Risk credit granting method and system based on weak data technology
A risk and data technology, applied in the computer field, can solve problems such as lack of core competitiveness and unprotected technology, and achieve the effects of reducing data collection and interaction costs, avoiding non-compliance problems, and solving leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0076] Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding and should be considered as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted from the following description for clarity and conciseness.
[0077] see figure 1 , showing a schematic flowchart of a risk credit method based on weak data technology according to an embodiment of the present invention, including the following steps:
[0078] S101: Collect and analyze the user's information, obtain the user's weak data field, and determine the user's risk level; wherein, the weak data is the data that is easy for the u...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com