:在確定第二評估資訊之後,獲取所述用戶與所述線下交易相關的歷史資料,以及,根據所述歷史資料,確定第三評估資訊,所述第三評估資訊用於評估用戶對所述線下交易的經營狀況,以及,結合所述第一評估資訊、所述第二評估資訊和所述第三評估資訊,評估所述用戶申請業務可用資源的可信度。例如,透過所述系統對所述用戶的關於所述線下交易的處罰記錄,可評估用戶的經營信用;透過每次所述線下交易的交易金額、所述線下交易的頻次和次數,可評估用戶的經營情況,經營規模、穩定性等;透過用戶對所述收款頁面的存取資料,可評估用戶對該線下交易的投入時間。透過綜合考慮上述資料,可獲得對用戶的所述線下交易的經營狀況評分,作為第三評估資訊。從而可將第三評估資訊作為一個因子用於綜合評估所述可信度。
圖3示出了根據本說明書實施例的一種處理業務的可用資源的方法流程圖。所述方法由所述業務所在的系統執行,包括:在步驟S31,獲取用戶對業務的可用資源的申請資料;在步驟S32,判斷所述申請資料是否滿足預定基本規則;在步驟S33,在所述申請資料滿足所述預定基本規則的情況下,獲取透過上述評估可信度的方法評估的用戶申請業務可用資源的可信度;以及,在步驟S34,根據所述可信度,對所述可用資源進行處理。
在步驟S31,獲取用戶對業務的可用資源的申請資料。例如,所述業務是醫療保險業務,例如上述門診險。在該情況中,所述申請資料至少包括:就診人姓名、就診人身份標識證件圖片、就診時間、就診醫院、就診科室、醫生姓名、症狀、發票圖片和病歷圖片。所述申請資料不限於上述資料,還可以另外包括藥品名稱資訊、藥品價格資訊、醫囑圖片、處方圖片、收費票據圖片等。其中,透過由用戶直接上傳獲取發票圖片、病歷圖片、處方圖片等憑證圖片。在一個實施例中,透過由用戶對所述憑證進行直接拍攝獲取所述憑證圖片。透過由人工智慧或第三方對所述憑證圖片進行文字識別處理,從而獲取其中包括的就診人姓名、就診時間、就診醫院、就診科室、就診醫生、藥品資訊、藥品價格資訊等。在一個實施例中,透過由用戶自行填寫而獲取上述資訊。
在步驟S32,判斷所述申請資料是否滿足預定基本規則。例如,在上述門診險實例中,所述預定基本規則包括以下至少一項:需本人就診、就診時間在保障期限內、就診疾病為非免責疾病、就診醫院為約定醫院、報案發票未重複使用、以及就診類型是保險業務的約定類型。
例如,透過比對報案資料中的就診人姓名和從用戶身份證圖片獲取的姓名,從而確定是否本人就診。透過建立疾病資料庫、科室資料庫等,並透過將報案資料庫中的就診科室、症狀等資訊與所述疾病資料庫、科室資料庫中的關鍵詞進行匹配,從而確定就診疾病是否為免責疾病。例如,美容、牙科、生育等科室疾病為免責疾病。例如,可設定門診險的理賠醫院為公立二級以上醫院,從而,可建立醫院資料庫,透過匹配獲得就診醫院的等級及性質,從而用於確定所述就診醫院是否為所述門診險的預定理賠醫院。例如,可建立發票庫,透過實時搜索發票庫中是否存在重號發票,從而確定報案發票是否重複使用。另外,還可以透過病歷、發票中的關鍵詞確定就診類型,如急門診、住院等類型。
在步驟S33,在所述申請資料滿足所述預定基本規則的情況下,獲取透過上述評估可信度的方法評估的用戶申請業務可用資源的可信度。例如,在上述門診險實例中,在所述申請資料滿足所述預定基本規則的情況下,獲取透過上述方法評估的用戶申請理賠的可信度,也即對用戶進行理賠的風險性。在所述申請資料不滿足所述預定基本規則的情況下,由於所述預定基本規則都是理賠必須滿足的強條件,因此,在該情況下,系統可馬上向用戶發送拒絕理賠的提示,並顯示拒賠的理由。
在步驟S34,根據所述可信度,對所述可用資源進行處理。在一個實施例中,所述可信度大於預定閾值,即,向用戶理賠的風險較小,從而可向所述用戶快速轉移所述可用資源。即,透過調用規則引擎,根據預定賠付規則,結合用戶所述索賠金額,計算用戶的賠付金額,並進行賠付。例如,預定賠付規則可包括,基於發票金額、統籌金額、第三方支付金額,以及用戶在該業務中的當前累計保額,計算單次就診理賠上限。
在一個實施例中,所述可信度小於預定閾值,即,理賠風險較大,在該情況下,將所述申請資料發送給所述業務的業務人員進行處理。業務人員可根據所述可信度的大小,適當提高理賠門檻,例如,要求用戶補充其它憑證、要求寄送原件資訊等,從而進一步控制欺詐風險。
圖4示出根據本說明書實施例的一種評估用戶申請業務可用資源的可信度的裝置400,所述裝置由所述業務所在的系統實施,包括:申請資料獲取單元401,配置為,獲取所述用戶對所述可用資源的申請資料;第一確定單元402,配置為,根據所述申請資料,確定第一評估資訊,所述第一評估資訊對應於所述申請資料的異常性;行為資料獲取單元403,配置為,獲取所述用戶的歷史行為資料;第二確定單元404,配置為,根據所述歷史行為資料,確定第二評估資訊,所述第二評估資訊對應於所述用戶的屬性特徵;以及評估單元405,配置為,結合所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度。
在一個實施例中,在上述評估用戶申請業務可用資源的可信度的裝置中,所述第一確定單元還配置為,透過確定以下至少一項而確定所述第一評估資訊:
對應的圖片庫中是否存在與所述憑證圖片相似的圖片;
所述申請資料相比於用戶的歷史申請資料是否存在異常;
所述申請資料與所述用戶的系統好友的申請資料是否存在聚集性;
與所述就診醫院相關的申請資料是否存在聚集性;
與所述就診科室相關的申請資料是否存在聚集性;
與所述醫生相關的申請資料是否存在聚集性;以及
用戶終端的地理位置資訊是否與所述就診醫院相符。
在一個實施例中,上述評估用戶申請業務可用資源的可信度的裝置400還包括:帳戶資訊獲取單元406,配置為,在獲取所述用戶對所述可用資源的申請資料之前,獲取所述用戶的帳戶資訊;第三確定單元407,配置為,根據所述帳戶資訊,確定所述用戶的身份評估資訊,以及,其中,所述評估單元還配置為,結合所述身份評估資訊、所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度。
在一個實施例中,上述評估用戶申請業務可用資源的可信度的裝置還包括:帳戶評級資訊獲取單元408,配置為,在獲取所述用戶對所述可用資源的申請資料之前,獲取所述用戶的帳戶評級資訊,以及,所述評估單元還配置為,結合所述帳戶評級資訊、所述第一評估資訊和所述第二評估資訊,評估所述用戶申請業務可用資源的可信度。
在一個實施例中,上述評估用戶申請業務可用資源的可信度的裝置還包括:歷史資料獲取單元409,配置為,在確定第二評估資訊之後,獲取所述用戶與所述線下交易相關的歷史資料,以及,第四確定單元410,配置為,根據所述歷史資料,確定第三評估資訊,所述第三評估資訊用於評估用戶對所述線下交易的經營狀況,以及,其中,所述評估單元還配置為,結合所述第一評估資訊、所述第二評估資訊和所述第三評估資訊,評估所述用戶申請業務可用資源的可信度。
圖5示出根據本說明書實施例的一種處理業務的可用資源的裝置500,所述裝置由所述業務所在的系統實施,包括:申請資料獲取單元51,配置為,獲取用戶對業務的可用資源的申請資料;判斷單元52,配置為,判斷所述申請資料是否滿足預定基本規則;可信度獲取單元53,配置為,在所述申請資料滿足所述預定基本規則的情況下,獲取透過上述評估可信度的方法評估的用戶申請業務可用資源的可信度;以及處理單元54,配置為,根據所述可信度,對所述可用資源進行處理。
在一個實施例中,在上述處理業務的可用資源的裝置中,所述處理單元還配置為,在所述可信度大於預定閾值的情況下,向所述用戶快速轉移所述可用資源。
在一個實施例中,在上述處理業務的可用資源的裝置中,所述處理單元還配置為,透過調用規則引擎,根據預定賠付規則,結合用戶所述索賠金額,計算用戶的賠付金額。。
在一個實施例中,在上述處理業務的可用資源的裝置中,所述處理單元還配置為,在所述可信度小於預定閾值的情況下,將所述申請資料發送給所述業務的業務人員進行處理。
本說明書另一方面提供一種計算機可讀的儲存媒體,其上儲存有指令代碼,所述指令代碼在計算機中執行時,令計算機執行上述方法。
透過根據本說明書實施例的處理業務可用資源的方法,有效平衡用戶體驗、理賠時效性和風險控制。一方面,大大減輕人工投入,從而提高用戶體驗,對於符合業務核賠規則且可信度較高的案件進行小時級甚至分鐘級的快速理賠服務,顛覆對健康醫療理賠週期長的觀念;而對於不符合核賠規則且可信度較高的案件進行及時地拒賠,並予以具體的拒賠原因,進行產品引導及用戶教育,可提高下次報案的成功率。另一方面,有效控制風險,從各個角度識別可能騙保和欺詐的風險,對於存疑案件,可實現自動系統觸發提高理賠門檻,如寄送原件資訊,或者流入有專業背景經驗的審核人員進行重點審核。
本領域普通技術人員應該還可以進一步意識到,結合本文中所公開的實施例描述的各示例的單元及算法步驟,能夠以電子硬體、計算機軟體或者二者的結合來實現,為了清楚地說明硬體和軟體的可互換性,在上述說明中已經按照功能一般性地描述了各示例的組成及步驟。這些功能究竟以硬體還是軟體方式來執軌道,取決於技術方案的特定應用和設計約束條件。本領域普通技術人員可以對每個特定的應用來使用不同方法來實現所描述的功能,但是這種實現不應認為超出本申請的範圍。
結合本文中所公開的實施例描述的方法或算法的步驟可以用硬體、處理器執軌道的軟體模組,或者二者的結合來實施。軟體模組可以置於隨機儲存器(RAM)、內存記憶體、唯讀儲存器(ROM)、電可編程ROM、電可抹除可編程ROM、暫存器、硬碟、可移動磁碟、CD-ROM、或技術領域內所公知的任意其它形式的儲存媒體中。
以上所述的具體實施方式,對本發明的目的、技術方案和有益效果進行了進一步詳細說明,所應理解的是,以上所述僅為本發明的具體實施方式而已,並不用於限定本發明的保護範圍,凡在本發明的精神和原則之內,所做的任何修改、等同替換、改進等,均應包含在本發明的保護範圍之內。
The embodiments of the present specification will be described below with reference to the drawings.
FIG. 1 shows a schematic diagram of a system 100 for processing available resources of a service according to an embodiment of the present specification. In one example, the service is, for example, the multi-collection and multi-guaranteed outpatient insurance business in Alipay. In this service, small offline merchants (business target users) only need to use Alipay's receipt code to receive payments for free outpatient insurance. Sum Assured, the more you collect, the higher the Sum Assured. In this embodiment, the system 100 is a claims system for the outpatient insurance business. Of course, the services described in the embodiments of the present specification are not limited to the above outpatient insurance services, and may be other services that need to process the resources available to the services. For example, the services may also be loan services.
As shown in FIG. 1, the system 100 includes a pre-judgment unit 11, a credibility evaluation unit 12, and an adjustment unit 13. For example, in the above example, the user submits a report report in the outpatient insurance business, such as an ID picture, an invoice picture, and a medical record picture. The system extracts report information from the pictures through artificial intelligence or a third party, such as the name of the visitor, the time of the visit, and the hospital. It is sent to the predictive unit 11 of the system 100 together. After obtaining the report materials, the pre-judgment unit 11 determines whether the report materials meet basic rules, for example, whether the doctor visits himself, whether the consultation time is within the guarantee period, whether the doctor's disease is a non-exempt disease, etc. In the case where the report materials do not satisfy the basic rules, the system 100 sends a prompt to the user terminal to refuse payment. In a case where the report materials meet the basic rules, the pre-judgment unit 11 sends the report materials to the credibility evaluation unit 12.
The credibility evaluation unit 12 includes a scoring model, which can score the report materials from multiple dimensions to evaluate the credibility of the report materials. For example, by combining the evaluation of the abnormality of the report materials and the attributes of the user (such as the proportion of false offline transactions performed by the user within a predetermined period), the credibility of the report data is evaluated. In addition, the credibility of the report data can be comprehensively evaluated in combination with the user's identity evaluation information, blacklist information, and user's business status information. When the credibility is less than a predetermined threshold, the application data is sent to a service personnel of the service for processing. In the case where the credibility is greater than a predetermined threshold, the credibility evaluation unit 12 sends the report materials to the adjustment unit 13 for quick compensation processing.
The adjustment unit 13 calls the rule engine, calculates the user's compensation amount based on the predetermined compensation rules, and combines the compensation amount described by the user, and performs the payment, thereby realizing fast claims at the hour or even minute level.
FIG. 2 shows a flowchart of a method for evaluating the credibility of a user's application for a service available resource according to an embodiment of the present specification. The method is executed by the system in which the service is located, and includes: in step S21, obtaining application information of the user for the available resources; in step S22, determining first evaluation information based on the application data, the first An evaluation information corresponds to the abnormality of the application data; in step S23, historical user behavior data is obtained; in step S24, second evaluation information is determined based on the historical behavior data, and the second evaluation information corresponds to Based on the attributes of the user; and in step S25, combining the first evaluation information and the second evaluation information to evaluate the credibility of the resources available for the user to apply for services.
First, in step S21, the user's application data for the available resources is obtained. For example, the business is a medical insurance business, such as the outpatient insurance mentioned above. In this case, the application information includes at least: the name of the visitor, the picture of the visitor's identity certificate, the time of the visit, the hospital, the department, the name of the doctor, the symptoms, the picture of the invoice, and the picture of the medical record. The application data is not limited to the above-mentioned data, for example, it may further include drug name information, drug price information, doctor order picture, prescription picture, charge bill picture, and the like. Among them, the voucher pictures such as the invoice picture, medical record picture, prescription picture, etc. are obtained through direct upload by the user. In one embodiment, the voucher picture is obtained by on-site shooting of the voucher by a user. Through artificial intelligence or a third party to perform text recognition processing on the voucher picture, thereby obtaining the name of the visitor, the time of the visit, the visit to the hospital, the visit department, the doctor, the drug information, and the price information of the drug. In one embodiment, the above text information may be obtained from a user's readme text information.
Step S22: Determine first evaluation information according to the application data, and the first evaluation information corresponds to the abnormality of the application data. The first evaluation information may be, for example, a score indicating whether there is abnormality. For example, when there is abnormality, the first evaluation information is set to 1, and when there is no abnormality, the first evaluation information is set to 0. In one embodiment, the first evaluation information may also be a probability indicating that there is abnormality.
In one embodiment, determining the first evaluation information according to the application data includes determining the first evaluation information by determining at least one of the following: whether a picture similar to the voucher picture exists in a corresponding picture library; Whether the application data is abnormal compared with the historical application data of the user; whether the application data is aggregated with the application data of the system friend of the user; whether the application data related to the visiting hospital is aggregated; and Whether the application data related to the consultation department is aggregated; whether the application data related to the doctor is aggregated; whether the geographical location information of the user terminal is consistent with the visiting hospital; whether the curative effect of the therapeutic drug is the same as the Symptoms correspond; and whether the price of the therapeutic drug is in line with the market price. It can be understood that the information used to determine the first evaluation information is not limited to the above information. In practical applications, there are many other abnormal situations, which are not listed here one by one.
For example, for a medical record picture uploaded by a user, if there is a picture in the corresponding medical record picture library with a very high similarity to the medical record picture, the medical record picture uploaded by the user may be a stolen picture, so the report material may be a false report Data so that the first evaluation information can be determined accordingly.
For example, in the case where the report materials of the user and the report materials of Alipay friends are abnormally gathered, for example, if the doctors who treat them are the same doctor, or if their visit time is the same time, there is a doctor-patient combination in the report materials. The possibility of cheating or gang cooperation is high, so that the first evaluation information can be determined accordingly.
For another example, in the case where it is determined that the efficacy of a therapeutic drug does not correspond to the symptoms according to the health insurance related knowledge map, for example, if the symptoms are hypertension, but the therapeutic drug is a medicine for beriberi, the reporting information is false reporting information Is more likely to determine the first evaluation information accordingly.
In one embodiment, multiple pieces of information are combined to determine the first evaluation information. For example, according to the application data, it can be determined at the same time that a picture with a very high similarity to the medical record picture exists in the corresponding medical record picture library, The report materials of Alipay friends are abnormally aggregated, and the curative effect of the treatment drugs does not correspond to the symptoms. In this case, a score corresponding to each piece of information can be obtained, and multiplied by their respective preset weights, and added, to obtain a comprehensive score as the first evaluation information. For example, assuming that each piece of information has a score of 1 and its respective weights are 1/4, 1/3, and 1/3, the first evaluation information obtained is 11/12. In this case, the more information items used to determine the abnormality, the greater the abnormality of the report material.
In step S23, historical behavior data of the user is acquired. In one embodiment, the available resources set by the service for its users are associated with offline transactions conducted by the users through the system, wherein the historical behavior data is that the users pass through the system within a predetermined period of time. The system conducts transaction data for offline transactions. For example, the business is the above-mentioned multi-collection and multi-insurance outpatient insurance business. In this business, small offline merchants only need to use Alipay to receive money to receive outpatient insurance coverage for free. The more the collection, the higher the insurance coverage. . In this example, the historical behavior data of the user is offline transaction data of the user receiving money through the money collection code within a predetermined period of time. The predetermined period is, for example, within three months, within six months, and the like. The transaction data includes, for example, at least one of the following data: the respective network environments of the parties to the transaction, the respective devices of the parties to the transaction, the relationship between the parties to the transaction, the geographical location of the transaction, the transaction amount, and the frequency of the transaction. For example, data related to the transaction may be obtained from a database in which the system stores historical transaction data.
In step S24, second evaluation information is determined according to the historical behavior data, and the second evaluation information corresponds to the attribute characteristics of the user. For example, in the above outpatient insurance example, the second evaluation information is determined according to the offline transaction data in the predetermined period, and the second evaluation information corresponds to the user performed through the system in the predetermined period. The percentage of false offline transactions compared to the total number of offline transactions conducted by the user through the system during the predetermined period. For each offline transaction, the above transaction data can be comprehensively judged through a judgment model to determine whether the offline transaction is a false offline transaction. For example, when the network environments of the two parties to the transaction are the same for a long period of time, for example, the wifi environment is the same for a long period of time, it is considered that the transaction is a false transaction. When the respective devices of the two parties to the transaction are the same device, it is considered that the transaction is likely to be a false transaction. When the relationship between the two parties of the transaction is determined to be a close relationship (such as a family member) or a friend or relative through an analysis of big data, it is considered that the transaction is likely to be a false transaction. When the geographic location of the transaction is significantly different from other transactions of the user, it is considered that the transaction is likely to be a false transaction. When the frequency of the transaction is large, for example, it is brushed many times in ten minutes, and the transaction amount is low, it is considered that the transaction is likely to be a false transaction.
In step S25, the credibility of the resources available for the user to apply for the service is evaluated in combination with the first evaluation information and the second evaluation information. For example, in the above example of outpatient insurance, the first evaluation information corresponds to the abnormality of the report data, and the second evaluation information corresponds to the proportion of users performing false offline transactions within a predetermined period. Corresponding weights may be set for the first evaluation information and the second evaluation information. For example, in one embodiment, it is determined that the first evaluation information is more important than the credibility. Therefore, the weight of the first evaluation information is set. Is a weight greater than the second evaluation information. Then, by multiplying the first evaluation information and the second evaluation information by their respective weights and adding them, comprehensive evaluation information can be obtained. The correspondence between the first evaluation information and the second evaluation information and the credibility can be used to The comprehensive evaluation information is converted into a score of credibility.
In one embodiment, the above-mentioned method for evaluating credibility further includes: before obtaining the user's application information for the available resources, obtaining account information of the user, and determining the user's account information based on the account information. Identity evaluation information, and in combination with the first evaluation information and the second evaluation information, evaluating the credibility of the resources available for the user to apply for a service includes combining the identity evaluation information and the first evaluation information And the second evaluation information to evaluate the credibility of the resources available for the user to apply for the service. The account information includes at least one of the following: registration time, registration time, operating frequency, operating time, login device, phone binding, funding situation, password modification record, and geographic location. By combining this information, it is possible to determine whether the account of the first user is used by himself or by someone else. For example, if it is determined that the registration time of multiple accounts is the same time and the login devices are the same, it may be considered that there is a greater possibility that these accounts have identity fraud. In one embodiment, user account information may be entered into a classification model to determine whether the account is used by others or impersonated by others. Therefore, the identity evaluation information can be used as a factor for comprehensively evaluating the credibility.
In one embodiment, the method for evaluating credibility further includes: before obtaining the user's application information for the available resources, obtaining account rating information of the user, and combining the account rating information, the The first evaluation information and the second evaluation information are used to evaluate the credibility of the resources available for the user to apply for the service. Here, obtaining the account rating information of the user includes, for example, determining whether the user account is in an insurance blacklist, an offline transaction blacklist, an identity fraud blacklist, a fleece user blacklist, and the like. Thereby, the account rating information can be used as a factor for comprehensively evaluating the credibility.
In one embodiment, the method for evaluating credibility further includes: after determining the second evaluation information, obtaining historical data related to the user and the offline transaction, and determining a third data based on the historical data. Evaluation information, the third evaluation information is used to evaluate a user's operating status of the offline transaction, and the evaluation is combined with the first evaluation information, the second evaluation information, and the third evaluation information The user applies for the credibility of the resources available to the business. For example, through the system's punishment record for the user on the offline transaction, the user's operating credit can be evaluated; through the transaction amount of each offline transaction, the frequency and number of offline transactions, It can evaluate the user's business situation, business scale, stability, etc .; through the user's access to the collection page, the user's investment time for offline transactions can be evaluated. By comprehensively considering the above data, a user's operating status score of the offline transaction can be obtained as the third evaluation information. Therefore, the third evaluation information can be used as a factor for comprehensively evaluating the reliability.
FIG. 3 shows a flowchart of a method for processing available resources of a service according to an embodiment of the present specification. The method is executed by the system where the service is located, and includes: in step S31, obtaining application information of a user for available resources of the service; in step S32, determining whether the application data meets a predetermined basic rule; in step S33, When the application data meets the predetermined basic rule, obtain the credibility of the resources available for the user to apply for the service, which is evaluated by the method for assessing credibility; and, in step S34, according to the credibility, Available resources for processing.
In step S31, the application materials for the available resources of the service by the user are obtained. For example, the business is a medical insurance business, such as the outpatient insurance mentioned above. In this case, the application information includes at least: the name of the visitor, the picture of the visitor's identity certificate, the time of the visit, the hospital, the department, the name of the doctor, the symptoms, the picture of the invoice, and the picture of the medical record. The application materials are not limited to the above materials, and may further include drug name information, drug price information, doctor order pictures, prescription pictures, charge bill pictures, and the like. Among them, the voucher pictures such as the invoice picture, medical record picture, prescription picture, etc. are obtained through direct upload by the user. In one embodiment, the voucher picture is obtained by directly shooting the voucher by a user. Through artificial intelligence or a third party to perform text recognition processing on the voucher picture, thereby obtaining the name of the visitor, the time of the visit, the visit to the hospital, the visit department, the doctor, the drug information, and the price information of the drug. In one embodiment, the above information is obtained by being filled in by the user.
In step S32, it is determined whether the application data meets a predetermined basic rule. For example, in the above outpatient insurance example, the predetermined basic rules include at least one of the following: I need to see a doctor, the time of the consultation is within the guarantee period, the disease being treated is a non-exempt disease, the hospital is an agreed hospital, the report invoice is not reused, And the type of consultation is the agreed type of insurance business.
For example, by comparing the name of the visitor in the report materials with the name obtained from the picture of the user's ID card, it is determined whether he or she sees the doctor. By establishing the disease database, department database, etc., and by matching the information of the visiting department and symptoms in the report database with the keywords in the disease database and department database, it is determined whether the treated disease is an exempt disease. . For example, department diseases such as cosmetic, dental, and fertility are exempt diseases. For example, the claiming hospital for outpatient insurance can be set as a public second-level or higher hospital. Therefore, a hospital database can be established to obtain the grade and nature of the visiting hospital through matching, so as to determine whether the visiting hospital is the scheduled outpatient insurance. Claims Hospital. For example, you can set up an invoice library, and search for invoices with duplicate numbers in the invoice library in real time to determine whether report invoices are reused. In addition, you can also use the keywords in your medical records and invoices to determine the type of treatment, such as emergency outpatient and hospitalization.
In step S33, if the application data satisfies the predetermined basic rule, obtain the credibility of the resources available for the user to apply for the service, which is evaluated by the method for evaluating credibility described above. For example, in the above-mentioned outpatient insurance case, in a case where the application data meets the predetermined basic rules, the credibility of the user's claim for compensation that is evaluated through the above method is obtained, that is, the risk of claiming for the user. In the case that the application data does not meet the predetermined basic rules, since the predetermined basic rules are all strong conditions that must be satisfied for claims settlement, in this case, the system can immediately send a prompt to the user to refuse claims, and Show reasons for rejection.
In step S34, the available resources are processed according to the credibility. In one embodiment, the credibility is greater than a predetermined threshold, that is, the risk of claiming from a user is small, so that the available resources can be quickly transferred to the user. That is, by calling the rule engine, according to a predetermined compensation rule, the user's compensation amount is calculated, and the compensation is performed. For example, the scheduled compensation rules may include calculating a single visit claim limit based on the amount of the invoice, the pooled amount, the amount paid by a third party, and the user's current cumulative sum insured in the business.
In one embodiment, the credibility is less than a predetermined threshold, that is, the claim risk is greater. In this case, the application data is sent to a business staff of the service for processing. Business personnel can appropriately increase the threshold for claims according to the level of credibility, such as requiring users to supplement other vouchers, requesting the sending of original information, etc., so as to further control the risk of fraud.
FIG. 4 shows a device 400 for evaluating the credibility of a resource available to a user for applying for a service according to an embodiment of the present specification. The device is implemented by a system where the service is located, and includes: an application data obtaining unit 401 configured to obtain The user's application data for the available resources; a first determining unit 402 configured to determine first evaluation information according to the application data, the first evaluation information corresponding to the abnormality of the application data; behavior data The obtaining unit 403 is configured to obtain historical behavior data of the user; the second determination unit 404 is configured to determine second evaluation information according to the historical behavior data, and the second evaluation information corresponds to the user's Attribute characteristics; and an evaluation unit 405 configured to evaluate the credibility of the resources available to the user to apply for services in combination with the first evaluation information and the second evaluation information.
In one embodiment, in the above-mentioned device for evaluating the credibility of a user's application for a service available resource, the first determining unit is further configured to determine the first evaluation information by determining at least one of the following:
Whether a picture similar to the voucher picture exists in the corresponding picture library;
Whether the application data is abnormal compared with the historical application data of the user;
Whether the application data is aggregated with the application data of the system friend of the user;
Whether the application data related to the visiting hospital is aggregated;
Whether the application data related to the consultation department is aggregated;
Whether the application data related to the doctor is aggregated; and whether the geographic location information of the user terminal is consistent with the visiting hospital.
In one embodiment, the above-mentioned apparatus 400 for evaluating the credibility of a user's application for a service available resource further includes: an account information acquisition unit 406 configured to acquire the user's application information for the available resource before acquiring the user User account information; a third determining unit 407 configured to determine the identity evaluation information of the user according to the account information, and wherein the evaluation unit is further configured to combine the identity evaluation information, the The first evaluation information and the second evaluation information evaluate the credibility of the resources available for the user to apply for the service.
In one embodiment, the above-mentioned device for evaluating the credibility of a user's application for a service available resource further includes: an account rating information acquisition unit 408 configured to acquire the user's application information for the available resource before acquiring the user The user's account rating information, and the evaluation unit is further configured to combine the account rating information, the first evaluation information, and the second evaluation information to evaluate the credibility of the resources available to the user for business applications.
In one embodiment, the above-mentioned device for evaluating the credibility of the resources available to the user for the service application further includes: a historical data acquisition unit 409 configured to, after determining the second evaluation information, acquire the user's relevance to the offline transaction Historical data, and a fourth determining unit 410 configured to determine third evaluation information based on the historical data, the third evaluation information is used to evaluate a user's operating status of the offline transaction, and, wherein, The evaluation unit is further configured to evaluate the credibility of the resources available for the user to apply for the service in combination with the first evaluation information, the second evaluation information, and the third evaluation information.
FIG. 5 illustrates an apparatus 500 for processing available resources of a service according to an embodiment of the present specification. The apparatus is implemented by a system where the service is located, and includes: an application data obtaining unit 51 configured to obtain a user's available resources for the service. Application data; a determination unit 52 configured to determine whether the application data satisfies a predetermined basic rule; a credibility acquisition unit 53 configured to obtain, through a case where the application data meets the predetermined basic rule, The method for evaluating credibility evaluates the credibility of the resources available to the user applying for the service; and the processing unit 54 is configured to process the available resources according to the credibility.
In one embodiment, in the above-mentioned device for processing available resources of a service, the processing unit is further configured to quickly transfer the available resources to the user if the credibility is greater than a predetermined threshold.
In one embodiment, in the above-mentioned device for processing available resources of a service, the processing unit is further configured to calculate a user's compensation amount by invoking a rule engine according to a predetermined compensation rule in combination with the user's claim amount. .
In an embodiment, in the above-mentioned device for processing available resources of a service, the processing unit is further configured to send the application data to a service of the service when the credibility is less than a predetermined threshold. Personnel for processing.
Another aspect of the present specification provides a computer-readable storage medium having stored therein an instruction code that, when executed in a computer, causes the computer to execute the above method.
Through the method for processing the resources available to the business according to the embodiments of this specification, the user experience, the timeliness of claims settlement, and risk control are effectively balanced. On the one hand, labor input is greatly reduced, thereby improving the user experience. Hourly or even minute-level fast claims services are provided for cases with high credibility that comply with business claims rules, and subvert the concept of a long period of claims for health care. Cases that do not meet the compensation rules and have high credibility will promptly refuse compensation, and give specific reasons for rejection, conduct product guidance and user education, which can improve the success rate of the next report. On the other hand, it can effectively control risks and identify possible risks of fraud and fraud from various angles. For suspected cases, it can implement automatic system triggers to raise the threshold for claims, such as sending original information, or flowing into auditors with professional background experience to focus Review.
Those of ordinary skill in the art should be further aware that the units and algorithm steps of each example described in connection with the embodiments disclosed herein can be implemented by electronic hardware, computer software, or a combination of the two, in order to clearly illustrate The interchangeability of hardware and software. In the above description, the composition and steps of each example have been described generally in terms of functions. Whether these functions are implemented in hardware or software depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of the present application.
The steps of the method or algorithm described in connection with the embodiments disclosed herein may be implemented by hardware, a software module that executes a processor, or a combination of the two. Software modules can be placed in random access memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, scratchpad, hard disk, removable disk, CD-ROM, or any other form of storage medium known in the art.
The specific embodiments described above further describe the objectives, technical solutions, and beneficial effects of the present invention in detail. It should be understood that the above are only specific embodiments of the present invention and are not intended to limit the present invention. The scope of protection, any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention shall be included in the scope of protection of the present invention.

透過結合附圖描述本說明書實施例,可以使得本說明書實施例更加清楚:By describing the embodiments of this specification with reference to the drawings, the embodiments of this specification can be made clearer:

圖1示出了根據本說明書實施例的處理業務的可用資源的系統100的示意圖; FIG. 1 shows a schematic diagram of a system 100 for processing available resources of a service according to an embodiment of the present specification;

圖2示出了根據本說明書實施例的一種評估用戶申請業務可用資源的可信度的方法的流程圖; FIG. 2 shows a flowchart of a method for evaluating the credibility of a user's application for a service available resource according to an embodiment of the present specification;

圖3示出了根據本說明書實施例的一種處理業務的可用資源的方法流程圖; FIG. 3 shows a flowchart of a method for processing available resources of a service according to an embodiment of the present specification;

圖4示出根據本說明書實施例的一種評估用戶申請業務可用資源的可信度的裝置400;以及 FIG. 4 illustrates an apparatus 400 for evaluating the credibility of a user's application for available resources according to an embodiment of the present specification; and

圖5示出根據本說明書實施例的一種處理業務的可用資源的裝置500。 FIG. 5 illustrates an apparatus 500 for processing available resources of a service according to an embodiment of the present specification.

Claims (29)

一種評估用戶申請業務可用資源的可信度的方法,該方法由該業務所在的系統執行,包括: 獲取該用戶對該可用資源的申請資料; 根據該申請資料,確定第一評估資訊,該第一評估資訊對應於該申請資料的異常性; 獲取該用戶的歷史行為資料; 根據該歷史行為資料,確定第二評估資訊,該第二評估資訊對應於該用戶的屬性特徵;以及 結合該第一評估資訊和該第二評估資訊,評估該用戶申請業務可用資源的可信度。A method for evaluating the credibility of the resources available to a user for applying for a service. The method is executed by the system where the service is located, and includes: Obtain the user's application information for the available resources; Determining the first evaluation information according to the application data, the first evaluation information corresponding to the abnormality of the application data; Obtain historical behavior data of the user; Determining second evaluation information based on the historical behavior data, the second evaluation information corresponding to the attribute characteristics of the user; and Combine the first evaluation information and the second evaluation information to evaluate the credibility of the resources available for the user to apply for the service. 根據申請專利範圍第1項所述的評估用戶申請業務可用資源的可信度的方法,其中,該業務為醫療保險業務,該申請資料至少包括:就診人姓名、就診人身份標識證件圖片、就診時間、就診醫院、就診科室、醫生姓名、症狀、發票圖片和病歷圖片。According to the method for assessing the credibility of the resources available to the user for applying for the business according to item 1 of the scope of patent application, wherein the business is a medical insurance business, the application information includes at least: the name of the visitor, the picture of the identity certificate of the visitor, and the appointment Time, visiting hospital, visiting department, doctor's name, symptoms, invoice picture and medical record picture. 根據申請專利範圍第2項所述的評估用戶申請業務可用資源的可信度的方法,其中根據該申請資料,確定第一評估資訊包括,透過確定以下至少一項而確定該第一評估資訊: 對應的圖片庫中是否存在與該憑證圖片相似的圖片; 該申請資料相比於用戶的歷史申請資料是否存在異常; 該申請資料與該用戶的系統好友的申請資料是否存在聚集性; 與該就診醫院相關的申請資料是否存在聚集性; 與該就診科室相關的申請資料是否存在聚集性; 與該醫生相關的申請資料是否存在聚集性;以及 用戶終端的地理位置資訊是否與該就診醫院相符。According to the method for assessing the credibility of the resources available to a user for a business application according to item 2 of the scope of the patent application, wherein determining the first evaluation information according to the application data includes determining the first evaluation information by determining at least one of the following: Whether a picture similar to the voucher picture exists in the corresponding picture library; Whether the application data is abnormal compared to the user's historical application data; Whether the application data is aggregated with the application data of the user's system friend; Whether the application data related to the visiting hospital is aggregated; Whether the application data related to the consultation department is aggregated; Whether the application data related to the doctor is aggregated; and Whether the geographical location information of the user terminal matches the visiting hospital. 根據申請專利範圍第2項所述的評估用戶申請業務可用資源的可信度的方法,其中該申請資料還包括以下至少一項:治療藥品名稱、治療藥品價格、處方圖片、醫囑圖片以及收費票據圖片,其中根據該申請資料,確定第一評估資訊包括,透過基於健康險相關知識圖譜確定以下至少一項:該治療藥品的療效是否與該症狀對應、以及該治療藥品價格是否符合市場價格,從而確定該第一評估資訊。According to the method for evaluating the credibility of the resources available to the user for the application according to item 2 of the scope of the patent application, the application data also includes at least one of the following: the name of the treatment drug, the price of the treatment drug, a picture of the prescription, a picture of the doctor's order, and a bill for payment Pictures, where the first assessment information is determined based on the application data, including determining at least one of the following: based on the health insurance-related knowledge map: whether the therapeutic drug's efficacy corresponds to the symptoms, and whether the therapeutic drug's price matches the market price, thereby Determine the first evaluation information. 根據申請專利範圍第1項所述的評估用戶申請業務可用資源的可信度的方法,其中,該業務針對其用戶設定的可用資源與該用戶透過該系統進行的線下交易相關聯,其中,該歷史行為資料為該用戶在預定時段內透過該系統進行線下交易的交易資料,以及,該第二評估資訊對應於該用戶在該預定時段內透過該系統進行的虛假線下交易次數相比於該用戶在該預定時段內透過該系統進行的線下交易總次數的百分比。According to the method for assessing the credibility of the resources available to a user for applying for a service according to item 1 of the scope of patent application, the available resources set by the service for its user are associated with offline transactions conducted by the user through the system, where, The historical behavior data is transaction data of the user performing offline transactions through the system in a predetermined period, and the second evaluation information corresponds to the number of false offline transactions performed by the user through the system in the predetermined period. The percentage of the total number of offline transactions conducted by the user through the system during the predetermined period. 根據申請專利範圍第1項所述的評估用戶申請業務可用資源的可信度的方法,還包括:在獲取該用戶對該可用資源的申請資料之前,獲取該用戶的帳戶資訊,根據該帳戶資訊,確定該用戶的身份評估資訊,以及,其中,結合該第一評估資訊和該第二評估資訊,評估該用戶申請業務可用資源的可信度包括,結合該身份評估資訊、該第一評估資訊和該第二評估資訊,評估該用戶申請業務可用資源的可信度。The method for evaluating the credibility of a user's application for available resources according to item 1 of the scope of patent application, further comprising: before obtaining the user's application information for the available resources, obtaining the user's account information, and according to the account information To determine the identity evaluation information of the user, and, in combination with the first evaluation information and the second evaluation information, evaluating the credibility of the resources available for the user to apply for business includes combining the identity evaluation information and the first evaluation information And the second evaluation information to evaluate the credibility of the resources available for the user to apply for the service. 根據申請專利範圍第6項所述的評估用戶申請業務可用資源的可信度的方法,其中,該帳戶資訊包括以下至少一項:註冊時間、註冊時長、操作頻率、操作時間、登錄設備、綁定電話、資金情況、密碼修改記錄以及地理位置。According to the method for assessing the credibility of the resources available to a user for a business application according to item 6 of the scope of patent application, the account information includes at least one of the following: registration time, registration time, operating frequency, operating time, login device, Binding phone, funding, password modification records, and geographic location. 根據申請專利範圍第1項所述的評估用戶申請業務可用資源的可信度的方法,還包括:在獲取該用戶對該可用資源的申請資料之前,獲取該用戶的帳戶評級資訊,以及,其中,結合該第一評估資訊和該第二評估資訊,評估該用戶申請業務可用資源的可信度包括,結合該帳戶評級資訊、該第一評估資訊和該第二評估資訊,評估該用戶申請業務可用資源的可信度。The method for evaluating the credibility of a user's application for available resources according to item 1 of the scope of patent application, further comprising: before obtaining the user's application information for the available resources, obtaining the user's account rating information, and, where Combining the first evaluation information and the second evaluation information, and evaluating the credibility of the resources available for the user to apply for the service includes evaluating the user's application for the business by combining the account rating information, the first evaluation information, and the second evaluation information. Credibility of available resources. 根據申請專利範圍第5項所述的評估用戶申請業務可用資源的可信度的方法,還包括:在確定第二評估資訊之後,獲取該用戶與該線下交易相關的歷史資料,以及,根據該歷史資料,確定第三評估資訊,該第三評估資訊對應於用戶對該線下交易的經營狀況, 以及,其中,結合該第一評估資訊和該第二評估資訊,評估該用戶申請業務可用資源的可信度包括,結合該第一評估資訊、該第二評估資訊和該第三評估資訊,評估該用戶申請業務可用資源的可信度。According to the method for assessing the credibility of the resources available to the user for the application according to item 5 of the scope of the patent application, the method further includes: after determining the second evaluation information, obtaining historical data related to the user and the offline transaction, and The historical data determines the third evaluation information, which corresponds to the user's operating status of the offline transaction, And, in combination with the first evaluation information and the second evaluation information, evaluating the credibility of the resources available for the user to apply for the service includes, in combination with the first evaluation information, the second evaluation information, and the third evaluation information, evaluating The user applies for the credibility of the resources available to the service. 一種處理業務的可用資源的方法,該方法由該業務所在的系統執行,包括: 獲取用戶對業務的可用資源的申請資料; 判斷該申請資料是否滿足預定基本規則; 在該申請資料滿足該預定基本規則的情況下,獲取透過根據申請專利範圍第1-9項中任一項所述的方法評估的用戶申請業務可用資源的可信度;以及 根據該可信度,對該可用資源進行處理。A method for processing available resources of a service, the method being executed by a system where the service is located, including: Obtain user application materials for available resources of the service; Determine whether the application materials meet the predetermined basic rules; In the case where the application data meets the predetermined basic rules, obtain the credibility of the resources available to the user for applying for the business, which is evaluated by the method described in any one of items 1-9 of the scope of patent application; and Based on the credibility, the available resources are processed. 根據申請專利範圍第10項所述的處理業務的可用資源的方法,其中該業務為醫療保險業務,該預定基本規則包括以下至少一項:需本人就診、就診時間在保障期限內、就診疾病為非免責疾病、就診醫院為約定醫院、報案發票未重複使用、以及就診類型是保險業務的約定類型。According to the method for processing the available resources of a business as described in item 10 of the scope of patent application, wherein the business is a medical insurance business, the predetermined basic rules include at least one of the following: the need for medical treatment, the medical treatment time is within the guarantee period, and the medical treatment is Non-exempt diseases, the visiting hospital is the agreed hospital, the report invoice is not reused, and the type of visit is the agreed type of insurance business. 根據申請專利範圍第10項所述的處理業務的可用資源的方法,其中,根據該可信度,對該可用資源進行處理包括,在該可信度大於預定閾值的情況下,向該用戶快速轉移該可用資源。The method for processing available resources of a service according to item 10 of the scope of patent application, wherein processing the available resources according to the credibility includes, if the credibility is greater than a predetermined threshold, quickly requesting the user Transfer this available resource. 根據申請專利範圍第12項所述的處理業務的可用資源的方法,其中向該用戶快速轉移該可用資源包括,透過調用規則引擎,根據預定賠付規則,結合用戶該索賠金額,計算用戶的賠付金額,並進行賠付。The method for processing available resources of a service according to item 12 of the scope of the patent application, wherein the rapid transfer of the available resources to the user includes calculating the user's compensation amount by invoking a rule engine and combining the user's claim amount with a predetermined payment rule. And make a payment. 根據申請專利範圍第10項所述的處理業務的可用資源的方法,其中,根據該可信度,對該可用資源進行處理包括,在該可信度小於預定閾值的情況下,將該申請資料發送給該業務的業務人員進行處理。The method for processing available resources of a service according to item 10 of the scope of patent application, wherein processing the available resources according to the credibility includes, if the credibility is less than a predetermined threshold, applying the application data Send to the business staff of the business for processing. 一種評估用戶申請業務可用資源的可信度的裝置,該裝置由該業務所在的系統實施,包括: 申請資料獲取單元,配置為,獲取該用戶對該可用資源的申請資料; 第一確定單元,配置為,根據該申請資料,確定第一評估資訊,該第一評估資訊對應於該申請資料的異常性; 行為資料獲取單元,配置為,獲取該用戶的歷史行為資料; 第二確定單元,配置為,根據該歷史行為資料,確定第二評估資訊,該第二評估資訊對應於該用戶的屬性特徵;以及 評估單元,配置為,結合該第一評估資訊和該第二評估資訊,評估該用戶申請業務可用資源的可信度。A device for evaluating the credibility of resources available to a user for applying for a service. The device is implemented by a system in which the service is located, and includes: An application data obtaining unit configured to obtain the user's application data for the available resources; A first determining unit configured to determine first evaluation information according to the application data, where the first evaluation information corresponds to an abnormality of the application data; A behavior data acquisition unit configured to acquire historical behavior data of the user; A second determining unit configured to determine second evaluation information according to the historical behavior data, the second evaluation information corresponding to the attribute characteristic of the user; and The evaluation unit is configured to, in combination with the first evaluation information and the second evaluation information, evaluate the credibility of the resource available for the user to apply for the service. 根據申請專利範圍第15項所述的評估用戶申請業務可用資源的可信度的裝置,其中,該業務為醫療保險業務,該申請資料至少包括:就診人姓名、就診人身份標識證件圖片、就診時間、就診醫院、就診科室、醫生姓名、症狀、發票圖片和病歷圖片。The device for evaluating the credibility of the resources available to the user for applying for the business according to item 15 of the scope of the patent application, wherein the business is a medical insurance business, and the application data includes at least: the name of the visitor, the picture of the identity certificate of the visitor, and the appointment Time, visiting hospital, visiting department, doctor's name, symptoms, invoice picture and medical record picture. 根據申請專利範圍第16項所述的評估用戶申請業務可用資源的可信度的裝置,其中該第一確定單元還配置為,透過確定以下至少一項而確定該第一評估資訊: 對應的圖片庫中是否存在與該憑證圖片相似的圖片; 該申請資料相比於用戶的歷史申請資料是否存在異常; 該申請資料與該用戶的系統好友的申請資料是否存在聚集性; 與該就診醫院相關的申請資料是否存在聚集性; 與該就診科室相關的申請資料是否存在聚集性; 與該醫生相關的申請資料是否存在聚集性;以及 用戶終端的地理位置資訊是否與該就診醫院相符。According to the device for evaluating the credibility of the resources available to the user for business application according to item 16 of the scope of the patent application, the first determination unit is further configured to determine the first evaluation information by determining at least one of the following: Whether a picture similar to the voucher picture exists in the corresponding picture library; Whether the application data is abnormal compared to the user's historical application data; Whether the application data is aggregated with the application data of the user's system friend; Whether the application data related to the visiting hospital is aggregated; Whether the application data related to the consultation department is aggregated; Whether the application data related to the doctor is aggregated; and Whether the geographical location information of the user terminal matches the visiting hospital. 根據申請專利範圍第16項所述的評估用戶申請業務可用資源的可信度的裝置,其中該申請資料還包括以下至少一項:治療藥品名稱、治療藥品價格、處方圖片、醫囑圖片以及收費票據圖片,其中該第一確定單元還配置為,基於健康險相關知識圖譜確定以下至少一項:該治療藥品的療效是否與該症狀對應、以及該治療藥品價格是否符合市場價格,從而確定該第一評估資訊。According to the device for assessing the credibility of the resources available to the user for the application according to item 16 of the scope of the patent application, the application data also includes at least one of the following: the name of the treatment drug, the price of the treatment drug, a picture of the prescription, a picture of the doctor's order and a bill Picture, wherein the first determining unit is further configured to determine at least one of the following based on the health insurance related knowledge map: whether the curative effect of the therapeutic drug corresponds to the symptom, and whether the therapeutic drug price conforms to the market price, thereby determining the first Evaluation information. 根據申請專利範圍第15項所述的評估用戶申請業務可用資源的可信度的裝置,其中,該業務針對其用戶設定的可用資源與該用戶透過該系統進行的線下交易相關聯,其中,該歷史行為資料為該用戶在預定時段內透過該系統進行線下交易的交易資料,以及,該第二評估資訊對應於該用戶在該預定時段內透過該系統進行的虛假線下交易次數相比於該用戶在該預定時段內透過該系統進行的線下交易總次數的百分比。According to the device for assessing the credibility of the resources available for a user's application according to item 15 of the scope of patent application, the available resources set by the service for its user are associated with offline transactions conducted by the user through the system, where, The historical behavior data is transaction data of the user performing offline transactions through the system in a predetermined period, and the second evaluation information corresponds to the number of false offline transactions performed by the user through the system in the predetermined period. The percentage of the total number of offline transactions conducted by the user through the system during the predetermined period. 根據申請專利範圍第15項所述的評估用戶申請業務可用資源的可信度的裝置,還包括:帳戶資訊獲取單元,配置為,在獲取該用戶對該可用資源的申請資料之前,獲取該用戶的帳戶資訊;第三確定單元,配置為,根據該帳戶資訊,確定該用戶的身份評估資訊,以及,其中,該評估單元還配置為,結合該身份評估資訊、該第一評估資訊和該第二評估資訊,評估該用戶申請業務可用資源的可信度。The apparatus for evaluating the credibility of a user's available resources for business applications according to item 15 of the scope of patent applications, further comprising: an account information acquisition unit configured to obtain the user's application information for the available resources before obtaining the user's application information for the available resources A third determination unit configured to determine the identity evaluation information of the user based on the account information, and wherein the evaluation unit is further configured to combine the identity evaluation information, the first evaluation information, and the first Second, evaluate the information to evaluate the credibility of the resources available for the user to apply for business. 根據申請專利範圍第20項所述的評估用戶申請業務可用資源的可信度的裝置,其中,該帳戶資訊包括以下至少一項:註冊時間、註冊時長、操作頻率、操作時間、登錄設備、綁定電話、資金情況、密碼修改記錄以及地理位置。According to the device for assessing the credibility of the resources available to a user for a business application according to item 20 of the scope of patent application, the account information includes at least one of the following: registration time, registration time, operating frequency, operating time, login device, Binding phone, funding, password modification records, and geographic location. 根據申請專利範圍第15項所述的評估用戶申請業務可用資源的可信度的裝置,還包括:帳戶評級資訊獲取單元,配置為,在獲取該用戶對該可用資源的申請資料之前,獲取該用戶的帳戶評級資訊,以及,該評估單元還配置為,結合該帳戶評級資訊、該第一評估資訊和該第二評估資訊,評估該用戶申請業務可用資源的可信度。The device for evaluating the credibility of a user's application for available resources according to item 15 of the scope of patent application, further comprising: an account rating information acquisition unit configured to obtain the user's application information for the available resources before acquiring the application The user's account rating information, and the evaluation unit is further configured to combine the account rating information, the first evaluation information, and the second evaluation information to evaluate the credibility of the resources available for the user to apply for the business. 根據申請專利範圍第19項所述的評估用戶申請業務可用資源的可信度的裝置,還包括:歷史資料獲取單元,配置為,在確定第二評估資訊之後,獲取該用戶與該線下交易相關的歷史資料,以及,第四確定單元,配置為,根據該歷史資料,確定第三評估資訊,該第三評估資訊對應於用戶對該線下交易的經營狀況, 以及,其中,該評估單元還配置為,結合該第一評估資訊、該第二評估資訊和該第三評估資訊,評估該用戶申請業務可用資源的可信度。The device for evaluating the credibility of a user's available resources for business application according to item 19 of the scope of patent application, further comprising: a historical data acquisition unit configured to acquire the user and the offline transaction after determining the second evaluation information Relevant historical data, and a fourth determination unit configured to determine third evaluation information based on the historical data, the third evaluation information corresponding to a user's operating status of the offline transaction, And, the evaluation unit is further configured to evaluate the credibility of the resources available for the user to apply for the service in combination with the first evaluation information, the second evaluation information, and the third evaluation information. 一種處理業務的可用資源的裝置,該裝置由該業務所在的系統實施,包括: 申請資料獲取單元,配置為,獲取用戶對業務的可用資源的申請資料; 判斷單元,配置為,判斷該申請資料是否滿足預定基本規則; 可信度獲取單元,配置為,在該申請資料滿足該預定基本規則的情況下,獲取透過根據申請專利範圍第1-9項中任一項所述的方法評估的用戶申請業務可用資源的可信度;以及 處理單元,配置為,根據該可信度,對該可用資源進行處理。A device for processing available resources of a service. The device is implemented by a system where the service is located and includes: An application data acquisition unit configured to acquire application data of a user's available resources for the service; A judging unit configured to judge whether the application data meets a predetermined basic rule; The credibility obtaining unit is configured to obtain, from a case where the application data satisfies the predetermined basic rule, a user's ability to apply for available resources for the business, which is evaluated through the method described in any one of items 1-9 of the scope of patent application. Reliability; and The processing unit is configured to process the available resource according to the credibility. 根據申請專利範圍第24項所述的處理業務的可用資源的裝置,其中該業務為醫療保險業務,該預定基本規則包括以下至少一項:需本人就診、就診時間在保障期限內、就診疾病為非免責疾病、就診醫院為約定醫院、報案發票未重複使用、以及就診類型是保險業務的約定類型。The device for processing available resources of a business according to Item 24 of the scope of the patent application, wherein the business is a medical insurance business, and the predetermined basic rule includes at least one of the following: the need for medical treatment, the time of the medical treatment within the coverage period, Non-exempt diseases, the visiting hospital is the agreed hospital, the report invoice is not reused, and the type of visit is the agreed type of insurance business. 根據申請專利範圍第24項所述的處理業務的可用資源的裝置,其中,該處理單元還配置為,在該可信度大於預定閾值的情況下,向該用戶快速轉移該可用資源。According to the device for processing available resources of a service according to item 24 of the scope of patent application, wherein the processing unit is further configured to quickly transfer the available resources to the user if the credibility is greater than a predetermined threshold. 根據申請專利範圍第26項所述的處理業務的可用資源的裝置,其中,該處理單元還配置為,透過調用規則引擎,根據預定賠付規則,結合用戶該索賠金額,計算用戶的賠付金額,並進行賠付。The device for processing available resources of a service according to item 26 of the scope of patent application, wherein the processing unit is further configured to calculate a user's compensation amount by invoking a rule engine according to a predetermined compensation rule in combination with the user's claim amount, and Make a payment. 根據申請專利範圍第24項所述的處理業務的可用資源的裝置,其中,該處理單元還配置為,在該可信度小於預定閾值的情況下,將該申請資料發送給該業務的業務人員進行處理。According to the device for processing available resources of a service according to item 24 of the scope of patent application, wherein the processing unit is further configured to send the application data to the business personnel of the service if the credibility is less than a predetermined threshold. For processing. 一種計算機可讀的儲存媒體,其上儲存有指令代碼,該指令代碼在計算機中執行時,令計算機執行申請專利範圍第1-14項中任一項所述的方法。A computer-readable storage medium stores an instruction code thereon. When the instruction code is executed in a computer, the computer is caused to execute the method described in any one of claims 1-14 of the scope of patent application.
TW108104722A 2018-04-12 2019-02-13 Method and device for processing available resources for service TW201944336A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810327856.8A CN108399532A (en) 2018-04-12 2018-04-12 The method and apparatus of the available resources of processing business
??201810327856.8 2018-04-12

Publications (1)

Publication Number Publication Date
TW201944336A true TW201944336A (en) 2019-11-16

Family

ID=63099035

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108104722A TW201944336A (en) 2018-04-12 2019-02-13 Method and device for processing available resources for service

Country Status (3)

Country Link
CN (1) CN108399532A (en)
TW (1) TW201944336A (en)
WO (1) WO2019196547A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108399532A (en) * 2018-04-12 2018-08-14 阿里巴巴集团控股有限公司 The method and apparatus of the available resources of processing business
CN109524072A (en) * 2018-05-28 2019-03-26 平安医疗健康管理股份有限公司 Electronic health record generation method, device, computer equipment and storage medium
CN109347787B (en) * 2018-08-15 2020-08-04 阿里巴巴集团控股有限公司 Identity information identification method and device
CN109165849A (en) * 2018-08-27 2019-01-08 众安信息技术服务有限公司 Methods of risk assessment and device
CN109816397B (en) * 2018-12-03 2021-05-25 北京奇艺世纪科技有限公司 Fraud discrimination method, device and storage medium
CN110322216A (en) * 2019-05-30 2019-10-11 阿里巴巴集团控股有限公司 The case checking method and device of knowledge based map
CN110543498B (en) * 2019-08-20 2022-02-18 武汉稀云科技有限公司 Multi-party data association query method and device based on event triggering
CN111191821B (en) * 2019-12-17 2023-07-25 东华大学 Knowledge graph driving-based equipment resource allocation optimization method
CN111985938A (en) * 2020-08-18 2020-11-24 支付宝(杭州)信息技术有限公司 Method, device and equipment for verifying authenticity of cross-border transaction

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102013084A (en) * 2010-12-14 2011-04-13 江苏大学 System and method for detecting fraudulent transactions in medical insurance outpatient services
CN105005709A (en) * 2015-08-19 2015-10-28 赵蒙海 Process mining method based on single-disease treatment process
CN106920066A (en) * 2016-08-03 2017-07-04 阿里巴巴集团控股有限公司 Information processing method and device
CN107784590A (en) * 2017-02-16 2018-03-09 平安科技(深圳)有限公司 The appraisal procedure and device of a kind of claim reserve
CN107067157A (en) * 2017-03-01 2017-08-18 北京奇艺世纪科技有限公司 Business risk appraisal procedure, device and air control system
CN107423869B (en) * 2017-04-18 2018-05-18 南京理工大学 It is a kind of that the system for driving permission is limited based on traffic historical record
CN107871284A (en) * 2017-11-22 2018-04-03 平安科技(深圳)有限公司 The appraisal procedure and device of risk Claims Resolution
CN107871285A (en) * 2017-12-06 2018-04-03 和金在线(北京)科技有限公司 A kind of health insurance pays for the method for detecting and system of fraud and abuse
CN108399532A (en) * 2018-04-12 2018-08-14 阿里巴巴集团控股有限公司 The method and apparatus of the available resources of processing business

Also Published As

Publication number Publication date
WO2019196547A1 (en) 2019-10-17
CN108399532A (en) 2018-08-14

Similar Documents

Publication Publication Date Title
TW201944336A (en) Method and device for processing available resources for service
US11301860B2 (en) Systems and methods for accessing records via derivative locators
US20230177515A1 (en) Decentralized safeguard against fraud
US7620596B2 (en) Systems and methods for evaluating financial transaction risk
CA3176778C (en) Information processing device, information processing method, and computer program background
AU2017210311A1 (en) Systems and methods for managing a talent based exchange
US20120323773A1 (en) Biometric risk management
US20160323247A1 (en) Systems and methods for anonymously obtaining data
EP2318996A1 (en) Credit risk control
WO2003069433A2 (en) Risk management clearinghouse
KR102204070B1 (en) Method and system for compensating for block-chain network participants
TW201944337A (en) Service risk control method and apparatus
TW202004636A (en) Insurance service optimization method and system and computer program product thereof
US11037160B1 (en) Systems and methods for preemptive fraud alerts
WO2017041527A1 (en) Information processing method, terminal and server, and computer storage medium
CN111433808A (en) System and method for global point-to-point retirement savings system
US20210352073A1 (en) Systems And Methods For Enhanced Authorization Messages
US10528924B2 (en) Self-aware token
TW201810158A (en) Scoring trustworthiness, competence, and/or compatibility of any entity for activities including recruiting or hiring decisions, skip tracing, insurance underwriting, credit decisions, or shortening or improving sales cycles
Bindman et al. Sorting Out the Health Risk in California's State‐Based Marketplace
US20180034775A1 (en) Filtering and verification hub
JP7340138B1 (en) Credit evaluation system, credit evaluation program, and credit evaluation method
US20240020648A1 (en) Benefit administration platform
US20230377048A1 (en) Methods and systems for evaluating medical insurance data in smart city based on the internet of things
Han CONSUMER USAGE BEHAVIOR AND BRAND LOYALTY OF OOREDOO MYANMAR M-PITESAN