A borrowing risk identification method and device

A risk identification and risk technology, applied in the computer field, can solve problems such as identifying risk situations and corporate economic losses

Inactive Publication Date: 2019-05-03
SHENZHEN MAIMAITI INFORMATION TECH CO LTD
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the consumer finance industry, illegal cash out is very serious. Once criminals succeed, they will directly bring economic losses to the company
[0003] In the field of lending, most users apply for loans for the first time, or apply for loans no more than 3 times. It is difficult for the system to identify risk situations by judging whether users log in from different places or are in areas where they often pay. How to use users It is a technical problem being researched by those skilled in the art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A borrowing risk identification method and device
  • A borrowing risk identification method and device
  • A borrowing risk identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.

[0046]The terms "first", "second", "third" and "fourth" in the specification, claims and drawings of the present application are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes unlisted steps or units, or optionally further includes For other steps or units inherent in these processes, methods, products or apparatuses.

[0047] It should be understood that the term "and / or" used in the description of the present application and the appended claims refers to any combination and all possible combinations of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a borrowing and lending risk identification method and device. The method comprises the following steps of: obtaining a sample; the device obtains a first place name; screening first historical lending data from the plurality of pieces of historical lending data, determining a first reference point according to the geographic position information in the first historical lending data after screening the first historical lending data, and determining the risk condition of the lending request initiated by the terminal by calculating the distance between the current geographic position information of the terminal and the first reference point. By adopting the embodiment of the invention, the risk condition of the borrowing and lending request initiatedby the terminal can be determined according to the current geographic position information of the terminal.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method and device for identifying lending risks. Background technique [0002] Security warnings based on geographical location information are widely used in the Internet industry and the financial industry. For example, QQ, if you log in to a different place that is not frequently logged in, it will trigger the identity verification of the second verification code. Using Alipay, payment operations in areas where payments are not frequent will trigger more stringent SMS verification. In the consumer finance industry, illegal cash out is very serious. Once criminals succeed, they will directly bring economic losses to the company. [0003] In the field of lending, most users apply for loans for the first time, or apply for loans no more than 3 times. It is difficult for the system to identify risk situations by judging whether users log in from different places or...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/02
Inventor 李莹
Owner SHENZHEN MAIMAITI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products