CN114820214A - Information processing method and device, electronic equipment and computer readable storage medium - Google Patents

Information processing method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN114820214A
CN114820214A CN202210478151.2A CN202210478151A CN114820214A CN 114820214 A CN114820214 A CN 114820214A CN 202210478151 A CN202210478151 A CN 202210478151A CN 114820214 A CN114820214 A CN 114820214A
Authority
CN
China
Prior art keywords
information
user
transaction
determining
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210478151.2A
Other languages
Chinese (zh)
Inventor
罗致力
朱道彬
孙刚
张易知
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202210478151.2A priority Critical patent/CN114820214A/en
Publication of CN114820214A publication Critical patent/CN114820214A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/243Classification techniques relating to the number of classes
    • G06F18/24323Tree-organised classifiers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/25Fusion techniques
    • G06F18/254Fusion techniques of classification results, e.g. of results related to same input data
    • G06F18/256Fusion techniques of classification results, e.g. of results related to same input data of results relating to different input data, e.g. multimodal recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Evolutionary Computation (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Evolutionary Biology (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present disclosure provides an information processing method and apparatus, an electronic device, and a computer-readable storage medium, which can be applied to the information processing field and the financial field. The information processing method includes: in response to receiving registration requests from a plurality of users, determining respective risk level information of the plurality of users according to the registration requests, wherein the registration requests comprise respective identity information and user basic information of the plurality of users; processing the respective user basic information and risk level information of a plurality of users to obtain respective transaction amount information of the plurality of users, wherein the transaction amount information corresponds to the identity information; and in response to receiving a transaction request from a target user in the plurality of users, determining target transaction limit information of the target user according to the transaction request.

Description

Information processing method and device, electronic equipment and computer readable storage medium
Technical Field
The present disclosure relates to the field of information processing and the field of finance, and more particularly, to an information processing method and apparatus, an electronic device, a computer-readable storage medium, and a computer program product.
Background
With the development of computer technology and information processing technology, various financial payment transaction channels adapted to different customer requirements have been developed. Risk control is an important component of financial payment transactions, while quota control is the most important means of managing the risk of payment for financial transactions.
In implementing the disclosed concept, the inventors found that there are at least the following problems in the related art: at present, the flexibility of quota control is low, and the actual requirements of different users cannot be met.
Disclosure of Invention
In view of the above, the present disclosure provides an information processing method and apparatus, an electronic device, a computer-readable storage medium, and a computer program product.
According to an aspect of the present disclosure, there is provided an information processing method including:
in response to receiving registration requests from a plurality of users, determining risk level information of each of the plurality of users according to the registration requests, wherein the registration requests comprise identity information and user basic information of each of the plurality of users;
processing the user basic information and the risk level information of each of the plurality of users to obtain the transaction amount information of each of the plurality of users, wherein the transaction amount information corresponds to the identity information; and
and in response to receiving a transaction request from a target user in the plurality of users, determining target transaction amount information of the target user according to the transaction request.
According to an embodiment of the present disclosure, the registration request further includes registration information of the user.
According to an embodiment of the present disclosure, the determining risk level information of each of the plurality of users according to the registration request includes:
determining respective evaluation values of the plurality of users according to a preset evaluation standard and the registration information; and
and determining the risk level information of each of the plurality of users according to the evaluation value, wherein the risk level information corresponds to the identification information.
According to an embodiment of the present disclosure, the registration information includes account opening link dimension information and transaction link dimension information of the user.
According to an embodiment of the present disclosure, the determining the evaluation value of each of the plurality of users according to a preset scoring criterion and the registration information includes:
determining a first evaluation value under the condition that the dimension information of the account opening link conforms to a first preset evaluation standard;
determining a second evaluation value under the condition that the dimension information of the transaction link meets a second preset evaluation standard; and
and determining the evaluation value according to the first evaluation value and the second evaluation value.
According to an embodiment of the present disclosure, the determining risk level information of each of the plurality of users according to the evaluation value includes:
determining the risk level information of the user as a first risk level when the evaluation value is greater than a first threshold value;
determining the risk level information of the user as a second risk level in a case where the evaluation value is between the first threshold and a second threshold; and
and determining the risk level information of the user as a third risk level when the evaluation value is smaller than the second threshold.
According to an embodiment of the present disclosure, the user basic information includes natural information, asset information, account information, and historical transaction information of the user.
According to an embodiment of the present disclosure, the processing the user basic information and the risk level information of each of the plurality of users to obtain the transaction amount information of each of the plurality of users includes:
respectively processing the user basic information and the risk level information of each of the plurality of users by using a preset model to obtain a processing result, wherein the preset model comprises a machine learning model; and
and determining the transaction amount information corresponding to the identity information of each of the plurality of users according to the processing result.
According to an embodiment of the present disclosure, the information processing method further includes:
and determining the risk identification information of the risk user under the condition that the processing result represents that the user belongs to the risk user.
According to an embodiment of the present disclosure, the transaction request includes target identification information and transaction information of the target user, and the transaction information includes transaction channel information, transaction type information, transaction amount information, user level information, and user preference information of the target user.
According to an embodiment of the present disclosure, the determining the target transaction amount information of the target user according to the transaction request includes:
determining candidate transaction amount information of the target user according to the target identity identification information; and
and determining the target transaction limit information according to the transaction channel information, the transaction type information, the user level information and the user preference information.
According to an embodiment of the present disclosure, the information processing method further includes:
determining authentication medium information according to the target transaction limit information under the condition that the relationship between the transaction amount information and the target transaction limit information meets a preset condition; and
and determining risk prompt information under the condition that the relationship between the transaction amount information and the target transaction amount information does not meet a preset condition.
According to another aspect of the present disclosure, there is provided an information processing apparatus including:
a first determining module, configured to determine, in response to receiving a registration request from a plurality of users, risk level information of each of the plurality of users according to the registration request, where the registration request includes identity information and user basic information of each of the plurality of users;
a processing module, configured to process the user basic information and the risk level information of each of the multiple users to obtain transaction amount information of each of the multiple users, where the transaction amount information corresponds to the identification information; and
and the second determining module is used for responding to the received transaction request from the target user in the plurality of users and determining the target transaction amount information of the target user according to the transaction request.
According to another aspect of the present disclosure, there is provided an electronic device including:
one or more processors;
a memory to store one or more instructions that,
wherein the one or more instructions, when executed by the one or more processors, cause the one or more processors to implement the method as described above.
According to another aspect of the present disclosure, there is provided a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to implement the method as described above.
According to another aspect of the present disclosure, there is provided a computer program product comprising computer executable instructions which, when executed, are for implementing a method as described above.
According to the embodiment of the disclosure, the respective risk level information of a plurality of users is determined according to the registration request, then the respective user basic information and the risk level information of the plurality of users are processed to obtain the respective transaction amount information of the plurality of users, and then the target transaction amount information of the target user is determined according to the transaction request of the target user in the plurality of users. By the technical means, the technical problems that the flexibility of quota control is low and the actual requirements of different users cannot be met in the related technology are at least partially solved, the efficiency of quota control can be improved by establishing a transaction limit control mechanism taking the users as dimensions, and the pertinence, flexibility and accuracy of quota control are improved.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent from the following description of embodiments of the present disclosure with reference to the accompanying drawings, in which:
fig. 1 schematically shows a system architecture to which an information processing method according to an embodiment of the present disclosure can be applied;
FIG. 2 schematically shows a flow chart of an information processing method according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a flow chart of a method of determining risk level information according to an embodiment of the present disclosure;
FIG. 4 is a flow chart that schematically illustrates a method for determining transaction amount information, in accordance with an embodiment of the present disclosure;
FIG. 5 is a flow chart of a method for determining information of a target transaction amount according to an embodiment of the disclosure;
fig. 6 schematically shows an example schematic diagram of an information processing method according to an embodiment of the present disclosure;
fig. 7 schematically shows a block diagram of an information processing apparatus according to an embodiment of the present disclosure; and
fig. 8 schematically shows a block diagram of an electronic device adapted to implement an information processing method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the personal information of the related user all accord with the regulations of related laws and regulations, necessary security measures are taken, and the customs of the public order is not violated.
In the technical scheme of the disclosure, before the personal information of the user is acquired or collected, the authorization or the consent of the user is acquired.
With the development of computer technology and data processing technology, various financial payment transaction channels adapted to different customer requirements have been developed. Risk control is an important component of financial payment transactions, while limit control is the most important means of managing financial transaction payment risk.
The limit of the online financial payment transaction channel is mainly controlled by factors such as an account opening place, a registration mode, a security authentication mode, a transaction type and the like of a client, and meanwhile, a transaction scene, a financial market environment, policy supervision and the like also change frequently, so that the requirement on limit control also changes.
In implementing the disclosed concept, the inventors found that there are at least the following problems in the related art: the flexibility of quota control is lower at present, and the actual requirements of different users cannot be met.
In order to at least partially solve the technical problems in the related art, the present disclosure provides an information processing method and apparatus, an electronic device, and a computer-readable storage medium, which can be applied to the information processing field and the financial field. The information processing method includes: in response to receiving registration requests from a plurality of users, determining respective risk level information of the plurality of users according to the registration requests, wherein the registration requests comprise respective identity information and user basic information of the plurality of users; processing the respective user basic information and risk level information of a plurality of users to obtain respective transaction amount information of the plurality of users, wherein the transaction amount information corresponds to the identity information; and in response to receiving a transaction request from a target user in the plurality of users, determining target transaction limit information of the target user according to the transaction request.
