Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User credibility social network data processing method

A technology of social network and processing method, which is applied in the field of user credibility social network data processing, which can solve the problem of user repayment willingness and repayment ability evaluation and determination, user data authenticity cannot be controlled, and online evaluation of user authenticity Problems such as the ability to repay the loan and the willingness to repay the loan are difficult, and achieve a clear technical solution and effect

Inactive Publication Date: 2019-09-06
先花信息技术(北京)有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the fact that the authenticity of user data cannot be controlled when collecting data in the online mode, users' repayment willingness and repayment ability cannot be evaluated and determined through simple identity information and asset information uploaded by users
At the same time, there is no sound user credit file data in China, and the vast majority of borrowers cannot query historical credit status through the credit interface, which makes it extremely difficult to evaluate the authenticity, repayment ability and repayment willingness of users online

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User credibility social network data processing method
  • User credibility social network data processing method
  • User credibility social network data processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] User A registers on the social platform with a mobile phone number and initiates a loan after completing identity authentication. The user implements the platform's request to share the loan request to the social circle. A's friends A1, A2...A6 click the link, and record the click time and corresponding page refresh times of these 6 users. Then A1 and A2 among the 6 friends left the page, and the remaining 4 people, A3, A4, A5, and A6, were guided to the next step by the page, that is, they answered the relevant questions about the identity of user A. A3 answered incorrectly, and A4 , A5, and A6 answered correctly and invested in user A. User A has raised a full amount and the data collection is complete.

[0073] For user A, based on the link A1-A6 has no abnormal values ​​in terms of time, region, and device matching, the value of the liked relationship is 6; based on the correct answers to A4-A6 and part A3, the value of the authentication relationship is 3.3; based...

Embodiment 2

[0079] User B registers and enters the social platform through the mobile phone number and initiates a loan after completing identity authentication. The user implements the platform's requirements and shares the loan request to the social circle. B's friends B1, B2, and B3 click the link, and the click time and corresponding page refresh times of these three users are recorded. Then these three friends all enter the next step, that is, answer the relevant questions about the identity of the user, all answer correctly and invest in user B, user B has raised a full amount, and the data collection is completed. For user B, based on B1-B3 clicking on the link, there are no abnormal values ​​in terms of time, region, and device matching, and the value of its like relationship is 3; based on the correct answer of B1-B3, its authentication relationship value is 3; based on B1-B3 investment If it is successful and no outliers appear, its investment relationship value is 3. At the sa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A user credibility social network data processing method provided by the invention is provided with a social network platform comprising WeChat, and comprises the following steps: a user registering to generate a corresponding social relationship judgment request; obtaining social data network information of different levels and types while the user initiates a borrowing request; inputting, cleaning and combing data, and outputting user social data; performing user credit assessment in the user social circle to obtain user credit data; and carrying out a step of carrying out secondary credit rating and credibility evaluation, and judging the borrowing default rate and the credit risk of the user. The method has the advantages that through overdue rate estimation of the user, the model evaluation value for distinguishing the quality of the user can reach 40 or above, the evaluation value of a traditional model is only about 35, the recognition rate of user evaluation can reach 70% or above, and namely repayment results of 70% of the users can be accurately recognized through the model. Compared with credit granting in a traditional mode, the method has a remarkable effect in practical application.

Description

[0001] This application is a divisional application of a Chinese application with the application date of December 31, 2015 and the application number 201511032501.9 titled "Processing Method of User Credibility Social Network Data". technical field [0002] The present invention relates to the field of Internet applications, in particular to a method for processing user credibility social network data. Background technique [0003] At present, the product uses an online model to evaluate the quality of users, including but not limited to monitoring the authenticity, repayment ability and repayment willingness of users. Due to the fact that the authenticity of user data cannot be controlled when collecting data in an online mode, users' repayment willingness and repayment ability cannot be evaluated and determined through simple identity information and asset information uploaded by users. At the same time, there is no sound user credit file data in China, and the vast major...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/02G06Q50/00
CPCG06Q50/01G06Q40/03
Inventor 崔毅龙
Owner 先花信息技术(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products