CN114997991A - Withdrawal risk interception method and device, computer equipment and storage medium - Google Patents

Withdrawal risk interception method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN114997991A
CN114997991A CN202210619754.XA CN202210619754A CN114997991A CN 114997991 A CN114997991 A CN 114997991A CN 202210619754 A CN202210619754 A CN 202210619754A CN 114997991 A CN114997991 A CN 114997991A
Authority
CN
China
Prior art keywords
risk
risk interception
interception rule
rule
credit product
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210619754.XA
Other languages
Chinese (zh)
Other versions
CN114997991B (en
Inventor
黄刚
郑亚萍
康仁君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kingdee Credit Information Co ltd
Original Assignee
Kingdee Credit Information Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kingdee Credit Information Co ltd filed Critical Kingdee Credit Information Co ltd
Priority to CN202210619754.XA priority Critical patent/CN114997991B/en
Publication of CN114997991A publication Critical patent/CN114997991A/en
Application granted granted Critical
Publication of CN114997991B publication Critical patent/CN114997991B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application relates to a withdrawal risk intercepting method and device, computer equipment and a storage medium. The method comprises the following steps: receiving a payment instruction, wherein the payment instruction carries instruction source, target credit product and loan application information; acquiring a white list and a black list corresponding to each risk interception rule in the M risk interception rules to be executed; and determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to each risk interception rule. The flexibility of the risk interception rule is improved.

Description

Withdrawal risk interception method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of internet technologies, and in particular, to a withdrawal risk intercepting method and apparatus, a computer device, and a storage medium.
Background
With the increasing variety of internet credit products, the proposal of a reasonable withdrawal risk interception scheme becomes an urgent problem to be solved. In the traditional technology, after receiving a withdrawal instruction, a server verifies loan application information based on a fixed risk interception rule, and determines whether to intercept withdrawal based on a verification result.
However, the risk interception rules adapted for different credit products may be different, and the risk interception rules are not flexible enough, so that the problem of non-payment due to unreasonable interception logic may occur.
Disclosure of Invention
Therefore, it is necessary to provide a withdrawal risk interception method, a withdrawal risk interception device, a computer device, and a storage medium, which can improve the flexibility of risk interception rules, in view of the above technical problems.
In a first aspect, the application provides a withdrawal risk intercepting method. The method comprises the following steps:
receiving a payment instruction, wherein the payment instruction carries instruction source, target credit product and loan application information;
acquiring a white list and a black list corresponding to each risk interception rule in the M risk interception rules to be executed;
and determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to each risk interception rule.
In one embodiment, the obtaining a white list and a black list corresponding to each risk interception rule of the M to-be-executed risk interception rules includes:
determining a first mapping relation according to a risk interception rule configured for each credit product by a user, wherein the first mapping relation is used for indicating the corresponding relation between the credit product and the risk interception rule;
and aiming at each risk interception rule in the M risk interception rules to be executed, acquiring a white list and a black list corresponding to the risk interception rule according to the first mapping relation and the risk interception rule.
In one embodiment, the obtaining a white list and a black list corresponding to the risk interception rule according to the first mapping relationship and the risk interception rule includes:
according to the first mapping relation, credit products which are not configured with the risk interception rule and credit products which are configured with the risk interception rule are searched;
determining the white list according to the credit products which are not configured with the risk interception rule;
determining the blacklist according to the credit product configured with the risk interception rule.
In one embodiment, the determining whether to intercept the loan according to the instruction source, the target credit product, the loan application information, and the white list and the black list corresponding to each risk interception rule includes:
verifying the withdrawal instruction according to the instruction source and the specified source of the withdrawal instruction of the target credit product aiming at the ith risk interception rule;
if the verification is passed, inquiring whether the target credit product is in a white list corresponding to the ith risk interception rule or not;
if the target credit product is not in the white list corresponding to the ith risk interception rule;
inquiring whether a blacklist corresponding to the ith risk interception rule is empty;
if the blacklist corresponding to the ith risk interception rule is not empty, inquiring whether the target credit product is in the blacklist corresponding to the ith risk interception rule;
if the target credit product is in the blacklist corresponding to the ith risk interception rule or the blacklist corresponding to the ith risk interception rule is empty, verifying the loan application information by adopting the ith risk interception rule;
if the verification is passed, determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and a white list and a black list corresponding to the (i + 1) th risk interception rule;
and if the verification fails, intercepting the withdrawal.
In one embodiment, the method further comprises:
and if the verification fails when the withdrawal instruction is verified, or the target credit product is in a white list corresponding to the ith risk interception rule, or the target credit product is not in a black list corresponding to the ith risk interception rule, determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to the (i + 1) th risk interception rule.
In one embodiment, the method further comprises:
and if the verification fails, determining whether to generate alarm information according to an alarm rule configured when the user is the ith risk interception rule.
