CN112381513A - Information approval method and device, electronic equipment and storage medium - Google Patents
Information approval method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN112381513A CN112381513A CN202011275046.6A CN202011275046A CN112381513A CN 112381513 A CN112381513 A CN 112381513A CN 202011275046 A CN202011275046 A CN 202011275046A CN 112381513 A CN112381513 A CN 112381513A
- Authority
- CN
- China
- Prior art keywords
- information
- question
- application user
- user
- answer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 71
- 238000011156 evaluation Methods 0.000 claims abstract description 66
- 230000006854 communication Effects 0.000 claims abstract description 40
- 238000004891 communication Methods 0.000 claims abstract description 39
- 230000008451 emotion Effects 0.000 claims description 35
- 238000012545 processing Methods 0.000 claims description 17
- 238000012795 verification Methods 0.000 claims description 15
- 238000004590 computer program Methods 0.000 claims description 8
- 230000008909 emotion recognition Effects 0.000 claims description 6
- 238000012502 risk assessment Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 7
- 238000012550 audit Methods 0.000 description 5
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000012954 risk control Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012552 review Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 210000000887 face Anatomy 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 210000000554 iris Anatomy 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 210000003462 vein Anatomy 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Game Theory and Decision Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application relates to an information approval method, an information approval device, electronic equipment and a storage medium, wherein the method comprises the following steps: acquiring a risk evaluation value of the application user according to the basic information and the pending information of the application user; acquiring a first question corresponding to the to-be-approved information and a first preset answer corresponding to the first question according to the risk evaluation value; when the risk evaluation value is smaller than or equal to a first threshold value, establishing video communication with the application user, and sending the first question to the application user; acquiring first video data corresponding to the first question; analyzing the first video data to obtain a first answer corresponding to the first question; and when the first answer is successfully matched with the first preset answer, determining that the information to be examined and approved passes the examination and approval. By adopting the method and the device, the auditing efficiency and accuracy can be improved.
Description
Technical Field
The application relates to the technical field of computers, and mainly relates to an information approval method, an information approval device, electronic equipment and a storage medium.
Background
Risk control (wind control for short) means that a risk manager takes various measures and methods to eliminate or reduce various possibilities of occurrence of a risk event or reduce loss caused by occurrence of the risk event.
80% of the risk control needs to be done during the audit approval process. However, the information approval process is usually performed by an approver manually performing approval operations such as material verification and initial, re-and final loan review according to the image file of the system and the information entered by the client, comparing the risk policy. Such an approval mode is easily affected by factors such as industry familiarity, work experience and the like of an approver, and thus approval efficiency is low.
Disclosure of Invention
The embodiment of the application provides an information approval method and device, electronic equipment and a storage medium, which can automatically approve and improve approval efficiency and approval accuracy.
In a first aspect, an embodiment of the present application provides an information approval method, where:
acquiring a risk evaluation value of the application user according to the basic information and the pending information of the application user;
acquiring a first question corresponding to the to-be-approved information and a first preset answer corresponding to the first question according to the risk evaluation value;
when the risk evaluation value is smaller than or equal to a first threshold value, establishing video communication with the application user, and sending the first question to the application user;
acquiring first video data corresponding to the first question;
analyzing the first video data to obtain a first answer corresponding to the first question;
and when the first answer is successfully matched with the first preset answer, determining that the information to be examined and approved passes the examination and approval.
In a second aspect, an embodiment of the present application provides an information approval apparatus, where:
the processing unit is used for acquiring a risk evaluation value of the application user according to the basic information and the pending information of the application user; acquiring a first question corresponding to the to-be-approved information and a first preset answer corresponding to the first question according to the risk evaluation value;
a communication unit, configured to establish video communication with the application user and send the first question to the application user when the risk evaluation value is less than or equal to a first threshold; acquiring first video data corresponding to the first question;
the processing unit is further configured to analyze the first video data to obtain a first answer corresponding to the first question; and when the first answer is successfully matched with the first preset answer, determining that the information to be examined and approved passes the examination and approval.
In a third aspect, an embodiment of the present application provides another electronic device, including a processor, a memory, a communication interface, and one or at least one program, where the one or at least one program is stored in the memory and configured to be executed by the processor, and the program includes instructions for some or all of the steps described in the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, where the computer program makes a computer execute to implement part or all of the steps described in the first aspect.
The embodiment of the application has the following beneficial effects:
after the information approval method, the information approval device, the electronic equipment and the storage medium are adopted, the risk evaluation value of the application user is obtained according to the basic information of the application user and the to-be-approved information, and then the first question corresponding to the to-be-approved information and the first preset answer corresponding to the first question are obtained according to the risk evaluation value. And when the risk evaluation value is smaller than or equal to the first threshold value, the overdue risk of the pending information is smaller, video communication can be established with the application user, and the first question is sent to the application user. And then acquiring first video data corresponding to the first question, and analyzing the first video data to obtain a first answer corresponding to the first question. And when the first answer is determined to meet the first preset answer, determining that the information to be examined and approved passes the examination and approval. Therefore, the examination and approval can be carried out through the preset examination and approval program without carrying out examination and approval through a manual examination and approval person, and the examination and approval efficiency can be improved. And the first question asked during the approval process is acquired from the to-be-approved information according to the risk evaluation value, so that the approval accuracy can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Wherein:
fig. 1 is a schematic flowchart of an information approval method according to an embodiment of the present application;
FIG. 2 is a schematic illustration of a knowledge-graph provided by an embodiment of the present application;
fig. 3 is a scene schematic diagram of an information approval method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an information approval apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art without any inventive work according to the embodiments of the present application are within the scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The network architecture related to the embodiment of the application comprises a server and electronic equipment corresponding to the server. The electronic device may be a Personal Computer (PC), a notebook computer, a smart phone, an all-in-one machine, a palm computer, a tablet computer (pad), a smart television playing terminal, a vehicle-mounted terminal, or a portable device, and is not limited herein. The operating system of the PC-side electronic device, such as a kiosk or the like, may include, but is not limited to, operating systems such as Linux system, Unix system, Windows series system (e.g., Windows xp, Windows 7, etc.), Mac OS X system (operating system of apple computer), and the like. The operating system of the electronic device at the mobile end, such as a smart phone, may include, but is not limited to, an operating system such as an android system, an IOS (operating system of an apple mobile phone), a Window system, and the like.
