CN104508623B - Behavior of credit network mapping - Google Patents

Behavior of credit network mapping Download PDF

Info

Publication number
CN104508623B
CN104508623B CN201280075055.8A CN201280075055A CN104508623B CN 104508623 B CN104508623 B CN 104508623B CN 201280075055 A CN201280075055 A CN 201280075055A CN 104508623 B CN104508623 B CN 104508623B
Authority
CN
China
Prior art keywords
instance
entity
identifier
credit
search
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201280075055.8A
Other languages
Chinese (zh)
Other versions
CN104508623A (en
Inventor
玛丽亚·辛森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dun and Bradstreet Inc
Original Assignee
Dun and Bradstreet Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dun and Bradstreet Inc filed Critical Dun and Bradstreet Inc
Publication of CN104508623A publication Critical patent/CN104508623A/en
Application granted granted Critical
Publication of CN104508623B publication Critical patent/CN104508623B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Abstract

A kind of method, including: receive the identifier of first instance, perform to return first search of the data base of the identifier of second instance, second instance and first instance have relation, perform to return the second search of the data of the identifier of the 3rd entity, 3rd entity is the creditor of second instance, and constructs in the storage device the data structure being defined via the path of second instance between first instance and the 3rd entity.The method can be performed by the equipment with processor and memorizer, and memorizer has instruction.Make processor perform said method when instruction is read by processor.

Description

Behavior of credit network mapping
Technical field
Present disclosure relates to credit evaluation, more particularly, to behavior of credit network mapping process.
Background technology
Method described in this part is the method that can carry out, but not necessarily previous the most structure The method thought or carry out.Therefore, unless otherwise noted, otherwise method described in this part is not The prior art of the claim in the application or should not be considered as owing to being included in this part Prior art.
The routine techniques of prestige or CREDIT SCORE such as Fei Aizhe (Fair Isaac) company (FICO) believes Indicate that company repays the probability of its floating debt by score.Credit side such as bank and credit card company make With CREDIT SCORE to being estimated by lending money to the potential risk that consumer causes.CREDIT SCORE wide General use makes credit broadly available and less expensive for consumer.
The financial history of company is analyzed generating credit by FICO and other similar technology Score.Such as, FICO analyze the repayment history of company, credit make expenditure, the length of credit history, Such as pay by instalments, have enough to meet the need, consume finance and the used credit type of mortgage loan, credit near Phase search and specific factor such as lien.
But, FICO assessment only financial history to single company is analyzed generating credit and obtains Point.Which has limited the scope of FICO assessment, and can not identify and explain and global confession in addition Answer the factor that chain is relevant.
Thus it still remains a need the behavior of credit of company is carried out more extensive and global assessment.
Summary of the invention
Provide the behavior of credit network mapping that the receivable account to the i.e. business of cash flow is estimated Journey.
Additionally provide a kind of method, including: receive the identifier of first instance;Perform to return second real First search of the data base of the identifier of body, second instance and first instance have relation;Execution is returned Returning second search of the data base of the identifier of the 3rd entity, the 3rd entity is the credits of second instance People;And construct in the storage device road via second instance between first instance and the 3rd entity The data structure that footpath is defined.
Additionally provide a kind of method, including: receive the identifier of first instance;Perform to return second real First search of the data base of the identifier of body, second instance is the creditor of first instance;Execution is returned Returning second search of the data base of the identifier of the 3rd entity, the 3rd entity is the credits of second instance People;And construct in the storage device road via second instance between first instance and the 3rd entity The data structure that footpath is defined.
Additionally provide a kind of method, including: receive the identifier of first instance;Perform to return second real First search of the data base of the identifier of body, second instance is relevant to first instance in level;Hold Row returns second search of the data base of the identifier of the 3rd entity, and the 3rd entity is the debt of second instance Power people;And construct in the storage device between first instance and the 3rd entity via second instance The data structure that path is defined.
Additionally provide a kind of method, including: receive the identifier of first instance;Perform to return second real First search of the data base of the identifier of body, second instance carries out credit inquiry to first instance;Hold Row returns second search of the data base of the identifier of the 3rd entity, and the 3rd entity is the debt of second instance Power people;And construct in the storage device between first instance and the 3rd entity via second instance The data structure that path is defined.
Additionally provide a kind of method, including: receive the identifier of first instance;Perform to return second real First search of the data base of the identifier of body, second instance is the creditor of first instance;Execution is returned Returning second search of the data base of the identifier of the 3rd entity, the 3rd entity carries out credit to second instance Inquiry;And construct in the storage device between first instance and the 3rd entity via second instance The data structure that path is defined.
Additionally provide a kind of method, including: receive the identifier of first instance;Perform to return second real First search of the data base of the identifier of body, second instance is relevant to first instance in level;Hold Row returns second search of the data base of the identifier of the 3rd entity, and second instance is carried out by the 3rd entity Credit inquiry;And construct in the storage device real via second between first instance and the 3rd entity The data structure that the path of body is defined.
Additionally provide a kind of equipment for performing method provided above.This equipment include processor and Memorizer.Memorizer includes the instruction can read by processor, and when instruction is read by processor Time make processor perform said method step action.
Additionally, there are the non-transitory memory medium of instruction including to be read by processor.Instruction is worked as Processor is made to perform the action of method provided above when being read by processor.
Accompanying drawing explanation
Fig. 1 shows the system for generating behavior of credit network mapping;
Fig. 2 shows the example that financial relations maps;
Fig. 3 shows that another financial relations maps;
Fig. 4 shows another example that financial relations maps;
Fig. 5 is the method for being estimated the behavior of credit of entity;
Fig. 6 is the another method for being estimated the behavior of credit of entity;
Fig. 7 is the another method for being estimated the behavior of credit of entity;
Fig. 8 is the another method for being estimated the behavior of credit of entity;
Fig. 9 is the another method for being estimated the behavior of credit of entity.
Parts or feature that more than one figure shares use identical reference to carry out table in each figure Show.
Detailed description of the invention
This disclosure has described the method and system providing perspective credit network to map, perspective letter There is provided interested with network mapping by the company from it with different separating degrees being carried out supervision The financial data of company.This perspective credit network maps provides global accurate finance model, should Finance model can such as identify the interruption of credit supply chain credit at difference, and by these Interrupt being associated with the final impact of the operation on company interested.
Referring to the drawings, referring particularly to Fig. 1, it is provided that one is used for generating behavior of credit network mapping System 100.System 100 includes being connected to user terminal 130 and data base via network 135 Computer 105.
Data base can be one or more physical database.In general, data base includes credit Inquiry 137, transaction data 140, Enterprise linkage 145, service parameter 150, Financial Network map 155 and output parameter 160.
Computer 105 includes the processor 110 communicated with memorizer 115.Memorizer 115 includes journey Sequence module 120.Processor 110 is configured to respond to instruction and performs the logic circuitry of instruction. Term " module " is used herein to mean that and can be presented as individual components or for multiple slave units The feature operation of integrated configuration.
Although being described as system 100 in this article being arranged on the instruction of the method for present disclosure In memorizer 115, but instruction can visibly be embodied in outer computer readable storage medium storing program for executing 125 On be used for being subsequently loaded in memorizer 115.Storage medium 125 can be that the storage of any routine is situated between Matter, includes but not limited to, floppy disk, CD, tape, read only memory, optical storage medium, logical With universal serial bus (USB) flash drive, digital versatile disk [Sony] or compressed drive.Instruction also may be used Be embodied in the random access memory being positioned on remote storage system and being coupled to memorizer 115 or In other kinds of electronic storage device.
Although additionally, being described as being installed in by program schema 120 in this article in memorizer 115 also And therefore realize with software, but its can with hardware (such as, electronic circuit system), firmware, In software, any one or a combination thereof realize.
Credit inquiry 137 is commonly stored data, such as, attempt to check the borrowing of credit history of company interested Borrow mechanism, landlord or the request of employer.It addition, credit inquiry 137 can include the 3rd of credit history Side's request, such as credit side's viewpoint.Credit inquiry 137 is commonly stored by the company's example asking its credit history Data as indicated by company interested.
