Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Risk credit granting method and system based on weak data technology

A risk and data technology, applied in the computer field, can solve problems such as lack of core competitiveness and unprotected technology, and achieve the effects of reducing data collection and interaction costs, avoiding non-compliance problems, and solving leakage

Pending Publication Date: 2022-08-09
JINGDONG TECH HLDG CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After downloading the code, the user can reversely understand the risk policy rules, so there is no protection for the technology, resulting in a lack of core competitiveness

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk credit granting method and system based on weak data technology
  • Risk credit granting method and system based on weak data technology
  • Risk credit granting method and system based on weak data technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding and should be considered as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted from the following description for clarity and conciseness.

[0077] see figure 1 , showing a schematic flowchart of a risk credit method based on weak data technology according to an embodiment of the present invention, including the following steps:

[0078] S101: Collect and analyze the user's information, obtain the user's weak data field, and determine the user's risk level; wherein, the weak data is the data that is easy for the u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a risk credit granting method and system based on a weak data technology, and relates to the technical field of computers. A specific embodiment of the method comprises the steps of collecting and analyzing information of a user to obtain a weak data field of the user, and determining a risk level of the user; performing random permutation and combination on all the user weak data fields to obtain a plurality of combined fields, and performing information value evaluation on the user in combination with the user risk level; and performing summation and averaging operation on the information values of the preset number of other users in the sample library, and if the evaluated information value is greater than or equal to the average value, performing risk credit granting operation on the user. The implementation mode can be directly deployed in the client server, the problem of leakage caused by external release and enabling of the risk strategy is solved, the data acquisition and interaction cost is reduced, and the problem of non-compliance of user personal information transmission is avoided.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and system for risk credit based on weak data technology. Background technique [0002] Risk control is the main technology in the current financial scenario, covering almost all business scenarios. However, there is a confusion that the risk control capability cannot be exported. The main reasons are: [0003] 1) It relies too much on the strong data provided by users, and some information is exchanged during risk technical cooperation, and there is a risk of personal information leakage; [0004] 2) At present, the risk strategy is mainly based on the existing strong data for risk rating of users. Some small and medium-sized enterprises may not be able to establish their own risk control system. At this time, the developed risk control strategy can be provided to customers in a similar way of outsourcing. After downloading the code, the user can reversely understand...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/2458G06Q40/02
CPCG06F16/2462G06Q40/03
Inventor 江小夏
Owner JINGDONG TECH HLDG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products