The server in the embodiment of the present application is similar to a general computer architecture, and includes a processor, a hard disk, a memory, a system bus, and the like, and is used for providing an application service for an electronic device. The application provided by the server may be a single integrated application program in the electronic device, or an embedded applet in other applications, or a system on a web page, etc., and is not limited herein. The number of the electronic devices and the number of the servers are not limited in the embodiment of the application, and the servers can provide services for the electronic devices at the same time. The server may be implemented as a stand-alone server or as a server cluster of multiple servers.
The servers may include front-end servers and back-end servers (not shown). The front-end server is used for generating a request instruction based on a display page of the electronic equipment and generating a page display instruction of the electronic equipment based on a processing result of the background server, so that the electronic equipment displays a page based on the page display instruction. For example, when the user submits the information to be approved on the electronic device, the front-end server generates an approval request. The background server is used for data interaction, and the background server is specifically used for examining and approving the information to be examined submitted by the electronic equipment or sending the information to be examined and approved to a manual examining and approving person.
The server in the embodiment of the application performs examination and approval or self-approval, and it can be understood that in the examination and approval process, the intelligent examiner communicates with the application user corresponding to the electronic device as the virtual image corresponding to the server. And the manual approver performs manual approval after receiving the information to be approved sent by the server. The manual approver may be used to check the approval result, or to approve the pending approval information with a high case level, and the like, which is not limited herein. The case level is large, namely the risk evaluation value is large, the approval amount is large, or the application user is special, such as the disability.
The embodiment of the application occurs when the electronic device corresponding to the application user performs video communication with the server, and it can be understood that the application user receives the problem sent by the server in a video communication mode and sends the answer to the problem to the server in a video communication mode in the approval process. And the video communication process can be stored as data in the approval process so as to be checked or reviewed by business personnel, and can also be provided to legal institutions and the like as evidence.
According to the method and the device, examination and approval information submitted by each user before and/or payment information of the user can be stored in advance. The approval information includes basic information of the user, such as name, past name, age, identification number, telephone number, address, academic calendar, associated user, and basic information of the associated user, which is not limited herein. The associated user may be a contact of the user, and may further include a family, a friend, a colleague, and the like of the user, which is not limited herein. The basic information of the associated user can refer to the description of the basic information of the user, and is not described in detail herein.
The repayment information is used for describing the repayment progress of the user after approval is passed, and the repayment information can include a repayment amount, whether delayed repayment exists, how long the repayment is completed, the remaining repayment amount and the like, and is not limited herein.
It can be understood that when the user submits new approval information, the economic condition of the user can be obtained according to the previously stored approval information of the user and/or the repayment information of the user, so that approval decision can be made conveniently, and the accuracy of risk control is improved.
The method and the device can also store the approval information and/or the unexamined and pending approval information which are approved by the user before and the video data in the process of approval in a block created on the block chain network. The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer. Therefore, data are stored in a distributed mode through the block chain, data security is guaranteed, and meanwhile data sharing of information among different platforms can be achieved.
The embodiment of the application provides an information approval method, which can be executed by an information approval device, wherein the device can be realized by software and/or hardware, can be generally integrated in a server, and can also be integrated in an approval application program of electronic equipment, so that the information approval method can be automatically approved, and the approval efficiency and the approval accuracy are improved.
Referring to fig. 1, fig. 1 is a schematic flow chart of an information approval method provided in the present application. The method is applied to a server for example, and comprises the following steps S101 to S106, wherein:
s101: and acquiring the risk evaluation value of the application user according to the basic information and the pending information of the application user.
In the embodiment of the application, the application user refers to a user submitting the information to be examined and approved. The basic information of the application user includes the name, past name, age, identification number, telephone number, address, academic calendar, associated user, basic information of the associated user, etc. of the application user, which is not limited herein.
The associated user may be a contact of the application user, and may further include a family, a friend, a colleague, and the like of the application user, which is not limited herein. The basic information of the associated user can refer to the description of the basic information of the application user, and is not described herein again. It should be noted that the basic information of the application user may include part of the basic information of the associated user, for example, the basic information of the application user may include necessary identification information such as a name and an identification number of the associated user, and the remaining basic information of the associated user may be searched according to the identification information. For example, if the associated user is a spouse of the application user, it may be determined whether the approval information of the spouse is stored in the server according to the name and the identification number of the spouse of the application user. If so, other basic information is acquired according to the approval information.
The pending approval information may include basic information of the application user, a loan amount, a repayment method, transaction flow information, credit investigation information, property information, and the like, as information related to the loan request submitted by the application user, which is not limited herein.
The risk evaluation value is used for describing the repayment risk of the application user after the approval of the information to be examined is passed, and can be understood as whether the application user can complete repayment within a preset time. It will be appreciated that the greater the loan amount, the greater the risk assessment value may be. The weaker the economic ability of the application user, the larger the risk evaluation value may be. The lower the credit of the application user, the larger the risk assessment value may be
The method for acquiring the risk evaluation value of the information to be examined and approved is not limited in the present application, and in one possible example, the step S101 includes the following steps a1 to A3, where:
a1: and obtaining the loan amount in the pending approval information.
The loan amount is an application loan amount in the pending approval information, and may be a specific number, or may be an amount range, or may be loan amounts corresponding to different repayment times, for example, the loan amount in 1 year is 5 ten thousand, the loan amount in 2 years is 8 ten thousand, and the loan amount in 3 years is 20 ten thousand. The loan amount is not limited in form, and may be a real currency such as a renminbi, a dollar, or a virtual currency such as a bitcoin.
A2: and obtaining the repayment efficiency of the application user according to the basic information of the application user.
The repayment efficiency is used for describing the repayment capability of the applying user, and can be understood as the repayment amount in unit time, for example, the repayment amount in each month. The method for acquiring the repayment efficiency is not limited, and the income information and the expenditure information of the application user can be acquired through the transaction flow information in the basic information of the application user, so that the repayment efficiency is acquired according to the income information and the expenditure information.
Further, in one possible example, step a2 includes the following steps B1-B7, wherein:
b1: and determining the associated user associated with the application user.
When the pending information of the application user contains the basic information of the associated user of the application user, the associated user can be determined according to the basic information in the pending information. Otherwise, the associated information can be searched according to the basic information of the application user, for example, family members of the application user can be searched, and a spouse, a parent, a brother and sister or a child of the application user can be determined; searching the study calendar of the application user, and determining the classmates of the application user; searching a working unit of the application user, and determining colleagues of the application user; and searching the address list or the communication application of the application user, and determining friends and the like of the application user. The method for determining the associated user is not limited in the application, and the search can be performed through at least one allowed access right. The number of the associated users is not limited in the application, and may be one or more.
B2: and acquiring the basic information of the associated user.
The basic information of the associated user may refer to the description in step S101, and is not described herein again.
B3: and acquiring the association value between the application user and the associated user.
The association value is used to describe an association relationship between the application user and the association user, and may be determined by the association relationship, for example, when the association user is a spouse of the application user, the association value may be 0.8; when the associated user is the father of the application user, the association value may be 0.6; when the association value is a brother and sister of the application user, the association value can be 0.5; when the associated user is a friend of the application user, the association value may be 0.3; when the associated user is a colleague of the application user, the associated value may be 0.2, and the like. The association relationship may be obtained through information recorded in pending information, or basic information of the application user, or basic information of the associated user, and the like, which is not limited herein.
In another implementation, the associated value may be determined by communication information between the requesting user and the associated user. The communication information can be obtained by searching through the communication application or the access right of the electronic equipment. It is understood that the more the communication frequency is, the more the number of communications is, and the longer the call duration is, the larger the correlation value is.
In another implementation, the association value between the application user and the associated user is determined based on the knowledge-graph. The knowledge graph describes concepts and mutual relations in the physical world in a symbolic form according to a semantic structural information organization mode, basic composition units of the knowledge graph are entity-relation-entity triple, entities and related attribute-value pairs thereof, and the entities are mutually connected through relations to form a network knowledge structure. Through the knowledge graph, business data can realize the conversion from information to knowledge, and is particularly suitable for organizing large-scale and strongly related business concept entities. The users and the associated users are connected through connecting lines, and numbers are marked on the connecting lines. The larger the number, the larger the association value between the user and the associated user. It should be noted that the connection line between the user and the associated user may be one or more, and is not limited herein. The more connecting lines, the smaller the association value between the representative user and the associated user.
Taking the schematic diagram of the knowledge graph shown in fig. 2 as an example, when the user identifier of the application user is a, the target vertices associated with the vertices corresponding to the application user may be b, d, q, and c (i.e., the associated users may be b, d, q, and c). Wherein, both the B and the D are connected with the A through 2 edges, and both the Hei and the C are connected with the A through 3 edges. If the weight of one connecting line is 1, the weight of two connecting lines is 0.8, and the weight of three connecting points is 0.6, the correlation value between a and b may be (0.4 × 1) × (0.4 × 0.8) ═ 0.128, the correlation value between a and b may be (0.3 × 1) (0.7 × 0.8) ((1 × 0.6) ═ 0.1008, the correlation value between a and c may be (0.2 × 1) ((0.3 × 0.8) ((1 × 0.6) ((0.0288) ((0.2 × 1) ((1 × 0.8) ("0.16").
It can be understood that if the knowledge graph is generated according to the pre-stored approval information and repayment information of the user, the association value between the application user and the associated user can be determined directly according to the number corresponding to the connecting line between the application user and the associated user in the knowledge graph.
B4: and acquiring a first fund state of the associated user according to the basic information of the associated user.
B5: and acquiring a second fund state of the application user according to the basic information of the application user.
Where the status of the funds may be assessed by income information, expense information, transaction flow information, property information, loan information, and the like. It should be noted that, in the present application, the order of step B4 and step B5 is not limited, and it is understood that step B4 and step B5 may be executed simultaneously or sequentially, and in this example, step B4 precedes step B5.
B6: and obtaining the repayment assistance efficiency of the associated user according to the first fund state and the associated value.
The repayment assisting efficiency is used for describing the repayment capacity that the associated user can provide help for the application user, and can be understood as the repayment amount providing the help in unit time. It should be noted that the payment assisting efficiency may also be negatively affected, and it can be understood that the associated user needs to apply for the magnitude of the user providing the financial assistance.
B7: and obtaining the repayment efficiency according to the repayment assistance efficiency and the second fund state.
It can be understood that the associated user can provide certain repayment assistance for the applying user. Therefore, in steps B1 to B7, the associated user associated with the application user is determined first, and the association value between the application user and the associated user is obtained. And then, obtaining the fund state of the associated user according to the basic information of the associated user, thereby determining the repayment assistance efficiency which can be provided by the associated user for the application user. And then, the fund state of the applying user is obtained according to the basic information of the applying user, so that the repayment efficiency of the applying user is obtained according to the fund state of the applying user and the repayment assisting efficiency of the associated user, and the accuracy of obtaining the repayment efficiency can be improved.
A3: and acquiring the risk evaluation value of the application user according to the loan amount and the repayment efficiency.
The method for acquiring the risk evaluation value of the application user according to the loan amount and the repayment efficiency is not limited, the repayment time of the loan amount can be calculated according to the repayment efficiency, and the risk evaluation value can be acquired according to the difference between the repayment time and the preset repayment time. It can be understood that before the payment time reaches the preset payment time, the user is indicated to be able to pay smoothly. Otherwise, the user is overdue and paid, that is, the risk evaluation value is large.
It can be understood that in steps a 1-A3, the repayment efficiency of the application user can be obtained through the basic information of the application user, so that the risk evaluation value of the application user can be obtained according to the loan amount in the pending information and the repayment capacity of the application user, and the accuracy of the risk evaluation can be improved.
S102: and acquiring a first question corresponding to the to-be-approved information and a first preset answer corresponding to the first question according to the risk evaluation value.
In the embodiment of the present application, the first question is a question selected from the pending information according to the risk evaluation value. The first preset answer may be a reference answer corresponding to the first question, or may be a reference standard corresponding to the reference answer, and the like, which is not limited herein. When the first answer corresponding to the first question answered by the application user is successfully matched with the first preset answer, the first answer is the same as a reference answer in the first preset answer, or meets the standard of the reference answer, or the score corresponding to the first answer reaches a preset threshold.
The number of the first problems is not limited in the present application, and may be one or more. All questions can be sent to the application user at one time; or the next question can be determined again according to the answer of the previous question; it is also possible to determine all the questions at once, and then select the next question according to the answer of the previous question, etc., without limitation.
The method for acquiring the first question and the first answer is not limited, the approval information can be analyzed to obtain a plurality of questions and the answer of each question, the question evaluation value of each question is acquired, the first question is selected according to the risk evaluation value and the question evaluation value, and the answer of the first question is acquired according to the answer of the question acquired before. Wherein,
in one possible example, step S102 includes the following step C1 and step C2, wherein:
c1: and acquiring a problem strategy according to the risk grade corresponding to the risk evaluation value.
The problem strategy is used for describing information such as problem types or problem directions, problem difficulty and easiness and the like. It can be understood that the larger the risk evaluation value is, the more the first questions in the question strategy are, or the more specific the content is, the greater the difficulty of replying.
The question strategy may also be used to determine whether to send all questions to the requesting user at one time, to determine the next question again according to the answer to the previous question, to determine all questions at one time, and to select the next question according to the answer to the previous question, and the like, which is not limited herein.
C2: and analyzing the information to be examined and approved according to the question strategy to obtain a first question and a first preset answer corresponding to the first question.
It can be understood that, in the step C1 and the step C2, the problem policy is obtained according to the risk level corresponding to the risk evaluation value, and then the to-be-approved information is analyzed according to the problem policy to obtain the first problem and the first preset answer corresponding to the first problem, so that the accuracy of obtaining the first problem and the first preset answer is improved, and the auditing efficiency is improved.
S103: and when the risk evaluation value is smaller than or equal to a first threshold value, establishing video communication with the application user, and sending the first question to the application user.
The first threshold is not limited in the present application, and may be set according to the loan amount, and the larger the loan amount, the larger the first threshold. For example, when the loan amount is 5 ten thousand, the first threshold value is 0.8; when the loan amount is 20 ten thousand, the first threshold value is 0.5; when the loan amount is 50 ten thousand, the first threshold value is 0.3, and the like.
In the embodiment of the application, the establishment of the video communication with the application user can be understood as the establishment of the video communication with the electronic device corresponding to the application user. The sending of the first question to the application user may be understood as sending the first question to the electronic device corresponding to the application user. The electronic device corresponding to the application user may be an electronic device for submitting the information to be examined and approved by the application user, or an electronic device for identity registration of any application user, and the device may also refer to an examination and approval device and the like pre-specified by the server, which is not limited herein.
In this embodiment of the application, the first question may be sent to the application user in a text and/or sound manner, that is, the first question is displayed in the electronic device corresponding to the application user, or the first question is played.
In one possible example, after establishing video communication with the requesting user, the method further comprises the following steps D1-D3, wherein:
d1: and acquiring the target verification information of the application user.
The target verification information can be a preset password of the application user, and the password can be a character string consisting of numbers, English and symbols. For example, in an application scenario of a bank, the password may be an online login password, an online banking password, or a bank card login password. The target verification information may also be physiological data, such as fingerprints, irises, faces, voice prints, veins, brain waves, etc. The target verification information may also be basic information in the pending information, such as, for example, the age, identification number, telephone number, address, contact, and basic information of the contact of the application user, which is not limited herein. It should be noted that after the video communication is established, the video data of the user can be acquired, so that the information (for example, facial image, voice data, etc.) corresponding to the video data can be acquired for authentication, and the acquisition efficiency is improved.
D2: and performing identity authentication on the application user according to the target authentication information.
The identity authentication method of the target authentication information is not limited, and authentication can be performed according to the type of the target authentication information. For example, when the target verification information is a password or basic information, verifying whether the password or the basic information is consistent with preset information, and if so, determining that the identity verification is successful; when the target verification information is physiological data, the physiological characteristics corresponding to the physiological data can be extracted, so that whether the physiological characteristics are consistent with the preset physiological characteristics or not is verified, and if so, the identity verification is determined to be successful.
D3: and after the authentication of the application user is successful, executing the step of sending the first question to the application user.
It can be understood that, in steps D1 to D3, after the server establishes video communication with the electronic device corresponding to the application user, the target authentication information of the application user is obtained first, then the application user is authenticated according to the target authentication information, and after the authentication is successful, the first problem is sent to the application user, so that the authentication is performed before the approval with the user, thereby avoiding others from performing approval instead, and improving the security of the approval.
S104: first video data corresponding to the first question is acquired.
In the embodiment of the present application, the first video data is real-time video data corresponding to the first question collected after the first question is sent to the application user. The start time of the first video data may be a transmission time of the first question, and the end time of the first video data may be a time at which an answer of the first question by the requesting user is determined.
The method for determining that the application user completes the answer of the first question is not limited in the present application, and the sound data in the video data may be analyzed to determine, for example, the sound data is analyzed to obtain characters like "answer is completed" or "answer is completed", or the sound data is analyzed to determine that the duration of the application user pausing speaking exceeds 5 seconds, or the answer time of the first question is determined, and when the answer time exceeds the answer time, the application user is determined to complete the answer of the first question.
In another possible example, the determination is made by the applicant user selecting an "answer done" or "determine" or like component in the page presented for review that determines that the applicant user is done with an answer and does not modify the answer.
S105: and analyzing the first video data to obtain a first answer corresponding to the first question.
The method for analyzing the first video data is not limited, and the first answer may be obtained by performing sound processing on sound data in the first video data, or may be obtained by performing emotion recognition on image data in the first video data. When a plurality of first questions are included, the first answers corresponding to the first questions may be obtained one by one, or all the first answers may be obtained statistically, which is not limited herein. Optionally, when the question policy is to select a question to be asked next according to the answer of the current question, the current first question may be sent to the application user one by one. After receiving the first answer to the first question, the next first question is obtained.
In one possible example, step S105 comprises the following steps E1 to E3, wherein:
e1: and performing voice recognition on the first video data to obtain a first text.
Where speech recognition refers to converting audio data to text, in this example, speech processing converts audio data in the first video data to the first text.
E2: and acquiring a text segment corresponding to the first question in the first text.
The text segment refers to a word, a sentence or a paragraph in the first text corresponding to the first question. The method for acquiring the text segments is not limited, segmentation can be performed according to the staying time in the audio, and the first text can be split into a plurality of sentences according to the relation between words and sentences.
E3: and sorting the text segments to obtain a first answer corresponding to the first question.
The method for arranging the text segments is not limited, the meaning of the sentence corresponding to each text segment can be obtained, or the wrongly recognized words can be modified according to the meaning of the whole sentence, or the positions of the words in the text segments can be adjusted according to the division of the host predicate understood by a computer, and the like. By arranging the text segments, the efficiency of identifying the first answer by the server can be improved, and whether the first answer is matched with the first preset answer or not can be conveniently judged.
It can be understood that, in steps E1 to E3, the first video data is first subjected to voice recognition to obtain a first text, then a text segment corresponding to the first question in the first text is obtained, and then the text segment is sorted to obtain a first answer corresponding to the first question, so that the accuracy of obtaining the first answer can be improved, and the server can conveniently determine whether the first answer matches with the first preset answer.
It should be noted that step S104 and step S105 may be executed synchronously, that is, the first video data is parsed in real time to obtain the first answer. As shown in the scenario diagram of the information approval method shown in fig. 3, the current page displays a first question sent by the intelligent approver, a first answer obtained according to the first video data of the application user, and a "confirm" component and a "answer again" component for the first answer. Wherein the "confirm" component is to determine that the first answer has been completed and confirm the answer. The "answer again" component is used to give another first answer.
S106: and when the first answer is successfully matched with the first preset answer, determining that the information to be examined and approved passes the examination and approval.
Whether the first answer is successfully matched with the first preset answer may refer to the description of step S102, which is not described herein again.
In the method shown in fig. 1, a risk evaluation value of an application user is obtained according to basic information and pending information of the application user, and then a first question corresponding to the pending information and a first preset answer corresponding to the first question are obtained according to the risk evaluation value. And when the risk evaluation value is smaller than or equal to the first threshold value, the overdue risk of the pending information is smaller, video communication can be established with the application user, and the first question is sent to the application user. And then acquiring first video data corresponding to the first question, and analyzing the first video data to obtain a first answer corresponding to the first question. And when the first answer is determined to meet the first preset answer, determining that the information to be examined and approved passes the examination and approval. Therefore, the examination and approval can be carried out through the preset examination and approval program without carrying out examination and approval through a manual examination and approval person, and the examination and approval efficiency can be improved. And the first question asked during the approval process is acquired from the to-be-approved information according to the risk evaluation value, so that the approval accuracy can be improved.
In one possible example, the method further comprises the following steps F1 to F3, wherein:
f1: and performing emotion recognition on the first video data to obtain a first emotion of the first text and a second emotion of the image corresponding to the first text.
The first emotion refers to an emotion obtained according to the voice information in the first video data, and when the first text is a text obtained by converting the audio data in the first video data, the first emotion may be an emotion of the first text. The second emotion is an emotion obtained from image information in the first video data, and can be understood as an emotion of an image corresponding to the first text.
F2: and determining the accuracy of the first text according to the first emotion and the second emotion.
Wherein, the accuracy rate is used for describing whether the first emotion and the second emotion are matched with the first text, and can be understood as whether the first emotion and the second emotion are accurate emotions. It is understood that the words can represent emotions, and the images can represent expressions of the application users. Therefore, the accuracy of the first text is determined according to the first emotion and the second emotion, and the accuracy of the approval is improved conveniently.
F3: and when the accuracy is greater than or equal to a second threshold value and the first answer is successfully matched with the first preset answer, determining that the information to be examined and approved passes the examination and approval.
The second threshold is not limited in the present application, and may be set by a risk evaluation value, and the larger the risk evaluation value is, the larger the second threshold is. For example, when the risk evaluation value is 0.8, the second threshold value is 0.8; when the risk evaluation value is 0.5, the second threshold value is 0.5; the second threshold value is 0.3 when the risk evaluation value is 0.3, and the like.
It is understood that in F1 to F3, emotion recognition is performed on the first video data to obtain a first emotion of the first text and a second emotion of the image corresponding to the first text. And determining the accuracy of the first text according to the first emotion and the second emotion. When the accuracy is greater than or equal to the second threshold and the first answer is successfully matched with the first preset answer, the approval of the information to be approved is determined to be passed, and the approval accuracy can be further improved.
In one possible example, after step S102, the method further comprises: and when the risk evaluation value is larger than a first threshold value, sending the first question and the first preset answer to a target approver.
The target approver may be an approver corresponding to the risk evaluation value, or may be a preset approver corresponding to the application user, or an approver corresponding to the approval type of the information to be approved, and the like, which is not limited herein.
It can be understood that the risk evaluation value is greater than the first threshold, which may indicate that the risk coefficient of the information to be audited is large, and the target approver performs manual audit, which may improve the accuracy of audit and facilitate reducing the risk. And the first question and the first preset answer are sent to the target approver, the problem to be checked is not required to be determined by the target approver, the efficiency of the audit can be improved, and the accuracy of the audit can be further improved.
In one possible example, before sending the first question and the first preset answer to the target approver, the method further comprises: determining the loan type of the pending information; and determining the target approver according to the sponsor of the pending approval information and the loan type.
The loan type may be, but is not limited to, car loan, house loan, mini loan, or the like. The sponsor of the application user may be a waiter of pending information, or may be a waiter in charge of the application user and a waiter who has contacted the application user, etc., which is not limited herein.
It will be appreciated that different approvers are familiar with different loan types, and that the sponsor or approver associated with the sponsor is more familiar with the transaction than other approvers. Therefore, the target approver is determined according to the sponsor and the loan type, the selection accuracy of the target approver can be improved, and the auditing efficiency and the auditing accuracy can be improved conveniently.
In one possible example, after step S106, the method further comprises: and disconnecting the video communication with the application user.
It can be understood that the video communication is disconnected after the approval is passed, so that the video recording is finished, and the privacy disclosure can be avoided. And the video data which is not related to the approval process is input, the occupied resources are reduced, and the subsequent archiving is facilitated.
The method of the embodiments of the present application is set forth above in detail and the apparatus of the embodiments of the present application is provided below.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an information approval apparatus according to the present application, consistent with the embodiment shown in fig. 1, and as shown in fig. 4, the information approval apparatus 400 includes:
the processing unit 401 is configured to obtain a risk evaluation value of an application user according to basic information and pending information of the application user; acquiring a first question corresponding to the to-be-approved information and a first preset answer corresponding to the first question according to the risk evaluation value;
a communication unit 402, configured to establish video communication with the application user and send the first question to the application user when the risk evaluation value is less than or equal to a first threshold; acquiring first video data corresponding to the first question;
the processing unit 401 is further configured to analyze the first video data to obtain a first answer corresponding to the first question; and when the first answer is successfully matched with the first preset answer, determining that the information to be examined and approved passes the examination and approval.
In one possible example, the processing unit 401 is specifically configured to obtain a loan amount in the pending approval information; obtaining the repayment efficiency of the application user according to the basic information of the application user; and acquiring the risk evaluation value of the application user according to the loan amount and the repayment efficiency.
In a possible example, the processing unit 401 is specifically configured to determine an associated user associated with the application user; acquiring basic information of the associated user; acquiring a correlation value between the application user and the correlation user; acquiring a first fund state of the associated user according to the basic information of the associated user; acquiring a second fund state of the application user according to the basic information of the application user; obtaining repayment assistance efficiency of the associated user according to the first fund state and the associated value; and obtaining the repayment efficiency of the application user according to the repayment assistance efficiency and the second fund state.
In a possible example, the processing unit 401 is specifically configured to obtain a problem policy according to a risk level corresponding to the risk evaluation value; and analyzing the information to be examined and approved according to the question strategy to obtain a first question and a first preset answer corresponding to the first question.
In a possible example, the processing unit 401 is specifically configured to perform speech recognition on the first video data to obtain a first text; acquiring a text segment corresponding to the first question in the first text; and sorting the text segments to obtain a first answer corresponding to the first question.
In a possible example, the processing unit 401 is further configured to perform emotion recognition on the first video data, to obtain a first emotion of the first text and a second emotion of an image corresponding to the first text; (ii) a Determining the accuracy of the first text according to the first emotion and the second emotion; and when the accuracy is greater than or equal to a second threshold value and the first answer is successfully matched with the first preset answer, determining that the information to be examined and approved passes the examination and approval.
In a possible example, the communication unit 402 is further configured to obtain target authentication information of the application user; the processing unit 401 is further configured to perform identity authentication on the application user according to the target authentication information; and after the authentication of the application user is successful, executing the step of sending the first question to the application user.
For the detailed process executed by each unit in the information approval apparatus 400, reference may be made to the execution steps in the foregoing method embodiments, which are not described herein again.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. As shown in fig. 5, the electronic device 500 includes a processor 510, a memory 520, a communication interface 530, and one or more programs 540. The related functions implemented by the communication unit 402 shown in fig. 4 may be implemented by the communication interface 530, and the related functions implemented by the processing unit 401 shown in fig. 4 may be implemented by the processor 510.
The one or more programs 540 are stored in the memory 520 and configured to be executed by the processor 510, the programs 540 including instructions for:
acquiring a risk evaluation value of the application user according to the basic information and the pending information of the application user;
acquiring a first question corresponding to the to-be-approved information and a first preset answer corresponding to the first question according to the risk evaluation value;
when the risk evaluation value is smaller than or equal to a first threshold value, establishing video communication with the application user, and sending the first question to the application user;
acquiring first video data corresponding to the first question;
analyzing the first video data to obtain a first answer corresponding to the first question;
and when the first answer is successfully matched with the first preset answer, determining that the information to be examined and approved passes the examination and approval.
In one possible example, in terms of obtaining the risk evaluation value of the application user according to the basic information and the pending information of the application user, the program 540 is specifically configured to execute the following steps:
obtaining the loan amount in the information to be examined;
obtaining the repayment efficiency of the application user according to the basic information of the application user;
and acquiring the risk evaluation value of the application user according to the loan amount and the repayment efficiency.
In a possible example, in terms of the efficiency of obtaining the payment of the application user according to the basic information of the application user, the program 540 is specifically configured to execute the following steps:
determining an associated user associated with the application user;
acquiring basic information of the associated user;
acquiring a correlation value between the application user and the correlation user;
acquiring a first fund state of the associated user according to the basic information of the associated user;
acquiring a second fund state of the application user according to the basic information of the application user;
obtaining repayment assistance efficiency of the associated user according to the first fund state and the associated value;
and obtaining the repayment efficiency of the application user according to the repayment assistance efficiency and the second fund state.
In one possible example, in terms of obtaining a first question corresponding to the information to be reviewed and a first preset answer corresponding to the first question according to the risk evaluation value, the program 540 is specifically configured to execute the following steps:
acquiring a problem strategy according to the risk grade corresponding to the risk evaluation value;
and analyzing the information to be examined and approved according to the question strategy to obtain a first question and a first preset answer corresponding to the first question.
In one possible example, in terms of the parsing the first video data to obtain the first answer corresponding to the first question, the program 540 is specifically configured to execute the following steps:
performing voice recognition on the first video data to obtain a first text;
acquiring a text segment corresponding to the first question in the first text;
and sorting the text segments to obtain a first answer corresponding to the first question.
In one possible example, the program 540 is further for executing the instructions of:
performing emotion recognition on the first video data to obtain a first emotion of the first text and a second emotion of the image corresponding to the first text;
determining the accuracy of the first text according to the first emotion and the second emotion;
and when the accuracy is greater than or equal to a second threshold value and the first answer is successfully matched with the first preset answer, determining that the information to be examined and approved passes the examination and approval.
In one possible example, after establishing video communication with the requesting user, the program 640 is further for instructions to:
acquiring target verification information of the application user;
according to the target verification information, performing identity verification on the application user;
and after the authentication of the application user is successful, executing the step of sending the first question to the application user.
Embodiments of the present application also provide a computer storage medium, where the computer storage medium stores a computer program for causing a computer to execute to implement part or all of the steps of any one of the methods described in the method embodiments, and the computer includes an electronic device and a server.
Embodiments of the application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform to implement some or all of the steps of any of the methods recited in the method embodiments. The computer program product may be a software installation package, the computer comprising an electronic device and a server.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art will also appreciate that the embodiments described in this specification are presently preferred and that no particular act or mode of operation is required in the present application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, a division of a unit is merely a logical division, and an actual implementation may have another division, for example, at least one unit or component may be combined or integrated with another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may also be distributed on at least one network unit. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a hardware mode or a software program mode.
The integrated unit, if implemented in the form of a software program module and sold or used as a stand-alone product, may be stored in a computer readable memory. With such an understanding, the technical solution of the present application may be embodied in the form of a software product, which is stored in a memory and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned memory comprises: various media capable of storing program codes, such as a usb disk, a read-only memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and the like.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash disk, ROM, RAM, magnetic or optical disk, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.
Claims (10)
1. An information approval method, comprising:
acquiring a risk evaluation value of the application user according to the basic information and the pending information of the application user;
acquiring a first question corresponding to the to-be-approved information and a first preset answer corresponding to the first question according to the risk evaluation value;
when the risk evaluation value is smaller than or equal to a first threshold value, establishing video communication with the application user, and sending the first question to the application user;
acquiring first video data corresponding to the first question;
analyzing the first video data to obtain a first answer corresponding to the first question;
and when the first answer is successfully matched with the first preset answer, determining that the information to be examined and approved passes the examination and approval.
2. The method according to claim 1, wherein the obtaining the risk evaluation value of the application user according to the basic information and the pending information of the application user comprises:
obtaining the loan amount in the information to be examined;
obtaining the repayment efficiency of the application user according to the basic information of the application user;
and acquiring the risk evaluation value of the application user according to the loan amount and the repayment efficiency.
3. The method according to claim 2, wherein the obtaining of the payment efficiency of the applying user according to the basic information of the applying user comprises:
determining an associated user associated with the application user;
acquiring basic information of the associated user;
acquiring a correlation value between the application user and the correlation user;
acquiring a first fund state of the associated user according to the basic information of the associated user;
acquiring a second fund state of the application user according to the basic information of the application user;
obtaining repayment assistance efficiency of the associated user according to the first fund state and the associated value;
and obtaining the repayment efficiency of the application user according to the repayment assistance efficiency and the second fund state.
4. The method according to any one of claims 1 to 3, wherein the obtaining a first question corresponding to the information to be reviewed and a first preset answer corresponding to the first question according to the risk assessment value comprises:
acquiring a problem strategy according to the risk grade corresponding to the risk evaluation value;
and analyzing the information to be examined and approved according to the question strategy to obtain a first question and a first preset answer corresponding to the first question.
5. The method according to any one of claims 1-3, wherein the parsing the first video data to obtain a first answer corresponding to the first question comprises:
performing voice recognition on the first video data to obtain a first text;
acquiring a text segment corresponding to the first question in the first text;
and sorting the text segments to obtain a first answer corresponding to the first question.
6. The method of claim 5, further comprising:
performing emotion recognition on the first video data to obtain a first emotion of the first text and a second emotion of the image corresponding to the first text;
determining the accuracy of the first text according to the first emotion and the second emotion;
and when the accuracy is greater than or equal to a second threshold value and the first answer is successfully matched with the first preset answer, determining that the information to be examined and approved passes the examination and approval.
7. The method of any of claims 1-3, wherein after establishing video communication with the requesting user, the method further comprises:
acquiring target verification information of the application user;
according to the target verification information, performing identity verification on the application user;
and after the authentication of the application user is successful, executing the step of sending the first question to the application user.
8. An information approval apparatus, comprising:
the processing unit is used for acquiring a risk evaluation value of the application user according to the basic information and the pending information of the application user; acquiring a first question corresponding to the to-be-approved information and a first preset answer corresponding to the first question according to the risk evaluation value;
a communication unit, configured to establish video communication with the application user and send the first question to the application user when the risk evaluation value is less than or equal to a first threshold; acquiring first video data corresponding to the first question;
the processing unit is further configured to analyze the first video data to obtain a first answer corresponding to the first question; and when the first answer is successfully matched with the first preset answer, determining that the information to be examined and approved passes the examination and approval.
9. An electronic device comprising a processor, a memory, a communication interface, and one or at least one program, wherein the one or at least one program is stored in the memory and configured to be executed by the processor, the program comprising instructions for performing the steps in the method of any of claims 1-7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program, the computer program causing a computer to execute to implement the method of any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011275046.6A CN112381513A (en) | 2020-11-13 | 2020-11-13 | Information approval method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011275046.6A CN112381513A (en) | 2020-11-13 | 2020-11-13 | Information approval method and device, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112381513A true CN112381513A (en) | 2021-02-19 |
Family
ID=74584023
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011275046.6A Pending CN112381513A (en) | 2020-11-13 | 2020-11-13 | Information approval method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112381513A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112926936A (en) * | 2021-02-23 | 2021-06-08 | 中国工商银行股份有限公司 | Bank business auditing method and device |
CN114240059A (en) * | 2021-11-22 | 2022-03-25 | 中国建设银行股份有限公司 | Resource online application processing method and device, computer equipment and storage medium |
CN116228139A (en) * | 2023-01-10 | 2023-06-06 | 南京田雨企业咨询管理有限公司 | Automobile financial risk auditing method and device, electronic equipment and storage medium |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107767263A (en) * | 2017-08-10 | 2018-03-06 | 深圳前海达飞金融服务有限公司 | A kind of measures and procedures for the examination and approval of consumptive credit, device and server |
CN108022167A (en) * | 2017-11-22 | 2018-05-11 | 阿里巴巴集团控股有限公司 | The implementation method and device of risk test and appraisal |
CN108335198A (en) * | 2018-02-07 | 2018-07-27 | 平安科技(深圳)有限公司 | Customer risk assessment method, device, equipment and computer readable storage medium |
CN109255697A (en) * | 2018-08-15 | 2019-01-22 | 普信恒业科技发展(北京)有限公司 | A kind of automatic credit estimation method and system based on artificial intelligence |
CN109325742A (en) * | 2018-09-26 | 2019-02-12 | 平安普惠企业管理有限公司 | Business approval method, apparatus, computer equipment and storage medium |
CN109509087A (en) * | 2018-12-15 | 2019-03-22 | 深圳壹账通智能科技有限公司 | Intelligentized loan checking method, device, equipment and medium |
CN109670936A (en) * | 2018-09-26 | 2019-04-23 | 深圳壹账通智能科技有限公司 | Loan examination & approval processing method, platform, equipment and computer readable storage medium |
CN109697665A (en) * | 2018-12-15 | 2019-04-30 | 深圳壹账通智能科技有限公司 | Loan checking method, device, equipment and medium based on artificial intelligence |
CN111210323A (en) * | 2019-12-26 | 2020-05-29 | 大象慧云信息技术有限公司 | Enterprise tax risk monitoring method and system |
CN111429267A (en) * | 2020-03-26 | 2020-07-17 | 深圳壹账通智能科技有限公司 | Face examination risk control method and device, computer equipment and storage medium |
CN111523996A (en) * | 2020-04-21 | 2020-08-11 | 北京易点淘网络技术有限公司 | Approval method and system |
CN111861732A (en) * | 2020-07-31 | 2020-10-30 | 重庆富民银行股份有限公司 | Risk assessment system and method |
-
2020
- 2020-11-13 CN CN202011275046.6A patent/CN112381513A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107767263A (en) * | 2017-08-10 | 2018-03-06 | 深圳前海达飞金融服务有限公司 | A kind of measures and procedures for the examination and approval of consumptive credit, device and server |
CN108022167A (en) * | 2017-11-22 | 2018-05-11 | 阿里巴巴集团控股有限公司 | The implementation method and device of risk test and appraisal |
CN108335198A (en) * | 2018-02-07 | 2018-07-27 | 平安科技(深圳)有限公司 | Customer risk assessment method, device, equipment and computer readable storage medium |
CN109255697A (en) * | 2018-08-15 | 2019-01-22 | 普信恒业科技发展(北京)有限公司 | A kind of automatic credit estimation method and system based on artificial intelligence |
CN109325742A (en) * | 2018-09-26 | 2019-02-12 | 平安普惠企业管理有限公司 | Business approval method, apparatus, computer equipment and storage medium |
CN109670936A (en) * | 2018-09-26 | 2019-04-23 | 深圳壹账通智能科技有限公司 | Loan examination & approval processing method, platform, equipment and computer readable storage medium |
CN109509087A (en) * | 2018-12-15 | 2019-03-22 | 深圳壹账通智能科技有限公司 | Intelligentized loan checking method, device, equipment and medium |
CN109697665A (en) * | 2018-12-15 | 2019-04-30 | 深圳壹账通智能科技有限公司 | Loan checking method, device, equipment and medium based on artificial intelligence |
CN111210323A (en) * | 2019-12-26 | 2020-05-29 | 大象慧云信息技术有限公司 | Enterprise tax risk monitoring method and system |
CN111429267A (en) * | 2020-03-26 | 2020-07-17 | 深圳壹账通智能科技有限公司 | Face examination risk control method and device, computer equipment and storage medium |
CN111523996A (en) * | 2020-04-21 | 2020-08-11 | 北京易点淘网络技术有限公司 | Approval method and system |
CN111861732A (en) * | 2020-07-31 | 2020-10-30 | 重庆富民银行股份有限公司 | Risk assessment system and method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112926936A (en) * | 2021-02-23 | 2021-06-08 | 中国工商银行股份有限公司 | Bank business auditing method and device |
CN114240059A (en) * | 2021-11-22 | 2022-03-25 | 中国建设银行股份有限公司 | Resource online application processing method and device, computer equipment and storage medium |
CN116228139A (en) * | 2023-01-10 | 2023-06-06 | 南京田雨企业咨询管理有限公司 | Automobile financial risk auditing method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9754101B2 (en) | Password check by decomposing password | |
US7266839B2 (en) | System and method for providing discriminated content to network users | |
US8010674B2 (en) | Learning and community-based web aggregation techniques | |
US20150172294A1 (en) | Managing user access to query results | |
CN112381513A (en) | Information approval method and device, electronic equipment and storage medium | |
US20170103230A1 (en) | Methods and systems for secure document management | |
CN112651841A (en) | Online business handling method and device, server and computer readable storage medium | |
CN110135850A (en) | A kind of information processing method and relevant apparatus | |
CN113064983B (en) | Semantic detection method, semantic detection device, computer equipment and storage medium | |
WO2019074446A1 (en) | System and method for processing a loan application | |
US20190075097A1 (en) | Verification system | |
CN110276537A (en) | The guard method of credit information safety based on block chain workload mechanism | |
CN114553838A (en) | Method, system and server for implementing remote service handling | |
CN107517180A (en) | Login method and device | |
CN115034886A (en) | Default risk prediction method and device | |
CN115170257A (en) | Method, system and device for bid evaluation | |
CN107590374A (en) | Control method, intelligent terminal and the storage device of voice assistant authority | |
CN111275540A (en) | Consumption credit approval method and device and terminal equipment | |
CN109801633A (en) | Method for processing business, device, electronic equipment and storage medium | |
CN114581124A (en) | Propaganda page generation method based on natural language processing and related device | |
KR102143181B1 (en) | Identification method, apparatus and program for fraud detection | |
CN106850539A (en) | Verification information acquisition method and device | |
CN112581075A (en) | Insurance letter processing method and device for security company | |
KR102571711B1 (en) | System and Method for Registrating Personal information capable of identificacion | |
CN111583020B (en) | Shared platform-based operation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |