Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Risk control method and device, computer equipment and computer readable storage medium

A risk control and risk technology, applied in the fields of computer equipment and computer-readable storage media, risk control methods and devices, can solve the problems of lack of uniformity, lack of risk control capabilities, business authenticity verification and insufficient fraud detection capabilities, etc.

Pending Publication Date: 2021-07-06
CHINA CONSTRUCTION BANK
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, all kinds of online credit products are developing rapidly, but there is no unified risk bottom line in the customer access stage (pre-loan risk verification), business authenticity verification and fraud detection capabilities are insufficient, and the manual verification of account managers is usually required. Many, and the machine control ability is relatively weak, which is mainly reflected in the following two aspects: (1) lack of unified pre-loan risk bottom-line technical guarantee, and no unified online business risk scanning entrance to automatically complete bottom-line rule scanning and business authenticity There is no way to provide more effective pre-loan risk control capabilities for the development of online credit business
(2) There is a lack of technical means for online business risk control capabilities, and it is impossible to identify and deal with pre-loan risk points in real time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk control method and device, computer equipment and computer readable storage medium
  • Risk control method and device, computer equipment and computer readable storage medium
  • Risk control method and device, computer equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0029] figure 1 The implementation process of the risk control method provided by the embodiment of the present invention is shown. For the convenience of description, only the parts related to the embodiment of the present invention are shown. The details are as follows:

[0030] Such as figure 1 As shown, the risk control method, which includes:

[0031] Step 101, based on the interception rule base embedded in the business process, conduct pre-loan risk checks on credit users;

[0032] Step 102, forming a set of credit users to be reviewed for the credit users who ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a risk control method and device, computer equipment and a computer readable storage medium, and relates to the technical field of data analysis and mining. The method comprises the following steps: carrying out pre-loan risk check on a credit user based on an interception rule base of an embedded business process; forming a to-be-rechecked credit user set for the credit users triggering the interception rules in the interception rule base; and according to the received at least one level of rechecking instruction, performing pre-loan risk rechecking on the to-be-rechecked credit users in the to-be-rechecked credit user set, and determining a pre-loan risk checking result of the to-be-rechecked credit users. According to the invention, the interception rule base is embedded into the business process to carry out pre-loan risk check, and at least one level of recheck is carried out on the credit user triggering the interception rule to determine the pre-loan risk of the credit user, so that the pre-loan risk check of the credit user can be realized, and meanwhile, the pre-loan risk check is carried out based on the interception rule base. Intensive management of pre-loan risk check can be realized.

Description

technical field [0001] The present invention relates to the technical field of data analysis and mining, in particular to a risk control method and device, computer equipment, and a computer-readable storage medium. Background technique [0002] This section is intended to provide a background or context to embodiments of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] At present, all kinds of online credit products are developing rapidly, but there is no unified risk bottom line in the customer access stage (pre-loan risk verification), business authenticity verification and fraud detection capabilities are insufficient, and the manual verification of account managers is usually required. Many, and the machine control ability is relatively weak, which is mainly reflected in the following two aspects: (1) lack of unified pre-loan risk bottom-line technical guarantee, and no unified...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q40/02G06F16/2455G06F16/2458
CPCG06F16/24564G06F16/2462G06Q40/03
Inventor 刘莎杨晓旗俞泱蓝智灵上官质纯张悦文林伟张靖蔡宇笙
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products