User credibility social network data processing method
A technology of social network and processing method, which is applied in the field of user credibility social network data processing, which can solve the problem of user repayment willingness and repayment ability evaluation and determination, user data authenticity cannot be controlled, and online evaluation of user authenticity Problems such as the ability to repay the loan and the willingness to repay the loan are difficult, and achieve a clear technical solution and effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0072] User A registers on the social platform with a mobile phone number and initiates a loan after completing identity authentication. The user implements the platform's request to share the loan request to the social circle. A's friends A1, A2...A6 click the link, and record the click time and corresponding page refresh times of these 6 users. Then A1 and A2 among the 6 friends left the page, and the remaining 4 people, A3, A4, A5, and A6, were guided to the next step by the page, that is, they answered the relevant questions about the identity of user A. A3 answered incorrectly, and A4 , A5, and A6 answered correctly and invested in user A. User A has raised a full amount and the data collection is complete.
[0073] For user A, based on the link A1-A6 has no abnormal values in terms of time, region, and device matching, the value of the liked relationship is 6; based on the correct answers to A4-A6 and part A3, the value of the authentication relationship is 3.3; based...
Embodiment 2
[0079] User B registers and enters the social platform through the mobile phone number and initiates a loan after completing identity authentication. The user implements the platform's requirements and shares the loan request to the social circle. B's friends B1, B2, and B3 click the link, and the click time and corresponding page refresh times of these three users are recorded. Then these three friends all enter the next step, that is, answer the relevant questions about the identity of the user, all answer correctly and invest in user B, user B has raised a full amount, and the data collection is completed. For user B, based on B1-B3 clicking on the link, there are no abnormal values in terms of time, region, and device matching, and the value of its like relationship is 3; based on the correct answer of B1-B3, its authentication relationship value is 3; based on B1-B3 investment If it is successful and no outliers appear, its investment relationship value is 3. At the sa...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com