In a second aspect, the application further provides a withdrawal risk intercepting device. The device comprises:
the receiving module is used for receiving a payment instruction, and the payment instruction carries an instruction source, a target credit product and loan application information;
the acquisition module is used for acquiring a white list and a black list corresponding to each risk interception rule in the M risk interception rules to be executed;
and the determining module is used for determining whether to intercept the payment according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to each risk interception rule.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory storing a computer program and a processor implementing the following steps when executing the computer program:
receiving a payment instruction, wherein the payment instruction carries instruction source, target credit product and loan application information;
acquiring a white list and a black list corresponding to each risk interception rule in the M risk interception rules to be executed;
and determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to each risk interception rule.
In a fourth aspect, the present application further provides a computer-readable storage medium. The computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of:
receiving a payment instruction, wherein the payment instruction carries instruction source, target credit product and loan application information;
acquiring a white list and a black list corresponding to each risk interception rule in the M risk interception rules to be executed;
and determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and a white list and a black list corresponding to each risk interception rule.
In a fifth aspect, the present application further provides a computer program product. The computer program product comprising a computer program which when executed by a processor performs the steps of:
receiving a payment instruction, wherein the payment instruction carries instruction source, target credit product and loan application information;
acquiring a white list and a black list corresponding to each risk interception rule in the M risk interception rules to be executed;
and determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to each risk interception rule.
The withdrawal risk intercepting method, the withdrawal risk intercepting device, the computer equipment and the storage medium,
receiving a withdrawal instruction, wherein the withdrawal instruction carries instruction sources, target credit products and loan application information, then obtaining a white list and a black list corresponding to each risk interception rule in M risk interception rules to be executed, and finally determining whether to intercept the withdrawal according to the instruction sources, the target credit products, the loan application information and the white list and the black list corresponding to each risk interception rule. The method of the embodiment of the application realizes the adaptation of the credit product and the risk interception rule, the flexibility of the risk interception rule is increased, and the interception logic is more reasonable.
Drawings
FIG. 1 is a schematic flow chart illustrating a withdrawal risk interception method according to an embodiment;
FIG. 2 is a schematic flow chart of S104 in one embodiment;
FIG. 3 is a diagram of a first mapping relationship in one embodiment;
FIG. 4 is a schematic diagram of a white list and a black list in one embodiment;
FIG. 5 is a schematic flow chart of S106 in one embodiment;
FIG. 6 is a diagram of M risk interception rules in one embodiment;
FIG. 7 is a block diagram showing the structure of a withdrawal risk intercepting apparatus according to an embodiment;
FIG. 8 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more clearly understood, the present application is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
With the increasing variety of internet credit products, the issue of proposing a reasonable withdrawal risk interception scheme becomes an urgent solution. In some embodiments, after receiving the withdrawal instruction, the server checks the loan application information based on a fixed risk interception rule, and determines whether to intercept the withdrawal based on a check result. However, the risk interception rules adapted for different credit products may be different, and the risk interception rules are not flexible enough, so that the problem of non-payment due to unreasonable interception logic may occur.
Therefore, the embodiment of the application provides a withdrawal risk intercepting method, in the embodiment, the risk intercepting rule is not flexible enough to serve as an entry point, business personnel are provided to configure different risk intercepting rules for each credit product, and a white list and a black list corresponding to each risk intercepting rule are obtained based on the configuration of the business personnel, wherein credit products which do not need to be verified by using the risk intercepting rules are stored in the white list, and credit products which need to be verified by using the risk intercepting rules are stored in the black list. And after the server receives the withdrawal instruction, judging whether to adopt the corresponding risk interception rule for verification or not based on the white list and the black list corresponding to each risk interception rule. The method of the embodiment of the application realizes the adaptation of the credit product and the risk interception rule, the flexibility of the risk interception rule is increased, and the interception logic is more reasonable.
Optionally, the withdrawal risk intercepting method provided in the embodiment of the present application may be applied to a server, or software or hardware with any specific corresponding processing capability, and the embodiment of the present application is only illustrated as being applied to the server. The following describes the implementation process and technical effects in detail with reference to specific embodiments.
In one embodiment, as shown in fig. 1, there is provided a withdrawal risk intercepting method, including the steps of:
s102, receiving a payment instruction, wherein the payment instruction carries instruction source, target credit product and loan application information.
In a possible implementation manner, for convenience of description, a user applying for loan, referred to as a borrower in the embodiment of the present application, may select a credit product and fill in loan personal information on a loan application page provided by a loan platform, and click a submit button after these operations are completed, and after the loan platform detects that the user clicks the submit button, the loan platform sends a payment instruction to a server, where the payment instruction carries the loan application information, the credit product selected by the user, and an instruction source. The loan application information comprises the loan personal information, and also comprises a built-in contract number, an order number and the like, wherein the built-in contract number and the order number can be automatically generated by the loan platform, and in this case, the instruction source is automatic payment.
In another possible implementation manner, a service person or a finance person may directly perform an operation of triggering a payment instruction on a payment page provided by the loan platform, and after detecting the operation, the loan platform sends the payment instruction to the server, where the payment instruction carries loan application information, a credit product, and an instruction source. Where the loan application information may be filled in by a business or finance on a cash out page, the credit product may be selected by the business or finance on the cash out page, in which case the instruction source is an artificial cash out.
For convenience of explanation, in the embodiments of the present application, "credit product selected by user" related to the first mode and "credit product" related to the second mode are referred to as target credit product.
Optionally, the above-mentioned loan personal information may include: age, academic calendar, occupation, position, certificate number, collection account, loan amount, payroll income, family condition, residence and personal credit record, etc.
S104, obtaining a white list and a black list corresponding to each risk interception rule in the M risk interception rules to be executed.
The white list corresponding to each risk interception rule stores credit products which do not need to be verified by adopting the risk interception rule, and the black list stores credit products which need to be verified by adopting the risk interception rule.
And S106, determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to each risk interception rule.
And aiming at each risk interception rule in the M risk interception rules to be executed, judging whether to use the risk interception rule for verification or not based on a target credit product carried by the withdrawal instruction and a white list and a black list corresponding to the risk interception rule, if so, verifying loan application information by using the risk interception rule, if not, abandoning the risk interception rule, namely, not using the risk interception rule for verifying the loan application information, and then entering the judgment of the next risk interception rule. And if the verification results of all the used risk interception rules are verified to be passed, the money is not intercepted, and if the verification results of any risk interception rule in all the used risk interception rules are not passed, the money is intercepted.
The withdrawal risk interception method provided by the embodiment of the application receives a withdrawal instruction, the withdrawal instruction carries an instruction source, a target credit product and loan application information, then obtains a white list and a black list corresponding to each risk interception rule in M risk interception rules to be executed, and finally determines whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to each risk interception rule. The method of the embodiment of the application realizes the adaptation of the credit product and the risk interception rule, the flexibility of the risk interception rule is increased, and the interception logic is more reasonable.
In the above-mentioned embodiment of the present application, the risk interception rule is filtered through the white list and the black list, and the following describes in detail how to obtain the white list and the black list, specifically, as shown in fig. 2, S104 includes:
s1041, determining a first mapping relation according to the risk interception rule configured by the user for each credit product, wherein the first mapping relation is used for indicating the corresponding relation between the credit product and the risk interception rule.
Optionally, the user in this step may be a service person.
Optionally, the loan platform may provide a configuration page, the business person may configure a risk interception rule for each credit product on the configuration page, and the loan platform may further send the business person configured a risk interception rule for each credit product to the server, so that the server may determine the first mapping relationship according to the risk interception rule configured by the business person for each credit product.
The following examples illustrate:
suppose that a business person configures rule 1, rule 2, and rule 3 for credit product a, rule 2, rule 4, and rule 5 for credit product B, and rule 1, rule 2, and rule 6 for credit product C on a configuration page, the configurations of the loan platform are sent to a server, and the server obtains a first mapping relationship based on the configurations, and the first mapping relationship is shown in fig. 3.
S1042, aiming at each risk interception rule in the M risk interception rules to be executed, acquiring a white list and a black list corresponding to the risk interception rule according to the first mapping relation and the risk interception rule.
Optionally, the set of all risk interception rules in the first mapping relationship may be a subset of the set of M risk interception rules to be executed. That is, the M to-be-executed risk interception rules include the risk interception rule in the first mapping relationship.
Optionally, for each risk interception rule in the M risk interception rules to be executed, a credit product not configured with the risk interception rule and a credit product configured with the risk interception rule may be searched according to the first mapping relationship; determining a white list according to credit products which are not configured with the risk interception rule; determining a blacklist according to the credit product configured with the risk interception rule.
The following is illustrated in connection with fig. 3:
suppose that the M to-be-executed risk interception rules are rule 1, rule 2, rule 3, rule 4, rule 5, and rule 6 in fig. 3. For rule 1, which credit products are configured with rule 1 is queried in the first mapping relationship, and if rule 1 is queried and credit product a and credit product C are configured, and rule 1 is not configured by credit product B, then it may be determined that the white list corresponding to rule 1 includes credit product B and the black list corresponding to rule 1 includes credit product a and credit product C. Similarly, inquiring which credit product configured the rule 2 in the first mapping relationship, and inquiring that the rule 2 is configured for each of the credit product a, the credit product B, and the credit product C, may determine that the white list corresponding to the rule 2 is empty, and the black list corresponding to the rule 2 includes the credit product a, the credit product B, and the credit product C. And obtaining a white list and a black list corresponding to the rules 3 to 6 respectively by adopting the same method. The white list and the black list corresponding to each of the rules 1 to 6 can be seen in fig. 4.
The embodiment of the application provides a specific implementation mode for obtaining the white list and the black list, after the white list and the black list are obtained, risk interception rules can be filtered based on the white list and the black list, so that the server only uses the risk interception rules configured by a user to check loan application information, and compared with the check of the loan application information by using fixed risk interception rules, the adaptation of credit products and the risk interception rules is realized, the flexibility of the risk interception rules is increased, and the interception logic is more reasonable.
In one embodiment, as shown in fig. 5, S106 includes:
s1061, aiming at the ith risk interception rule, verifying the withdrawal instruction according to the instruction source and the specified source of the withdrawal instruction of the target credit product.
Optionally, the service person may configure the specified source of the withdrawal instruction for each credit product on the configuration page, and the loan platform may send the specified source of the withdrawal instruction for each credit product to the server, so that the server may search the specified source of the withdrawal instruction based on the target credit product after receiving the withdrawal instruction, and then verify the withdrawal instruction based on the instruction source carried in the withdrawal instruction and the specified source. Specifically, the server may compare the instruction source carried in the withdrawal instruction with the specified source, and if the instruction source and the specified source are the same, the verification is considered to be passed, and if the instruction source and the specified source are different, the verification is considered to be failed.
The following examples illustrate:
assuming that the designated source of the withdrawal instruction of the credit product A configured by the service personnel is manual withdrawal, the designated source of the withdrawal instruction of the credit product B is manual withdrawal, the designated source of the withdrawal instruction of the credit product C is automatic withdrawal, the target credit product carried in the withdrawal instruction received by the server is the credit product A, the instruction source carried in the withdrawal instruction is automatic withdrawal, and since the designated source of the withdrawal instruction of the credit product A is manual withdrawal and the instruction source carried in the withdrawal instruction is automatic withdrawal, the two are different, it is determined that the verification of the withdrawal instruction fails.
If the check of S1061 passes, S1062 is performed.
If the check of S1061 fails, S1066 is performed.
Optionally, in the case that the check is failed in S1061, a check failure message may be further sent to the service staff or the finance, where the check failure message is used to indicate that the check on the withdrawal instruction fails, and after receiving the check failure message, the service staff or the finance may determine, by combining with the actual situation, whether to trigger the withdrawal instruction from the specified source.
S1062, inquiring whether the target credit product is in a white list corresponding to the ith risk interception rule.
And if the target credit product is in the white list corresponding to the ith risk interception rule, executing S1066.
And if the target credit product is not in the white list corresponding to the ith risk interception rule, executing S1063.
S1063, inquiring whether the blacklist corresponding to the ith risk interception rule is empty.
And if the blacklist corresponding to the ith risk interception rule is empty, executing S1065.
If the blacklist corresponding to the ith risk interception rule is not empty, S1064 is executed.
S1064, inquiring whether the target credit product is in a blacklist corresponding to the ith risk interception rule.
And if the target credit product is in the blacklist corresponding to the ith risk interception rule, executing S1065.
And if the target credit product is not in the blacklist corresponding to the ith risk interception rule, executing S1066.
And S1065, verifying the loan application information by adopting the ith risk interception rule.
If the verification passes, S1066 is performed.
If the verification is not passed, the payment is intercepted.
It should be noted that the key point of the embodiment of the present application is to filter the risk interception rule by using a white list and a black list, and as to what the risk interception rule is specifically, the embodiment of the present application is not limited, and as an example, the risk interception rule may be: one or more combinations of certificate numbers, built-in contract numbers, order numbers, collection accounts, credit products, loan amounts. Such as: the ith risk interception rule is used for adding loan amount to the collection account, and the process of verifying loan application information by adopting the ith risk interception rule is as follows: and extracting a collection account and a loan amount from the loan application information, checking whether the collection account and the loan amount meet preset conditions, if so, considering that the verification is passed, and if not, considering that the verification is not passed. The following steps are repeated: the ith risk interception rule is: if the certificate number is repeated, the process of verifying the loan application information by adopting the ith risk interception rule is as follows: and extracting the certificate number from the loan application information, checking whether the certificate number has been successfully paid out, if the certificate number has been successfully paid out, determining that the verification is not passed, and if the certificate number has not been paid out, determining that the verification is passed.
S1066, determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to the (i + 1) th risk interception rule.
For the judgment of the (i + 1) th risk interception rule is similar to the ith risk interception rule, which is not repeated herein in the embodiment of the present application, referring to fig. 6, the judgment may be performed in sequence according to the sequence shown in fig. 6, so as to filter out the risk interception rules to be adopted, check the loan application information by using the risk interception rules, if all the check results corresponding to the risk interception rules are passed, no loan is intercepted, and if any one of the check results corresponding to the risk interception rules is failed, the loan is intercepted.
The following process of S1061-S1066 is illustrated:
assuming that a white list corresponding to a 1 st risk interception rule in the M risk interception rules to be executed is empty, and a black list corresponding to the 1 st risk interception rule comprises a credit product A, a credit product B and a credit product C. Assuming that a target credit product carried by a payment instruction is a credit product A, an instruction source carried by the payment instruction is manual payment, assuming that an appointed source of the payment instruction of the credit product A is manual payment, since the instruction source carried by the payment instruction is the same as the appointed source of the payment instruction of the credit product A, checking the payment instruction is passed, then inquiring whether the credit product A is in a white list corresponding to a 1 st risk interception rule, since the white list corresponding to the 1 st risk interception rule is empty, continuously inquiring whether a blacklist corresponding to the 1 st risk interception rule is empty, since the blacklist corresponding to the 1 st risk interception rule is not empty, continuously inquiring whether the credit product A is in the blacklist corresponding to the 1 st risk interception rule, since the credit product A is in the blacklist corresponding to the 1 st risk interception rule, and verifying the loan application information by adopting the 1 st risk interception rule, if the loan application information passes the verification, judging the 2 nd risk interception rule, wherein the judgment of the 2 nd risk interception rule is similar to the 1 st risk interception rule, and the embodiment of the application is not repeated herein. And finishing the judgment of the M risk interception rules to be executed according to the sequence.
Optionally, the service personnel may configure an alarm rule for each risk interception rule on the configuration page, and when the verification fails when the ith risk interception rule is used to verify the loan application information, determine whether to generate the alarm information according to the alarm rule configured when the user is the ith risk interception rule.
The following examples illustrate:
suppose that the alarm rule configured by the service person for rule 1 in fig. 3 is: and (3) alarming, wherein the alarming rule configured for the rule 2 is as follows: no alarm, the alarm rule configured for rule 3 is: and (4) alarming, wherein the alarming rules configured for the rule 4 are as follows: and (3) alarming, wherein the alarming rule configured for the rule 5 is as follows: no alarm, the alarm rule configured for rule 6 is: no alarm is given. If the check fails when the loan application information is checked by adopting the rule 1, inquiring the alarm rule of the rule 1, wherein the alarm rule of the rule 1 is as follows: and if the alarm is given, generating alarm information and sending the alarm information to the service personnel so that the service personnel can follow up the processing. The service personnel can configure the alarm for the rule which is necessary to follow up, and configure the non-alarm for the rule which is not necessary to follow up, thereby avoiding the alarm flooding.
The embodiment of the application provides a detailed withdrawal interception scheme, and based on the scheme, the risk interception rules needing to be adopted can be filtered out, so that credit products and the risk interception rules are more adaptive, and the flexibility of the risk interception rules is improved.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a part of the steps in the flowcharts related to the embodiments described above may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the execution order of the steps or stages is not necessarily sequential, but may be rotated or alternated with other steps or at least a part of the steps or stages in other steps.
Based on the same inventive concept, the embodiment of the application also provides a withdrawal risk intercepting device for realizing the withdrawal risk intercepting method. The implementation scheme for solving the problem provided by the device is similar to the implementation scheme recorded in the method, so that specific limitations in one or more embodiments of the withdrawal risk intercepting device provided below can be referred to the limitations on the withdrawal risk intercepting method in the above description, and details are not described herein again.
In one embodiment, as shown in fig. 7, there is provided a withdrawal risk intercepting apparatus including:
the receiving module 701 is used for receiving a payment instruction, wherein the payment instruction carries instruction sources, target credit products and loan application information;
an obtaining module 702, configured to obtain a white list and a black list corresponding to each risk interception rule in the M risk interception rules to be executed;
a determining module 703, configured to determine whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information, and the white list and the black list corresponding to each risk interception rule.
Optionally, the obtaining module 702 is specifically configured to:
determining a first mapping relation according to a risk interception rule configured for each credit product by a user, wherein the first mapping relation is used for indicating the corresponding relation between the credit product and the risk interception rule;
and aiming at each risk interception rule in the M risk interception rules to be executed, acquiring a white list and a black list corresponding to the risk interception rule according to the first mapping relation and the risk interception rule.
Optionally, the obtaining module 702 is specifically configured to:
according to the first mapping relation, credit products which are not configured with the risk interception rule and credit products which are configured with the risk interception rule are searched;
determining the white list according to the credit products which are not configured with the risk interception rule;
determining the blacklist according to the credit product configured with the risk interception rule.
Optionally, the determining module 703 is specifically configured to:
according to the ith risk interception rule, verifying the withdrawal instruction according to the instruction source and the specified source of the withdrawal instruction of the target credit product;
if the verification is passed, inquiring whether the target credit product is in a white list corresponding to the ith risk interception rule or not;
if the target credit product is not in the white list corresponding to the ith risk interception rule;
inquiring whether a blacklist corresponding to the ith risk interception rule is empty;
if the blacklist corresponding to the ith risk interception rule is not empty, inquiring whether the target credit product is in the blacklist corresponding to the ith risk interception rule;
if the target credit product is in the blacklist corresponding to the ith risk interception rule or the blacklist corresponding to the ith risk interception rule is empty, verifying the loan application information by adopting the ith risk interception rule;
if the verification is passed, determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and a white list and a black list corresponding to the (i + 1) th risk interception rule;
and if the verification fails, intercepting the withdrawal.
Optionally, the determining module 703 is specifically configured to:
and if the verification fails when the withdrawal instruction is verified, or the target credit product is in a white list corresponding to the ith risk interception rule, or the target credit product is not in a black list corresponding to the ith risk interception rule, determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to the (i + 1) th risk interception rule.
Optionally, the determining module 703 is further configured to:
and if the verification fails, determining whether to generate alarm information according to an alarm rule configured when the user is the ith risk interception rule.
The modules in the withdrawal risk intercepting apparatus can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 8. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing the data such as the first mapping relation and the like which need to be stored by the server. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a withdrawal risk interception method.
It will be appreciated by those skilled in the art that the configuration shown in fig. 8 is a block diagram of only a portion of the configuration associated with the present application, and is not intended to limit the computing device to which the present application may be applied, and that a particular computing device may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
receiving a payment instruction, wherein the payment instruction carries instruction source, target credit product and loan application information; acquiring a white list and a black list corresponding to each risk interception rule in the M risk interception rules to be executed; and determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to each risk interception rule.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
determining a first mapping relation according to a risk interception rule configured for each credit product by a user, wherein the first mapping relation is used for indicating the corresponding relation between the credit product and the risk interception rule; and aiming at each risk interception rule in the M risk interception rules to be executed, acquiring a white list and a black list corresponding to the risk interception rule according to the first mapping relation and the risk interception rule.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
according to the first mapping relation, credit products which are not configured with the risk interception rule and credit products which are configured with the risk interception rule are searched; determining the white list according to the credit products which are not configured with the risk interception rule; determining the blacklist according to the credit product configured with the risk interception rule.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
according to the ith risk interception rule, verifying the withdrawal instruction according to the instruction source and the specified source of the withdrawal instruction of the target credit product; if the verification is passed, inquiring whether the target credit product is in a white list corresponding to the ith risk interception rule; if the target credit product is not in the white list corresponding to the ith risk interception rule; inquiring whether a blacklist corresponding to the ith risk interception rule is empty; if the blacklist corresponding to the ith risk interception rule is not empty, inquiring whether the target credit product is in the blacklist corresponding to the ith risk interception rule; if the target credit product is in the blacklist corresponding to the ith risk interception rule or the blacklist corresponding to the ith risk interception rule is empty, verifying the loan application information by adopting the ith risk interception rule; if the verification is passed, determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and a white list and a black list corresponding to the (i + 1) th risk interception rule; and if the verification fails, intercepting the withdrawal.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
and if the verification fails when the withdrawal instruction is verified, or the target credit product is in a white list corresponding to the ith risk interception rule, or the target credit product is not in a black list corresponding to the ith risk interception rule, determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to the (i + 1) th risk interception rule.
In one embodiment, the processor when executing the computer program further performs the steps of:
and if the verification fails, determining whether to generate alarm information according to an alarm rule configured when the user is the ith risk interception rule.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, performs the steps of:
receiving a payment instruction, wherein the payment instruction carries instruction source, target credit product and loan application information; acquiring a white list and a black list corresponding to each risk interception rule in the M risk interception rules to be executed; and determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to each risk interception rule.
In one embodiment, the computer program when executed by the processor further performs the steps of:
determining a first mapping relation according to a risk interception rule configured for each credit product by a user, wherein the first mapping relation is used for indicating the corresponding relation between the credit product and the risk interception rule; and aiming at each risk interception rule in the M risk interception rules to be executed, acquiring a white list and a black list corresponding to the risk interception rule according to the first mapping relation and the risk interception rule.
In one embodiment, the computer program when executed by the processor further performs the steps of:
according to the first mapping relation, searching credit products which are not configured with the risk interception rule and credit products which are configured with the risk interception rule; determining the white list according to the credit products which are not configured with the risk interception rule; determining the blacklist according to the credit product configured with the risk interception rule.
In one embodiment, the computer program when executed by the processor further performs the steps of:
verifying the withdrawal instruction according to the instruction source and the specified source of the withdrawal instruction of the target credit product aiming at the ith risk interception rule; if the verification is passed, inquiring whether the target credit product is in a white list corresponding to the ith risk interception rule; if the target credit product is not in the white list corresponding to the ith risk interception rule; inquiring whether a blacklist corresponding to the ith risk interception rule is empty; if the blacklist corresponding to the ith risk interception rule is not empty, inquiring whether the target credit product is in the blacklist corresponding to the ith risk interception rule; if the target credit product is in the blacklist corresponding to the ith risk interception rule or the blacklist corresponding to the ith risk interception rule is empty, verifying the loan application information by adopting the ith risk interception rule; if the verification is passed, determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and a white list and a black list corresponding to the (i + 1) th risk interception rule; if the verification is not passed, the payment is intercepted.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and if the verification fails when the withdrawal instruction is verified, or the target credit product is in a white list corresponding to the ith risk interception rule, or the target credit product is not in a black list corresponding to the ith risk interception rule, determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to the (i + 1) th risk interception rule.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and if the verification fails, determining whether to generate alarm information according to an alarm rule configured when the user is the ith risk interception rule.
In one embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, performs the steps of:
receiving a payment instruction, wherein the payment instruction carries instruction source, target credit product and loan application information; acquiring a white list and a black list corresponding to each risk interception rule in the M risk interception rules to be executed; and determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and a white list and a black list corresponding to each risk interception rule.
In one embodiment, the computer program when executed by the processor further performs the steps of:
determining a first mapping relation according to a risk interception rule configured for each credit product by a user, wherein the first mapping relation is used for indicating the corresponding relation between the credit product and the risk interception rule; and aiming at each risk interception rule in the M risk interception rules to be executed, acquiring a white list and a black list corresponding to the risk interception rule according to the first mapping relation and the risk interception rule.
In one embodiment, the computer program when executed by the processor further performs the steps of:
according to the first mapping relation, credit products which are not configured with the risk interception rule and credit products which are configured with the risk interception rule are searched; determining the white list according to the credit products which are not configured with the risk interception rule; determining the blacklist according to the credit product configured with the risk interception rule.
In one embodiment, the computer program when executed by the processor further performs the steps of:
according to the ith risk interception rule, verifying the withdrawal instruction according to the instruction source and the specified source of the withdrawal instruction of the target credit product; if the verification is passed, inquiring whether the target credit product is in a white list corresponding to the ith risk interception rule; if the target credit product is not in the white list corresponding to the ith risk interception rule; inquiring whether a blacklist corresponding to the ith risk interception rule is empty; if the blacklist corresponding to the ith risk interception rule is not empty, inquiring whether the target credit product is in the blacklist corresponding to the ith risk interception rule; if the target credit product is in the blacklist corresponding to the ith risk interception rule or the blacklist corresponding to the ith risk interception rule is empty, verifying the loan application information by adopting the ith risk interception rule; if the verification is passed, determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and a white list and a black list corresponding to the (i + 1) th risk interception rule; and if the verification fails, intercepting the withdrawal.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and if the verification fails when the withdrawal instruction is verified, or the target credit product is in a white list corresponding to the ith risk interception rule, or the target credit product is not in a black list corresponding to the ith risk interception rule, determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to the (i + 1) th risk interception rule.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and if the verification fails, determining whether to generate alarm information according to an alarm rule configured when the user is the ith risk interception rule.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, databases, or other media used in the embodiments provided herein can include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high-density embedded nonvolatile Memory, resistive Random Access Memory (ReRAM), Magnetic Random Access Memory (MRAM), Ferroelectric Random Access Memory (FRAM), Phase Change Memory (PCM), graphene Memory, and the like. Volatile Memory can include Random Access Memory (RAM), external cache Memory, and the like. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others. The databases referred to in various embodiments provided herein may include at least one of relational and non-relational databases. The non-relational database may include, but is not limited to, a block chain based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic devices, quantum computing based data processing logic devices, etc., without limitation.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (10)

1. A withdrawal risk interception method, comprising:
receiving a payment instruction, wherein the payment instruction carries instruction source, target credit product and loan application information;
acquiring a white list and a black list corresponding to each risk interception rule in the M risk interception rules to be executed;
and determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and a white list and a black list corresponding to each risk interception rule.
2. The method of claim 1, wherein the obtaining a white list and a black list corresponding to each risk interception rule of the M risk interception rules to be executed comprises:
determining a first mapping relation according to a risk interception rule configured for each credit product by a user, wherein the first mapping relation is used for indicating the corresponding relation between the credit product and the risk interception rule;
and aiming at each risk interception rule in the M risk interception rules to be executed, acquiring a white list and a black list corresponding to the risk interception rule according to the first mapping relation and the risk interception rule.
3. The method according to claim 2, wherein the obtaining a whitelist and a blacklist corresponding to the risk interception rule according to the first mapping relationship and the risk interception rule comprises:
according to the first mapping relation, searching credit products which are not configured with the risk interception rule and credit products which are configured with the risk interception rule;
determining the white list according to the credit products which are not configured with the risk interception rule;
determining the blacklist according to the credit product configured with the risk interception rule.
4. The method according to any one of claims 1-3, wherein said determining whether to block the withdrawal according to the instruction source, the target credit product, the loan application information, and the whitelist and blacklist for each risk blocking rule comprises:
verifying the payment instruction according to the instruction source and the specified source of the payment instruction for the target credit product;
if the verification is passed, inquiring whether the target credit product is in a white list corresponding to the ith risk interception rule or not;
if the target credit product is not in the white list corresponding to the ith risk interception rule;
inquiring whether a blacklist corresponding to the ith risk interception rule is empty;
if the blacklist corresponding to the ith risk interception rule is not empty, inquiring whether the target credit product is in the blacklist corresponding to the ith risk interception rule;
if the target credit product is in the blacklist corresponding to the ith risk interception rule or the blacklist corresponding to the ith risk interception rule is empty, verifying the loan application information by adopting the ith risk interception rule;
if the verification is passed, determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and a white list and a black list corresponding to the (i + 1) th risk interception rule;
and if the verification fails, intercepting the withdrawal.
5. The method of claim 4, further comprising:
and if the verification fails when the withdrawal instruction is verified, or the target credit product is in a white list corresponding to the ith risk interception rule, or the target credit product is not in a black list corresponding to the ith risk interception rule, determining whether to intercept the withdrawal according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to the (i + 1) th risk interception rule.
6. The method of claim 4, further comprising:
and if the verification fails, determining whether to generate alarm information according to an alarm rule configured when the user is the ith risk interception rule.
7. A withdrawal risk intercepting apparatus, characterized in that the apparatus comprises:
the receiving module is used for receiving a payment instruction, and the payment instruction carries an instruction source, a target credit product and loan application information;
the acquisition module is used for acquiring a white list and a black list corresponding to each risk interception rule in the M risk interception rules to be executed;
and the determining module is used for determining whether to intercept the payment according to the instruction source, the target credit product, the loan application information and the white list and the black list corresponding to each risk interception rule.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 6.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program realizes the steps of the method of any one of claims 1 to 6 when executed by a processor.
CN202210619754.XA 2022-06-02 2022-06-02 Method, device, computer equipment and storage medium for intercepting withdrawal risk Active CN114997991B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210619754.XA CN114997991B (en) 2022-06-02 2022-06-02 Method, device, computer equipment and storage medium for intercepting withdrawal risk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210619754.XA CN114997991B (en) 2022-06-02 2022-06-02 Method, device, computer equipment and storage medium for intercepting withdrawal risk

Publications (2)

Publication Number Publication Date
CN114997991A true CN114997991A (en) 2022-09-02
CN114997991B CN114997991B (en) 2024-04-23

Family

ID=83030345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210619754.XA Active CN114997991B (en) 2022-06-02 2022-06-02 Method, device, computer equipment and storage medium for intercepting withdrawal risk

Country Status (1)

Country Link
CN (1) CN114997991B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109584048A (en) * 2018-11-30 2019-04-05 上海点融信息科技有限责任公司 The method and apparatus that risk rating is carried out to applicant based on artificial intelligence
CN109816515A (en) * 2018-12-24 2019-05-28 天翼电子商务有限公司 Credit class product Internet-based selects system and method
US20200193513A1 (en) * 2018-12-18 2020-06-18 Fintech Credit Innovations Inc. Online lending platform providing firm offers of credit
CN113256401A (en) * 2021-05-26 2021-08-13 中科柏诚科技(北京)股份有限公司 Method, device, server and storage medium for intercepting user outside pre-loan domain
CN114445217A (en) * 2022-03-23 2022-05-06 深圳前海微众银行股份有限公司 Credit risk prevention and control method, device and system and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109584048A (en) * 2018-11-30 2019-04-05 上海点融信息科技有限责任公司 The method and apparatus that risk rating is carried out to applicant based on artificial intelligence
US20200193513A1 (en) * 2018-12-18 2020-06-18 Fintech Credit Innovations Inc. Online lending platform providing firm offers of credit
CN109816515A (en) * 2018-12-24 2019-05-28 天翼电子商务有限公司 Credit class product Internet-based selects system and method
CN113256401A (en) * 2021-05-26 2021-08-13 中科柏诚科技(北京)股份有限公司 Method, device, server and storage medium for intercepting user outside pre-loan domain
CN114445217A (en) * 2022-03-23 2022-05-06 深圳前海微众银行股份有限公司 Credit risk prevention and control method, device and system and computer readable storage medium

Also Published As

Publication number Publication date
CN114997991B (en) 2024-04-23

Similar Documents

Publication Publication Date Title
JP7028532B2 (en) Methods, equipment and computer programs for managing the blockchain life cycle
CN110688425B (en) Method and system for conditionally deferring transactions for blockchains
CN110494876B (en) System and method for issuing and tracking digital tokens within distributed network nodes
US11062294B2 (en) Cognitive blockchain for customized interchange determination
US20200412524A1 (en) Audit chain for private blockchain
US11115804B2 (en) Subscription to dependencies in smart contracts
US20210049715A1 (en) Blockchain-based data procesing method, apparatus, and electronic device
WO2016141491A1 (en) Systems and methods for managing data
US12039597B1 (en) Systems and methods for measuring data quality over time
CN112330471B (en) Service data processing method, device, computer equipment and storage medium
CN111598575B (en) Business process control method, business process control device, electronic equipment and readable storage medium
US11914732B2 (en) Systems and methods for hard deletion of data across systems
CN111967821A (en) Method, device, equipment and system for generating clearance confirmation information
CN114265577A (en) Service data processing method and device, computer equipment and storage medium
WO2019177788A1 (en) Detecting alterations of journal data structures
US20230259948A1 (en) Generating a multi-transaction dispute package
US20200226591A1 (en) Blockchain Based Action and Billing
CN114997991B (en) Method, device, computer equipment and storage medium for intercepting withdrawal risk
CN114490415A (en) Service testing method, computer device, storage medium, and computer program product
CN114549193A (en) List screening method, apparatus, device, storage medium and program product
CN114119243A (en) Pool financing management method, device, medium and electronic equipment based on block chain
US20240005321A1 (en) Digital policy criteria integration for making determinations within an inter-network facilitation system
US11704747B1 (en) Determining base limit values for contacts based on inter-network user interactions
US20240232900A1 (en) Intelligently selecting models for resolving pending debit transaction disputes across computer networks
US20230245128A1 (en) Detecting digital harvesting utilizing a dynamic transaction request fraud detection model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant