A risk identification method and device based on address matching
A risk identification and address matching technology, applied in the network field, can solve the problems of difficult address matching, low reliability of matching results, and difficulty in verifying address information, so as to reduce the risk of leakage, increase accuracy, and protect user privacy.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0061] Such as figure 1 As shown, it is a flow chart of the risk identification method based on address matching provided in Embodiment 1 of the present application, including the following steps:
[0062] S101: Receive risk verification request information, where the risk verification request information includes identification information of a user requesting to process a service and first address coding information for identifying a first address.
[0063] The embodiment of the present application can be implemented in any risk identification product, and any other possible application scenarios are within the protection scope of the embodiment of the present application. The embodiment of the present application mainly describes the matching of addresses in Chinese. Of course, address matching can be performed in any language other than Chinese using the method of address encoding proposed in the embodiment of the present application.
[0064] The executive subject of thi...
Embodiment 2
[0081] Such as figure 2 As shown, the flowchart of the risk identification method based on address matching provided in Embodiment 2 of the present application includes the following steps:
[0082] S201: Receive the risk verification request information sent by the service server, the risk verification request information includes the fuzzy identification information of the user who requests to process the business and the first address code information used to identify the first address; wherein, the fuzzy The personalized identification information includes partial information of each type of complete identification information among various complete identification information.
[0083]Here, the user's fuzzy identification information includes multiple identification information, and each identification information is part of a corresponding complete identification information. For example, it may include at least two of fuzzy names, fuzzy mobile phone numbers, fuzzy ID c...
Embodiment 3
[0096] Such as image 3 As shown, the flowchart of the risk identification method based on address matching provided in Embodiment 3 of the present application includes the following steps:
[0097] S301: Receive risk verification request information sent by the service server, where the risk verification request information includes the fuzzy identification information of the user who requests to process the service and the first address code information used to identify the first address.
[0098] S302: Determine whether user information matching the fuzzy identification information is stored.
[0099] S303: If it is determined that there is no stored user information that matches the fuzzy identification information, feed back information about user matching failure to the service server.
[0100] S304: If it is determined that there is user information that matches the fuzzy identification information, extract the second address code information and second credit record i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