It should be noted that the information processing method and apparatus provided by the embodiments of the present disclosure may be used in the information processing field and the financial field, for example, to determine a user transaction limit. The information processing method and apparatus provided by the embodiments of the present disclosure can also be used in any fields other than the information processing field and the financial field, for example, applied to risk control. The application fields of the information processing method and the information processing device provided by the embodiment of the disclosure are not limited.
Fig. 1 schematically shows a system architecture to which an information processing method according to an embodiment of the present disclosure can be applied. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the system architecture 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104 and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired and/or wireless communication links, and so forth.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as a shopping-like application, a web browser application, a search-like application, an instant messaging tool, a mailbox client, and/or social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the information processing method provided by the embodiment of the present disclosure may be generally executed by the server 105. Accordingly, the information processing apparatus provided by the embodiment of the present disclosure may be generally provided in the server 105. The information processing method provided by the embodiment of the present disclosure may also be executed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the information processing apparatus provided in the embodiment of the present disclosure may also be provided in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Alternatively, the information processing method provided by the embodiment of the present disclosure may also be executed by the terminal device 101, 102, or 103, or may also be executed by another terminal device different from the terminal device 101, 102, or 103. Accordingly, the information processing apparatus provided in the embodiment of the present disclosure may also be provided in the terminal device 101, 102, or 103, or in another terminal device different from the terminal device 101, 102, or 103.
For example, the identification information and the user basic information may be originally stored in any one of the terminal devices 101, 102, or 103 (e.g., the terminal device 101, but not limited thereto), or may be stored on an external storage device and may be imported into the terminal device 101. Then, the terminal device 101 may locally execute the information processing method provided by the embodiment of the present disclosure, or send the identification information and the user basic information to other terminal devices, servers, or server clusters, and execute the information processing method provided by the embodiment of the present disclosure by the other terminal devices, servers, or server clusters receiving the identification information and the user basic information.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Fig. 2 schematically shows a flow chart of an information processing method according to an embodiment of the present disclosure.
As shown in fig. 2, the information processing method may include operations S210 to S230.
In operation S210, in response to receiving registration requests from a plurality of users, risk level information of each of the plurality of users is determined according to the registration requests. The registration request includes identification information and user basis information for each of the plurality of users.
In operation S220, the user basic information and the risk level information of each of the plurality of users are processed to obtain the transaction amount information of each of the plurality of users. The transaction amount information corresponds to the identity information.
In operation S230, in response to receiving a transaction request from a target user among a plurality of users, target transaction amount information of the target user is determined according to the transaction request.
According to the embodiment of the disclosure, the registration request may be a request message sent by the user to the server through the client. The registration request may include, but is not limited to, identification information and user basic information of the user, and the registration request may also include registration information of the user.
According to the embodiment of the disclosure, the identity identification information corresponds to the user one by one and can be used for representing the identity of the user. The identification information may include, for example, a user id (identity document), but is not limited thereto, and the identification information may also include a barcode, a magnetic stripe, an IC chip, or the like, as long as the user can be identified.
According to the embodiment of the disclosure, the risk level information corresponds to the identification information one by one, and can be used for representing the risk level and the credibility of the user corresponding to the identification information. The transaction amount information corresponds to the identity information and can be used for representing the limitation of the tradable amount of the user corresponding to the identity information.
According to the embodiment of the disclosure, the transaction request may be a request message sent by a target user of a plurality of users to the server through the client. The transaction request may include target identification information for the target user. The target trade limit information can be determined in the trade limit information through the target identity identification information.
According to the embodiment of the disclosure, different data sources provided by the bank system can be integrated through a big data technology by combining existing risk assessment resources of the bank system, historical transaction data of the bank system and the like, and risk level information and transaction amount information are determined.
According to the embodiment of the disclosure, the respective risk level information of a plurality of users is determined according to the registration request, then the respective user basic information and the risk level information of the plurality of users are processed to obtain the respective transaction amount information of the plurality of users, and then the target transaction amount information of the target user is determined according to the transaction request of the target user in the plurality of users. By the technical means, the technical problems that the flexibility of quota control is low and the actual requirements of different users cannot be met in the related technology are at least partially solved, the efficiency of quota control can be improved by establishing a transaction limit control mechanism taking the users as dimensions, and the pertinence, flexibility and accuracy of quota control are improved.
The method shown in fig. 2 is further described with reference to fig. 3-6 in conjunction with specific embodiments.
FIG. 3 schematically illustrates a flow chart of a method of determining risk level information according to an embodiment of the disclosure.
As shown in fig. 3, operation S210 may include operations S311 to S312.
In operation S311, respective evaluation values of a plurality of users are determined according to preset evaluation criteria and registration information.
In operation S312, risk level information of each of the plurality of users is determined according to the evaluation value. The risk level information corresponds to the identification information.
According to an embodiment of the present disclosure, the registration information may include account opening link dimension information and transaction link dimension information of the user. The preset evaluation criteria may include a first preset evaluation criteria for an account opening link dimension and a second preset evaluation criteria for a transaction link dimension.
According to an embodiment of the present disclosure, operation S311 may include the following operations.
And under the condition that the dimension information of the account opening link accords with a first preset evaluation standard, determining a first evaluation value. And under the condition that the dimension information of the transaction link meets a second preset evaluation standard, determining a second evaluation value. An evaluation value is determined based on the first evaluation value and the second evaluation value.
According to the embodiment of the disclosure, the first preset evaluation criterion for the account opening link dimension may include user account opening intention verification and user identity identification.
For example, in the case that the user's desire to open an account is real, the purpose of opening an account is clear, and the reason for opening an account is reasonable, it may be determined that the desire to open an account verifies the situation evaluation value. Under the conditions that the identity document is real and effective, the account opening applicant is consistent with the identity information and the real name system of the mobile phone number is reserved, the evaluation value of the identity recognition condition can be determined. The first evaluation value may be determined based on the verification-of-account-willingness evaluation value and the identification-situation evaluation value.
According to an embodiment of the present disclosure, the second preset evaluation criterion for the transaction link dimension may include non-counter business verification of the user.
For example, in the case where the user opens the non-counter payment function of the bank settlement account in a non-face-to-face manner, the first non-counter service evaluation value may be determined. The second non-counter service assessment value may be determined when the bank individual applies for a non-counter payment function only with valid identity documents. And under the condition that a user individual can provide one of auxiliary identification materials such as a local city account book, a residence certificate, a social security card, a social security payment certificate, a water and electricity and coal payment certificate or a mobile phone number real name and one year of network access besides an effective identification certificate, a third non-counter service evaluation value can be determined. The fourth non-counter service evaluation value may be determined in the case where the user individual may provide one of proof documents such as a revenue certification, an asset certification, a bank settlement account transaction flow, and the like in addition to the valid identification document, the auxiliary identification material. The second evaluation value may be determined based on the first non-counter service evaluation value, the second non-counter service evaluation value, the third non-counter service evaluation value, and the fourth non-counter service evaluation value.
According to the embodiment of the present disclosure, the evaluation value may be determined from the first evaluation value and the second evaluation value. For example, the evaluation value may be determined by summing the first evaluation value and the second evaluation value.
Operation S312 may include the following operations according to an embodiment of the present disclosure.
In the case where the evaluation value is larger than the first threshold value, the risk level information of the user is determined as a first risk level. In a case where the evaluation value is between the first threshold value and the second threshold value, the risk level information of the user is determined to be the second risk level. In the case where the evaluation value is smaller than the second threshold value, the risk level information of the user is determined to be a third risk level.
According to the embodiment of the present disclosure, the risk level information of the user may be determined according to the relationship of the evaluation value, the first threshold value, and the second threshold value. The risk level information corresponds to the identification information.
According to the embodiment of the present disclosure, the first threshold and the second threshold may be flexibly set by a person skilled in the art according to practical application conditions, and the embodiment of the present disclosure does not limit the first threshold and the second threshold as long as the first threshold is greater than the second threshold.
According to the embodiment of the present disclosure, the specific form of the risk level information may be flexibly set by a person skilled in the art according to the actual application situation, and the embodiment of the present disclosure does not limit the specific form of the risk level information. For example, the risk level information may include a high level, a medium level, and a low level, but is not limited thereto, and the risk level information may further include a level a, a level B, a level C, and the like.
For example, the first threshold value may be set to 40 and the second threshold value may be set to 25. In the case where the evaluation value is greater than 40, it may be determined that the risk level information of the user is low. In the case where the evaluation value is between 40 and 25, the risk level information of the user can be determined to be intermediate. In the case where the evaluation value is less than 25, it may be determined that the risk level information of the user is high.
According to the embodiment of the disclosure, the client can be graded and graded according to the condition that the user opens the electronic bank, and the risk grade information of the user is determined. When the evaluation value of the user is higher, the risk level information determined according to the evaluation value is lower, the possibility of representing the risk of the user is lower, and the credibility is higher.
According to the embodiment of the present disclosure, by determining the respective evaluation values of the plurality of users according to the preset evaluation criteria and the registration information, and determining the respective risk level information of the plurality of users according to the evaluation values. Through the technical means, the risk level information of each of a plurality of users with the user as the dimension can be determined, so that a transaction limit control mechanism with the user as the dimension is established, and the pertinence and the accuracy of limit control can be improved.
FIG. 4 is a flow chart of a method for determining transaction amount information according to an embodiment of the disclosure.
As shown in fig. 4, operation S220 may include operations S421 to S422.
In operation S421, the user basic information and the risk level information of each of the plurality of users are respectively processed by using a preset model, so as to obtain a processing result. The preset model includes a machine learning model.
In operation S422, transaction amount information corresponding to the respective identification information of the plurality of users is determined according to the processing result.
According to the embodiment of the disclosure, the user basic information of each of a plurality of users can be extracted from each transaction subsystem at the end of each day. The transaction subsystems may include enterprise-level user information systems, user credit management systems, deposit systems, loan systems, historical transaction detail systems, and the like.
According to the embodiment of the disclosure, the extracted user basic information and risk level information can be stored in the data lake, and the data lake is used for storing and analyzing data.
According to embodiments of the present disclosure, a data lake is a type of system that stores raw formats of data, typically object blocks or files, and the data lake may be used to store structured data, semi-structured data, unstructured data, binary data, and the like, from a relational database.
According to an embodiment of the present disclosure, the user basic information may include natural information, asset information, account information, and historical transaction information of the user. The natural information of the user may include gender, age, marital status, education level, work industry, etc. The asset information may include the user's asset condition. The historical transaction information may include transaction type, amount, transaction location, transaction counter-party information, and the like.
According to the embodiment of the disclosure, a model can be established in a data lake, the basic information and the risk level information of the user are analyzed at regular time, appropriate transaction limit information is given to each user, and the transaction limit information can be imported into a transaction subsystem.
According to embodiments of the present disclosure, the model may comprise a deep learning model or an expert rules model. The expert rule model may be a machine learning model structure that artificially encodes business experience. The expert rules model may include a single decision tree or a random forest.
According to the embodiment of the disclosure, the expert rule model can be utilized to process the user basic information and the risk level information to obtain a processing result. The processing result can be used for representing whether the user belongs to the risk user.
According to the embodiment of the disclosure, compared with a data warehouse, the cost of information integration analysis can be reduced according to the development needs of markets and businesses by using the characteristic that the data lake stores unstructured data.
According to an embodiment of the present disclosure, the information processing method may further include the following operations.
And determining the risk identity identification information of the risk user under the condition that the processing result represents that the user belongs to the risk user.
According to the embodiment of the disclosure, in the case that the processing result indicates that the user belongs to the risky user, the risky user may be labeled, for example, as "money laundering high-risk customer", "gambling high-risk customer", "other high-risk customer", and the like, and imported into the risky fraud subsystem.
According to the embodiment of the disclosure, under the condition that the processing result representation user does not belong to the risk user, the transaction amount information of the processing result user can be obtained.
According to the embodiment of the disclosure, the user basic information and the risk level information of each of the plurality of users are respectively processed by using the preset model to obtain the processing result, and the transaction amount information corresponding to the identity information of each of the plurality of users is determined according to the processing result. Through the technical means, the transaction limit information can be automatically determined by utilizing the preset model, so that the efficiency and the accuracy of limit control are improved.
Fig. 5 is a flow chart schematically illustrating a method for determining target transaction amount information according to an embodiment of the disclosure.
As shown in fig. 5, operation S230 may include operations S531 to S532.
In operation S531, candidate transaction amount information of the target user is determined according to the target identification information.
In operation S532, target transaction amount information is determined according to the transaction channel information, the transaction type information, the user level information, and the user preference information.
According to an embodiment of the present disclosure, the transaction request may include target identification information and transaction information of the target user, and the transaction information may include transaction channel information, transaction type information, transaction amount information, user level information, and user preference information of the target user.
According to an embodiment of the present disclosure, the transaction channel information may include an internet bank or a mobile phone. The transaction type information may include transfer, consumption or payment. The user level information may include general or membership. The user preference information may include conservative, neutral, aggressive, etc.
According to the embodiment of the disclosure, under the condition that the target user uses the bank system of the client to conduct transaction, the client can submit the target identity identification information and the transaction information of the target user, can determine candidate transaction amount information according to the target identity identification information, and determine the target transaction amount information according to the transaction information.
According to an embodiment of the present disclosure, the information processing method may further include the following operations.
And under the condition that the relationship between the transaction amount information and the target transaction amount information meets a preset condition, determining authentication medium information according to the target transaction amount information. And determining risk prompt information under the condition that the relationship between the transaction amount information and the target transaction amount information does not meet a preset condition.
According to the embodiment of the disclosure, when the user conducts transactions such as on-line remittance, quick payment and code scanning payment, the verification can be conducted in advance, and the authentication medium information recommended to the user can be returned under the condition that the relationship between the transaction amount information and the target transaction amount information meets the preset condition.
According to the embodiment of the disclosure, under the condition that the relationship between the transaction amount information and the target transaction amount information does not meet the preset condition, the transaction request of the user or the risk client exceeding the target transaction amount information can be rejected, and the corresponding risk prompt words and solution measures of the client can be prompted. For example, the system may be prompted to "identify that there is a greater risk for your transaction, ask for a call to consult/go to a website to consult/click on an icon for customer service assistance in case of doubt", etc.
According to the embodiment of the disclosure, the candidate transaction limit information of the target user is determined according to the target identity identification information of the target user, and the target transaction limit information is determined according to the transaction channel information, the transaction type information, the user level information and the user preference information. Through the technical means, the transaction limit control can be realized more conveniently and more quickly based on the user dimension, so that the limit control efficiency is improved.
Fig. 6 schematically shows an example schematic diagram of an information processing method according to an embodiment of the present disclosure.
As shown in fig. 6, in response to receiving a registration request 601 from a plurality of users, the registration request 601 may include identity information 6011, registration information 6012, and user base information 6013, and respective evaluation values 603 of the plurality of users may be determined according to a preset evaluation criterion 602 and the registration information 6012. The risk level information 604 of each of the plurality of users can be determined based on the evaluation value 603. The preset model 605 may be utilized to process the user basic information 6013 and the risk level information 604 of each of the plurality of users, so as to obtain a processing result 606. Transaction amount information 607 corresponding to the respective identification information of the plurality of users may be determined according to the processing result 606. So that the target transaction limit information can be determined according to the target identification information of the target user in the plurality of users.
Fig. 7 schematically shows a block diagram of an information processing apparatus according to an embodiment of the present disclosure.
As shown in fig. 7, the information processing apparatus 700 may include a first determining module 701, a processing module 702, and a second determining module 703.
The first determining module 701 is configured to, in response to receiving a registration request from a plurality of users, determine risk level information of each of the plurality of users according to the registration request. The registration request includes identification information and user basis information for each of the plurality of users.
The processing module 702 is configured to process the user basic information and the risk level information of each of the multiple users to obtain the transaction amount information of each of the multiple users. The transaction amount information corresponds to the identity information.
The second determining module 703 is configured to, in response to receiving a transaction request from a target user among the multiple users, determine target transaction amount information of the target user according to the transaction request.
According to an embodiment of the present disclosure, the registration request may further include registration information of the user.
According to an embodiment of the present disclosure, the first determining module 701 may include a first determining unit and a second determining unit.
A first determining unit configured to determine respective evaluation values of the plurality of users based on a preset evaluation criterion and the registration information.
And a second determining unit configured to determine risk level information of each of the plurality of users based on the evaluation value. The risk level information corresponds to the identification information.
According to an embodiment of the present disclosure, the registration information may include account opening link dimension information and transaction link dimension information of the user.
According to an embodiment of the present disclosure, the first determining unit may include a first determining subunit, a second determining subunit, and a third determining subunit.
And the first determining subunit is used for determining the first evaluation value under the condition that the dimension information of the account opening link conforms to a first preset evaluation standard.
And the second determining subunit is used for determining a second evaluation value under the condition that the dimension information of the transaction link meets a second preset evaluation standard.
A third determining subunit for determining an evaluation value based on the first evaluation value and the second evaluation value.
According to an embodiment of the present disclosure, the second determination unit may include a fourth determination subunit, a fifth determination subunit, and a sixth determination subunit.
And a fourth determining subunit, configured to determine, in a case where the evaluation value is greater than the first threshold value, the risk level information of the user as the first risk level.
A fifth determining subunit operable to determine the risk level information of the user as the second risk level in a case where the evaluation value is between the first threshold value and the second threshold value.
A sixth determining subunit configured to determine, in a case where the evaluation value is smaller than the second threshold value, the risk level information of the user as a third risk level.
According to an embodiment of the present disclosure, the user basic information may include natural information, asset information, account information, and historical transaction information of the user.
According to an embodiment of the present disclosure, the processing module 702 may include a processing unit and a third determining unit.
And the processing unit is used for respectively processing the respective user basic information and the risk level information of the plurality of users by using the preset model to obtain a processing result. The preset model includes a machine learning model.
And the third determining unit is used for determining the transaction amount information corresponding to the respective identity information of the plurality of users according to the processing result.
According to an embodiment of the present disclosure, the processing module 702 may further include a fourth determination unit.
And the fourth determining unit is used for determining the risk identity information of the risk user under the condition that the processing result represents that the user belongs to the risk user.
According to an embodiment of the present disclosure, the transaction request may include target identification information and transaction information of the target user, the transaction information including transaction channel information, transaction type information, transaction amount information, user level information, and user preference information of the target user.
According to an embodiment of the present disclosure, the second determining module 703 may include a fifth determining unit and a sixth determining unit.
And the fifth determining unit is used for determining candidate transaction limit information of the target user according to the target identity identification information.
And the sixth determining unit is used for determining the target transaction amount information according to the transaction channel information, the transaction type information, the user level information and the user preference information.
According to an embodiment of the present disclosure, the second determining module 703 may further include a seventh determining unit and an eighth determining unit.
And the seventh determining unit is used for determining the authentication medium information according to the target transaction amount information under the condition that the relationship between the transaction amount information and the target transaction amount information meets the preset condition.
And the eighth determining unit is used for determining the risk prompt message under the condition that the relationship between the transaction amount information and the target transaction amount information does not meet the preset condition.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any plurality of the first determining module 701, the processing module 702 and the second determining module 703 may be combined and implemented in one module/unit/sub-unit, or any one of the modules/units/sub-units may be split into a plurality of modules/units/sub-units. Alternatively, at least part of the functionality of one or more of these modules/units/sub-units may be combined with at least part of the functionality of other modules/units/sub-units and implemented in one module/unit/sub-unit. According to an embodiment of the present disclosure, at least one of the first determining module 701, the processing module 702, and the second determining module 703 may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or may be implemented in any one of three implementations of software, hardware, and firmware, or in a suitable combination of any of them. Alternatively, at least one of the first determining module 701, the processing module 702 and the second determining module 703 may be at least partly implemented as a computer program module, which when executed may perform a corresponding function.
It should be noted that the information processing apparatus portion in the embodiments of the present disclosure corresponds to the information processing method portion in the embodiments of the present disclosure, and the description of the information processing apparatus portion specifically refers to the information processing method portion, and is not repeated herein.
Fig. 8 schematically shows a block diagram of an electronic device adapted to implement an information processing method according to an embodiment of the present disclosure. The electronic device shown in fig. 8 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 8, a computer electronic device 800 according to an embodiment of the present disclosure includes a processor 801 which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)802 or a program loaded from a storage section 808 into a Random Access Memory (RAM) 803. The processor 801 may include, for example, a general purpose microprocessor (e.g., CPU), an instruction set processor and/or related chip sets and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 801 may also include onboard memory for caching purposes. The processor 801 may include a single processing unit or multiple processing units for performing different actions of the method flows according to embodiments of the present disclosure.
In the RAM 803, various programs and data necessary for the operation of the electronic apparatus 800 are stored. The processor 801, the ROM 802, and the RAM 803 are connected to each other by a bus 804. The processor 801 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 802 and/or RAM 803. Note that the programs may also be stored in one or more memories other than the ROM 802 and RAM 803. The processor 801 may also perform various operations of method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
Electronic device 800 may also include input/output (I/O) interface 805, input/output (I/O) interface 805 also connected to bus 804, according to an embodiment of the present disclosure. Electronic device 800 may also include one or more of the following components connected to I/O interface 805: an input portion 806 including a keyboard, a mouse, and the like; an output section 807 including a signal such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 808 including a hard disk and the like; and a communication section 809 including a network interface card such as a LAN card, a modem, or the like. The communication section 809 performs communication processing via a network such as the internet. A drive 810 is also connected to the I/O interface 805 as necessary. A removable medium 811 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 810 as necessary, so that a computer program read out therefrom is mounted on the storage section 808 as necessary.
According to embodiments of the present disclosure, method flows according to embodiments of the present disclosure may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 809 and/or installed from the removable medium 811. The computer program, when executed by the processor 801, performs the above-described functions defined in the system of the embodiments of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to an embodiment of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium. Examples may include, but are not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 802 and/or RAM 803 described above and/or one or more memories other than the ROM 802 and RAM 803.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the method provided by the embodiments of the present disclosure, when the computer program product is run on an electronic device, the program code being configured to cause the electronic device to implement the information processing method provided by the embodiments of the present disclosure.
The computer program, when executed by the processor 801, performs the above-described functions defined in the system/apparatus of the embodiments of the present disclosure. The systems, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In one embodiment, the computer program may be hosted on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted in the form of a signal on a network medium, distributed, downloaded and installed via communication section 809, and/or installed from removable media 811. The computer program containing program code may be transmitted using any suitable network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the disclosure, and these alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (12)

1. An information processing method comprising:
in response to receiving registration requests from a plurality of users, determining risk level information of each of the plurality of users according to the registration requests, wherein the registration requests comprise identity identification information and user basic information of each of the plurality of users;
processing the user basic information and the risk level information of each of the plurality of users to obtain the transaction amount information of each of the plurality of users, wherein the transaction amount information corresponds to the identity information; and
and in response to receiving a transaction request from a target user in the plurality of users, determining target transaction limit information of the target user according to the transaction request.
2. The method of claim 1, wherein the registration request further includes registration information of the user;
the determining the respective risk level information of the plurality of users according to the registration request includes:
determining respective evaluation values of the plurality of users according to a preset evaluation standard and the registration information; and
and determining the risk level information of each of the plurality of users according to the evaluation value, wherein the risk level information corresponds to the identity information.
3. The method of claim 2, wherein the registration information includes account opening link dimensional information and transaction link dimensional information of the user;
the determining the evaluation values of the plurality of users according to the preset scoring criteria and the registration information includes:
determining a first evaluation value under the condition that the dimension information of the account opening link conforms to a first preset evaluation standard;
determining a second evaluation value under the condition that the dimension information of the transaction link meets a second preset evaluation standard; and
determining the evaluation value according to the first evaluation value and the second evaluation value.
4. The method of claim 2 or 3, wherein said determining risk level information for each of the plurality of users from the assessment value comprises:
determining the risk level information of the user as a first risk level in a case where the evaluation value is greater than a first threshold value;
determining the risk level information of the user as a second risk level in a case where the evaluation value is between the first threshold value and a second threshold value; and
determining the risk level information of the user as a third risk level in a case where the evaluation value is smaller than the second threshold value.
5. The method of claim 1, wherein the user base information includes natural information, asset information, account information, and historical transaction information of the user;
the processing the user basic information and the risk level information of each of the plurality of users to obtain the transaction amount information of each of the plurality of users comprises:
respectively processing the user basic information and the risk level information of the users by using a preset model to obtain processing results, wherein the preset model comprises a machine learning model; and
and determining the transaction limit information corresponding to the respective identity identification information of the plurality of users according to the processing result.
6. The method of claim 5, further comprising:
and determining the risk identity information of the risk user under the condition that the processing result represents that the user belongs to the risk user.
7. The method of claim 1, wherein the transaction request includes target identification information and transaction information of the target user, the transaction information including transaction channel information, transaction type information, transaction amount information, user level information, and user preference information of the target user;
the step of determining the target transaction limit information of the target user according to the transaction request comprises the following steps:
determining candidate transaction limit information of the target user according to the target identity identification information; and
and determining the target transaction limit information according to the transaction channel information, the transaction type information, the user level information and the user preference information.
8. The method of claim 7, further comprising:
determining authentication medium information according to the target transaction limit information under the condition that the relationship between the transaction amount information and the target transaction limit information meets a preset condition; and
and determining risk prompt information under the condition that the relation between the transaction amount information and the target transaction amount information does not meet a preset condition.
9. An information processing apparatus comprising:
the system comprises a first determining module, a second determining module and a third determining module, wherein the first determining module is used for responding to a registration request from a plurality of users and determining the risk level information of each of the plurality of users according to the registration request, and the registration request comprises the identity identification information and the user basic information of each of the plurality of users;
the processing module is used for processing the user basic information and the risk level information of each of the plurality of users to obtain the transaction amount information of each of the plurality of users, wherein the transaction amount information corresponds to the identity information; and
and the second determining module is used for responding to a transaction request received from a target user in the plurality of users and determining target transaction limit information of the target user according to the transaction request.
10. An electronic device, comprising:
one or more processors;
a memory to store one or more instructions that,
wherein the one or more instructions, when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-8.
11. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to carry out the method of any one of claims 1 to 8.
12. A computer program product comprising computer executable instructions for implementing the method of any one of claims 1 to 8 when executed.
CN202210478151.2A 2022-04-29 2022-04-29 Information processing method and device, electronic equipment and computer readable storage medium Pending CN114820214A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210478151.2A CN114820214A (en) 2022-04-29 2022-04-29 Information processing method and device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210478151.2A CN114820214A (en) 2022-04-29 2022-04-29 Information processing method and device, electronic equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN114820214A true CN114820214A (en) 2022-07-29

Family

ID=82512177

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210478151.2A Pending CN114820214A (en) 2022-04-29 2022-04-29 Information processing method and device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN114820214A (en)

Similar Documents

Publication Publication Date Title
US20210374749A1 (en) User profiling based on transaction data associated with a user
CN111210335B (en) User risk identification method and device and electronic equipment
US10726501B1 (en) Method to use transaction, account, and company similarity clusters derived from the historic transaction data to match new transactions to accounts
CN113610230A (en) Training method, prediction method, device, computer system and storage medium
CN110197426B (en) Credit scoring model building method, device and readable storage medium
CN114358147A (en) Training method, identification method, device and equipment of abnormal account identification model
CN113507419A (en) Training method of flow distribution model, and flow distribution method and device
CN113010798A (en) Information recommendation method, information recommendation device, electronic equipment and readable storage medium
US20220198579A1 (en) System and method for dimensionality reduction of vendor co-occurrence observations for improved transaction categorization
CN115795345A (en) Information processing method, device, equipment and storage medium
CN113094595A (en) Object recognition method, device, computer system and readable storage medium
CN115048561A (en) Recommendation information determination method and device, electronic equipment and readable storage medium
CN114820214A (en) Information processing method and device, electronic equipment and computer readable storage medium
CN114357523A (en) Method, device, equipment, storage medium and program product for identifying risk object
US11561963B1 (en) Method and system for using time-location transaction signatures to enrich user profiles
CN114880369A (en) Risk credit granting method and system based on weak data technology
CN112613980A (en) Transaction processing method and device, electronic equipment and computer-readable storage medium
CN118134492A (en) Business risk identification method, device, equipment, medium and program product
US20210248617A1 (en) System and method for predicting support escalation
CN113095805A (en) Object recognition method, device, computer system and readable storage medium
CN115689705A (en) Object identification method, device, equipment and medium
CN116562974A (en) Object recognition method, device, electronic equipment and storage medium
CN117011051A (en) Service processing method and device, electronic equipment and computer readable storage medium
CN116341945A (en) Object evaluation method and device, electronic equipment and computer readable storage medium
CN114742648A (en) Product pushing method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination