+

CN110166416A - A method of it is assessed based on Internet authentication and credit - Google Patents

A method of it is assessed based on Internet authentication and credit Download PDF

Info

Publication number
CN110166416A
CN110166416A CN201810273168.8A CN201810273168A CN110166416A CN 110166416 A CN110166416 A CN 110166416A CN 201810273168 A CN201810273168 A CN 201810273168A CN 110166416 A CN110166416 A CN 110166416A
Authority
CN
China
Prior art keywords
applicant
information
credit
cell
portrait
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810273168.8A
Other languages
Chinese (zh)
Inventor
彭愈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Ict Agel Ecommerce Ltd
Original Assignee
Guizhou Ict Agel Ecommerce Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Ict Agel Ecommerce Ltd filed Critical Guizhou Ict Agel Ecommerce Ltd
Priority to CN201810273168.8A priority Critical patent/CN110166416A/en
Publication of CN110166416A publication Critical patent/CN110166416A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Power Engineering (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention relates to a kind of methods assessed based on Internet authentication and credit, which comprises scanning applicant's identity card front and back sides obtain the authentic and valid identity information of applicant (echo applicant determined that);It shoots applicant's dynamic portrait and compares ID card information;Applicant independently selects emergency contact and relationship while obtaining applicant's cell phone apparatus address list list;The message registration that applicant's phone number unique identity obtains applicant section historical time is filled in by docking telecom operators;It docks third party's data platform and obtains applicant's web-based history debt-credit information by stages;It is acquired by above data, the debt-credit that system analysis computation applicant is currently available amount by stages.

Description

A method of it is assessed based on Internet authentication and credit
Technical field
The present invention relates to identity reality certifications, mainly multielement verifying identity reality and a kind of method of assessment.
Background technique
Service can solve applicant's microfinance shortage problem to network loan by stages at present, and applicant only needs to download APP It can apply for that small amount services by stages, market prospects are considerable.But application process is different from operating under line network loan by stages, owns Step is all that applicant independently carries out on line, and the good and bad jumbled together for network environment, if without the good applicant's relevant information of control Authenticity, or without providing the assessment of the scientific and effective accrediting amount, be easy to bad credit situation by stages occur.This not only can be right Investor is also a kind of impact to the platform service between two parties for providing debt-credit there are certain monetary losses risk, while to entire Service will also result in malicious influences by stages for internet debt-credit, cause undesirable social conduct.So needing to take effective certification Mode authenticates to carry out the identity information of applicant, and the credit appraisal procedure for providing science carries out debt-credit amount assessment.
Summary of the invention
To solve the above-mentioned problems, the present invention obtains authentic and valid ID card information by scanning identity card, and logical portrait is recognized Card verification face identity information, is selected by emergency contact's phone number and relationship selection obtains cell phone apparatus address list letter Breath, by docking telecom operators obtain certain time period in history message registration information check frequent contact, in addition by The huge data basis of the information mutual communication and internet big data of internet obtains air control data reference, is finally reached reduction Network loan services bad debt risk and protection investor and the between two parties purpose of the interests of platform by stages.
The present invention provides a kind of methods assessed based on Internet authentication and credit, which comprises
Scan applicant's identity card front and back sides and obtain the authentic and valid identity information of applicant, echo applicant determined that;
Identity-based demonstrate,proves the reading storage of front and back sides information, shoots applicant's dynamic portrait, compares certification portrait information;
Applicant independently selects contact person in X cell phone apparatus address list and selects corresponding relationship, synchronous to obtain applicant Address list list in cell phone apparatus;
Docking third party telecom operators fill in applicant's unique identity and carry out cell-phone number authorization, to obtain applicant Message registration in certain time is used as and does information comparison with address list in previous step cell phone apparatus;
Comprehensive analysis, which is acquired, by information above calculates the current debt-credit highest amount of applicant.
It wherein, include: to set applicant to calculate the current debt-credit highest amount of applicant to information collection comprehensive analysis The message registration of the nearly half a year of standby interior address list and telecom operators compares, comprising X above in conjunction with converse for each person Y times with On then pass through, the phone number used when confirming that applicant registers with this and has stable contact person to commonly use phone number.Base In internet big data basis, the information that applicant's information is provided with multiple third-party platforms is compared, inquires applicant family Whether in other network loan platforms lending and borrowing business and corresponding refund situation were handled;
More specifically, in the method analysis: using the information interconnectivity of internet, being acquired by ID card information It retains, with applicant's dynamic portrait information comparison, confirms applicant's information authenticity.Pass through address list in applicant's equipment and fortune It seeks log in certain time that quotient provides to compare, the phone number that confirmation applicant registers has stable to commonly use number Contact person.
More specifically, in the method analysis, further includes:
ID card information certification, by calling applicant's cell phone apparatus rear camera, focusing identifies identity card front and back sides, Scanning is committed to network analysis.If applicant's identity information physical presence in plateform system at this end, returns to corresponding mistake Information, authentication failure.If applicant's identity information is not present in plateform system at this end, returned after network analysis scanned picture The information such as aobvious name, identification card number, date of birth, applicant determined that rear submit, ID card information certification passes through, and stores applicant Information.
Portrait authentification of message, ID card information enter portrait by rear system and authenticate.By calling applicant's cell phone apparatus Front camera, speech animation instruction applicant do corresponding dynamic action, act ratio according to application human action and systemic presupposition It is right, if movement is inconsistent, the acquisition failure of dynamic portrait, portrait authentification failure.If keeping strokes, dynamic portrait acquire successfully, into And compared with previous step identity card image dough figurine picture, compare inconsistent, portrait authentification failure, if compare it is consistent, portrait certification at Function stores applicant's portrait information.
Contact person's certification, portrait authentification of message enter contact information by rear system and authenticate.Apply for manpower by calling Address list in machine equipment, allows applicant independently to select emergency contact.Emergency contact is necessary for 11 China's Mainland mobile phones Number.System analyzes whether selected number is 11 China's Mainland mobile phones according to cell-phone number digit and Service Dialing Numbers beginning Number, if not being, system returns to miscue, and contact person adds failure.If so, contact person adds successfully.The same manner adds X Contact person, contact person's certification pass through, and store contact information in applicant's cell phone apparatus.
Cell-phone number authorization identifying, contact person's certification enter cell-phone number authorization identifying by rear system.Electricity is called by interface Believe the nearly half a year history log of operator authorization crawl applicant.The log grabbed is deposited with previous step contact person certification Contact person compares in applicant's cell phone apparatus of storage, then passes through comprising X above in conjunction with conversing for each person Y times or more, really with this The phone number that applicant registers is recognized to commonly use number, there is stable contact person.Cell-phone number authorization identifying passes through.
Wherein, when cell-phone number authorization identifying calls third-party operator, due to each telecom operators' cell-phone number authorized party Formula has differences, and system is based on 11 cell-phone numbers of applicant and starts three bit digitals, judges the corresponding telecom operators of number (electricity Letter, mobile, connection).System docks corresponding interface further according to operator's result of judgement, obtains operator's authorization page letter Breath.
Unaware certification, cell-phone number authorization identifying terminate to need the authentication item of applicant's autonomous operation, system after passing through It is authenticated into applicant's unaware.Using information high connectivity and the big data basis of internet, third party is called by interface Authoritative big data air control platform, debt-credit of the data basis quick check applicant history based on big data in other loan platforms Situation, comprehensive analysis return to authentic and valid authentication result.
More specifically, in the method analysis, further includes: system supports that all authentication items accrediting amounts are configurable, right It is and noninductive in the credit authentication items (authentication ids, portrait certification, contact person's certification, address list certification) of applicant's autonomous operation After knowing that credit item, all certifications pass through, system reads each single item and corresponds to amount addition, and final result is that applicant finally awards Believe amount.On the contrary, any one credit item authentification failure, credit stops, and applicant can not take final amount.
More specifically, in the method analysis, further includes: have between perception credit authentication items that there are High relevancies and suitable Sequence, previous authentication items are necessary for through state, and system can just enter next authentication items.All authentication items are all completed, credit meter Calculation system initially enters calculating state, and when fructufy shows applicant, and applicant can carry out debt-credit row according to amount is obtained For.
Detailed description of the invention
Embodiment of the present invention is described below with reference to attached drawing, in which:
Fig. 1 is the platform for the method assessed based on Internet authentication and credit shown according to embodiment of the present invention Structural block diagram;
Fig. 2 is the certification for the method assessed based on Internet authentication and credit shown according to embodiment of the present invention And credit flow chart of steps.
Appended drawing reference: 1 has perception authentication items module;2 unaware authentication items modules;3 credit result amount computing modules;a1 The certification of applicant's ID card information;The certification of a2 applicant's portrait;A3 applicant emergency contact certification;The communication of a4 applicant's history Record certification;A5 applicant's unaware credit certification;Amount calculates a6 applicant's debt-credit by stages.
Specific embodiment
Hereinafter reference will be made to the drawings to the embodiment of the method for the invention assessed based on Internet authentication and credit It is described in detail.
Service can solve applicant's microfinance shortage problem to network loan by stages at present, and applicant only needs to download APP Using can apply for that small amount services by stages, market prospects are considerable.But loan application process is different from applying under line network by stages Operation, all steps are all that applicant independently carries out on line, and the good and bad jumbled together for network environment, if without the good applicant of control The authenticity of relevant information, or without providing scientific and effective accrediting amount assessment, it is easy to bad credit situation by stages occur.This Can not only certain monetary losses be caused to the investment of investor, be also a kind of impact to the platform between two parties for providing debt-credit service, The development that there is also malicious influences is unfavorable for internet finance is serviced the debt-credit of entire internet by stages simultaneously.
In order to overcome the above problem, the present invention has built a kind of method assessed based on Internet authentication and credit Network analysis platform, to main ID card information, portrait information, contact information, message registration information and other networks Certification is compared in the information for borrowing or lending money platform between two parties.It is guided according to system, all authentication items, which all pass through, just can get debt-credit by stages Amount.
Real identity card information is obtained by scanning identity card, leads to portrait certification verification face identity information, by urgent The selection of contact person's phone number and relationship selection obtain cell phone apparatus address list information, are obtained by docking telecom operators a certain History message registration information checks frequent contact in period, in addition by the information high connectivity and internet of internet The huge data basis of big data obtains believable air control data reference, is finally reached reduction network loan and services bad credit wind by stages Danger and protection investor and the between two parties purpose of the interests of platform.
Fig. 1 is the platform for the method assessed based on Internet authentication and credit shown according to embodiment of the present invention Structural block diagram.The structure includes:
There is perception authentication module, including ID card information certification, the certification of portrait authentification of message, contact information, leads to Words record authentification of message, all items need user's autonomous operation to complete.It is authentic and valid to scan identity card front and back sides acquisition applicant Identity information, echo applicant determined that, if information echo it is wrong, applicant can independently modify;Identity-based is demonstrate,proved information and is read Storage shoots applicant's dynamic portrait, authenticates portrait information;Applicant independently selects X connection in cell phone apparatus address list People simultaneously selects corresponding relationship, and system is synchronous to obtain address list list in applicant's cell phone apparatus;Dock third party telecom operators It fills in the progress cell-phone number authorization of applicant's unique identity and is used as hand to obtain message registration in applicant's nearly six months Address list information compares in machine equipment;Wherein, message registration information comparison includes: to transport address list in applicant's equipment and telecommunications The message registration for seeking the nearly half a year of quotient compares, and then passes through comprising X above in conjunction with conversing for each person Y times or more, is confirmed with this The phone number used when applicant registers has stable contact person to commonly use phone number.
Unaware authentication module is not necessarily to user's operation.System automatically provides applicant's information and multiple third-party platforms Information compare, whether inquiry applicant family in other network loan platforms handled lending and borrowing business and corresponding refund Situation;
Accrediting amount computing module, system supports that all authentication items accrediting amounts are configurable, for applicant's autonomous operation Credit authentication items (authentication ids, portrait certification, contact person's certification, address list certification) and unaware credit item.All items After certification passes through, system starts to calculate amount automatically, corresponds to amount addition by reading each single item, final result is applicant The final accrediting amount.On the contrary, any one credit item authentification failure, credit stops, and applicant can not take final amount.
The step of Fig. 2 is the method assessed based on Internet authentication and credit shown according to embodiment of the present invention Flow chart.The described method includes:
Applicant complete registration after system prompt need first to carry out authenticate credit can enjoy debt-credit service by stages.Applicant Guided according to system, scanning identity card front and back sides obtain the authentic and valid identity information of applicant, echo applicant determined that, such as believe Breath echo is wrong, and applicant can independently modify;
Identity-based demonstrate,proves information and reads storage, shoots applicant's dynamic portrait, authenticates portrait information;
Applicant independently selects X contact person in cell phone apparatus address list and selects corresponding relationship, and system is synchronous to be obtained Address list list in applicant's cell phone apparatus;
Docking third party telecom operators fill in applicant's unique identity and carry out cell-phone number authorization, to obtain applicant Message registration in nearly six months is used as address list information in cell phone apparatus and compares;
Based on internet big data basis, applicant's information and multiple third-party platform air control information are compared;
The current debt-credit highest amount of applicant is calculated after acquiring comprehensive analysis by information above.
It wherein, include: based on internet to calculate the current debt-credit highest amount of applicant to information collection comprehensive analysis Big data basis, the information that applicant's information is provided with multiple third-party platforms is compared, and whether inquires applicant family at it His network loan platform handled lending and borrowing business and corresponding refund situation;Address list in applicant's equipment and telecommunications are transported The message registration for seeking the nearly half a year of quotient compares, and then passes through comprising X above in conjunction with conversing for each person Y times or more, is confirmed with this The phone number used when applicant registers has stable contact person to commonly use phone number.
In the method analysis: using the information mutual communication of internet, being acquired and retained by ID card information, with application People's dynamic portrait information comparison confirms applicant's information authenticity.Pass through the half a year close with operator of address list in applicant's equipment Log compares, and the phone number that confirmation applicant registers has stable contact person to commonly use number.
In the method analysis, further includes:
ID card information certification, by calling applicant's cell phone apparatus rear camera, focusing identifies identity card front and back sides, Scanning is committed to network analysis.If applicant's identity information physical presence in plateform system at this end, returns to corresponding mistake Information, authentication failure.If applicant's identity information is not present in plateform system at this end, returned after network analysis scanned picture The information such as aobvious name, identification card number, date of birth, applicant determined that rear submit, ID card information certification passes through, and stores applicant Information.
Portrait authentification of message, ID card information enter portrait by rear system and authenticate.By calling applicant's cell phone apparatus Front camera, speech animation indicate that applicant completes corresponding dynamic action, are acted according to application human action and systemic presupposition It compares, if movement is inconsistent, the acquisition failure of dynamic portrait, portrait authentification failure.If keeping strokes, dynamic portrait is acquired successfully, And then compared with previous step identity card image dough figurine picture, inconsistent, portrait authentification failure is compared, if comparing consistent, portrait certification Success stores applicant's portrait information.
Contact person's certification, portrait authentification of message enter contact information by rear system and authenticate.Apply for manpower by calling Address list in machine equipment, allows applicant independently to select emergency contact.Emergency contact is necessary for 11 China's Mainland mobile phones Number.System analyzes whether selected number is 11 China's Mainland mobile phones according to cell-phone number digit and Service Dialing Numbers beginning Number, if not being, system returns to miscue, and contact person adds failure.If so, contact person adds successfully.The same manner adds X Contact person, contact person's certification pass through, and store contact information in applicant's cell phone apparatus.
Cell-phone number authorization identifying, contact person's certification enter cell-phone number authorization identifying by rear system.Electricity is called by interface Believe the nearly half a year history log of operator authorization crawl applicant.The log grabbed is deposited with previous step contact person certification Contact person compares in applicant's cell phone apparatus of storage, then passes through comprising X above in conjunction with conversing for each person Y times or more, really with this The phone number that applicant registers is recognized to commonly use number, there is stable contact person.Cell-phone number authorization identifying passes through.
Wherein, when cell-phone number authorization identifying calls third-party operator, due to each telecom operators' cell-phone number authorized party Formula has differences, and system is based on 11 cell-phone numbers of applicant and starts three bit digitals, judges the corresponding telecom operators of number (electricity Letter, mobile, connection).System docks corresponding interface further according to operator's result of judgement, obtains operator's authorization page letter Breath.
Unaware certification, cell-phone number authorization identifying terminate to need the authentication item of applicant's autonomous operation, system after passing through It is authenticated into applicant's unaware.Using information mutual communication and the big data basis of internet, third party's power is called by interface Prestige big data air control platform, debt-credit feelings of the data basis quick check applicant history based on big data in other loan platforms Condition, comprehensive analysis return to authentic and valid authentication result.
In the method analysis, further includes: system supports that all authentication items accrediting amounts are configurable, certainly for applicant The credit authentication items (authentication ids, portrait certification, contact person's certification, address list certification) and unaware credit item of main operation, After all certifications pass through, system reads each single item and corresponds to amount addition, and final result is the final accrediting amount of applicant.Phase Instead, any one credit item authentification failure, credit stop, and applicant can not take final amount.
The method analysis in, further includes: have perception credit authentication items between there are High relevancies and succession, it is previous Authentication items are necessary for through state, and system can just enter next authentication items.All authentication items are all completed, and credit computing system starts Into the state of calculating, when fructufy, shows applicant, and applicant can carry out lend-borrow action according to amount is obtained.
In addition, the necessity of authentication items, succession and corresponding amount numerical value, using system parameter configurableization come real It is existing, to adapt to the air control requirement of different times, the safety of Strengthens network debt-credit.
Using the method for the invention assessed based on Internet authentication and credit, for existing network loan ring Border determines the authenticity of applicant's identity information and meets platform by the multi-party comparison to loan applicant's identity information It is required that air control qualification;Applicant is calculated after comprehensive analysis and borrows or lends money amount, and applicant carries out lend-borrow action immediately.

Claims (5)

1. a kind of method assessed based on Internet authentication and credit, which comprises
Scan applicant's identity card front and back sides and obtain the authentic and valid identity information of applicant, echo applicant determined that;
Identity-based demonstrate,proves the reading storage of front and back sides information, shoots applicant's dynamic portrait, authenticates portrait information;
Applicant independently selects contact person in X cell phone apparatus address list and selects corresponding relationship, synchronous to obtain applicant's mobile phone Address list list in equipment;
Docking telecom operators fill in applicant's phone number unique identity and carry out cell-phone number authorization, to obtain applicant Message registration in a period of time is used as and does information comparison with address list in previous step cell phone apparatus;
It docks third party data center and obtains applicant's web-based history debt-credit information by stages;
Comprehensive analysis, which is acquired, by information above calculates the current debt-credit of applicant highest amount by stages;
Wherein, to information collection comprehensive analysis with calculate the current debt-credit highest amount of applicant include: will be in applicant's equipment The message registration in certain time that address list is provided with telecom operators compares, comprising X above in conjunction with the Y that converses for each person Then pass through more than secondary, confirms that the phone number that applicant registers to commonly use number, there is stable contact person with this;Applicant is believed It ceases the information that provides with multiple third-party platforms to compare, inquires whether applicant in other network loan platforms handled debt-credit Business and corresponding refund situation by stages.
2. the method assessed as described in claim 1 based on Internet authentication and credit, it is characterised in that:
Using the information mutual communication of internet, is acquired and retained by ID card information, and applicant's dynamic portrait information comparison, really Recognize applicant's information authenticity;The nearly half a year log ratio provided by address list in applicant's equipment and telecom operators Right, the phone number that confirmation applicant registers has stable contact person to commonly use number.
3. the method assessed as claimed in claim 2 based on Internet authentication and credit, which is characterized in that further include:
ID card information certification, by calling applicant's cell phone apparatus rear camera, focusing identification identity card front and back sides, scanning Submission system analysis;If applicant's identity information physical presence in plateform system at this end, returns to corresponding error message, body Part authentification failure;Echoed if applicant's identity information is not present in plateform system at this end, after network analysis scanned picture name, The information such as identification card number, date of birth, applicant determined that rear submit, ID card information certification passes through, and stores applicant's information;
Portrait authentification of message, ID card information enter portrait by rear system and authenticate;By calling applicant's cell phone apparatus preposition Camera, speech animation prompt applicant to complete specified dynamic action, are compared according to application human action and systemic presupposition movement, If movement is inconsistent, the acquisition failure of dynamic portrait, portrait authentification failure;If keeping strokes, dynamic portrait is acquired successfully, Jin Eryu Previous step identity card image dough figurine picture compares, and compares inconsistent, portrait authentification failure, if comparing unanimously, portrait is authenticated successfully, deposits Store up applicant's portrait information;
Contact person's certification, portrait authentification of message enter contact information by rear system and authenticate;By calling applicant's mobile phone to set Standby interior address list, applicant independently select emergency contact, and wherein emergency contact is necessary for 11 China's Mainland cell-phone numbers; System analyzes whether selected number is 11 China's Mainland cell-phone numbers according to cell-phone number digit and Service Dialing Numbers beginning, such as It is not that system returns to miscue, contact person adds failure;If so, contact person adds successfully;The same manner adds X connection People, contact person's certification pass through, and store address list information in applicant's cell phone apparatus;
Cell-phone number authorization identifying, contact person's certification enter cell-phone number authorization identifying by rear system;Telecommunications fortune is called by interface It seeks quotient and authorizes log in crawl applicant section historical time;The log grabbed is deposited with previous step contact person certification Contact person compares in applicant's cell phone apparatus of storage, then passes through comprising X above in conjunction with conversing for each person Y times or more, really with this The phone number that applicant registers is recognized to commonly use number, there is stable contact person;Cell-phone number authorization identifying passes through;
Wherein, when cell-phone number authorization identifying calls third-party operator, since each telecom operators' cell-phone number authorization is deposited In difference, system is based on 11 cell-phone numbers of applicant and starts 3 bit digitals, judges the corresponding telecom operators of phone number, according to Judging result docks corresponding Operator interface, obtains operator's authorization page information and is authorized;
Unaware certification, cell-phone number authorization identifying terminate to need the authentication item of applicant's autonomous operation after passing through, and system enters The certification of applicant's unaware;Using information mutual communication and the big data basis of internet, third party's big data is called by interface Air control system, in the debt-credit situation of other network loan platforms, return after comprehensive analysis really has quick check applicant history The authentication result of effect.
4. the method assessed as claimed in claim 3 based on Internet authentication and credit, which is characterized in that further include:
System supports that all authentication items accrediting amounts are configurable, and the credit authentication items and unaware of applicant's autonomous operation are awarded After believing that item, all certifications pass through, system reads each single item and corresponds to amount and be added, and final amount total value is that applicant can divide The accrediting amount of phase;On the contrary, any one credit item authentification failure, credit stops, and applicant can not take final amount, Wu Fajin Row network loan behavior.
5. the method assessed as claimed in claim 4 based on Internet authentication and credit, which is characterized in that further include:
Have between perception credit authentication items there are High relevancy and succession, previous authentication items are necessary for through state, and system is Next authentication items can be entered;Unaware credit item is just to be initiated after the completion of last has perception authentication items;It is all to recognize Card item is all completed, and credit computing system initially enters calculating state, and when fructufy shows applicant, applicant can according to Lend-borrow action is carried out to amount.
CN201810273168.8A 2018-03-29 2018-03-29 A method of it is assessed based on Internet authentication and credit Withdrawn CN110166416A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810273168.8A CN110166416A (en) 2018-03-29 2018-03-29 A method of it is assessed based on Internet authentication and credit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810273168.8A CN110166416A (en) 2018-03-29 2018-03-29 A method of it is assessed based on Internet authentication and credit

Publications (1)

Publication Number Publication Date
CN110166416A true CN110166416A (en) 2019-08-23

Family

ID=67636366

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810273168.8A Withdrawn CN110166416A (en) 2018-03-29 2018-03-29 A method of it is assessed based on Internet authentication and credit

Country Status (1)

Country Link
CN (1) CN110166416A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110599190A (en) * 2019-09-27 2019-12-20 支付宝(杭州)信息技术有限公司 Identity authentication method and device based on block chain
CN112597533A (en) * 2020-12-10 2021-04-02 支付宝(杭州)信息技术有限公司 Risk prevention and control method, device and equipment based on privacy protection
CN112861169A (en) * 2021-01-14 2021-05-28 支付宝(杭州)信息技术有限公司 Data processing method, device and equipment based on privacy protection
CN113068178A (en) * 2021-03-25 2021-07-02 中国联合网络通信集团有限公司 Terminal authentication method and server
CN116738481A (en) * 2023-06-07 2023-09-12 湖南君创融信科技有限公司 Security credit assessment method and system based on big data

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110599190A (en) * 2019-09-27 2019-12-20 支付宝(杭州)信息技术有限公司 Identity authentication method and device based on block chain
CN110599190B (en) * 2019-09-27 2022-10-21 支付宝(杭州)信息技术有限公司 Identity authentication method and device based on block chain
CN112597533A (en) * 2020-12-10 2021-04-02 支付宝(杭州)信息技术有限公司 Risk prevention and control method, device and equipment based on privacy protection
CN112861169A (en) * 2021-01-14 2021-05-28 支付宝(杭州)信息技术有限公司 Data processing method, device and equipment based on privacy protection
CN112861169B (en) * 2021-01-14 2022-06-14 支付宝(杭州)信息技术有限公司 Data processing method, device and equipment based on privacy protection
CN113068178A (en) * 2021-03-25 2021-07-02 中国联合网络通信集团有限公司 Terminal authentication method and server
CN116738481A (en) * 2023-06-07 2023-09-12 湖南君创融信科技有限公司 Security credit assessment method and system based on big data

Similar Documents

Publication Publication Date Title
CN110166416A (en) A method of it is assessed based on Internet authentication and credit
CN110012028B (en) Medical identity authentication method and system
US9300792B2 (en) Registration, verification and notification system
CN110046902A (en) Risk trade processing method, device and equipment
CN106209766A (en) The bidirectional applications platform of a kind of mobile phone and method
US20120030108A1 (en) System and method for the remote identification and verification of a client's identity during the provision of financial services
CN107729727A (en) The real name identification method and device of a kind of account number
CN106570481A (en) Processing method, apparatus and system for bill informatization
WO2009003605A2 (en) Virtual prepaid or credit card and method and system for providing such and for electronic payment transactions
CN105407042A (en) Remote SIM card accessing method and system based on wechat public platform
CN107786491A (en) account number verification method and device
CN107230140A (en) House lease and vending method and system
CN102184497A (en) Electronic transaction system and payment method with telegraph number as account number
US9558479B1 (en) Systems and methods for verification of identity and location
CN114553838A (en) Implementation method, system and server for remote business processing
CN110298672A (en) User identity checking method, device, computer equipment and storage medium
CN112398858A (en) Method and system for real-name identity authentication of courier
CN107464184A (en) A kind of account opens method and its device
CN109446778A (en) Immovable Property Registration information acquisition method, computer installation and computer readable storage medium based on recognition of face
KR100818793B1 (en) Auto call system using telephone and financial transaction method using the system
CN109981654A (en) Digital identity generation method and device
CN110443621A (en) Video core body method, apparatus, equipment and computer storage medium
CN109034439A (en) A kind of intelligent visitor system based on two dimensional code reservation type
CN114613367A (en) Synchronous audio and video recording method, device and storage medium based on voice recognition
CN110378789A (en) Solution, system and the computer readable storage medium of disputed transaction

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20190823

WW01 Invention patent application withdrawn after publication
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载