Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hawkeye anti-fraud big data risk control evaluation system

An evaluation system and big data technology, applied in data processing applications, instruments, finance, etc., can solve problems such as limited evaluation data, inability to meet, and risk control technology difficult to meet risk evaluation, etc., to expand the scope of customer sources and data, avoid The effect of gang fraud and increasing the review rate

Pending Publication Date: 2019-01-18
上海良鑫网络科技有限公司
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. Traditional risk control relies on a small amount of strong characteristic data, such as: personal information, income, education, work, car production, real estate, personal credit records and other information for risk pricing analysis, and cannot comprehensively and reasonably conduct risk assessments for all users. high rate
[0007] 2. The traditional risk control data processing technology is backward, unable to meet the current Internet information age, large data volume cleaning processing, analysis modeling and risk assessment, etc.
[0008] 3. The rapid iteration of traditional risk control policies and the lack of early warning mechanisms make it impossible to quickly provide real-time early warnings and adjust risk control strategies based on market risk changes, so as to avoid risks and reduce losses in a timely manner
[0009] To sum up, the risk control technology of traditional financial institutions is difficult to meet the risk assessment of customers' financial needs in the current Internet era. Although banks and institutions are constantly trying to iterate and update risk control technology, due to the limitations of their own state-owned enterprises , it is difficult to complete the leading and implementation of new technologies
At present, traditional risk control technology cannot accurately evaluate most Internet customers, and the evaluation data that can be relied on is limited, loopholes occur frequently, and the rapid iteration of risk control and early warning mechanisms are seriously lacking.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hawkeye anti-fraud big data risk control evaluation system
  • Hawkeye anti-fraud big data risk control evaluation system
  • Hawkeye anti-fraud big data risk control evaluation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] The Hawkeye anti-fraud big data risk control evaluation system includes original data, knowledge graph, user portrait, risk control model and risk control products, characterized in that: the original data is a basic data warehouse; the knowledge graph is a data governance platform; The user portrait includes a feature platform; the risk control model includes a model platform, and the model platform includes policy rules, score cards, and data mining; the risk control product includes a risk control platform.

[0038] In this embodiment, aiming at the shortcomings of traditional financial institutions' risk control, the "Hawkeye Anti-fraud Big Data Risk Control Evaluation System" is launched to form a new risk control plan for comprehensive analysis and evaluation of big data. We use data collection and cleaning technology, big data storage technology and big data intelligent data mining technology to complete the online collection risk assessment and decision-making of...

Embodiment 2

[0040] The basic data warehouse is to store all the data of any user that can be captured, including the address book, call records, text messages, mobile phone app installation and usage, buried point information data, device information data, etc. , It also includes that we pay for customers to obtain credit information source data, including social security, provident fund, UnionPay data, Zhima Credit, JD.com, Tencent and other credit data.

[0041] In this embodiment, here we will store the full amount of all user data that can be captured. Under normal circumstances, it includes the mobile phone address book, call records, text messages, mobile app installation and usage, buried point information data, device information data, etc. that the user authorizes to capture, and also includes the credit information source data that we pay for the customer to call. Credit data such as social security, provident fund, UnionPay data, Sesame Credit, JD.com, Tencent, etc. After captu...

Embodiment 3

[0043] The data governance platform is conducting in-depth analysis, mining, and cleaning on various dimensions of users. User data is split into six dimensions: user basic attribute data, user behavior data, user historical lending data, user authentication data, and user social relations. For data and user repayment ability data, the data governance platform includes the cleaning and transformation of raw data, storage definition according to business division, etc.

[0044] In this embodiment, the data governance platform is like a high-quality data processing factory. The data on this platform mainly conducts in-depth analysis, mining, and cleaning of various dimensions of users. For example, we split user data into six dimensions. The basic attribute data, user behavior data, user historical lending data, user authentication data, user social relationship data, user repayment ability data, etc., under each large data dimension, we have hundreds of important core indicators...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an eagle-eye anti-fraud big data risk control evaluation system, comprising original data, knowledge map, user portrait, risk control model and risk control product. The invention is characterized in that: the original data is a basic data warehouse; The knowledge map is a data governance platform; The user portrait includes a feature platform; The wind control model comprises a model platform, wherein the model platform comprises policy rules, a score card and data mining; The wind control product comprises a wind control platform. The invention solves the problem thatthe traditional wind control relies on a small amount of strong characteristic data, and the risk assessment can not be comprehensively and reasonably carried out for all users, and the erroneous killing rate is very high. Traditional risk control data processing technology is backward, and can not realize large amount of data cleaning, analysis and modeling and risk assessment in the current Internet information age; Traditional risk control policy is lack of rapid iteration and early warning mechanism, which can not quickly adjust the risk control strategy according to the market risk changes, so as to avoid the risk on-line in time.

Description

technical field [0001] The invention relates to the technical field of risk control evaluation, in particular to an eagle eye anti-fraud big data risk control evaluation system. Background technique [0002] Internet finance is developing rapidly in recent years, but the domestic credit reporting system is not perfect. As of June 2016, the central bank’s credit reporting covered 880 million people, of which only 380 million had credit data, accounting for 29% of the total population. Based on the calculation of this data, nearly 1.2 billion people in China have no credit data. However, most domestic banks or financial institutions still use traditional technology for risk control. Traditional banks and financial institutions rely on a small amount of strong characteristic data such as: personal information, income, education, work, car production, real estate, personal credit records and other information for risk pricing analysis, but most people do not have the traditional...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q40/02
CPCG06Q40/03
Inventor 梁晓靖张福生
Owner 上海良鑫网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products