CN113129153A - Risk assessment method and device - Google Patents

Risk assessment method and device Download PDF

Info

Publication number
CN113129153A
CN113129153A CN202110313965.6A CN202110313965A CN113129153A CN 113129153 A CN113129153 A CN 113129153A CN 202110313965 A CN202110313965 A CN 202110313965A CN 113129153 A CN113129153 A CN 113129153A
Authority
CN
China
Prior art keywords
user
security product
information
security
product
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110313965.6A
Other languages
Chinese (zh)
Inventor
肖任淞
邓原
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yinyan Science And Technology Service Group Co ltd
Original Assignee
Yinyan Science And Technology Service Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yinyan Science And Technology Service Group Co ltd filed Critical Yinyan Science And Technology Service Group Co ltd
Priority to CN202110313965.6A priority Critical patent/CN113129153A/en
Publication of CN113129153A publication Critical patent/CN113129153A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application is suitable for the technical field of security information service, and provides a risk assessment method applied to electronic equipment, which comprises the following steps: acquiring product information of a first security product, wherein the first security product is any one of one or more security products, and the product information comprises a trading deposit of the first security product; acquiring fund information of a user, wherein the fund information of the user comprises available fund of the user and position taking profit and loss of the user; and determining the risk level corresponding to the first security product when the user does not purchase the first security product by combining the trading deposit of the first security product, the available fund of the user and the position taking profit and loss of the user, and displaying the risk level on the electronic equipment. By the risk assessment method, the problems that a user cannot obtain the risk state grade of each security product and is not beneficial to the user to carry out risk control can be solved, and the investment benefit of the user is maximized.

Description

Risk assessment method and device
Technical Field
The application relates to the technical field of security information service, in particular to a risk assessment method and device.
Background
With the rapid development of society, the assets of people are gradually increased. In order to further realize the value preservation and increment of assets, the securities investment gradually becomes a financing means for people. How to avoid investment risk in the process of securities investment and further realize maximization of investment benefits becomes a problem to be solved urgently.
Conventional securities investment risk assessment determines a user's risk level relative to a security product by first obtaining user's funding information (e.g., user's available funds, user's total funds, position taken for profit and loss, etc.), and then combining the security product information (e.g., security product price, security product corresponding trade deposits) obtained after the user selects or purchases a particular security product.
However, in the above approach, the user can only know the risk level of a security product relative to the security product after selecting or having purchased the security product. When a user faces a plurality of security products, the user cannot acquire the risk level of the user relative to each product due to the fact that the user cannot select or purchase each product in sequence, and risk control is not facilitated for the user so that investment benefit maximization is achieved.
Disclosure of Invention
The embodiment of the application provides a risk assessment method and a risk assessment device, and the problems that a user cannot acquire the risk state grade of each security product and is not beneficial to the user to carry out risk management and control can be solved.
In a first aspect, an embodiment of the present application provides a risk assessment method, which is applied to an electronic device, and includes: acquiring product information of a first security product, wherein the first security product is any one of one or more security products, and the product information comprises a trading deposit of the first security product; acquiring fund information of a user, wherein the fund information of the user comprises available fund of the user and position taking profit and loss of the user; and determining the risk level corresponding to the first security product when the user does not purchase the first security product by combining the trading deposit of the first security product, the available fund of the user and the position taking profit and loss of the user, and displaying the risk level on the electronic equipment.
It should be understood that, in a possible implementation manner, product information of a plurality of security products may also be obtained simultaneously, the product information of each security product includes a corresponding trading security deposit of the security product, and then, in combination with the fund information of the user, the risk level of each security product of the plurality of security products is determined before the user purchases the security product, and is displayed on the electronic device.
According to the method, the risk grade corresponding to the security product is determined when the user does not purchase the security product by obtaining the product of any security product, the available fund of the user and the position profit and loss of the user, and the risk grade is displayed on the electronic equipment, so that the user can obtain the risk grade of each security product through the electronic equipment before purchasing the security product, and then risk assessment is carried out, so that the investment risk is avoided, and the investment benefit maximization is realized.
With reference to the first aspect, in a possible implementation manner of the first aspect, when the user does not purchase the first security product, the risk level corresponding to the first security product may be determined by calculating a risk degree of the first security product when the user does not purchase the first security product, and specifically includes: calculating the risk degree of the user relative to the first security product according to a preset formula by combining the trading deposit of the first security product, the available fund of the user and the position taking profit and loss of the user; and then determining a target interval where the risk degree is located from the plurality of preset intervals, and determining the risk grade corresponding to the target interval as the risk grade corresponding to the first security product.
With reference to the first aspect, in a possible implementation manner of the first aspect, the fund information of the user may further include total funds of the user, and then the foregoing method may further determine available funds of the user by acquiring transaction information of the user and combining the transaction information of the user and the total funds of the user (the total funds of the user minus funds consumed after the user purchases product securities products are the available funds of the user).
The user's transaction information includes the name of the first security product purchased by the user, the number of the first security products purchased by the user, and the price of the first security product when the user purchases the first security product.
With reference to the first aspect, in a possible implementation manner of the first aspect, when the risk level of the user satisfies a preset condition and the user purchases the first security product, the method further includes: and sending prompt information corresponding to the risk level of the user after purchasing the first security product to the user.
By the method, when the risk level of the user after purchasing the security product meets the preset condition, the user receives the prompt information after purchasing the security product. For example, if the risk level after the user purchases the security product is "additional deposit", the user will receive prompt information about the additional deposit and the amount of the deposit to be added, so that the user can perform subsequent operations in time.
With reference to the first aspect, in a possible implementation manner of the first aspect, in order to facilitate a user to view and compare risk levels of security products, the method may further include: acquiring trading information of a user, wherein the trading information comprises the name of a first security product purchased by the user, the number of the first security product purchased by the user and the price of the first security product when the user purchases the first security product; and displaying one or more of product information, user funding information, user transaction information, and reminder information on the electronic device.
In a second aspect, an embodiment of the present application provides an electronic device, including: memory, processor and computer program stored in the memory and executable on the processor, characterized in that the processor implements any of the methods according to the first aspect as described above when executing the computer program
In a third aspect, an embodiment of the present application provides a computer-readable storage medium, including: the computer-readable storage medium stores a computer program, wherein the computer program, when executed by a processor, implements any of the methods as described in the first aspect above.
In a fourth aspect, an embodiment of the present application provides a computer program product, which, when run on an electronic device, causes the electronic device to perform the risk assessment method according to any one of the above first aspects.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a block diagram of a portion of an example handset according to some embodiments of the present application;
FIG. 2 is a graphical user interface diagram of an example provided according to some embodiments of the present application;
fig. 3 is a schematic flow chart of an example risk assessment method according to some embodiments of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
The risk prompting method provided by the embodiment of the application can be applied to electronic devices such as a mobile phone, a tablet personal computer, a wearable device, a vehicle-mounted device, an Augmented Reality (AR)/Virtual Reality (VR) device, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA), and the like, and the embodiment of the application does not limit the specific types of the electronic devices at all.
For example, the electronic device may be a Station (ST) in a WLAN, which may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA) device, a handheld device with wireless communication capability, a computing device or other processing device connected to a wireless modem, a vehicle mounted device, a vehicle networking terminal, a computer, a laptop, a handheld communication device, a handheld computing device, a satellite wireless device, a wireless modem set card, a television Set Top Box (STB), a Customer Premises Equipment (CPE), and/or other devices for communicating over a wireless system and a next generation communication system, e.g., a mobile terminal in a 5G network or a future-evolved public land mobile network (public land mobile network, PLMN) mobile terminals in the network, etc.
Take the electronic device as a mobile phone as an example. Fig. 1 is a block diagram of a portion of an exemplary handset 100 according to some embodiments of the present application. Referring to fig. 1, the cellular phone includes: processor 110, memory 120, input unit 130, display unit 140, speaker 150. Those skilled in the art will appreciate that the handset configuration shown in fig. 1 is not intended to be limiting and may include more or fewer components than shown, or some components may be combined, or a different arrangement of components, such as a communications module, a power module, etc.
The following describes each component of the mobile phone in detail with reference to fig. 1:
the processor 110 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 120 and calling data stored in the memory 120, thereby performing overall monitoring of the mobile phone. Alternatively, processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110. In some embodiments of the present application, the processor 110 is configured to obtain product information for a first security product and fund information for a user, and to process the product information and the fund information for the user to obtain a risk level for the first security product.
The memory 120 may be used to store software programs and modules, and the processor 110 executes various functional applications and data processing of the mobile phone by operating the software programs and modules stored in the memory 120. The memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 120 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. In some embodiments of the present application, the memory 120 may store product information of the first security product and fund information of the user acquired by the processor 110.
The input unit 130 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone 100. In some embodiments of the present application, a user may locate a particular security product via the input unit 130 to obtain product information and a risk level for the security product.
The display unit 140 may be used to display information input by a user or information provided to the user and various menus of the mobile phone. The display unit 140 may be configured in the form of a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), or the like.
Speaker 150 is the audio interface between the user and the handset. The audio circuit of the mobile phone can transmit the electrical signal converted from the received audio data to the speaker 150, and the electrical signal is converted into a sound signal by the speaker 150 and output. In some embodiments of the present application, the mobile phone 100 may prompt the user to receive a prompt message corresponding to the risk level after the user purchases the security product through the speaker 150.
Although not shown, the handset 100 also includes a power supply (e.g., a battery) for powering the various components, and preferably, the power supply may be logically connected to the processor 110 via a power management system, such that functions of managing charging, discharging, and power consumption are performed via the power management system.
In addition, although not shown, the mobile phone 100 may further include a bluetooth module, a Wi-Fi module, and the like, which will not be described herein.
The following embodiments can be implemented on the cellular phone 100 having the above-described hardware configuration. The following embodiment will take the mobile phone 100 as an example to describe the risk assessment method provided in the embodiment of the present application.
FIG. 2 is a Graphical User Interface (GUI) diagram provided in accordance with some embodiments of the present application.
As shown in fig. 2 (a), the user interface 201 may include: status bar 2011, tray 2012 with common application icons. Wherein:
the status bar 2011 may include: one or more signal strength indicators for mobile communication signals (which may also be referred to as cellular signals), operator name (e.g., "china mobile"), one or more signal strength indicators for wireless fidelity (Wi-Fi) signals, battery status indicators, and time indicators.
The tray 2012 with the common application icons may expose: a travel crossbar icon, a WeChat icon, an App (application) Store icon, a shrimp icon, a train wisdom icon, a player icon, a LINE icon, a bar icon, an Aiqiyi icon, a nail icon, a pile burying icon, and a risk assessment APP icon 2013.
Optionally, the tray 2012 with the common application icon may also display other application icons, such as: an icon of QQ, an icon of setting, an icon of memo, an icon of mail, and an icon of phone. The application is not limited to the application icons that may be presented on this GUI 201.
Alternatively, when no more application icons can be presented on the GUI 201, the user can also view the icons of the remaining applications by sliding the page.
In some embodiments, the GUI 201 shown in (a) of fig. 2 may be a Home screen.
It is understood that the diagram (a) in fig. 2 is merely an exemplary illustration of the GUI on the mobile phone 100, and should not be construed as limiting the embodiment of the present application.
When the user clicks the risk assessment App2013 in the GUI 201, the interface jumps to the GUI 202 shown in (b) of fig. 2, namely, the "login registration" interface of the risk assessment App.
On the GUI 202, the user can input his/her login name and login password in the "information input field" 2021 to log in to App. For example, the user inputs a login name "kakasi" and a login password "isaak" to login.
In a possible implementation manner, when the user uses the App for the first time, a "register" button can be clicked to register the account of the App first.
Fig. 2 (c) illustrates the GUI 203 after the user successfully logs in. As shown, when a user needs to search for a specific security product, the user may enter information such as the name or code of the security product in the search field 2031 to search for the security product. For example, a user may enter "security product E" to look up information corresponding to that product.
In some embodiments of the present application, information relating to a security product and the user's risk level with respect to the security product may be presented in a "presentation area" 2032 of the GUI 203. The information that may be presented by the region includes the name of the security product, the price (dollar) of the security product, the transaction deposit (dollar) of the security product, the available funds (dollar), the risk level, etc. Also, when the presentation area 2032 of the GUI 203 cannot present all the information, the user can select the next page through the page select button 2033 to present the relevant information comprehensively (see fig. 2(d) for 2041 in the GUI 204).
In other embodiments of the present application, the GUI 203 may also display the current date of the trade and the trade deposit rate 2034 to ensure that the user can obtain the latest information about the security product and the latest risk status of himself with respect to the security product in real time.
In yet another embodiment of the present application, the user may click on funds 2042 in the GUI 204 to view his own funds information. Illustratively, as shown in the (e) diagram in fig. 2, a "presentation area" 2051 of the GUI 205 presents some basic information of the user (e.g., including an avatar, a reputation level, a financing time, etc.), as well as funding information of the user.
The user's fund information includes the user's total assets (my assets), position taken profit and loss (including position taken profit and loss of the user relative to a particular security product), available funds, and transaction information (including security product name, security product quantity, security product price).
By displaying the information of one or more security products, the risk level of the user relative to each security product, the fund information of the user and the like on the interface of the risk assessment App, the user can better know the risk level of each security product, further avoid the investment risk and realize the maximization of investment benefits.
In some embodiments of the present application, after the user purchases a specific security product, the mobile phone 100 may further display the risk level of the security product purchased by the user and corresponding prompt information to the user. For example, assuming that the user purchases a security product B, if the risk level after the user purchases the security product B is "add deposit", the mobile phone 100 receives the risk prompt message 2061 (see fig. 2 (e)), and displays the message "good you, transaction is completed, the risk level is add deposit, and the add deposit needs to be added by 10 ten thousand yuan in order to ensure your investment safety. Detail click www.fengxianpinggu.com. If the user needs to unsubscribe, please reply to Q. The prompt is warm, and the short message does not charge any fee. "
It should be understood that the risk level of the user with respect to each security product displayed in the risk assessment App interface is a risk level when the user has not purchased the security product, that is, a risk level after assuming that the user purchased a single number of 1 security products.
It should also be appreciated that for the same security product, the greater the number purchased by the user, the higher its risk rating with respect to that product.
Based on the above description, in one possible implementation, since the amount of a security product purchased by a user is not necessarily a unit amount, the risk level of the user after purchasing a specific security product may be the same as or different from the risk level when the security product is not purchased. However, in such a situation, the method still provides a good aid for the user to understand and determine his or her risk level with respect to the particular security product.
Fig. 3 shows a schematic flow chart of a risk assessment method 300 provided by the present application, which may be applied to the above-described cell phone 100 by way of example and not limitation.
The risk assessment method of the present application will be described below with reference to the GUI shown in fig. 2 and fig. 3. The method comprises the following specific steps:
301: product information is obtained for a first security, where the first security product may be any one of one or more security products.
Wherein the product information includes a transaction deposit of the first security product. A trade deposit refers to a fixed amount of money that a user provides to ensure that the user has sufficient funds to trade and assume risk when trading a security product (typically, a trade deposit is collected by a platform that the user trades (e.g., risk assessment App, royal, etc.) or by an exchange (e.g., shanghai stock exchange, shenzhen stock exchange, etc.)). In the process of stock exchange, the exchange deposit is collected according to a certain proportion of the price of the stock product, so the exchange deposit can change according to the fluctuation of the price of the stock product.
For example, it is assumed that on the tth trading day, the mobile phone 100 obtains product information of a plurality of first security products as shown in table 1 below, including the prices (10000 yuan, 20000 yuan, 30000 yuan) of A, B, C three first security products, the number of one hand (100 shares), and the trading security deposit (10 ten thousand, 20 ten thousand, 30 ten thousand) paid by one hand, when the trading security deposit rate is 10%.
TABLE 1
Figure BDA0002990365270000101
Optionally, the cell phone 100 can also obtain product information for more (e.g., 4, 5. N) first security products.
302: and acquiring fund information of the user, wherein the fund information of the user comprises available fund of the user and position taking profit and loss of the user.
The position-holding profit and loss, also called floating profit and loss, refers to the difference between the price of the security product held by the user at the end of the trading day and the price of the security product on the previous trading day.
Available funds refer to funds that the user may use to trade.
In some embodiments of the present application, the funds available to the user when the user is not purchasing any security products are the total funds of the user.
In another possible implementation, transaction information of the user may be further obtained, wherein the transaction information includes a name of the first security product purchased by the user, a quantity of the first security product purchased by the user, and a price of the first security product when the user purchases the first security product, and then the current available funds of the user are determined by using the total funds of the user according to the quantity of the first security product purchased by the user and the price of the first security product when the user purchases the first security product.
For example, assume that on the tth trading day, the fund information of the user acquired by the mobile phone 100 is shown in table 2 below, which includes the total amount of the user (20 ten thousand), the name of the first security product, the position and profit loss of the user relative to each security product, and the available funds of the user (10 ten thousand, 0, -10 ten thousand).
TABLE 2
Figure BDA0002990365270000111
To facilitate a better understanding of the present scheme, a brief description is now provided of the relationship between the deposit of the first security product, the user's position, profit, and loss, the user's available funds, and the user's total funds.
For example, after opening a warehouse (or building a warehouse), the user needs to pay the transaction deposit corresponding to the first security product to be purchased in time no matter whether the user holds multiple warehouses or empty warehouses at the moment. For the amount of the offered trade deposit, all different rules of the different trades are generally charged between 5% and 10% of the price of the security (i.e., the trade deposit rate). For example, if the transaction security rate is 5%, the price of the first security product is 2000 yuan, and the number of the first security products purchased is 10 (one stock/ton/…), the initial security rate required by the user is 2000 × 5% × 10 × 1000 yuan.
And then, the user can generate position taking profit and loss along with the price fluctuation of the security products, and the trading deposit of the security products can be correspondingly increased and decreased along with the position taking profit and loss. If the available funds in the user account are lower than the transaction deposit at the time, the user needs to pay the supplementary account funds according to the regulations, and the part of the funds supplemented by the user is the supplementary deposit. For example, assuming that the total user funds on the Tth transaction day is 30 ten thousand dollars, the transaction security deposit rate is 10%, the price of the purchased first security product is 2000 dollars, and the number of purchased first security products is 10 hands (assuming that one hand is 100/stock/ton/…), the user needs to purchase 10 hands of transaction security deposit of 2000 100 × 10% >, 10 ═ 20 ten dollars;
on the T +1 th transaction day, the price of the security product is 1900 Yuan, at this time, the position of the user is taken as position of (1900 + 2000) × 10 × 100 ═ 10 ten thousand Yuan, the available fund of the user is 30-10 ═ 20 ten thousand Yuan, the transaction guarantee fund of the user is 1900 ═ 100 × 10 ═ 19 Ten Yuan, and the available fund is greater than the transaction guarantee fund, so the user does not need to add the guarantee fund at this time;
on the T +2 th transaction day, the price of the security product becomes 1800 yuan, at this time, the user's position of taking profit and loss (1800 + 1900) × 10 × 100 ═ 10 ten thousand yuan, the user's available fund is 20-10 ═ 10 ten thousand yuan, the user's transaction deposit is 1800x100x 10% x10 ═ 18 ten thousand yuan, the available fund is less than the transaction deposit, so the user needs to add 8 ten thousand yuan deposit.
After obtaining the product information of the first security product and the fund information of the user, a risk level of the user with respect to one or more security products when the user has not purchased the security product may be determined.
303: in conjunction with a transaction deposit for one or more security products, available funds of a user, and a position taken by the user, a risk level is determined with respect to the one or more security products when the user has not purchased the security products, and the risk level is displayed on the electronic device.
In another possible implementation manner, the mobile phone 100 may calculate, according to a preset formula, a risk degree of the user with respect to the first security product in combination with a transaction deposit of the first security product, available funds of the user, and position taking profit and loss of the user, then determine, from a plurality of preset intervals, a target interval in which the risk degree is located, and determine a risk level corresponding to the target interval as a risk level corresponding to the first security product.
Alternatively, the correspondence between the preset intervals and the risk levels may be as shown in table 3 below.
TABLE 3
Risk rating Preset interval
Is normal [-1000,0.0)
Additional guarantee gold [0.0,0.8)
Relatively forced leveling bin [0.8,1)
Absolutely forced flat storehouse [1,100)
It should be appreciated that in some embodiments of the present application, when the user's available funds are negative and not taking a position, the user's risk level is a knock; when the available funds of the user + the position of the user for profit and loss and the transaction deposit are less than 0 and the position of the user is taken, the risk level of the user is the debt.
It should be understood that the corresponding relationship between the preset interval and the risk level can be set by related personnel according to some attribute information of the security product and the fund information of the user. The setting mode of the corresponding relation between the preset interval and the risk level is not limited.
Illustratively, the risk of the user with respect to the first security product A, B, C is calculated according to the formula (one) in combination with the product information of the first security product A, B, C, the fund information of the user, obtained in 301, 302:
risk ═ available fund + position holding profit and loss)/transaction deposit formula (I)
Then, in combination with the corresponding relationship between the preset intervals and the risk levels in table 3, a target interval in which the risk degree is located is determined from a plurality of preset intervals, and the risk level corresponding to the target interval is determined as the risk level corresponding to the first security product, as shown in table 4 below:
TABLE 4
Product name Degree of risk Risk rating
A -1 Is normal
B 0 Additional guarantee gold
C 0.33 Additional guarantee gold
After determining the risk rating of the user with respect to the first security product A, B, C, the risk rating of the first security product is displayed on the mobile phone 100 for the user to refer to determine the security product to be purchased (see (c) and (d) in fig. 2).
It should be understood that the above embodiments are exemplified by the risk level when the user has not purchased any security product. In some embodiments of the present application, when the risk level of the user relative to the security product meets a preset condition and the user purchases the security product, a prompt message corresponding to the risk level after the user purchases the security product is sent to the user. The content of the prompt message and the manner of sending the prompt message are the same as those in (f) of fig. 2, and are not described herein again.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
In summary, according to the present application, by obtaining product information of one or more security products and available funds of a user, a risk degree of the user is calculated by using a preset formula, and a risk level of the user relative to each security product is determined according to the risk degree, and finally, each security product and a risk level corresponding to the security product that the user needs to purchase are displayed on the mobile phone 100, so that the user can perform risk assessment on each security product and determine one or more security products to be purchased, thereby maximizing investment benefits.
In addition, by the method of the present application, if the user purchases a specific security product, the mobile phone 100 sends the risk level after the user purchases the security product and the corresponding prompt information to the user according to the transaction information of the user, so that the user can perform subsequent operations conveniently.
An embodiment of the present application further provides an electronic device, including: at least one processor, a memory, and a computer program stored in the memory and executable on the at least one processor, the processor implementing the steps of any of the various method embodiments described above when executing the computer program.
The embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps in the above-mentioned method embodiments.
The embodiments of the present application provide a computer program product, which when running on a mobile terminal, enables the mobile terminal to implement the steps in the above method embodiments when executed.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be implemented by a computer program, which can be stored in a computer readable storage medium and can implement the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include at least: any entity or device capable of carrying computer program code to a photographing apparatus/electronic device, a recording medium, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunication signals, and software distribution medium. Such as a usb-disk, a removable hard disk, a magnetic or optical disk, etc. In certain jurisdictions, computer-readable media may not be an electrical carrier signal or a telecommunications signal in accordance with legislative and patent practice.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/network device and method may be implemented in other ways. For example, the above-described apparatus/network device embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (7)

1. A risk assessment method applied to electronic equipment is characterized by comprising the following steps:
obtaining product information for a first security product, the first security product being any one of one or more security products, the product information including a trade deposit for the first security product;
acquiring fund information of a user, wherein the fund information of the user comprises available fund of the user and position taking profit and loss of the user;
and determining a risk level corresponding to the first security product when the user does not purchase the first security product by combining the trading deposit of the first security product, the available funds of the user and the position taking profit and loss of the user, and displaying the risk level on the electronic equipment.
2. The method of claim 1, wherein said determining a risk level for the first security product when the user has not purchased the first security product in combination with a transaction deposit for the first security product, available funds of the user, and a position taken profit or loss of the user comprises:
calculating the risk degree of the user relative to the first security product according to a preset formula by combining the trading deposit of the first security product, the available fund of the user and the position taking profit and loss of the user;
and determining a target interval where the risk degree is located from a plurality of preset intervals, and determining a risk grade corresponding to the target interval as a risk grade corresponding to the first security product.
3. The method according to claim 1 or 2, wherein when the risk level of the user satisfies a preset condition and the user purchases the first security product, the method further comprises: and sending prompt information corresponding to the risk level of the user after the user purchases the first security product to the user.
4. The method of claim 1 or 2, wherein the user's funds information further includes the user's total funds, the method further comprising:
acquiring transaction information of the user, wherein the transaction information comprises a name of the first security product purchased by the user, a number of the first security product purchased by the user, and a price of the first security product when the user purchases the first security product; and the number of the first and second groups,
the acquiring of the fund information of the user comprises the following steps:
and determining the available funds of the user according to the transaction information of the user and the total amount of the user.
5. The method according to claim 1 or 2, characterized in that the method further comprises:
acquiring transaction information of the user, wherein the transaction information comprises a name of the first security product purchased by the user, a number of the first security product purchased by the user, and a price of the first security product when the user purchases the first security product; and
displaying one or more of the product information, the user's funding information, the user's transaction information, the reminder information on the electronic device.
6. An electronic device comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the method of any of claims 1 to 5 when executing the computer program.
7. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 5.
CN202110313965.6A 2021-03-24 2021-03-24 Risk assessment method and device Pending CN113129153A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110313965.6A CN113129153A (en) 2021-03-24 2021-03-24 Risk assessment method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110313965.6A CN113129153A (en) 2021-03-24 2021-03-24 Risk assessment method and device

Publications (1)

Publication Number Publication Date
CN113129153A true CN113129153A (en) 2021-07-16

Family

ID=76774078

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110313965.6A Pending CN113129153A (en) 2021-03-24 2021-03-24 Risk assessment method and device

Country Status (1)

Country Link
CN (1) CN113129153A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113643137A (en) * 2021-08-27 2021-11-12 泰康保险集团股份有限公司 Risk prediction method, device, medium and electronic equipment for investment portfolio

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050101896A (en) * 2004-04-20 2005-10-25 김동진 Real-time risk management system and method for on-line stock trading and loan
CN110009197A (en) * 2019-03-14 2019-07-12 平安信托有限责任公司 Method for prewarning risk, device, computer equipment and storage medium
CN110060130A (en) * 2019-04-23 2019-07-26 杭州幻方科技有限公司 A kind of portfolio customization transaction system and method
CN110175902A (en) * 2019-04-09 2019-08-27 昆山古鳌电子机械有限公司 A kind of risk management and control method
US20200090268A1 (en) * 2017-05-26 2020-03-19 Alibaba Group Holding Limited Method and apparatus for determining level of risk of user, and computer device
CN111383099A (en) * 2020-03-25 2020-07-07 中国建设银行股份有限公司 Wind control method and device based on bulk goods transaction
CN111626634A (en) * 2020-06-04 2020-09-04 中国银行股份有限公司 User behavior tracking method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050101896A (en) * 2004-04-20 2005-10-25 김동진 Real-time risk management system and method for on-line stock trading and loan
US20200090268A1 (en) * 2017-05-26 2020-03-19 Alibaba Group Holding Limited Method and apparatus for determining level of risk of user, and computer device
CN110009197A (en) * 2019-03-14 2019-07-12 平安信托有限责任公司 Method for prewarning risk, device, computer equipment and storage medium
CN110175902A (en) * 2019-04-09 2019-08-27 昆山古鳌电子机械有限公司 A kind of risk management and control method
CN110060130A (en) * 2019-04-23 2019-07-26 杭州幻方科技有限公司 A kind of portfolio customization transaction system and method
CN111383099A (en) * 2020-03-25 2020-07-07 中国建设银行股份有限公司 Wind control method and device based on bulk goods transaction
CN111626634A (en) * 2020-06-04 2020-09-04 中国银行股份有限公司 User behavior tracking method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113643137A (en) * 2021-08-27 2021-11-12 泰康保险集团股份有限公司 Risk prediction method, device, medium and electronic equipment for investment portfolio

Similar Documents

Publication Publication Date Title
US20080052176A1 (en) Payment device to allow an automated means for ordering and payment by food establishment patrons
JP7002311B2 (en) Information processing equipment, information processing methods, and programs
CN108182502A (en) The generation method of growing quality evaluation index, the statistical method of business growth value
CN110097356B (en) Payment method, device, equipment and storage medium
US20180365684A1 (en) Currency trading platform and service
KR102260953B1 (en) System for mediating export of used car and method thereof
CN106663301A (en) Information processing device, information processing method, and program
EP2143060A1 (en) Anonymous block trade matching system
CN113129153A (en) Risk assessment method and device
CN113935821A (en) Method, device, electronic equipment and medium for settling commission charge in banking business
CN108665312A (en) Method and apparatus for generating information
US20130282555A1 (en) System of exchange trading (embodiments)
US20210374711A1 (en) Information processing system, server, and computer readable recording medium
KR102671759B1 (en) System for estimating safety of real estate transaction and method thereof
CN108805543A (en) A kind of method and terminal of output Receiving information
CN111158555B (en) Virtual article packet receiving method, virtual article packet sending method, virtual article packet receiving device, virtual article packet sending device and virtual article packet receiving and sending system
KR102097244B1 (en) Method for peer to peer intellectual property secured loan financial technology service and apparatus thereof
RU2321185C2 (en) System for providing services based on free talk certificates
CN114140203A (en) Data determination method and device, electronic equipment and storage medium
CN110602665B (en) Method for determining sharing service index based on communication certificate sharing service
CN113409119A (en) Method and device for assessing capital risk of financing lease enterprise, storage medium and electronic equipment
CN102903057B (en) Integrate the method and system of the event handling of the investment bank and trustship person's scope of business
CN112132668A (en) Order processing method and device
CN111062784A (en) Intelligent bidirectional recommendation system for electric power user transaction
US20040128244A1 (en) Charging device, charging method, transaction supporting device, and transaction supporting method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination