Data security processing method and device based on financial service and medium

A technology of data security and processing methods, applied in the field of big data, can solve problems such as low collection efficiency, difficulty in ensuring user information security, and reduced user experience, so as to achieve the effects of protecting data security, improving collection efficiency, and improving security

Active Publication Date: 2022-04-15
HANGYIN CONSUMER FINANCE CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the current common collection methods are manual methods, which need to push the user’s business transaction information to a third-party organization for collection. However, manual decision-making is difficult to give the best collection plan for different users, and the collection efficiency is low. The third-party organization exposes user-related information, making it difficult to guarantee user information security, and does not meet the security and real-time requirements of the financial industry, which reduces user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security processing method and device based on financial service and medium
  • Data security processing method and device based on financial service and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0068] The technical solutions provided by various embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0069] Such as figure 1 As shown, a financial business-based data security processing method provided in the embodiment of the present application includes:

[0070] S101: Accord...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data security processing method and device based on financial services, and a medium, and is used for solving the technical problem that an existing collection method is difficult to meet the security and high efficiency required by a user. The method comprises the following steps: determining a credit level corresponding to a loan amount and a credit node domain corresponding to the credit level; determining a specified credit node generated based on the user, so as to obtain first service information corresponding to the user through the specified credit node; determining identity information corresponding to the user and an overdue record; performing virtualization processing on the identity information to replace at least part of information in the identity information with virtual data to obtain virtual identity information; service summary information corresponding to the associated service is obtained; according to the overdue record, the identity authentication factor corresponding to the user and the loan amount, obtaining a risk control level; and generating a collection scheme including the virtual identity information, the service summary information and the risk control level, and sending the collection scheme to a third party so as to execute a collection service.

Description

technical field [0001] This application relates to the field of big data, and specifically relates to a financial business-based data security processing method, equipment and media. Background technique [0002] With the development of the financial loan industry, the collection business derived from it has also developed rapidly. Most of the current common collection methods are manual methods, which need to push the user’s business transaction information to a third-party organization for collection. However, manual decision-making is difficult to give the best collection plan for different users, and the collection efficiency is low. The third-party organization exposed user-related information, which made it difficult to guarantee the user's information security, failed to meet the security and real-time requirements of the financial industry, and reduced the user experience. Contents of the invention [0003] In order to solve the above problems, this application pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06Q40/02
Inventor 朱振华
Owner HANGYIN CONSUMER FINANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products