Untrusted user data processing method, system and related apparatus

A processing method and user data technology, applied in the direction of electrical digital data processing, special data processing applications, instruments, etc., can solve problems such as poor use effect, achieve the effect of convenient and fast automatic processing process, and a wide range of related data sources

Inactive Publication Date: 2018-03-13
浙江极赢信息技术有限公司
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since the data of these untrustworthy users are currently scattered on the Internet, and each has its own storage form and keyword name, it is impossible to obtain high-quality untrustworthy user data through simple crawling, resulting in a certain amount of wrong content in the query of untrustworthy users Data, the actual use effect is not good

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Untrusted user data processing method, system and related apparatus
  • Untrusted user data processing method, system and related apparatus
  • Untrusted user data processing method, system and related apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The core of this application is to provide a processing method, system, device and computer-readable storage medium for untrustworthy user data, which uses multiple web crawlers to crawl relevant data from multiple channels, making the source of relevant data more extensive and more reasonable to use The data processing method is more convenient and efficient, and the data obtained from multiple channels is compared and screened to make the data quality of untrustworthy users higher.

[0047]In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an untrusted user data processing method. The method comprises the steps of crawling untrusted data from public untrusted databases or blacklist databases by utilizing a network crawler; according to a recording form of the untrusted data, selecting a corresponding mode for performing keyword information extraction to obtain processed keywords; performing attribution division of corresponding content data on the processed keywords according to users which the processed keywords belong to, thereby obtaining target untrusted data, and establishing an untrusted user information library by utilizing the target untrusted data; and judging whether abnormal content data occurs in the untrusted user information library or not, and if the abnormal content data occurs, correcting the abnormal content data according to a priority sequence of the processed keywords. The related data can be crawled through multiple channels; the data processing mode is more reasonable, moreconvenient and quicker; and the data is compared and processed, so that the untrusted user data quality is higher. Meanwhile, the invention furthermore discloses an untrusted user data processing system and apparatus, and a computer readable storage medium, which have the abovementioned beneficial effects.

Description

technical field [0001] The present application relates to the technical field of network data processing, and in particular to a method, system, device and computer-readable storage medium for processing untrustworthy user data. Background technique [0002] With the vigorous development of the financial industry today, when it comes to finance, risk control is inseparable. Risk control can be said to be the lifeline of financial institutions, especially for Internet finance that pursues inclusiveness and efficiency. In the era of Internet finance, efficiency has indeed been improved, but fraud risk control has become another challenge that financial institutions have to face. It is necessary to examine the credit risk of loan applicants and to prevent fraudulent behavior. Among them, the risk control blacklist (data of untrustworthy users) has become an important part of risk control for many financial institutions. [0003] The use of the blacklist allows financial instit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
Inventor 肖宇涵王黎
Owner 浙江极赢信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products