CN104508623A - Credit behavior network mapping - Google Patents

Credit behavior network mapping Download PDF

Info

Publication number
CN104508623A
CN104508623A CN201280075055.8A CN201280075055A CN104508623A CN 104508623 A CN104508623 A CN 104508623A CN 201280075055 A CN201280075055 A CN 201280075055A CN 104508623 A CN104508623 A CN 104508623A
Authority
CN
China
Prior art keywords
instance
entity
identifier
processor
search
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201280075055.8A
Other languages
Chinese (zh)
Other versions
CN104508623B (en
Inventor
玛丽亚·辛森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dun and Bradstreet Corp
Dun and Bradstreet Inc
Original Assignee
Dun and Bradstreet Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dun and Bradstreet Inc filed Critical Dun and Bradstreet Inc
Publication of CN104508623A publication Critical patent/CN104508623A/en
Application granted granted Critical
Publication of CN104508623B publication Critical patent/CN104508623B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Technology Law (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A method including receiving an identifier of a first entity, performing a first search of a database that returns an identifier of a second entity having a relationship with the first entity, performing a second search of a database that returns an identifier of a third entity that is a creditor of the second entity, and constructing in a storage device, a data structure that defines a path between the first entity and the third entity via the second entity. The method can be executed by an apparatus having a processor and a memory with instructions. The instructions, when read by the processor, cause the processor to perform the method described above.

Description

Behavior of credit network mapping
Technical field
Present disclosure relates to credit evaluation, more specifically, relates to behavior of credit network mapping process.
Background technology
Method described in this part is the method that can carry out, but might not be the method previously conceived or carried out.Therefore, unless otherwise noted, the method otherwise described in this part is not the prior art of claim in the application or should be considered to prior art owing to being included in this part.
Routine techniques such as the Fei Aizhe (Fair Isaac) company credit's score (FICO) of prestige or CREDIT SCORE indicates that company repays the possibility of floating debt.Credit side such as bank and credit card company use CREDIT SCORE to assess by lending money to the potential risk that consumer causes.The widely using of CREDIT SCORE makes credit broadly can obtain consumer and more cheap.
FICO score and financial history analyze of other similar technology to company generate CREDIT SCORE.Such as, the financial history of FICO to company is analyzed, such as repay history, credit usage degree, credit history length, such as pay by instalments, have enough to meet the need, consume finance and mortgage loan use the recent search of credit type, credit and specific factor as right of retention.
But FICO assessment only generates CREDIT SCORE to the financial history analysis of single company.Conversely, which has limited the scope of FICO assessment, and can not identify in addition and explain the factor relevant with more global supply chain.
Therefore, still need to carry out more extensive and global assessment to the behavior of credit of company.
Method described in this part is the method that can carry out, but might not be the method previously conceived or carried out.Therefore, unless otherwise noted, the method otherwise described in this part is not the prior art of claim in the application or should not be admitted to be prior art owing to being included in this part.
Summary of the invention
Provide the behavior of credit network mapping process that the receivable account of cash flow and business is assessed.
Additionally provide a kind of method, comprising: the identifier receiving first instance; Perform the first search returning the database of the identifier of second instance, second instance and first instance have relation; Perform the second search returning the database of the identifier of the 3rd entity, the 3rd entity is the obligee of second instance; And construct the data structure that the path via second instance between first instance and the 3rd entity is limited in the storage device.
Additionally provide a kind of method, comprising: the identifier receiving first instance; Perform the first search returning the database of the identifier of second instance, second instance is the obligee of first instance; Perform the second search returning the database of the identifier of the 3rd entity, the 3rd entity is the obligee of second instance; And construct the data structure that the path via second instance between first instance and the 3rd entity is limited in the storage device.
Additionally provide a kind of method, comprising: the identifier receiving first instance; Perform the first search returning the database of the identifier of second instance, second instance is relevant to first instance in level; Perform the second search returning the database of the identifier of the 3rd entity, the 3rd entity is the obligee of second instance; And construct the data structure that the path via second instance between first instance and the 3rd entity is limited in the storage device.
Additionally provide a kind of method, comprising: the identifier receiving first instance; Perform the first search returning the database of the identifier of second instance, second instance carries out credit inquiry to first instance; Perform the second search returning the database of the identifier of the 3rd entity, the 3rd entity is the obligee of second instance; And construct the data structure that the path via second instance between first instance and the 3rd entity is limited in the storage device.
Additionally provide a kind of method, comprising: the identifier receiving first instance; Perform the first search returning the database of the identifier of second instance, second instance is the obligee of first instance; Perform the second search returning the database of the identifier of the 3rd entity, the 3rd entity carries out credit inquiry to second instance; And construct the data structure that the path via second instance between first instance and the 3rd entity is limited in the storage device.
Additionally provide a kind of method, comprising: the identifier receiving first instance; Perform the first search returning the database of the identifier of second instance, second instance is relevant to first instance in level; Perform the second search returning the database of the identifier of the 3rd entity, the 3rd entity carries out credit inquiry to second instance; And construct the data structure that the path via second instance between first instance and the 3rd entity is limited in the storage device.
Additionally provide a kind of equipment for performing the method provided above.This equipment comprises processor and storer.Storer comprises the instruction can read by processor, and makes processor perform the action of said method step when instruction is read by processor.
In addition, there is the non-transient state storage medium comprising the instruction can read by processor.Instruction makes the action of the method provided above processor execution when being read by processor.
Accompanying drawing explanation
Fig. 1 shows the system for generating behavior of credit network mapping;
Fig. 2 shows the example that financial relations maps;
Fig. 3 shows another financial relations and maps;
Fig. 4 shows another example that financial relations maps;
Fig. 5 is the method for assessing the behavior of credit of entity;
Fig. 6 is the another method for assessing the behavior of credit of entity;
Fig. 7 is the another method for assessing the behavior of credit of entity;
Fig. 8 is the another method for assessing the behavior of credit of entity;
Fig. 9 is the another method for assessing the behavior of credit of entity.
The parts that a more than figure shares or feature use identical Reference numeral to represent in each figure.
Embodiment
This disclosure has described the method and system providing perspective credit network to map, perspective credit network is mapping through and monitors to from its company with different degree of separation the financial data providing company interested.This perspective credit network maps and provides global accurate finance model, and this finance model such as can identify the interruption of credit supply chain in the credit at difference place, and these are interrupted the final impact of the operation be associated with company interested.
With reference to accompanying drawing, particularly with reference to Fig. 1, provide a kind of system 100 for generating behavior of credit network mapping.
Fig. 1 comprises the computing machine 105 being connected to user terminal 130 and database via network 135.
Database can be one or more physical database.In general, database comprises credit inquiry 137, transaction data 140, Enterprise linkage 145, service parameter 150, credit network mapping 155 and output parameter 160.
Computing machine 105 also comprises the processor 110 communicated with storer 115.Storer 115 comprises program module 120.Processor is configured in response to instruction and the logic circuitry performing instruction.Term " module " is in this article for representing the feature operation that can be presented as individual components or the integrated configuration for multiple slave unit.
Although system 100 be described as the instruction of the method for present disclosure to be arranged in storer 115 in this article, instruction can visibly be embodied on outer computer readable storage medium storing program for executing 125 for being loaded into subsequently in storer 115.Storage medium 125 can be the storage medium of any routine, includes but not limited to, floppy disk, CD, tape, ROM (read-only memory), optical storage medium, USB (universal serial bus) (USB) flash drive, digital versatile disk [Sony] or compressed drive.Instruction can also be embodied in and is arranged on remote storage system and is coupled to the random access memory of storer 115 or the electronic storage device of other types.
In addition, although program schema 120 to be described as being installed in this article in storer 115 and therefore to realize with software, it can realize with any one or its combination in hardware (such as, electronic circuit system), firmware, software.
Credit inquiry 137 stores data usually, such as, attempt the request of the lending institution of the credit history of checking company interested, landlord or employer.In addition, credit inquiry can comprise third party's request of credit history, such as credit side's viewpoint.Credit inquiry 137 stores usually by the data of company such as indicated by company interested of its credit history of request.
Transaction data 140 comprises the financial data of company, such as receivable account data.Receivable account data is the information of the money of the debt balance due from specific company of such as company.In addition, entity identification is the debtor of obligee by receivable account data, and indicates credit line.Receivable account data is instructed to according to obligee's information usually, and comprises the receivable account of the supplier of company interested particularly.Processor 110 receives receivable account data according to the instruction of program module 120 from company, and fills transaction data 140.
Enterprise linkage 145 comprises the business connection data of company.Business connection data are the hierarchical relationships between the associated companies of company interested, and the hierarchical relationship between the associated companies of the supplier of company interested in addition.Such as, Enterprise linkage 145 comprises hierarchical relationship identifier as parent company, subsidiary company, branch office, business partner and neither parent company neither the associated companies of subsidiary company, such as, have the company of common parent company.
Service parameter 150 comprises the bankruptcy data of company, corporate statistics data, data query and city's Value Data.Bankruptcy data comprise the designator of the supplier of bankruptcy.Corporate statistics data comprise company data as the quantity of employee, factory types and size.Data query comprises the information about the company inquired about company interested, and in addition such as, to the amount of the company that company interested is inquired about, numerical value.Market value data comprise company at different time such as every day, city's value information weekly and monthly.
Credit network mapping 155 comprises company interested and maps from the financial relations of the associated companies be separated by different degree of separation.Usually, financial relations maps the cash flow signal and the trend that represent the supplier of the supplier relevant to company interested and supplier.Supplier is the company providing article or service to business interested.Supplier comprises public utilities, interim post recruitment mechanism and office supplier.In addition, financial relations maps and can be included in level relevant company, and the relevant supplier of company and the supplier of supplier in this external level.The example that financial relations maps will be shown in Fig. 2 and Fig. 3 of discussion below.
Output parameter 160 is assessment results of entity 205.Such as, output parameter 160 can comprise change or the increment (δ) of the market value of entity 205.
User terminal 130 can receive input from user and to the input/output device of user's Output rusults.Such as, user terminal 130 can comprise and is provided for user can transmit information and keyboard from command selection to processor 110 or speech recognition subsystem.User terminal 130 also comprises output unit as display or printer.Cursor control as mouse, tracking ball or operating rod make user can over the display manipulable cursor with to processor 110 transmit add information and command selection.
Fig. 2 is the example that financial relations maps, and such as credit network maps 200.Credit network maps 200 and shows the global supply chain relevant with specific interested company and entity 205, such as credit supply.Particularly, credit network maps the company that 200 show the shared different degree of separation relevant from entity 205.The finance that the financial information provided by each such as company of putting of the global supply chain of credit finally affects entity 205 are healthy, the such as credit risk of entity 205.
In global supply chain, share and comprise such as obligee company, the company that level is correlated with and industry with the company of the different degree of separation of entity 205 and go together.Conversely, the finance health of each company in these companies can provide again the early stage credit risk of warning entity 205.
The obligee of entity 205 comprises entity 210 and entity 220.In addition, credit network mapping 200 provides the additional company in global supply chain, also provides the obligee of such as obligee.Entity 215 is obligees of entity 210, and entity 225 is obligees of entity 220, and entity 240 is obligees of entity 235.The dotted line being connected to each entity in entity 215, entity 225 and entity 240 represents the obligee of the obligee of the unlimited amount in global supply chain.That is, credit network maps the degree of depth or the width that 200 can be extended to any expectation comprising associated companies.
The company with entity 205 with hierarchical relationship comprises entity 230.This hierarchical relationship can comprise parent company's relation, subsidiary company's relation or neither parent company neither the associated companies relation of subsidiary company.As shown in the figure, entity 230 is subsidiary companies of entity 205.
In addition, credit network mapping 200 comprises the colleague 250 as the colleague of entity 205.Colleague 250 is from the company with the entity 205 phase same industry, and is summarized as the control group of entity 205.
The instruction that processor 110 performs from program module 120 maps 200 to produce the credit network of Financial Network mapping 155 as provided in Fig. 2.
Such as, the instruction from program module 120 makes processor 110: the identifier receiving first instance; Perform the first search returning the database of the identifier of second instance, second instance and first instance have relation; And perform the second search returning the database of the identifier of the 3rd entity, the 3rd entity is the obligee of second instance.Instruction also makes processor 110 construct the data structure limited the path via second instance between first instance and the 3rd entity in the storage device.
Map 200 with reference to credit network, first instance can be entity 205, and second instance can be entity 210, and the 3rd entity can be entity 215.First search returns the identifier of entity 210, and the second search returns the identifier of entity 215, and entity 215 is obligees of entity 210.The obligee of to be entity 210 the be entity 205 of the relation between entity 210 and entity 205.Credit network map 200 also show between entity 205 and entity 215 via the data structure that the path of entity 210 limits.
Instruction from program module 120 can also make processor 110 according to the feature such as cash flow of the 3rd entity such as entity 215 and entity 235, assesses the feature such as assessing credit risks of first instance such as entity 205.
In addition, first search can return the first credit line expanding to first instance such as entity 205 from second instance such as entity 210, and the second search can return the second credit line expanding to second instance such as entity 210 from the 3rd entity such as entity 215.
In other embodiment, second instance can be relevant to first instance in level.Such as, second instance can be entity 230, i.e. the subsidiary company of entity 205.Therefore, when processor 110 performing database first search and when returning the identifier of second instance, processor 110 returns the identifier of entity 210, and when processor 110 performing database second search and when returning the identifier of the 3rd entity, processor returns the identifier of entity 235.
Fig. 3 shows another financial relations and maps, and such as credit network maps 300.
Credit network maps another embodiment that 300 are the whole world finance chain relevant with entity 205.Especially, credit network maps 300 and also show by credit inquiry to entity 205 or the interested inquiry company of entity 230, and the obligee of company such as inquires about in company relevant with inquiry company in addition.
The instruction that processor 110 performs from program module 120 maps 155 as credit network mapping 300 to produce Financial Network.Similarly, adopt discussed above make processor 110 produce credit network map 200, from program schema 120 instruction to produce credit network map 300.
Particularly, instruction makes processor 110: the identifier receiving first instance; Perform the first search returning the database of the identifier of second instance, second instance and first instance have relation; Perform the second search returning the data of the identifier of the 3rd entity, the 3rd entity is the obligee of second instance; And construct the data structure that the path via second instance between first instance and the 3rd entity is limited in the storage device.In addition, instruction can make processor 110 according to the feature of the feature evaluation first instance of the 3rd entity.
Such as, the identifier of first instance can be entity 205.First search returns the identifier of entity 305, such as second instance related with first instance tool.Relation between entity 205 and entity 305 is entity 305 is fabricators entity 205 being carried out to credit inquiry.Second search of database returns the identifier of entity 310, such as, as the 3rd entity of the obligee of second instance.In addition, the second search returns the credit line expanding to entity 305 from entity 310.Credit network map 300 also show to entity 205 such as first instance and entity 310 such as between the 3rd entity via the data structure that the path of entity 305 such as second instance limits.Credit network maps 300 identifiers that can also comprise entity 205, the identifier of entity 305, the identifier of entity 310 and expands to the credit line of entity 305 from entity 310.
In other embodiment, the instruction from program module 120 can make processor 110: the identifier receiving first instance; Perform the first search returning the database of the identifier of second instance, second instance is relevant to first instance in level; Perform the second search returning the data of the identifier of the 3rd entity, the 3rd entity carries out credit inquiry to second instance; And construct the data structure that the path via second instance between first instance and the 3rd entity is limited in the storage device.In addition, instruction can make processor 110 according to the feature of the feature evaluation of the 3rd entity about first instance.
Such as, first instance is entity 205, and second instance is entity 230.Due to the subsidiary company that entity 230 is entities 205, therefore entity 230 is relevant to entity 205 in level.Because entity 325 pairs of entities 230 carry out credit inquiry, therefore the second search can return the identifier of entity 325.Credit network map 300 show to entity 205 such as first instance and entity 325 such as between the 3rd entity via the data structure that the path of entity 230 such as second instance limits.In addition, feature can be depend on entity 325, the credit risk of entity 205.
Fig. 4 is another example that financial relations maps, and such as credit network maps 400.
Credit network maps 400 and shows the global supply chain relevant with specific company interested and entity 205, such as credit supply.Particularly, credit network maps the company that 400 show relevant from entity 205, shared different degree of separation, such as entity 405 and entity 410.Entity 405 is obligees of entity 205, and entity 410 is fabricators entity 405 being carried out to credit inquiry.
Processor 110 performs the instruction of the mapping 400 from program module 120 to credit network.
Especially, instruction makes processor 110: the identifier receiving first instance; Perform the first search returning the database of the identifier of second instance, second instance is the obligee of first instance; Perform the second search returning the data of the identifier of the 3rd entity, the 3rd entity carries out credit inquiry to second instance; And construct the data structure that the path via second instance between first instance and the 3rd entity is limited in the storage device.
For example, referring to Fig. 4, the identifier of first instance can be entity 205.First search returns the identifier of the obligee of entity 405 such as first instance.Second search returns entity 410 such as carries out the 3rd entity of credit inquiry identifier to entity 405 (second instance).In addition, Fig. 4 shows the data structure limited the path via connecting line between entity 205 and entity 410 constructed in the storage device.
In other embodiment, instruction can also make processor 110 according to the feature of the feature evaluation first instance of the 3rd entity.In addition, first search can also return the first credit line expanding to first instance from second instance, and when processor construction data structure, processor can also comprise the identifier of first instance, the identifier of second instance, the identifier of the 3rd entity and credit line.
Such as, processor 110 according to the entity 410 i.e. credit risk of the 3rd entity, can assess the feature of the entity 205 i.e. credit risk of first instance.
Fig. 5 is the method for assessing the behavior of credit of entity, that is, method 500.
Especially, method 500 maps relation between the entity shown in 200 with reference to the financial relations of Fig. 2.Particularly, the relation between method 500 reference entity 205, entity 210 and entity 215.Entity 210 is obligees of entity 205, and entity 215 is obligees of entity 210.
Method 500 starts from step 505.Step 505 specifies the identifier receiving first instance such as entity 205.After step 505, method 500 proceeds to step 510.
Step 510 specifies the database of search second instance such as entity 210, and second instance is the obligee of first instance.After step 510, method 500 proceeds to step 515.
Step 515 specifies the database of search the 3rd entity such as entity 215, and the 3rd entity is the obligee of second instance.After step 515, method 500 proceeds to step 520.
Step 520 regulation constructs the data structure limited the path via second instance between first instance and the 3rd entity.After step 510, method 500 proceeds to step 525.
Step 525 specifies the feature of the feature evaluation first instance according to the 3rd entity.After step 525, method 500 terminates.
Fig. 6 is the another method for assessing the behavior of credit of entity, that is, method 600.
Especially, method 600 maps relation between the entity shown in 200 with reference to the financial relations of Fig. 2.Particularly, the relation between method 600 reference entity 205, entity 230 and entity 235.Entity 230 is relevant to entity 205 in level, and entity 235 is obligees of entity 230.
Method 600 starts from step 605.Step 605 specifies the identifier receiving first instance such as entity 205.After step 605, method 600 proceeds to step 610.
Step 610 specifies the database of search second instance such as entity 230, and second instance is relevant to first instance in level.After step 610, method 600 proceeds to step 615.
Step 615 specifies the database of search the 3rd entity such as entity 235, and the 3rd entity is the obligee of second instance.After step 615, method 600 proceeds to step 620.
Step 620 regulation constructs the data structure limited the path via second instance between first instance and the 3rd entity.After step 620, method 600 proceeds to step 625.
Step 625 specifies the feature of the feature evaluation first instance according to the 3rd entity.After step 625, method 600 terminates.
Fig. 7 is the another method for assessing the behavior of credit of entity.
Especially, method 700 maps relation between the entity shown in 300 with reference to the financial relations of Fig. 3.Particularly, the relation between method 700 reference entity 205, entity 305 and entity 310.Entity 305 is fabricators entity 205 being carried out to credit inquiry, and entity 310 is obligees of entity 305.
Method 700 starts from step 705.Step 705 specifies the identifier receiving first instance such as entity 205.After step 705, method 700 proceeds to step 710.
Step 710 specifies the database of search second instance such as entity 305, and second instance carries out credit inquiry to first instance.After step 710, method 700 proceeds to step 715.
Step 715 specifies the database of search the 3rd entity such as entity 310, and the 3rd entity is the obligee of second instance.After step 715, method 700 proceeds to step 720.
Step 720 regulation constructs the data structure limited the path via second instance between first instance and the 3rd entity.After stage 720, method 700 proceeds to step 725.
Step 725 specifies the feature of the feature evaluation first instance according to the 3rd entity.After step 725, method 700 terminates.
Fig. 8 is the another method for assessing the behavior of credit of entity.
Especially, method 800 maps relation between the entity shown in 400 with reference to the financial relations of Fig. 4.Particularly, the relation between method 800 reference entity 205, entity 405 and entity 410.Entity 405 is obligees of entity 205, and entity 410 is fabricators entity 405 being carried out to credit inquiry.
Method 800 starts from step 805.Step 800 specifies the identifier receiving first instance such as entity 205.After step 805, method 800 proceeds to step 810.
Step 810 specifies the database of search second instance such as entity 405, and second instance is the obligee of first instance.After step 810, method 800 proceeds to step 815.
Step 815 specifies the database of search the 3rd entity such as entity 410, and the 3rd entity carries out credit inquiry to second instance.After step 815, method 800 proceeds to step 820.
Step 820 regulation constructs the data structure limited the path via second instance between first instance and the 3rd entity.After step 820, method 800 proceeds to step 825.
Step 825 specifies the feature of the feature evaluation first instance according to the 3rd entity.After step 825, method 800 terminates.
Fig. 9 is the another method for assessing the behavior of credit of entity.
Especially, method 900 maps relation between the entity shown in 300 with reference to the financial relations of Fig. 3.Particularly, the relation between method 900 reference entity 205, entity 230 and entity 325.Entity 230 is relevant to entity 205 in level, and entity 325 is fabricators entity 230 being carried out to credit inquiry.
Method 900 starts from step 905.Step 905 specifies the identifier receiving first instance such as entity 205.After step 905, method 900 proceeds to step 910.
Step 910 specifies the database of search second instance such as entity 230, and second instance is relevant to first instance in level.After step 910, method 900 proceeds to step 915.
Step 915 specifies the database of search the 3rd entity such as entity 325, and the 3rd entity carries out credit inquiry to second instance.After step 915, method 900 proceeds to step 920.
Step 920 regulation constructs the data structure limited the path via second instance between first instance and the 3rd entity.After step 920, method 900 proceeds to step 925.
Step 925 specifies the feature of the feature evaluation first instance according to the 3rd entity.After step 925, method 900 terminates.
Technology described herein is exemplary, and is not appreciated that any specific restriction implied present disclosure.Should be understood that, various replacement, combination and amendment can be imagined by those skilled in the art.Such as, point out unless otherwise noted or by step itself, otherwise the step be associated with process described herein can perform with any order.Present disclosure is intended to contain all such replacements fallen within the scope of claims, amendment and modification.

Claims (60)

1. a method, comprising:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance and described first instance have relation;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity is the obligee of described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
2. method according to claim 1, also comprises:
The feature of described first instance is assessed according to the feature of described 3rd entity.
3. method according to claim 1,
Wherein, the obligee of to be described second instance be in described pass described first instance,
Wherein, described first search also returns the first credit line expanding to described first instance from described second instance,
Wherein, described second search also returns the second credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity, (d) described first credit line and (e) described second credit line.
4. method according to claim 1,
Wherein, described pass is that described second instance is relevant to described first instance in level,
Wherein, described second search also returns the credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity and (d) described credit line.
5. method according to claim 1,
Wherein, described pass is that described second instance has carried out credit inquiry to described first instance,
Wherein, described second search also returns the credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity and (d) described credit line.
6. a method, comprising:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance is the obligee of described first instance;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity is the obligee of described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
7. method according to claim 6, also comprises:
The feature of first instance according to the feature evaluation of described 3rd entity.
8. method according to claim 6,
Wherein, described first search also returns the first credit line expanding to described first instance from described second instance,
Wherein, described second search also returns the second credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity, (d) described first credit line and (e) described second credit line.
9. a method, comprising:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance is relevant to described first instance in level;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity is the obligee of described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
10. method according to claim 9, also comprises:
The feature of first instance according to the feature evaluation of described 3rd entity.
11. methods according to claim 9,
Wherein, described second search also returns the credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity and (d) described credit line.
12. 1 kinds of methods, comprising:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance has carried out credit inquiry to described first instance;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity is the obligee of described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
13. methods according to claim 12, also comprise:
The feature of first instance according to the feature evaluation of described 3rd entity.
14. methods according to claim 12,
Wherein, described second search also returns the credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity and (d) described credit line.
15. 1 kinds of methods, comprising:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance is the obligee of described first instance;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity has carried out credit inquiry to described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
16. methods according to claim 15, also comprise:
The feature of first instance according to the feature evaluation of described 3rd entity.
17. methods according to claim 15,
Wherein, described first search also returns the first credit line expanding to described first instance from described second instance, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity and (d) described credit line.
18. 1 kinds of methods, comprising:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance is relevant to described first instance in level;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity carries out credit inquiry to described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
19. methods according to claim 18, also comprise:
The feature of first instance according to the feature evaluation of described 3rd entity.
20. methods according to claim 18,
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance and (c) described 3rd entity.
21. 1 kinds of equipment, comprising:
Processor; And
Storer, described storer comprises the instruction can read by described processor, and described instruction makes described processor perform following action when being read by described processor:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance and described first instance have relation;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity is the obligee of described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
22. equipment according to claim 21, wherein, described instruction also makes described processor perform following action:
The feature of first instance according to the feature evaluation of described 3rd entity.
23. equipment according to claim 21,
Wherein, the obligee of to be described second instance be in described pass described first instance,
Wherein, described first search also returns the first credit line expanding to described first instance from described second instance,
Wherein, described second search also returns the second credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity, (d) described first credit line and (e) described second credit line.
24. equipment according to claim 21,
Wherein, described pass is that described second instance is relevant to described first instance in level,
Wherein, described second search also returns the credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity and (d) described credit line.
25. equipment according to claim 21,
Wherein, described pass is that described second instance has carried out credit inquiry to described first instance,
Wherein, described second search also returns the credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity and (d) described credit line.
26. 1 kinds of equipment, comprising:
Processor; And
Storer, described storer comprises the instruction can read by described processor, and described instruction makes described processor perform following action when being read by described processor:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance is the obligee of described first instance;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity is the obligee of described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
27. equipment according to claim 26, wherein, described instruction also makes described processor perform following action:
The feature of first instance according to the feature evaluation of described 3rd entity.
28. equipment according to claim 26,
Wherein, described first search also returns the first credit line expanding to described first instance from described second instance,
Wherein, described second search also returns the second credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity, (d) described first credit line and (e) described second credit line.
29. 1 kinds of equipment, comprising:
Processor; And
Storer, described storer comprises the instruction can read by described processor, and described instruction makes described processor perform following action when being read by described processor:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance is relevant to described first instance in level;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity is the obligee of described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
30. equipment according to claim 29, wherein, described instruction also makes described processor perform following action:
The feature of first instance according to the feature evaluation of described 3rd entity.
31. equipment according to claim 29,
Wherein, described second search also returns the credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity and (d) described credit line.
32. 1 kinds of equipment, comprising:
Processor; And
Storer, described storer comprises the instruction can read by described processor, and described instruction makes described processor perform following action when being read by described processor:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance has carried out credit inquiry to described first instance;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity is the obligee of described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
33. equipment according to claim 32, wherein, described instruction also makes described processor perform following action:
The feature of first instance according to the feature evaluation of described 3rd entity.
34. equipment according to claim 32,
Wherein, described second search also returns the credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity and (d) described credit line.
35. 1 kinds of equipment, comprising:
Processor; And
Storer, described storer comprises the instruction can read by described processor, and described instruction makes described processor perform following action when being read by described processor:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance is the obligee of described first instance;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity has carried out credit inquiry to described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
36. equipment according to claim 35, wherein, described instruction also makes described processor perform following action:
The feature of first instance according to the feature evaluation of described 3rd entity.
37. equipment according to claim 35,
Wherein, described first search also returns the first credit line expanding to described first instance from described second instance, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity and (d) described credit line.
38. 1 kinds of equipment, comprising:
Processor; And
Storer, described storer comprises the instruction can read by processor, and described instruction makes described processor perform following action when being read by described processor:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance is relevant to described first instance in level;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity has carried out credit inquiry to described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
39. according to equipment according to claim 38, and wherein, described instruction also makes described processor perform following action:
The feature of first instance according to the feature evaluation of described 3rd entity.
40. according to equipment according to claim 38,
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance and (c) described 3rd entity.
41. 1 kinds of non-transient state storage mediums, comprise the instruction can read by processor, and described instruction makes described processor perform following action when being read by described processor:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance and described first instance have relation;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity is the obligee of described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
42. non-transient state storage mediums according to claim 41, wherein, described instruction also makes described processor perform following action:
The feature of first instance according to the feature evaluation of described 3rd entity.
43. non-transient state storage mediums according to claim 41,
Wherein, the obligee of to be described second instance be in described pass described first instance,
Wherein, described first search also returns the first credit line expanding to described first instance from described second instance,
Wherein, described second search also returns the second credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity, (d) described first credit line and (e) described second credit line.
44. non-transient state storage mediums according to claim 41,
Wherein, described pass is that described second instance is relevant to described first instance in level,
Wherein, described second search also returns the credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity and (d) described credit line.
45. non-transient state storage mediums according to claim 41,
Wherein, described pass is that described second instance has carried out credit inquiry to described first instance,
Wherein, described second search also returns the credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity and (d) described credit line.
46. 1 kinds of non-transient state storage mediums, comprise the instruction can read by processor, and described instruction makes described processor perform following action when being read by described processor:
Processor; And
Storer, described storer comprises the instruction can read by processor, and described instruction makes described processor perform following action when being read by described processor:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance is the obligee of described first instance;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity is the obligee of described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
47. non-transient state storage mediums according to claim 46, wherein, described instruction also makes described processor perform following action:
The feature of first instance according to the feature evaluation of described 3rd entity.
48. non-transient state storage mediums according to claim 46,
Wherein, described first search also returns the first credit line expanding to described first instance from described second instance,
Wherein, described second search also returns the second credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity, (d) described first credit line and (e) described second credit line.
49. 1 kinds of non-transient state storage mediums, comprise the instruction can read by processor, and described instruction makes described processor perform following action when being read by described processor:
Processor; And
Storer, described storer comprises the instruction can read by processor, and described instruction makes described processor perform following action when being read by described processor:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance is relevant to described first instance in level;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity is the obligee of described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
50. non-transient state storage mediums according to claim 49, wherein, described instruction also makes described processor perform following action:
The feature of first instance according to the feature evaluation of described 3rd entity.
51. non-transient state storage mediums according to claim 49,
Wherein, described second search also returns the credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity and (d) described credit line.
52. 1 kinds of non-transient state storage mediums, comprise the instruction can read by processor, and described instruction makes described processor perform following action when being read by described processor:
Processor; And
Storer, described storer comprises the instruction can read by processor, and described instruction makes described processor perform following action when being read by described processor:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance has carried out credit inquiry to described first instance;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity is the obligee of described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
53. non-transient state storage mediums according to claim 52, wherein, described instruction also makes described processor perform following action:
The feature of first instance according to the feature evaluation of described 3rd entity.
54. non-transient state storage mediums according to claim 52,
Wherein, described second search also returns the credit line expanding to described second instance from described 3rd entity, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity and (d) described credit line.
55. 1 kinds of non-transient state storage mediums, comprise the instruction can read by processor, and described instruction makes described processor perform following action when being read by described processor:
Processor; And
Storer, described storer comprises the instruction can read by processor, and described instruction makes described processor perform following action when being read by described processor:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance is the obligee of described first instance;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity has carried out credit inquiry to described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
56. non-transient state storage mediums according to claim 55, wherein, described instruction also makes described processor perform following action:
The feature of first instance according to the feature evaluation of described 3rd entity.
57. non-transient state storage mediums according to claim 55,
Wherein, described first search also returns the first credit line expanding to described first instance from described second instance, and
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance, (c) described 3rd entity and (d) described credit line.
58. 1 kinds of non-transient state storage mediums, comprise the instruction can read by processor, and described instruction makes described processor perform following action when being read by described processor:
Processor; And
Storer, described storer comprises the instruction can read by processor, and described instruction makes described processor perform following action when being read by described processor:
Receive the identifier of first instance;
Perform the first search returning the database of the identifier of second instance, described second instance is relevant to described first instance in level;
Perform the second search returning the database of the identifier of the 3rd entity, described 3rd entity has carried out credit inquiry to described second instance; And
Construct the data structure that the path via described second instance between described first instance and described 3rd entity is limited in the storage device.
59. non-transient state storage mediums according to claim 58, wherein, described instruction also makes described processor perform following action:
The feature of first instance according to the feature evaluation of described 3rd entity.
60. non-transient state storage mediums according to claim 58,
Wherein, described structure comprises in the data structure: the described identifier of the described identifier of (a) described first instance, the described identifier of (b) described second instance and (c) described 3rd entity.
CN201280075055.8A 2012-05-30 2012-05-30 Behavior of credit network mapping Active CN104508623B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2012/039972 WO2013180700A1 (en) 2012-05-30 2012-05-30 Credit behavior network mapping

Publications (2)

Publication Number Publication Date
CN104508623A true CN104508623A (en) 2015-04-08
CN104508623B CN104508623B (en) 2016-09-21

Family

ID=49673749

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201280075055.8A Active CN104508623B (en) 2012-05-30 2012-05-30 Behavior of credit network mapping

Country Status (9)

Country Link
JP (1) JP5770961B2 (en)
KR (1) KR101720661B1 (en)
CN (1) CN104508623B (en)
AU (1) AU2012381098A1 (en)
CA (1) CA2874590A1 (en)
HK (1) HK1209206A1 (en)
MX (1) MX2014014523A (en)
RU (1) RU2573198C1 (en)
WO (1) WO2013180700A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050144119A1 (en) * 2003-03-19 2005-06-30 The Norseman Group, Llc Financing structure
CN101782992A (en) * 2010-03-18 2010-07-21 万易通国际科技(北京)有限公司 Online transaction system and method
CN102243748A (en) * 2011-08-04 2011-11-16 郁晓东 Electronic debt management operation system device and realization method of electronization and financial commercialization of claim and debt
CN102436622A (en) * 2011-12-28 2012-05-02 浙江汇信科技有限公司 Method for evaluating network market operator credit status

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2254611C2 (en) * 2003-03-13 2005-06-20 Общество с ограниченной ответственностью "Мобилити" Method for providing mobile electronic communication devices users with actual commercial information on alternative basis (variants) and information system for realization of said method (variants)
US6991276B2 (en) 2003-05-20 2006-01-31 Mccauley Alvin D Luggage loft assembly
US7725386B2 (en) * 2004-03-15 2010-05-25 Arthur J Prieston Method for offering representation and warranty insurance for mortgage loans
JP2006099492A (en) * 2004-09-30 2006-04-13 Hitachi Ltd Loan decision index calculation system
US7962403B2 (en) * 2006-03-16 2011-06-14 Sungard Avantgard Llc Method and apparatus for a model assessing debtor behavior
EP2011071A2 (en) * 2006-04-11 2009-01-07 FX Alliance, Llc Credit data processing system for controlling electronic trading based on credit arrangements
US20080133402A1 (en) * 2006-09-05 2008-06-05 Kerry Ivan Kurian Sociofinancial systems and methods
JP5186197B2 (en) * 2007-12-19 2013-04-17 株式会社エヌ・ティ・ティ・データ Evaluation apparatus, evaluation method, and evaluation program
RU99630U1 (en) * 2009-03-23 2010-11-20 Григорий Рафаилович Лифшиц EXCHANGE PLAYER (OPTIONS)
US8458074B2 (en) * 2010-04-30 2013-06-04 Corelogic Solutions, Llc. Data analytics models for loan treatment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050144119A1 (en) * 2003-03-19 2005-06-30 The Norseman Group, Llc Financing structure
CN101782992A (en) * 2010-03-18 2010-07-21 万易通国际科技(北京)有限公司 Online transaction system and method
CN102243748A (en) * 2011-08-04 2011-11-16 郁晓东 Electronic debt management operation system device and realization method of electronization and financial commercialization of claim and debt
CN102436622A (en) * 2011-12-28 2012-05-02 浙江汇信科技有限公司 Method for evaluating network market operator credit status

Also Published As

Publication number Publication date
HK1209206A1 (en) 2016-03-24
MX2014014523A (en) 2015-02-24
KR101720661B1 (en) 2017-03-28
WO2013180700A1 (en) 2013-12-05
CN104508623B (en) 2016-09-21
JP5770961B2 (en) 2015-08-26
KR20150024320A (en) 2015-03-06
RU2573198C1 (en) 2016-01-20
AU2012381098A1 (en) 2014-12-18
CA2874590A1 (en) 2013-12-05
JP2015518226A (en) 2015-06-25

Similar Documents

Publication Publication Date Title
Khandani et al. Systemic risk and the refinancing ratchet effect
Wanke et al. Predicting performance in ASEAN banks: an integrated fuzzy MCDM–neural network approach
Bellotti et al. Forecasting and stress testing credit card default using dynamic models
Sornette et al. Financial bubbles, real estate bubbles, derivative bubbles, and the financial and economic crisis
Alcock et al. The determinants of debt maturity in Australian firms
Carey et al. The risks of financial institutions
Bystrom et al. What drives bitcoin volatility?
Černius et al. Financial information and management decisions: Impact of accounting policy on financial indicators of the firm
JP2018503927A (en) Segmentation and stratification of composite portfolio of investment securities
CN112561681A (en) Method, device, electronic equipment and storage medium for determining potential loan enterprise
Ghent Infrequent housing adjustment, limited participation, and monetary policy
US20210073910A1 (en) Credit behavior network mapping
Glass et al. Modelling the performance of Irish credit unions, 2002 to 2010
Director Financial analysis for HR managers: Tools for linking HR strategy to business strategy
Ng et al. Hands-On Artificial Intelligence for Banking: A practical guide to building intelligent financial applications using machine learning techniques
CN104508623A (en) Credit behavior network mapping
Chen An analytical theory of project investment: a comparison with real option theory
AU2017101891A4 (en) Electronic calculator for real time optimisation, searching, and extrapolating multiple scenarios of post-retirement cash flow with intertemporal settings, and system and method thereof
McLeay et al. UK broad money growth in the Long Expansion 1992—2007: what can it tell us about the role of money
Lusida et al. The effect of productivity on liquidity under financial frictions
Mohammad et al. The asymmetrical linkage between oil price and banking stability in the MENA region
Himpler The World Financial Crisis: Impacts on GDP and International Trade in Taiwan
JP2018036928A (en) Device used for trading securities
Jadav Data Analytics to Identify Triggers of Mortgage Default-An Exploratory Study
Bebczuk Corporate finance, financial development, and growth

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1209206

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1209206

Country of ref document: HK