Risk control rule generation method, device and equipment, and computer readable storage medium
A technology of rules and risk control, applied in the field of big data, can solve problems such as the inability to meet the fine configuration of risk control rules for loan customers
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0063] see figure 1 , shows a flow chart of the steps of the method for generating risk control rules according to the embodiment of the present invention. It can be understood that the flowchart in this method embodiment is not used to limit the sequence of execution steps. The following is an exemplary description taking computer equipment as the execution subject, as follows:
[0064] Such as figure 1 As shown, the method for generating risk control rules may include steps S100-S700, wherein:
[0065] Step S100, according to the loan business request, obtain loan product data, source channel and multiple user data, and the source channel is the channel through which the user accesses the consumer finance system.
[0066] Exemplarily, the method for generating risk control rules is applied in a consumer finance system.
[0067] In an exemplary embodiment, the loan product data in the consumer finance system includes product type data and product content data of the loan ...
Embodiment 2
[0103] read on Figure 7 , shows a schematic diagram of program modules of the risk control rule generation device of the present invention. In this embodiment, the risk control rule generator 20 may include or be divided into one or more program modules, and one or more program modules are stored in a storage medium and executed by one or more processors to The present invention is completed, and the above method for generating risk control rules can be realized. The program module referred to in the embodiment of the present invention refers to a series of computer program instruction segments capable of accomplishing specific functions, which is more suitable for describing the execution process of the risk control rule generation device 20 in the storage medium than the program itself. The following description will specifically introduce the functions of each program module of the present embodiment:
[0104] The data acquisition module 800 is used to acquire loan produ...
Embodiment 3
[0118] refer to Figure 8 , is a schematic diagram of the hardware architecture of the computer device according to Embodiment 3 of the present invention. In this embodiment, the computer device 2 is a device capable of automatically performing numerical calculation and / or information processing according to preset or stored instructions. The computer device 2 may be a rack server, a blade server, a tower server or a cabinet server (including an independent server, or a server cluster composed of multiple servers) and the like. Such as Figure 8 As shown, the computer device 2 at least includes, but is not limited to, a memory 21 , a processor 22 , a network interface 23 , and a risk control rule generation device 20 that can communicate with each other through a system bus. in:
[0119] In this embodiment, the memory 21 includes at least one type of computer-readable storage medium, and the readable storage medium includes flash memory, hard disk, multimedia card, card-typ...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com