CN116596537A - Bank business authorization method and device, storage medium and electronic equipment - Google Patents

Bank business authorization method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN116596537A
CN116596537A CN202310340598.8A CN202310340598A CN116596537A CN 116596537 A CN116596537 A CN 116596537A CN 202310340598 A CN202310340598 A CN 202310340598A CN 116596537 A CN116596537 A CN 116596537A
Authority
CN
China
Prior art keywords
authorization
user
data
authorized
banking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310340598.8A
Other languages
Chinese (zh)
Inventor
金俊仪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202310340598.8A priority Critical patent/CN116596537A/en
Publication of CN116596537A publication Critical patent/CN116596537A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses a banking business authorization method, a banking business authorization device, a storage medium and electronic equipment, wherein the banking business authorization method comprises the following steps: acquiring business transaction data of a user to be authorized in the process of transacting banking business and user information of the user to be authorized; acquiring bank verification data for carrying out authorization verification on a user to be authorized; determining an authorization result of the user to be authorized according to the user information, the business transaction data and the bank verification data; and sending the authorization result to the user terminal so as to display the authorization result of the user to be authorized through the user terminal. The consumption of human resources can be reduced.

Description

Bank business authorization method and device, storage medium and electronic equipment
Technical Field
The present application relates to the field of electronic devices, and in particular, to a banking service authorization method, a banking service authorization device, a banking service authorization storage medium, and an electronic device.
Background
Banking business encompasses a variety of types, such as savings, bond, insurance, financial, and online mall business. In the process of handling various banking businesses, the user needs different banking businesses.
Therefore, the banking system developer needs to change the system code according to different banking authorization requirements, and the workload of the banking system developer is increased sharply along with the diversity of the banking requirements of the user. Therefore, the prior art has the defect of higher human resource consumption.
Disclosure of Invention
The embodiment of the application provides a banking business authorization method, a banking business authorization device, a storage medium and electronic equipment, which can reduce human resources.
In a first aspect, an embodiment of the present application provides a banking authorization method, including:
acquiring business transaction data of a user to be authorized in the process of transacting banking business and user information of the user to be authorized;
acquiring bank verification data for carrying out authorization verification on a user to be authorized;
determining an authorization result of the user to be authorized according to the user information, the business transaction data and the bank verification data;
and sending the authorization result to the user terminal so as to display the authorization result of the user to be authorized through the user terminal.
In a second aspect, an embodiment of the present application further provides a banking authorization device, including:
the user data acquisition module is used for acquiring business transaction data of the user to be authorized in the process of transacting banking business and user information of the user to be authorized;
The bank data acquisition module is used for acquiring bank verification data for carrying out authorization verification on a user to be authorized;
the authorization verification module is used for determining an authorization result of the user to be authorized according to the user information, the business transaction data and the bank verification data;
and the communication module is used for sending the authorization result to the user terminal so as to display the authorization result of the user to be authorized through the user terminal.
In a third aspect, embodiments of the present application also provide a computer-readable storage medium having stored thereon a computer program which, when run on a computer, causes the computer to perform a banking authorization method as provided by any of the embodiments of the present application.
In a fourth aspect, an embodiment of the present application further provides an electronic device, including a processor and a memory, where the memory has a computer program, and the processor is configured to execute the banking authorization method according to any embodiment of the present application by calling the computer program.
According to the technical scheme provided by the embodiment of the application, the user information of the user to be authorized and the business transaction data thereof in the process of transacting the banking business are obtained, and the user information, the banking transaction data and the banking verification data are subjected to data comparison, so that the authorization result of the user to be authorized is determined. Compared with the prior art, the application does not need to continuously modify the system codes of different banking authorities, reduces the workload of developing manual work of a banking system, and further reduces the manpower resource cost of a bank.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an application scenario of a banking authorization method according to an embodiment of the present application.
Fig. 2 is a flow chart of a banking authorization method according to an embodiment of the present application.
Fig. 3 is a schematic structural diagram of a banking authorization device according to an embodiment of the present application.
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. It will be apparent that the described embodiments are only some, but not all, embodiments of the application. All other embodiments, which can be made by a person skilled in the art without any inventive effort, are intended to be within the scope of the present application based on the embodiments of the present application.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
In the related art, when the situation of changing the authorization requirement of the banking business or upgrading the banking system is faced, a developer of the banking system is required to maintain related system codes, so that the authorization requirement of the banking business or the use requirement of the banking system is met. However, such a method is difficult to cope with a large number of scenes in which codes need to be modified, which causes a rapid increase in workload of developers of the banking system and causes loss of human resources. Before the user is authorized for banking, the code is maintained by a developer of the banking system, and related matters of the banking authorization of the user cannot be processed rapidly, so that the efficiency of the banking authorization processing of the user is reduced.
In order to solve the technical problems mentioned in the related art, an embodiment of the present application provides a banking authorization method, where an execution body of the banking authorization method may be a banking authorization device provided by the embodiment of the present application or an electronic device integrated with the banking authorization device. The banking authorization device can be realized in a hardware or software mode, and the electronic equipment can be a smart phone, a folding screen mobile phone, a tablet personal computer, a palm computer, a desktop computer and the like, and can also be a server. In the following embodiments, a solution provided by the embodiments of the present application will be described by taking a server as an electronic device as an example.
Specifically, referring to fig. 1, fig. 1 is a schematic application scenario of a banking authorization method according to an embodiment of the present application, in the application scenario, a server is used as an execution body, and various data of a user in a banking transaction process are collected through a user terminal, where the data includes transaction data and user information. The server also acquires bank verification data from a bank database, so as to compare the business transaction data with the user information according to the bank verification data, and analyze the authorization result of the user to be authorized. And then, returning the authorization result to the user terminal for display.
Referring to fig. 2, fig. 2 is a flow chart of a banking authorization method according to an embodiment of the application. The specific flow of the banking authorization method provided by the embodiment of the application can be as follows:
101. and acquiring business transaction data of the user to be authorized in the process of transacting banking business and user information of the user to be authorized.
The user to be authorized can be any user who performs banking business transaction and needs banking business authorization. Aspects of banking authorization include: transfer service, large funds extraction service, loan approval service, credit card credit service, mortgage service, etc.
In the process that the user to be authorized handles banking business, the user can carry out the filling of related data by himself or by contacting a banking manager. The data to be filled in includes bank statement, bank agreement, transaction amount, financial account information, transaction password, etc. and is called business transaction data. In the process of filling data, some links also need to collect the identity card information and the bank card information of the user, and the collected data is called user information.
It can be appreciated that all kinds of data related to the user in the process of handling the banking business can be included in the business transaction data and/or the user information provided in this embodiment.
102. And acquiring bank verification data for carrying out authorization verification on the user to be authorized.
The database at the bank end also records information of each client, and the information includes but is not limited to: historical transaction records of banks, credit information of users, social security payment information of users, insurance information of users, addresses of users, deposit information of users and the like.
When bank verification data for carrying out authorization verification on the user to be authorized is obtained, data related to the user to be authorized can be called from a database at a bank end according to user information of the user to be authorized to serve as the bank verification data.
103. And determining an authorization result of the user to be authorized according to the user information, the business transaction data and the bank verification data.
The user information, the business transaction data and the bank verification data are analyzed to determine whether to carry out the authorization result of banking authorization on the user to be authorized.
For example, the user information can be verified through bank verification data to determine whether to authorize the user to be authorized, wherein if the authentication is identified, the user to be authorized is not authorized, and if the authentication is successful, the user to be authorized is authorized.
For another example, the business transaction data may be validated by bank validation data to analyze whether the business transaction data is authorized, wherein the authorization result includes not authorizing or giving authorization.
For another example, the user information and the business transaction data can be comprehensively verified through the bank verification data, so that a corresponding authorization result is obtained. As there are a variety of embodiments, they are not listed here.
104. And sending the authorization result to the user terminal so as to display the authorization result of the user to be authorized through the user terminal.
By sending the authorization result to the user terminal, after the user terminal receives the authorization result, a corresponding interface can be rendered according to the authorization result. For example, if the authentication is successful, an interface for authorizing banking services to the user to be authorized may be displayed. For another example, if the authentication fails, an interface that does not perform banking authorization on the user to be authorized may be displayed, and the reason for the authorization failure is prompted to be the authentication failure.
The server is used for remotely authorizing the banking business of the user to be authorized, and the authorization authority of a banking business manager can be replaced, so that the banking business manager with authority for each banking client is prevented from authorizing different work items, unified and standardized management of banking business authorization is realized, and the efficiency of authorizing the banking business is improved.
It can be understood that the authorization result can include fingerprint verification authorization, password login authorization, face verification authorization, authorization card authorization and the like, compared with the prior art, the method and the device replace the defect that various types of authorization are frequently performed due to different banking businesses, thereby realizing unified management of authorization resources.
In particular, the application is not limited by the order of execution of the steps described, as some of the steps may be performed in other orders or concurrently without conflict.
By the banking business authorization method in the embodiment of the application, the user information of the user to be authorized and the business transaction data thereof in the process of handling banking business are acquired, the user information, the banking transaction data and the banking verification data are subjected to data comparison, and further the user information and the banking transaction data are analyzed according to the banking verification data, so that whether the user to be authorized is authorized for related business is determined, and after the user to be authorized is determined to be authorized for business, an authorization result can be sent to a user terminal so as to be displayed through a corresponding interface rendered by the user terminal. The scheme provided by the embodiment of the application is suitable for various banking business authorization scenes, and the codes of a banking system are not required to be changed according to the requirements of banking business authorization, so that the labor cost consumed by system development is saved, and good economic benefits are brought to banks.
In some embodiments, the user information includes: a bank card image and an identity card image; the business transaction data comprises business transaction images; determining an authorization result of the user to be authorized according to the user information, the business transaction data and the bank verification data, wherein the method comprises the following steps:
identifying a bank card image and an identity card image to obtain first identity information of a user to be authorized;
acquiring second identity information of a user to be authorized according to the business transaction image;
if the first identity information is consistent with the second identity information, determining an authorization result according to the business transaction data and the bank verification data;
if the first identity information is inconsistent with the second identity information, determining that the first identity information is not authorized as an authorization result.
The image of the bank card can be obtained by shooting, scanning and the like through a user terminal, and the user terminal can be a mobile phone, a tablet, a scanner, a bank self-service all-in-one machine and the like. Likewise, the image of the identification card can also be obtained by shooting, scanning and other modes through the user terminal.
After the bank card image and the identity card image are obtained, the card number of the bank card can be identified through a picture-to-text technology, and the information such as the identity card number, the name, the address, the identity card validity period, the affiliated place and the like of the identity card can be identified. The identified text information is called first identity information of the user to be authorized.
The user to be authorized also relates to the business transaction image in the business transaction process. For example, in the process of service handling by the user to be authorized, some links need to shoot the user to be authorized or perform operations such as video recording on the user to be authorized. Thus, a business transaction image containing the face image of the user is obtained, and the business transaction image can also comprise voice data of the user and the like. The face characteristic information in the business transaction image is extracted, and the extracted face characteristic information is further called second identity information of the user to be authorized.
And then comparing the first identity information with the second identity information, wherein the comparison content can comprise face characteristic information, names, sexes and the like so as to judge whether the first identity information is consistent with the second identity information, and when the first identity information is consistent with the second identity information, the bank card and the identity card are indicated to belong to the user to be authorized, and when the first identity information is inconsistent with the second identity information, the bank card and the identity card are indicated to not belong to the user to be authorized.
When the first identity information is consistent with the second identity information, an authorization result is determined according to the service transaction data and the bank verification data, namely, the identity verification is performed on the user to be authorized, and further information such as transaction risk of the user to be authorized is determined according to the service transaction data, so that whether the user to be authorized needs to be continuously authorized or in what type of mode is authorized, and various optional modes are not listed here.
When the first identity information is inconsistent with the second identity information, the identity verification and identification of the user to be authorized can be determined, the user to be authorized is directly not authorized, and the safety of banking transaction is ensured.
It will be appreciated that after the user to be authorized is not authorized, the user terminal will send the unauthorized result to the user terminal as an authorization result, and after the user terminal receives the authorization result, a corresponding interface may be rendered, where the interface may be a main interface, or an information prompt interface, etc.
If the banking business of the user to be authorized is authorized, when the interface of the user terminal is rendered, the interface is the banking business which needs to be transacted by the user to be authorized in the next link, so that the user to be authorized is helped to transact the banking business rapidly.
In some embodiments, determining the authorization result from the business transaction data and the bank verification data includes:
based on the business transaction data and the bank verification data, analyzing the transaction characteristics of the user to be authorized;
and determining an authorization strategy matched with the transaction characteristics, and taking the authorization strategy as an authorization result.
The business transaction data and the bank verification data are subjected to data analysis, so that the transaction characteristics of the user to be authorized can be analyzed. The transaction characteristics can describe how much the user to be authorized prefers to different banking types, as well as the level of risk that can be tolerated for different banking types, and the amount of transaction that is conventionally selected, etc.
The business transaction data and the bank verification data may be analyzed, for example, by a regression algorithm to predict transaction characteristics of the user to be authorized, which may be referred to as data characteristics. The transaction characteristics of the user to be authorized can also be obtained by carrying out statistical analysis on the business transaction data and the bank verification data. As there are a number of alternatives, this is not listed here.
The corresponding relation between the transaction characteristics and the authorization policies is preset, and the corresponding authorization policies can be matched for the user to be authorized according to the corresponding relation, so that the authorization policies are used as authorization results. Wherein, the authorization result comprises not authorizing and giving authorization. When the authorization is given, the authorization policy may further include one or more of fingerprint verification authorization, password login authorization, face verification authorization, authorization card authorization, and other authorization manners.
In some embodiments, the business transaction data may include business transaction images, business transaction forms, transaction types, and transaction media, etc., and the bank verification data may include credit data, historical business authorization data, and billing information, etc. When the transaction characteristics of the user to be authorized are analyzed according to the business transaction data and the bank verification data, the transaction characteristics of multiple dimensions can be obtained through the data of the multiple dimensions included in the business transaction data and the bank verification data. For example, a dimension transaction characteristic is obtained by analyzing the business transaction form and the account information so as to represent the bearing condition of the transaction amount of the user to be authorized. For another example, a transaction characteristic of another dimension is obtained by analyzing the business transaction form and credit data to characterize the credit status of the user to be authorized. For example, transaction characteristics of another dimension are obtained by analyzing transaction media, account information and credit information, so as to represent the risk of authorizing the user to be authorized. For another example, the transaction characteristics of another dimension are obtained by analyzing the transaction form and the historical transaction authorization data so as to represent the change condition of the transaction habit of the user to be authorized, and the like.
It may be appreciated that in the process of performing transaction characteristic analysis on the user to be authorized by the service transaction data and the bank verification data, at least one of the service transaction form, the transaction type and the transaction medium included in the service transaction data may be combined with at least one of credit investigation data, historical service authorization data and account information included in the bank verification data, so as to comprehensively analyze the transaction characteristic of the user to be authorized. Of course, the transaction characteristics of the user to be authorized may indicate the transaction characteristics of at least one dimension, and may also indicate the transaction characteristics of at least two dimensions after fusion, which are not limited herein, and all the ways of obtaining the transaction characteristics of the user to be authorized through the service transaction data and the bank verification data provided in the embodiments of the present application belong to the protection scope required by the present application.
In some embodiments, analyzing transaction characteristics of a user to be authorized based on business transaction data and bank verification data includes:
data screening is carried out on business transaction data and bank verification data, and screened data are obtained;
configuring corresponding weights for candidate data with different dimensions in the screened data;
And determining the transaction characteristics of the user to be authorized according to the candidate data with different dimensions and the weights corresponding to the candidate data.
For example, the business transaction data and/or bank verification data may also be data filtered, and transaction characteristics of the user to be authorized are analyzed based on the filtered data. The conditions for data screening are as follows: data screening based on banking types, data screening based on transaction media, data screening based on transaction amounts, and the like.
For example, when data screening is performed based on the banking business type, if the user to be authorized handles the loan business currently, historical data only including the loan business can be screened from the historical business authorization data to serve as screened data, and account-hanging data affecting the loan business can be continuously screened from account-hanging information to serve as screened data.
Further, the filtered data covers part or all of at least one of the business transaction form, transaction type, transaction medium, credit data, historical business authorization data, and billing information. Such data may be referred to as candidate data of different dimensions. For example, the business transaction form is used as candidate data of one dimension, the transaction type is used as candidate data of another dimension, the screened credit data is used as candidate data of another dimension, the screened historical business authorization data is used as candidate data of another dimension, and the like.
The candidate data in different dimensions may be provided with corresponding weights, and the weights may be preset values. The weights corresponding to different candidate data can be configured according to the transaction characteristics of the user to be authorized, and the weights of the candidate data with different dimensions can be set by the user to be authorized or a bank manager in a self-defined mode, and specific embodiments are defined herein.
It can be appreciated that by adjusting the weights corresponding to the candidate data of different dimensions, personalized analysis of the transaction characteristics of the authorized user can be achieved. For example, a higher weight is set for candidate data related to the transaction amount, so that the transaction characteristics of the user to be authorized are focused on the transaction amount, and the corresponding authorization policy is matched according to the transaction amount. For another example, by setting a higher weight for the credit investigation data, the transaction characteristics of the user to be authorized can be focused on the transaction risk, and the corresponding authorization policy is matched according to the transaction risk.
In this embodiment, by performing data screening on the service transaction data and the bank verification data, invalid data which does not need to be concerned can be filtered, so that the efficiency of subsequent data analysis is improved, and more accurate and effective transaction characteristics can be obtained when the transaction characteristics of the user to be authorized are analyzed according to the screened data. In addition, the screened data is divided into candidate data with different dimensions, so that corresponding weights are set for the different candidate data, personalized analysis is conveniently carried out on transaction characteristics of the user to be authorized, the matching mode of the authorization strategy is more flexible, different authorization requirements are adapted, and convenience is provided for the user to be authorized greatly.
In some embodiments, the authorization policy includes: authorization requirements, authorization levels, and authorization modes.
Determining an authorization policy matched with the transaction characteristics, and taking the authorization policy as an authorization result, wherein the method comprises the following steps:
matching the authorization requirement, the authorization level and the authorization mode according to the transaction characteristics as an authorization result.
The authorization requirement refers to whether the user to be authorized is authorized or not, and the authorization requirement is divided into authorization giving and authorization not giving.
When the authorization is given, the corresponding authorization level, namely the high and low of the authorization authority, can be continuously matched, wherein the higher the authorization authority is, the higher the range of the banking transaction business which can be operated by the user to be authorized is, the lower the authorization authority is, and the lower the range of the banking transaction business which can be operated by the user to be authorized is, and the higher the limit is. The authorization level may include basic authorization, special authorization, etc., where the special authorization is higher in authority than the level authorization.
When the authorization is given, the corresponding authorization mode can be matched continuously, wherein the authorization mode comprises fingerprint verification authorization, password login authorization, face verification authorization, authorization card authorization and the like.
It is understood that the authorization policy may be classified into a given authorization and a non-given authorization, a basic authorization, and a special authorization, and may be classified into a non-given authorization, a basic authorization, a combined authorization with (at least one of fingerprint authentication authorization, password login authorization, face authentication authorization, and authorization card authorization), and a special authorization, and a combined authorization with (at least one of fingerprint authentication authorization, password login authorization, face authentication authorization, and authorization card authorization). As there are a number of alternatives, this is not listed here.
The authorization policies may also be matched for transaction characteristics, for example, by pre-trained decision models. Specifically, the transaction characteristics can be input into the decision model for authorization policy matching, so as to obtain an authorization policy corresponding to the transaction characteristics.
The decision model can be a multi-classification model, the decision model can be obtained by model training through sample data, the sample data comprises paired transaction characteristics and authorization strategies, and the decision model learns the mapping relation between the transaction characteristics and the authorization strategies in the process of training the decision model, so that a trained decision model is obtained. When the trained decision model is applied, the corresponding authorization strategy can be output by taking the transaction characteristics as input.
In this embodiment, the user to be authorized is accurately authorized by matching the diversified authorization policies based on the authorization characteristics.
In some embodiments, the business transaction data includes: business transaction forms, transaction types, and transaction media; the bank verification data includes: credit data, historical business authorization data and account information; determining an authorization result according to the business transaction data and the bank verification data, including:
Determining the risk level of the object to be authorized according to the account-hanging information and the credit investigation data;
if the risk level is greater than a preset threshold, determining that the authorization is not given as an authorization result;
if the risk level is not greater than the preset threshold, determining an authorization level according to the risk level, the service transaction form, the transaction type and the historical service authorization data;
determining an authorization mode based on the transaction medium;
the authorization mode and the authorization level are determined as authorization results.
And according to the account information and the credit information, the risk level for authorizing the user to be authorized can be analyzed. The risk level can be analyzed according to the account-hanging information, the risk level can be analyzed according to the credit information, and the risk level can be analyzed by combining the account-hanging information and the credit information. The higher the risk level is, the larger the estimated loss of the authorized existing business transaction is, and the smaller the estimated loss is. The risk level may be divided into two or more levels according to actual demands, for example, the risk level includes a high risk and a low risk, and the risk level may be further divided into a high level, a low level, a lowest level, and the like according to the degree.
For example, in analyzing the risk level of authorizing the user to be authorized according to the billing information, the billing time, the billing amount, whether to account for the account, etc. may be analyzed to determine the risk level. For example, when the account hanging information displays the conditions of bill delinquent, large account amount and the like, the risk level of authorizing the user to be authorized can be improved, so that the user has a high risk level. If the account information shows that the bill is well cleared and not under account, the risk level of authorizing the user to be authorized can be reduced, so that the user has a low risk level. If the account information shows that the bill is well paid or not owed or the amount of the owed account is small, the risk level of authorizing the user to be authorized can be properly increased, so that the user has a higher risk level. And if the account-hanging information shows that the user to be authorized does not hang the account, the user can be assessed to have the lowest risk level.
When the risk level of authorizing the user to be authorized is analyzed according to the credit data, the credit data can display the credit score of the user, and the risk level can be analyzed according to the credit score. Wherein the higher the credit score, the lower the risk level. The lower the credit score, the higher the risk level.
And when the risk level analysis of the authorization is carried out on the user to be authorized according to the credit information and the account information, the credit information and the account information can be combined, for example, if at least one of the credit information and the account information shows that the risk level is high, the final risk level is directly judged to be high, and if the credit information and the account information show that the risk level is low, the final risk level is directly judged to be low.
When the risk level is greater than a preset threshold, the user to be authorized is not authorized, and when the risk level is not greater than the preset threshold, an authorization strategy when the user to be authorized is authorized can be further analyzed.
Illustratively, the authorization level may also be determined based on risk levels, business transaction forms, transaction types, historical business authorization data, and the like. Where the authorization level includes, but is not limited to, basic authorization, special authorization, and of course, may be classified as very high, higher, low, lowest, etc., depending on the degree. The specific division is not limited herein.
The higher the risk level, the lower the authorization level, and vice versa, for example, the higher the authorization level, the lowest the risk level is displayed, and the highest authorization level may be given to the user to be authorized. The larger the difference between the service transaction form and the historical service authorization data, the lower the authorization level, whereas the higher the authorization level, for example, the amount of the service transaction form is far greater than the amount of the historical service authorization data, the lowest authorization level may be given to the user to be authorized, and if the data of the service transaction form is far less than the amount of the historical service authorization data, the highest authorization level may be given to the user to be authorized. The higher the transaction risk involved in the transaction type, the higher the authorization level, and vice versa, the lower the authorization level, e.g., if the transaction type is an insurance service, the higher the authorization level may be given to the user to be authorized, whereas if the transaction type is a withdrawal service, the lower the authorization level may be given to the user to be authorized.
Specifically, different weights can be set for the risk level, the business transaction form, the historical business authorization data and the transaction type respectively, so that the authorization level is comprehensively analyzed. When the authorization level is comprehensively analyzed, the average value of the authorization levels which are respectively corresponding to the three analyzed by the risk level, the business transaction form, the historical business authorization data, the transaction type and the like can be obtained, so that the average value is used as the final authorization level.
The transaction medium includes a direct medium and an indirect medium, wherein the direct medium may refer to a user terminal used by an off-line business hall of a bank or an application program on a bank line. Indirect media refers to the situation with third party intervention or multiple party intervention, such as the situation where the user to be authorized handles banking transactions using WeChat, payment treasury, etc.
The authorization mode is determined according to the transaction medium, namely, the authorization type acceptable by identifying the transaction medium is determined, so that the corresponding authorization mode is set. For example, when the transaction medium is a payment instrument, the authorization mode may include at least one of fingerprint authentication authorization, password login authorization, face authentication authorization, and the like. For another example, where the transaction medium is a banking self-service machine, the authorization mode may include at least one of fingerprint authentication authorization, password login authorization, face authentication authorization, authorization card authorization, and the like.
After determining the authorization level and the authorization mode, the authorization level and the authorization mode used by the user to be authorized can be sent to the user terminal for display.
In some embodiments, obtaining business transaction data of a user to be authorized in a process of transacting banking business and user information of the user to be authorized includes:
Acquiring user data of a user to be authorized in the process of transacting banking business through a preset interface;
and analyzing the user data according to the data type to obtain the business transaction data and the user information of the user to be authorized.
The preset interface can be an SDK (Software Development Kit, a software development kit) standard interface, and the data of the user terminal can be obtained through the unified SDK interface, so that a unified business transaction authorization mode and a user transaction interface can be provided for various systems, and banking business handling of a user is facilitated.
The data types can be classified into images, i.e., indicating user information, and non-images, i.e., indicating business transaction data.
In some embodiments, before acquiring the business transaction data of the user to be authorized in the process of transacting the banking business and the user information of the user to be authorized, the method further comprises:
and decoupling the authorization function and the business transaction function of the user terminal.
In the related art, different user terminals and different banks or different bank system versions have relevance to the authorization function and the business transaction function adopted by the user terminals. The embodiment of the application firstly decouples the authorization function and the business transaction function, thereby realizing the same scheduling of the authorization function and the business transaction function and facilitating business authorization.
As can be seen from the above, the banking authorization method provided by the embodiment of the application can realize that the system code is not required to be changed when the authorization function is adjusted by decoupling the authorization function and the business transaction function of the user terminal, and the data of the user terminal is uniformly acquired through the SDK interface, so that the business transaction data is convenient to uniformly manage and analyze, thereby carrying out business authorization in a centralized manner, improving the efficiency of business authorization and saving the labor cost.
A banking authorization device 200 is also provided in one embodiment. Referring to fig. 3, fig. 3 is a schematic structural diagram of a banking authorization device 200 according to an embodiment of the application. Wherein the banking authorization device 200 is applied to an electronic apparatus, the banking authorization device 200 includes:
a user data obtaining module 201, configured to obtain service transaction data of a user to be authorized in a process of transacting banking services, and user information of the user to be authorized;
a bank data acquisition module 202, configured to acquire bank verification data for performing authorization verification on a user to be authorized;
the authorization verification module 203 is configured to determine an authorization result of the user to be authorized according to the user information, the service transaction data and the bank verification data;
The communication module 204 is configured to send the authorization result to the user terminal, so as to display the authorization result of the user to be authorized through the user terminal.
In some embodiments, the user information includes: a bank card image and an identity card image; the business transaction data comprises business transaction images; the authorization verification module 203 is further configured to:
identifying a bank card image and an identity card image to obtain first identity information of a user to be authorized;
acquiring second identity information of a user to be authorized according to the business transaction image;
if the first identity information is consistent with the second identity information, determining an authorization result according to the business transaction data and the bank verification data;
if the first identity information is inconsistent with the second identity information, determining that the first identity information is not authorized as an authorization result.
In some embodiments, the authorization verification module 203 is further to:
based on the business transaction data and the bank verification data, analyzing the transaction characteristics of the user to be authorized;
and determining an authorization strategy matched with the transaction characteristics, and taking the authorization strategy as an authorization result.
In some embodiments, the authorization verification module 203 is further to:
data screening is carried out on business transaction data and bank verification data, and screened data are obtained;
Configuring corresponding weights for candidate data with different dimensions in the screened data;
and determining the transaction characteristics of the user to be authorized according to the candidate data with different dimensions and the weights corresponding to the candidate data.
In some embodiments, the business transaction data includes: business transaction forms, transaction types, and transaction media; the bank verification data includes: credit data, historical business authorization data and account information; the method comprises the steps of carrying out a first treatment on the surface of the
The authorization verification module 203 is further configured to:
determining the risk level of the object to be authorized according to the account-hanging information and the credit investigation data;
if the risk level is greater than a preset threshold, determining that the authorization is not given as an authorization result;
if the risk level is not greater than the preset threshold, determining an authorization level according to the risk level, the service transaction form, the transaction type and the historical service authorization data;
determining an authorization mode based on the transaction medium;
the authorization mode and the authorization level are determined as authorization results.
In some embodiments, the user data acquisition module 201 is further configured to:
acquiring user data of a user to be authorized in the process of transacting banking business through a preset interface;
and analyzing the user data according to the data type to obtain the business transaction data and the user information of the user to be authorized.
In some embodiments, before acquiring the business transaction data of the user to be authorized in the process of transacting the banking business and the user information of the user to be authorized, the banking authorization device 200 is further configured to:
and decoupling the authorization function and the business transaction function of the user terminal.
It should be noted that, the banking authorization device 200 provided in the embodiment of the present application belongs to the same concept as the banking authorization method in the above embodiment, and any method provided in the embodiment of the banking authorization method can be implemented by the banking authorization device 200, and detailed implementation process of the method is shown in the embodiment of the banking authorization method, which is not repeated herein.
As can be seen from the above, the banking authorization device provided by the embodiment of the application can realize that the system code is not required to be changed when the authorization function is adjusted by decoupling the authorization function and the business transaction function of the user terminal, and the data of the user terminal is uniformly acquired through the SDK interface, so that the business transaction data is convenient to uniformly manage and analyze, thereby carrying out business authorization in a centralized manner, improving the efficiency of business authorization and saving the labor cost.
The embodiment of the application also provides electronic equipment which can be smart phones, folding screen mobile phones, tablet computers, palm computers, desktop computers and other equipment, and can also be a server. Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application, as shown in fig. 4. The electronic device 300 includes a processor 301 having one or more processing cores, a memory 302 having one or more computer-readable storage media, and a computer program stored on the memory 302 and executable on the processor. The processor 301 is electrically connected to the memory 302. It will be appreciated by those skilled in the art that the electronic device structure shown in the figures is not limiting of the electronic device and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
The processor 301 is a control center of the electronic device 300, connects various portions of the entire electronic device 300 using various interfaces and lines, and performs various functions of the electronic device 300 and processes data by running or loading software programs and/or modules stored in the memory 302, and invoking data stored in the memory 302, thereby performing overall monitoring of the electronic device 300.
In the embodiment of the present application, the processor 301 in the electronic device 300 loads the instructions corresponding to the processes of one or more application programs into the memory 302 according to the following steps, and the processor 301 executes the application programs stored in the memory 302, so as to implement various functions:
acquiring business transaction data of a user to be authorized in the process of transacting banking business and user information of the user to be authorized;
acquiring bank verification data for carrying out authorization verification on a user to be authorized;
determining an authorization result of the user to be authorized according to the user information, the business transaction data and the bank verification data;
and sending the authorization result to the user terminal so as to display the authorization result of the user to be authorized through the user terminal.
The specific implementation of each operation above may be referred to the previous embodiments, and will not be described herein.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
As can be seen from the above, the electronic device provided in this embodiment can realize that the system code is not required to be changed when the authorization function is adjusted by decoupling the authorization function and the service transaction function of the user terminal, and the data of the user terminal is uniformly acquired through the SDK interface, so that the service transaction data is convenient to be uniformly managed and analyzed, thereby performing service authorization in a centralized manner, improving the service authorization efficiency, and saving the labor cost.
Those of ordinary skill in the art will appreciate that all or a portion of the steps of the various methods of the above embodiments may be performed by instructions, or by instructions controlling associated hardware, which may be stored in a computer-readable storage medium and loaded and executed by a processor.
To this end, an embodiment of the present application provides a computer readable storage medium, and those skilled in the art will understand that all or part of the steps in implementing the method of the above embodiment may be implemented by a program to instruct related hardware, and the program may be stored in a computer readable storage medium, where the program when executed includes the following steps:
Acquiring business transaction data of a user to be authorized in the process of transacting banking business and user information of the user to be authorized;
acquiring bank verification data for carrying out authorization verification on a user to be authorized;
determining an authorization result of the user to be authorized according to the user information, the business transaction data and the bank verification data;
and sending the authorization result to the user terminal so as to display the authorization result of the user to be authorized through the user terminal.
The specific implementation of each operation above may be referred to the previous embodiments, and will not be described herein.
The storage medium may be ROM/RAM, magnetic disk, optical disk, etc. The steps in any banking authorization method provided by the embodiment of the present application can be executed by the computer program stored in the storage medium, so that the beneficial effects that any banking authorization method provided by the embodiment of the present application can be achieved, and detailed descriptions of the previous embodiments are omitted.
The foregoing describes in detail a banking authorization method, apparatus, storage medium and electronic device provided by the embodiments of the present application, and specific examples are applied to illustrate the principles and embodiments of the present application, where the foregoing examples are only used to help understand the method and core idea of the present application; meanwhile, as those skilled in the art will vary in the specific embodiments and application scope according to the ideas of the present application, the present description should not be construed as limiting the present application in summary.

Claims (10)

1. A method of authorizing banking, the method comprising:
acquiring business transaction data of a user to be authorized in the process of transacting banking business and user information of the user to be authorized;
acquiring bank verification data for carrying out authorization verification on the user to be authorized;
determining an authorization result of the user to be authorized according to the user information, the business transaction data and the bank verification data;
and sending the authorization result to a user terminal so as to display the authorization result of the user to be authorized through the user terminal.
2. The banking authorization method according to claim 1, wherein the user information includes: a bank card image and an identity card image; the business transaction data comprises business transaction images; the determining the authorization result of the user to be authorized according to the user information, the business transaction data and the bank verification data comprises the following steps:
identifying the bank card image and the identity card image to obtain first identity information of the user to be authorized;
acquiring second identity information of the user to be authorized according to the business transaction image;
If the first identity information is consistent with the second identity information, determining the authorization result according to the business transaction data and the bank verification data;
and if the first identity information is inconsistent with the second identity information, determining that the first identity information is not authorized as the authorization result.
3. A banking authorization method according to claim 2, wherein the determining of the authorization result from the transaction data and the bank verification data comprises:
analyzing the transaction characteristics of the user to be authorized based on the business transaction data and the bank verification data;
and determining an authorization strategy matched with the transaction characteristics, and taking the authorization strategy as the authorization result.
4. A banking authorization method according to claim 3, wherein the analysis of transaction characteristics of the user to be authorized based on the transaction data and the banking verification data comprises:
data screening is carried out on the business transaction data and the bank verification data to obtain screened data;
configuring corresponding weights for candidate data with different dimensions in the screened data;
And determining the transaction characteristics of the user to be authorized according to the candidate data with different dimensions and the weights corresponding to the candidate data.
5. A banking authorization method according to claim 2 wherein the transaction data includes: business transaction forms, transaction types, and transaction media; the bank verification data includes: credit data, historical business authorization data and account information; the determining the authorization result according to the business transaction data and the bank verification data comprises the following steps:
determining the risk level of the object to be authorized according to the account-hanging information and the credit investigation data;
if the risk level is greater than a preset threshold, determining that the authorization is not authorized as the authorization result;
if the risk level is not greater than the preset threshold, determining an authorization level according to the risk level, the business transaction form, the transaction type and the historical business authorization data;
determining an authorization mode based on the transaction medium;
and determining the authorization mode and the authorization level as the authorization result.
6. The banking authorization method according to claim 1, wherein the acquiring business transaction data of a user to be authorized in a banking process and user information of the user to be authorized includes:
Acquiring user data of the user to be authorized in the process of transacting banking business through a preset interface;
and analyzing the user data according to the data type to obtain the business transaction data and the user information of the user to be authorized.
7. A banking authorization method according to any one of claims 1 to 6 wherein before obtaining transaction data of a user to be authorized in the process of transacting banking and user information of the user to be authorized, further comprises:
and decoupling the authorization function and the business transaction function of the user terminal.
8. A banking authorization device, comprising:
the user data acquisition module is used for acquiring business transaction data of a user to be authorized in the process of transacting banking business and user information of the user to be authorized;
the bank data acquisition module is used for acquiring bank verification data for carrying out authorization verification on the user to be authorized;
the authorization verification module is used for determining an authorization result of the user to be authorized according to the user information, the business transaction data and the bank verification data;
and the communication module is used for sending the authorization result to a user terminal so as to display the authorization result of the user to be authorized through the user terminal.
9. A computer readable storage medium having stored thereon a computer program, which when run on a computer causes the computer to perform the banking authorization method of any one of claims 1 to 7.
10. An electronic device comprising a processor and a memory, the memory storing a computer program, wherein the processor is configured to perform the banking authorization method of any of claims 1 to 7 by invoking the computer program.
CN202310340598.8A 2023-03-27 2023-03-27 Bank business authorization method and device, storage medium and electronic equipment Pending CN116596537A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310340598.8A CN116596537A (en) 2023-03-27 2023-03-27 Bank business authorization method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310340598.8A CN116596537A (en) 2023-03-27 2023-03-27 Bank business authorization method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN116596537A true CN116596537A (en) 2023-08-15

Family

ID=87605130

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310340598.8A Pending CN116596537A (en) 2023-03-27 2023-03-27 Bank business authorization method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN116596537A (en)

Similar Documents

Publication Publication Date Title
US11710055B2 (en) Processing machine learning attributes
CN108876133B (en) Risk assessment processing method, device, server and medium based on business information
CN106875078B (en) Transaction risk detection method, device and equipment
EP3617983A1 (en) Method and device for virtual resource allocation, model establishment and data prediction
US20060218407A1 (en) Method of confirming the identity of a person
US12026704B2 (en) System and method for assessing a digital interaction with a digital third party account service
CN112712429A (en) Remittance service auditing method, remittance service auditing device, computer equipment and storage medium
CN110766340A (en) Business auditing method, device and equipment
CN104376452A (en) System and method for managing payment success rate on basis of international card payment channel
CN111489175B (en) Online identity authentication method, device, system and storage medium
CN116823274A (en) Fraud risk assessment method and device applied to financial terminal
CN108961034A (en) System and method, storage medium based on user behavior certification
CN115034886A (en) Default risk prediction method and device
CN114862110A (en) Method and device for building middle platform of commercial banking business, electronic equipment and storage medium
CN111709709A (en) Information processing method, system and computer equipment based on warranty service
CN116596537A (en) Bank business authorization method and device, storage medium and electronic equipment
CN114880369A (en) Risk credit granting method and system based on weak data technology
CN113034285A (en) Request processing method and device, computer equipment and storage medium
US10216830B2 (en) Multicomputer processing of client device request data using centralized event orchestrator and link discovery engine
CN111507829A (en) Overseas credit card wind control model iteration method, device, equipment and storage medium
US10296882B2 (en) Multicomputer processing of client device request data using centralized event orchestrator and link discovery engine
CN113436020B (en) Illegal account identification method and device, computer equipment and storage medium
TWI662493B (en) Debit authorization method and system
CN117455655A (en) Credit line management method, device, storage medium and terminal
CN115358841A (en) Bank online fast loan data model based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination