WO2020221146A1 - Procédé de génération d'informations, dispositif électronique et support lisible par ordinateur - Google Patents

Procédé de génération d'informations, dispositif électronique et support lisible par ordinateur Download PDF

Info

Publication number
WO2020221146A1
WO2020221146A1 PCT/CN2020/086923 CN2020086923W WO2020221146A1 WO 2020221146 A1 WO2020221146 A1 WO 2020221146A1 CN 2020086923 W CN2020086923 W CN 2020086923W WO 2020221146 A1 WO2020221146 A1 WO 2020221146A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
credit
credit evaluation
value
evaluation information
Prior art date
Application number
PCT/CN2020/086923
Other languages
English (en)
Chinese (zh)
Inventor
王飞
Original Assignee
上海掌门科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海掌门科技有限公司 filed Critical 上海掌门科技有限公司
Publication of WO2020221146A1 publication Critical patent/WO2020221146A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Definitions

  • the embodiments of the present application relate to the field of computer technology, and specifically relate to information generation methods, electronic devices, and computer-readable media.
  • Credit score can be used to characterize the credibility of a person. The higher the credit score, the higher the credibility of the person. Generating credit scores is of great significance. For example, in various application scenarios, credit scores can be used as a reference to control risks and reduce losses.
  • the prevailing personal credit rating methods are mainly derived from the consideration of personal behavior information provided by creditors, such as taking into account personal deposits and loans, consumption records, and repayment records.
  • the embodiment of the present application proposes an information generation method, an electronic device, and a computer-readable medium.
  • an embodiment of the present application provides an information generation method.
  • the method includes: sending a credit evaluation request for a second user to a first terminal corresponding to a first user, wherein the first user is in the In the friend group of the second user; receiving the credit evaluation information returned by the first terminal, wherein the credit evaluation information is determined by the first user based on the credit evaluation request; based on the credit evaluation information To generate the second credit value of the second user.
  • an embodiment of the present application provides an information generating device, which includes a sending unit configured to send a credit evaluation request for a second user to a first terminal corresponding to a first user, wherein the The first user is in the friend group of the second user; the receiving unit is configured to receive the credit evaluation information returned by the first terminal, wherein the credit evaluation information is based on the first user The credit evaluation request is determined; the generating unit is configured to generate the second credit value of the second user based on the credit evaluation information.
  • an embodiment of the present application provides an electronic device, which includes: one or more processors; a storage device, on which one or more programs are stored, when the above one or more programs are When executed by or multiple processors, the above one or more processors implement the method described in any implementation manner in the first aspect.
  • an embodiment of the present application provides a computer-readable medium on which a computer program is stored, where the computer program is executed by a processor to implement the method described in any implementation manner in the first aspect.
  • the information generation method, electronic device, and computer-readable medium provided by the embodiments of this application first send a credit evaluation request for the second user to the first user who is a friend of the second user, and then according to the first user’s
  • the credit evaluation request generates the second credit value of the second user.
  • the technical effect may at least include: providing a new way of generating credit information.
  • Fig. 1 is an exemplary system architecture diagram in which some embodiments of the present application can be applied;
  • Fig. 2 is a flowchart of an embodiment of the information generating method according to the present application.
  • Figure 3 is a schematic diagram of an application scenario of the information generation method according to the present application.
  • Fig. 4 is a flowchart of another embodiment of the information generating method according to the present application.
  • Fig. 5 is a schematic structural diagram of a computer system suitable for implementing the devices of the embodiments of the present application.
  • Fig. 1 shows an exemplary system architecture 100 to which the information generation method of the present application can be applied.
  • the system architecture 100 may include a device 101, a network 102, and a device 103.
  • the network 102 is a medium used to provide a communication link between the device 101 and the device 103.
  • the network 102 may include various connection types, such as wired, wireless communication links, or fiber optic cables.
  • the devices 101 and 103 may be hardware devices or software that support network connections to provide various network services.
  • the device When the device is hardware, it can be a variety of electronic devices that support display screens, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, servers, and so on.
  • a hardware device it can be implemented as a distributed device group composed of multiple devices, or as a single device.
  • the device When the device is software, it can be installed in the electronic devices listed above.
  • software it can be implemented as multiple software or software modules for providing distributed services, or as a single software or software module. There is no specific limitation here.
  • devices can provide corresponding network services by installing corresponding client applications. After the device has installed the client application, it can be embodied as a client in network communication. After the device has installed the server application, it can be embodied as a server in network communication.
  • the device 101 is embodied as a client, and the device 103 is embodied as a server.
  • the device 101 can interact with the device 103 via the network 102 to receive or send messages and so on.
  • Various communication client applications such as instant messaging applications, can be installed on the device 101.
  • the device 103 may be a server that provides various services. For example, the device 103 may send a credit evaluation request to the device 101, and then generate a credit value based on the received credit evaluation information.
  • the information generation method provided in the embodiment of the present application may be executed by the device 103.
  • FIG. 1 the number of networks and devices in FIG. 1 is merely illustrative. According to implementation needs, there can be any number of networks and devices.
  • FIG. 2 shows a process 200 of an embodiment of an information generation method.
  • the method is mainly applied to an electronic device with a certain computing capability as an example.
  • the electronic device may be the device 103 shown in FIG. 1.
  • the information generation method includes the following steps:
  • Step 201 Send a credit evaluation request for the second user to the first terminal corresponding to the first user.
  • the execution subject of the information generation method may send a credit evaluation request for the second user to the first terminal corresponding to the first user.
  • the credit evaluation request may be generated by the second terminal or server used by the second user.
  • the second terminal may generate a credit evaluation request, and then send the generated credit evaluation request to the server. Then, the server may receive the credit evaluation request, and then send the received credit evaluation request to the first terminal.
  • the second user clicks on the credit test control on the second terminal.
  • the second terminal may send a request for generating a credit value to the server.
  • the server In response to receiving the request for generating a credit value, the server generates a credit evaluation request, and sends the credit evaluation request to the first terminal.
  • the first user may be in the friend group of the second user.
  • the above-mentioned friend group may be a collection of friends who have established an association relationship with the second user in advance.
  • the friend group of the second user Zhao Yi includes Zhang San, Li Si, and Wang Wu.
  • the above-mentioned execution subject may send a credit evaluation request for the second user Zhao Yi to a terminal used by one or more of Zhang San, Li Si, and Wang Wu (all may be referred to as the first terminal).
  • the credit evaluation request for the second user may be used to request the first user to provide credit evaluation information for the second user.
  • the information evaluation information is determined by the first user based on the credit evaluation request.
  • the first user may input credit evaluation information for the second user.
  • the credit evaluation information may be used to indicate the information given by the first user to characterize the credit of the second user.
  • the credit evaluation information can be in various forms.
  • the credit evaluation information can be an evaluation value, a credit rating, or a fuel bag.
  • the first user may use various methods to input credit evaluation information for the second user.
  • the first user may select the credit rating information from the credit rating information displayed on the first terminal as the credit evaluation information, so as to realize the input of the credit evaluation information for the second user.
  • providing credit rating information for the first user to select can save the first user's operation time, thereby increasing the possibility of the first user returning the credit rating information (if the operation is troublesome, it may not be returned) , And then improve the speed and accuracy of generating the second credit value (with more reference credit evaluation information can improve the accuracy).
  • the first user may input the evaluation value into the first terminal as credit evaluation information, so as to realize the input of credit evaluation information for the second user.
  • the input of the evaluation value by the first user can quantify the credibility of the second user in the mind of the first user, and thus, a more accurate second credit value can be generated.
  • Step 202 Receive credit evaluation information returned by the first terminal.
  • the above-mentioned execution subject may receive the credit evaluation information returned by the first user.
  • the credit evaluation information received by the above-mentioned execution subject is also one or more.
  • the first user may or may not respond to the credit evaluation request. Therefore, the number of credit evaluation information received by the above-mentioned executive body may be the same as or different from the number of the first user .
  • Step 203 Generate a second credit value of the second user based on the credit evaluation information.
  • the execution subject may generate the second credit value of the second user based on the received credit evaluation information.
  • the credit value of the second user is called the second credit value
  • the credit value of the first user is called the first credit value
  • the credit value may be in various forms, such as numerical values (for example, 60 points or 80 points in a percentile system, etc.), for example, grades (for example, excellent, medium, and low). It can be understood that even if the credit value is in the form of a grade, it is recorded as a numerical value when it is recorded by the computer.
  • generating the second credit value can be based on the original second credit value and updating the original second credit value to obtain a new second credit value; it can also be based on the absence of the original second credit value, Generate a second credit value.
  • various methods can be used to generate the second credit value of the second user.
  • the evaluation value given by the first user can be multiplied by the weight to serve as the second credit value of the second user. If there are multiple first users, each evaluation value can be multiplied by the weight corresponding to each user (that is, weighted), and then the weighted results are summed to obtain the second credit value.
  • FIG. 3 is a schematic diagram of an application scenario of the information generation method according to this embodiment.
  • the application scenario of Figure 3 :
  • the second user operates on the second terminal 302, such as clicking on a credit test, and the second terminal generates a credit evaluation request.
  • the second terminal sends the credit evaluation request to the server 303.
  • the server sends the credit evaluation request to the first terminal corresponding to the first user.
  • the server sends the credit evaluation request to the first terminal corresponding to the first user.
  • there are multiple first terminals namely the first terminal 3011, the first terminal 3012, and the first terminal 3013.
  • the first user inputs credit evaluation information for the second user.
  • the server receives the credit evaluation information returned by the first terminal.
  • the first terminal 3011 and the first terminal 3013 returned credit evaluation information, and the first terminal 3012 did not return the credit evaluation information.
  • the server may generate the second credit value of the second user according to the received credit evaluation information.
  • the server may receive the credit evaluation information returned by the first terminal 3011 and the first terminal 3013 to generate the second credit value of the second user.
  • the server can use the credit evaluation information received within a preset time period after issuing the credit evaluation request to generate the second credit value; if all the credits returned by the first terminal are received within the preset time period To evaluate information, stop receiving tasks in advance; for a first terminal that does not return credit evaluation information within the preset time period, it is considered that the first terminal does not return credit evaluation information, that is, it stops receiving tasks after the preset time period ends.
  • the method provided by the foregoing embodiment of the present application first sends a credit evaluation request for the second user to the first user who is a friend of the second user, and then generates the second user according to the credit evaluation request given by the first user
  • the second credit value of, technical effects can at least include:
  • this application uses the search for the first user in social relationships and allows the first user to evaluate the credit of the second user.
  • This method can fully explore the judgment of the second user’s credibility by people familiar with the second user. It is then quantified as the second credit value of the second user, and the obtained second credit value can accurately characterize the credibility of the second user, that is, the accuracy of the second credit value of the second user can be obtained.
  • the above method may further include: selecting the first user from the friend group of the second user.
  • the above step 201 may include: sending a credit evaluation request to the first terminal corresponding to the selected first user.
  • all users in the friend group of the second user may be determined as the first user.
  • a predetermined number of first users may be randomly selected from the friend group of the second user.
  • the first user may be selected from the friend group of the second user according to the credit value of the user in the friend group of the second user.
  • the first user may be selected from the friend group of the second user according to the latest interaction time between the user in the friend group of the second user and the second user.
  • selecting the first user from the friend group of the second user may include: selecting the first user from the friend group of the second user according to the interaction activity with the second user.
  • interactive activity can be used to characterize the activity of interaction between users.
  • the calculation method of interactive activity can be customized according to the actual scene.
  • the frequency and/or number of messages sent between users can be used to calculate the interaction activity.
  • the selection of the first user by the server can ensure the fairness of the selected first user and calculate a more accurate second credit value.
  • the selected interaction activity between the first user and the second user satisfies at least one of the following but not limited to: the frequency of contact between the first user and the second user is greater than a preset frequency threshold The time interval between the last contact between the first user and the second user is less than a first preset time threshold; the average contact time between the first user and the second user is greater than the second preset time threshold; The first credit value of the first user is greater than the first credit threshold.
  • the above-mentioned executive body may first drill out the first user whose first credit value is greater than the first credit threshold; then, from the selected users, select the first user whose contact frequency with the second user is greater than the preset frequency threshold. user.
  • one or more items can be flexibly selected from the contact frequency, the time interval between the last contact time and the current time, the average contact duration, and the first credit value as the specific content of the interaction activity.
  • the method further includes any one of the following: receiving a corresponding credit evaluation requirement of the second user initiated by the second terminal; receiving a credit for the second user initiated by a third user related to the second user Evaluation needs.
  • the second user can send a credit evaluation request to the server, and obtain his own credit information with the help of the server.
  • the third user may be a user related to the second user.
  • the third user may be a third party (such as some financial institutions, organizations, etc.) that needs to obtain the credit information of the second user,
  • the above step 201 may include: based on the credit evaluation requirement, sending a credit evaluation request for the second user to the first terminal corresponding to the first user.
  • the credit evaluation requirement includes a user identification.
  • step 201 may include: sending a credit evaluation request to a terminal corresponding to the user indicated by the user identifier in the credit evaluation requirement.
  • the foregoing method may further include: receiving a user identifier sent by a second terminal corresponding to the second user.
  • Step 201 may include: sending a credit evaluation request to a terminal corresponding to the user indicated by the received user identification.
  • the second user can select which users participate in the evaluation process of his own credit.
  • the second terminal may send the user identification selected by the second user to the server, and the server may determine the user specified by the received user identification as the first user. Then, a credit evaluation request is sent to the terminal (ie, the first terminal) corresponding to the user (ie, the first user) indicated by the received user identifier.
  • the interference items in the friend group can be removed (for example, users who are not familiar with the second user, users with poor credit, etc.), thereby improving the determination of the first user.
  • Speed of credit value for example, users who are not familiar with the second user, users with poor credit, etc.
  • step 203 may include: in response to receiving the credit evaluation information, acquiring the first credit value of the first user who gave the received credit evaluation information; in response to determining that the acquired first credit value is less than the predetermined Set a second credit threshold and discard the received credit evaluation information.
  • the received credit evaluation information can be determined as the target information evaluation information, the first credit value of the first user who gave the target credit evaluation information (referred to as the target first credit value) is obtained, and in response to determining the target first credit value If the credit value is less than the preset second credit threshold, the target credit evaluation information is discarded.
  • the number of the first user may be at least one; step 203 may include: generating the second credit value of the second user according to the number of received credit evaluation information.
  • the credit evaluation information in the form of a fuel pack given by the first user (for example, the credit evaluation information is in the form of a small red flower) is used to fuel the second user’s second credit value.
  • the server receives the first A refueling package given by the user (for example, every time a small red flower is received), the second credit value is increased.
  • the second credit value is generated according to the form of the fuel pack given by the first user, and the second credit value of the second user can be determined according to how many first users are willing to guarantee the credit of the second user.
  • the number of first users who are willing to guarantee the credit of the second user is positively correlated with the credit of the second user, so that a more accurate second credit value can be determined.
  • generating the second credit value of the second user according to the number of received credit evaluation information can be achieved in the following manner: according to the number of received credit evaluation information and the number of credit evaluation requests issued The ratio of the numbers generates the second credit value of the second user.
  • the above ratio can be used as the second credit value.
  • the second credit value is determined according to the above ratio, and the second credit value of the second user can be determined according to the proportion of first users who are willing to guarantee the second user's credit.
  • the proportion of the first users who are willing to guarantee the credit of the second user is positively correlated with the credit of the second user, so that a more accurate second credit value can be determined.
  • FIG. 4 shows a process 400 of another embodiment of an information generation method.
  • the process 400 of the information generation method includes the following steps:
  • Step 401 Send a credit evaluation request for a second user to a first terminal corresponding to the first user.
  • the execution subject of the information generation method may send a credit evaluation request for the second user to the first terminal corresponding to the first user.
  • the first user is in the friend group of the second user, and the first user inputs credit evaluation information for the second user.
  • Step 402 Receive credit evaluation information.
  • the above-mentioned execution subject may receive credit evaluation information.
  • Step 403 Generate a second credit value of the second user based on the received credit evaluation information.
  • the above-mentioned execution subject may generate the second credit value of the second user based on the received credit evaluation information.
  • step 401, step 402, and step 403 can be referred to the description of step 201, step 202, and step 203, which will not be repeated here.
  • the above-mentioned execution subject may determine a normal first user from at least one first user based on the second credit value and the received credit evaluation information.
  • the first user with a deviation in evaluation may be the first user whose credit evaluation information is consistent with the credibility of the second user.
  • the first credit value of a normal first user may be updated.
  • various methods can be used to update the first credit value of a normal first user, for example, multiplying the original first credit value by 1.5 times; for example, adding a preset value to the original first credit value The increment and so on.
  • Step 404 Determine a first user with an evaluation deviation from at least one first user based on the second credit value and the received credit evaluation information.
  • the execution subject determines the first user with an evaluation deviation from at least one first user based on the second credit value of the second user and the received credit evaluation information.
  • the first user with a deviation in evaluation may be a first user whose credit evaluation information is not consistent with the credibility of the second user.
  • the second user may have good credit, but the first user gives credit evaluation information with low credit.
  • This first user can be considered as the first user with a biased evaluation.
  • the second user may have low credit, but the first user may give credit evaluation information with good credit, and this first user may be considered as the first user with an evaluation deviation.
  • the second credit value and the received credit evaluation information may be used to determine the first user with an evaluation deviation from at least one first user.
  • the credit evaluation information includes a credit evaluation value. If the absolute value of the difference between the credit evaluation value and the second credit value is greater than the preset difference threshold, it is determined that the first user who gave the credit evaluation value is the first user with the evaluation deviation. One user.
  • the credit evaluation information includes a credit rating.
  • the credit level to which the second credit value belongs can also be determined according to the preset correspondence between the credit value and the credit level. It can be understood that the credit rating can have a rank order. If the level difference between the credit level in the credit evaluation information and the credit level to which the second credit value belongs is greater than the preset gap threshold, it is determined that the first user given this credit level is the first user with an evaluation deviation.
  • the first credit value of the first user with an evaluation deviation may be updated, for example, the first credit value is discounted (the first credit value is multiplied by 80% as the new first credit value).
  • Step 405 Determine the influence value of the evaluation deviation of the credit evaluation information given by the first user on the second credit value.
  • the execution subject may determine the influence value of the evaluation deviation of the credit evaluation information given by the first user on the second credit value.
  • the evaluation deviation of the credit evaluation information given by the first user, for the second credit value the influence value may be large or small.
  • the above influence value can be determined by referring to the method of generating the second credit value based on the credit evaluation information.
  • the above-mentioned influence value is determined as the number of fuel packs given by the first user with the evaluation deviation.
  • the second credit value is determined by the weighted summation of the evaluation values given by each first user, then the evaluation deviation can be calculated from the product of the first user’s weight and the given evaluation value. , Determined as the above influence value.
  • Step 406 Generate a first credit value of the first user whose evaluation deviation is based on the impact value.
  • the execution subject may generate the first credit value of the first user whose evaluation deviation is based on the influence value.
  • the first credit value is updated on the basis of the original first credit value to generate the first credit value of the first user with the evaluation deviation. If the first user does not have the original first credit value, the new first credit value is directly generated.
  • the difference between the first credit value and the aforementioned influence value may be used as the new first credit value.
  • the above influence value may be multiplied by the preset weight to obtain the weighted result, and then the difference between the first credit value and the weighted result may be used as the new first credit value.
  • the negative value of the above-mentioned influence value may be determined as the first credit value of the first user with the above-mentioned evaluation deviation.
  • the flow 400 of the information generation method in this embodiment highlights the determination of the first user of the evaluation deviation and the generation of the first user of the evaluation deviation according to the above influence value. Step of the first credit value. Therefore, the technical effects of the solution described in this embodiment may at least include:
  • the generation of the second credit value refers to multiple aspects (for example, credit evaluation information of multiple first users), which can be considered to be more accurate. If the credit evaluation information has a large deviation from the second credit value, it can be determined that the deviation is given A larger first user may be less credible. Therefore, by adjusting the first credit value of the first user with an evaluation deviation, a first credit value closer to the credibility of the first user with an evaluation deviation can be obtained.
  • FIG. 5 shows a schematic structural diagram of a computer system 500 suitable for implementing the device of the embodiments of the present application.
  • the device shown in FIG. 5 is only an example, and should not bring any limitation to the function and scope of use of the embodiments of the present application.
  • the computer system 500 includes a central processing unit (CPU, Central Processing Unit) 501, which can be loaded to random access according to a program stored in a read-only memory (ROM, Read Only Memory) 502 or from a storage part 508
  • the program in the memory (RAM, Random Access Memory) 503 executes various appropriate actions and processing.
  • various programs and data required for the operation of the system 500 are also stored.
  • the CPU 501, the ROM 502, and the RAM 503 are connected to each other through a bus 504.
  • An input/output (I/O, Input/Output) interface 505 is also connected to the bus 504.
  • the following components are connected to the I/O interface 505: the input part 506 including keyboard, mouse, etc.; including the output part 507 such as cathode ray tube (CRT, Cathode Ray Tube), liquid crystal display (LCD, Liquid Crystal Display), and speakers 507
  • a storage part 508 including a hard disk, etc. and a communication part 509 including a network interface card such as a LAN (Local Area Network) card and a modem.
  • the communication section 509 performs communication processing via a network such as the Internet.
  • the driver 510 is also connected to the I/O interface 505 as needed.
  • a removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is installed on the drive 510 as needed, so that the computer program read from it is installed into the storage section 608 as needed.
  • the process described above with reference to the flowchart can be implemented as a computer software program.
  • the embodiments of the present disclosure include a computer program product, which includes a computer program carried on a computer-readable medium, and the computer program contains program code for executing the method shown in the flowchart.
  • the computer program may be downloaded and installed from the network through the communication part 509, and/or installed from the removable medium 511.
  • the central processing unit (CPU) 501 the above-mentioned functions defined in the method of the present application are executed.
  • the above-mentioned computer-readable medium in the present application may be a computer-readable signal medium or a computer-readable storage medium, or any combination of the two.
  • the computer-readable storage medium may be, for example, but not limited to, an electric, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the above. More specific examples of computer-readable storage media may include, but are not limited to: electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read-only memory (ROM), erasable Programmable read only memory (EPROM or flash memory), optical fiber, portable compact disk read only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
  • the computer-readable storage medium may be any tangible medium that contains or stores a program, and the program may be used by or in combination with an instruction execution system, apparatus, or device.
  • a computer-readable signal medium may include a data signal propagated in a baseband or as a part of a carrier wave, and a computer-readable program code is carried therein. This propagated data signal can take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • the computer-readable signal medium may also be any computer-readable medium other than the computer-readable storage medium.
  • the computer-readable medium may send, propagate, or transmit the program for use by or in combination with the instruction execution system, apparatus, or device .
  • the program code contained on the computer-readable medium can be transmitted by any suitable medium, including but not limited to: wireless, wire, optical cable, RF, etc., or any suitable combination of the above.
  • the computer program code used to perform the operations of this application can be written in one or more programming languages or a combination thereof.
  • the above-mentioned programming languages include object-oriented programming languages-such as Java, Smalltalk, C++, and also conventional Procedural programming language-such as "C" language or similar programming language.
  • the program code can be executed entirely on the user's computer, partly on the user's computer, executed as an independent software package, partly on the user's computer and partly executed on a remote computer, or entirely executed on the remote computer or server.
  • the remote computer can be connected to the user's computer through any kind of network including a local area network (LAN) or a wide area network (WAN), or it can be connected to an external computer (for example, using an Internet service provider to pass Internet connection).
  • LAN local area network
  • WAN wide area network
  • each block in the flowchart or block diagram can represent a module, program segment, or part of code, and the module, program segment, or part of code contains one or more for realizing the specified logical function Executable instructions.
  • the functions marked in the block may also occur in a different order from the order marked in the drawings. For example, two blocks shown in succession can actually be executed substantially in parallel, or they can sometimes be executed in the reverse order, depending on the functions involved.
  • each block in the block diagram and/or flowchart, and the combination of the blocks in the block diagram and/or flowchart can be implemented by a dedicated hardware-based system that performs the specified functions or operations Or it can be realized by a combination of dedicated hardware and computer instructions.
  • the units involved in the embodiments described in the present application can be implemented in software or hardware.
  • the described unit may also be provided in the processor, for example, it may be described as: a processor includes a sending unit, a receiving unit, and a generating unit. Among them, the names of these units do not constitute a limitation on the unit itself under certain circumstances.
  • the sending unit can also be described as "a unit that sends a credit evaluation request.”
  • the present application also provides a computer-readable medium, which may be included in the device described in the above-mentioned embodiments; or it may exist alone without being assembled into the device.
  • the above-mentioned computer-readable medium carries one or more programs, and when the above-mentioned one or more programs are executed by the apparatus, the apparatus is caused to: send a credit evaluation request for the second user to the first terminal corresponding to the first user, Wherein, the first user is in the friend group of the second user; receiving credit evaluation information returned by the first terminal, wherein the credit evaluation information is based on the credit evaluation by the first user The request is determined; based on the credit evaluation information, the second credit value of the second user is generated.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention concerne un procédé de génération d'informations, un dispositif électronique et un support lisible par ordinateur. Le procédé consiste à : envoyer une demande d'évaluation de crédit d'un second utilisateur à un premier terminal correspondant à un premier utilisateur (201), le premier utilisateur faisant partie d'un groupe d'amis du second utilisateur ; recevoir des informations d'évaluation de crédit renvoyées par le premier terminal (202), les informations d'évaluation de crédit étant déterminées par le premier utilisateur sur la base de la demande d'évaluation de crédit ; et générer une seconde valeur de crédit du second utilisateur sur la base des informations d'évaluation de crédit (203).
PCT/CN2020/086923 2019-04-29 2020-04-26 Procédé de génération d'informations, dispositif électronique et support lisible par ordinateur WO2020221146A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910355420.4 2019-04-29
CN201910355420.4A CN110097457B (zh) 2019-04-29 2019-04-29 信息生成方法、电子设备和计算机可读介质

Publications (1)

Publication Number Publication Date
WO2020221146A1 true WO2020221146A1 (fr) 2020-11-05

Family

ID=67446361

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/086923 WO2020221146A1 (fr) 2019-04-29 2020-04-26 Procédé de génération d'informations, dispositif électronique et support lisible par ordinateur

Country Status (2)

Country Link
CN (1) CN110097457B (fr)
WO (1) WO2020221146A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110097457B (zh) * 2019-04-29 2022-05-31 上海掌门科技有限公司 信息生成方法、电子设备和计算机可读介质
CN113626881A (zh) * 2020-05-07 2021-11-09 顺丰科技有限公司 对象评估方法、装置、电子设备及存储介质
CN113077331A (zh) * 2021-03-25 2021-07-06 胡立禄 一种基于大数据的个人金融信用评价系统及方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107239519A (zh) * 2017-05-25 2017-10-10 广州亿码科技有限公司 一种基于活动的社交方法及系统
WO2018118353A1 (fr) * 2016-12-21 2018-06-28 Mastercard International Incorporated Système et procédés d'autorisation améliorée de cartes prépayées
CN108985611A (zh) * 2018-07-06 2018-12-11 长沙万百网络科技有限责任公司 一种个人信用品德评估系统和实施方法
CN109087163A (zh) * 2018-07-06 2018-12-25 阿里巴巴集团控股有限公司 信用评估的方法及装置
CN110097457A (zh) * 2019-04-29 2019-08-06 上海掌门科技有限公司 信息生成方法、电子设备和计算机可读介质

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727633A (zh) * 2008-10-23 2010-06-09 浙江大学 信用数据的处理方法及装置
CN103310353B (zh) * 2013-07-05 2016-11-02 重庆大学 一种抗攻击的数据过滤优化系统和方法
CN104616194A (zh) * 2014-12-31 2015-05-13 腾讯科技(深圳)有限公司 一种数据处理方法及支付平台
CN104899762A (zh) * 2015-04-09 2015-09-09 哈尔滨工程大学 一种基于逆向推理的信任管理方法
CN106355414A (zh) * 2015-07-15 2017-01-25 阿里巴巴集团控股有限公司 处理用户反馈信息的方法及装置
CN107491865A (zh) * 2017-07-28 2017-12-19 丁伟明 一种用户的社会信用评估方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018118353A1 (fr) * 2016-12-21 2018-06-28 Mastercard International Incorporated Système et procédés d'autorisation améliorée de cartes prépayées
CN107239519A (zh) * 2017-05-25 2017-10-10 广州亿码科技有限公司 一种基于活动的社交方法及系统
CN108985611A (zh) * 2018-07-06 2018-12-11 长沙万百网络科技有限责任公司 一种个人信用品德评估系统和实施方法
CN109087163A (zh) * 2018-07-06 2018-12-25 阿里巴巴集团控股有限公司 信用评估的方法及装置
CN110097457A (zh) * 2019-04-29 2019-08-06 上海掌门科技有限公司 信息生成方法、电子设备和计算机可读介质

Also Published As

Publication number Publication date
CN110097457A (zh) 2019-08-06
CN110097457B (zh) 2022-05-31

Similar Documents

Publication Publication Date Title
US20200389461A1 (en) Authenticated access and aggregation database platform
WO2020221146A1 (fr) Procédé de génération d'informations, dispositif électronique et support lisible par ordinateur
US20190251234A1 (en) Authentication challenges based on fraud initiation requests
US20170200137A1 (en) Combined security for electronic transfers
US10984468B1 (en) Systems and methods for estimating past and prospective attribute values associated with a user account
US20190325473A1 (en) Reward point redemption for cryptocurrency
US20210136159A1 (en) Communication tool for initiation of services
CN110807649A (zh) 一种金融产品的邀请奖励方法和系统
WO2021068635A1 (fr) Procédé et appareil de traitement d'informations, et dispositif électronique
CN109299348A (zh) 一种数据查询方法、装置、电子设备及存储介质
WO2021203919A1 (fr) Procédé et appareil pour évaluer un modèle d'apprentissage conjoint
JP2014527651A (ja) 対人的対話からのテキストコンテンツを用いて、対人関係影響情報を判定するためのシステム及び方法
WO2020088050A1 (fr) Procédé et dispositif de génération d'informations
US9824403B2 (en) Measuring problems from social media discussions
US9747175B2 (en) System for aggregation and transformation of real-time data
US11620456B2 (en) Text-based discourse analysis and management
CN116932214A (zh) 指令发送方法、装置、电子设备及计算机存储介质
WO2020150325A1 (fr) Versement de cycle sans facturation automatisé
US20230162053A1 (en) Machine-learning techniques for risk assessment based on clustering
CN111275542A (zh) 一种贷款请求的处理方法、装置和系统
WO2023129977A1 (fr) Codage catégoriel lissé exponentiellement pour maîtriser l'accès à une ressource de réseau
US20180054496A1 (en) Social content aggregation
WO2021169550A1 (fr) Procédé et dispositif de traitement d'informations
US20240086923A1 (en) Entity profile for access control
US12008009B2 (en) Pre-computation and memoization of simulations

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20798900

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 04/02/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 20798900

Country of ref document: EP

Kind code of ref document: A1