Transaction data 140 includes the financial data of company, the most receivable account data.Receivable account number According to the information of money of debt balance due from specific company being such as company.It addition, receivable account data will be real Body is designated the debtor of creditor, and indicates credit line.Receivable account data generally according to Creditor's information and be instructed to, and specifically include the receivable account of the supplier of company interested. Processor 110 receives receivable account data according to the instruction of program module 120 from company, and fills Transaction data 140.
Enterprise linkage 145 includes the business connection data of company interested.Business connection data are senses Hierarchical relationship between the associated companies of interest company, and the phase of the supplier of company interested Hierarchical relationship between Guan company.Such as, Enterprise linkage 145 includes that hierarchical relationship identifier is as female male Department, subsidiary, branch company, business partner and neither parent company is not the relevant public affairs of subsidiary Department, such as, have the company of common parent company.
Service parameter 150 includes the bankruptcy data of company, corporate statistics data, inquiry data and market value Data.Bankruptcy data include the designator of the supplier of bankruptcy.Corporate statistics data include company data Quantity, factory types and size such as employee.Inquiry data include looking into about to company interested The information of company ask, and amount to the company that company interested is inquired about in addition, such as numerical value. Market value data include that company is at different time such as every day, city's value information weekly and monthly.
Financial Network maps 155 and includes company interested and the relevant public affairs separated by different separating degrees The financial relations of department maps.Generally, financial relations maps and represents the supply relevant to company interested The cash flow signal of the supplier of business and supplier and trend.Supplier is to carry to company interested For article or the company of service.Supplier includes public utilities, interim post recruitment mechanism and office Supplier.It addition, financial relations maps can be included in level relevant company, and this is external The supplier of company relevant in level and the supplier of supplier.The Fig. 2 that will discuss below It is the example that financial relations maps to Fig. 4.
Output parameter 160 is the assessment result of entity interested.Such as, output parameter 160 is permissible The change of market value or increment (δ) including entity interested.
User terminal 130 is can to receive input from user and export the input of result/defeated to user Go out device.Such as, user terminal 130 can include passing to processor 110 for allowing users to Deliver letters breath and the keyboard of command selection or speech recognition subsystem.User terminal 130 also includes output dress Put such as display or printer.Cursor controls to allow users to such as mouse, tracking ball or stick Display upper-pilot light is marked with and transmits additional information and command selection to processor 110.
Fig. 2 is that the example that financial relations maps, such as credit network map 200.Credit network Map 200 to show and the specific company interested global supply chain that i.e. entity 205 is relevant, such as Credit is supplied.Specifically, credit network map 200 show relevant from entity 205 shared different The company of separating degree.Each by the global supply chain of credit puts the finance letter that such as company is provided The finance that breath finally affects entity 205 are healthy, the such as credit risk of entity 205.
In global supply chain, share include such as credits from the company of the different separating degrees of entity 205 People company, company relevant in level and industry are gone together.In turn, each public affairs in these companies The healthy early stage credit risk that warning entity 205 can be provided again of finance of department.
The creditor of entity 205 includes entity 210 and entity 220.Credit network maps 200 and also wraps Include the creditor of the company in global supply chain, such as creditor.Entity 215 is the debt of entity 210 Power people, entity 225 is the creditor of entity 220, and entity 240 is the creditor of entity 235. The dotted line being connected to each entity in entity 215, entity 225 and entity 240 represents global provisioning The creditor of an infinite number of creditor in chain.Can expand it is to say, credit network maps 200 Generated includes any desired degree of depth or the width of associated companies.
The company with entity 205 with hierarchical relationship includes entity 230.This hierarchical relationship can include Parent company's relation, subsidiary's relation or neither parent company is not the associated companies relation of subsidiary. As it can be seen, entity 230 is the subsidiary of entity 205.
It addition, credit network mapping 200 includes the colleague 250 of the colleague as entity 205.Colleague 250 is from the company of the same trade with entity 205 phase, and is summarized as the matched group of entity 205.
Processor 110 performs to map 155 such as from the instruction of program module 120 to produce Financial Network Credit network maps 200.
Such as, the instruction from program module 120 makes processor 110: receive the mark of first instance Symbol;Performing to return first search of the data base of the identifier of second instance, second instance and first is in fact Body has relation;And perform to return the second of the data base of the identifier of the 3rd entity to search for, the 3rd Entity is the creditor of second instance.Instruction also makes processor 110 construct in the storage device first The data structure being defined via the path of second instance between entity and the 3rd entity.
Mapping 200 with reference to credit network, first instance can be entity 205, and second instance can be Entity 210, and the 3rd entity can be entity 215.First search returns the mark of entity 210 Symbol, and the second search returns the identifier of entity 215, and, as described above, entity 215 I.e. the 3rd entity is the entity 210 i.e. creditor of second instance.Between entity 210 and entity 205 Relation be entity 210 be the creditor of entity 205.Credit network maps 200 and also show entity The data structure being defined via the path of entity 210 between 205 and entity 215.
Instruction from program module 120 can also make processor 110 according to the 3rd entity such as entity The feature of 215 such as cash flow, assesses the feature such as credit wind of first instance such as entity 205 Danger assessment.
It addition, the first search can return and expand to first instance example from second instance such as entity 210 Such as the first credit line of entity 205, and the second search can return from the 3rd entity such as entity 215 the second credit lines expanding to second instance such as entity 210.
In other embodiment, second instance can be relevant to first instance in level.Such as, Second instance can be entity 230, i.e. the subsidiary of entity 205.Therefore, hold when processor 110 When the first of row data base is searched for and return the identifier of second instance, processor 110 returns entity The identifier of 230, and when processor 110 performs second search of data base and returns the 3rd entity Identifier time, processor return entity 235 identifier.
Fig. 3 shows that another financial relations maps, and such as credit network maps 300.
It is another embodiment of the whole world finance chain relevant with entity 205 that credit network maps 300. Especially, credit network mapping 300 also show by credit inquiry entity 205 or entity 230 Inquiry company interested, and company relevant with inquiry company in addition such as inquires about the credits of company People.In credit network maps 300, entity 305 is the manufacture that entity 205 carries out credit inquiry Person, and entity 310 is the creditor of entity 305.Entity 315 is also that entity 205 is carried out letter With the maker of inquiry, and entity 320 is the creditor of entity 315.Entity 325 is to entity 230 makeies carrying out credit inquiry, and entity 330 is the creditor of entity 325.
Processor 110 performs to map 155 such as from the instruction of program module 120 to produce Financial Network Credit network maps 300.Similarly, use and discussed above make processor 110 produce credit net Network map 200, produce credit network from the instruction of program schema 120 and map 300.
Specifically, instruction makes processor 110: receive the identifier of first instance;Perform return second First search of the data base of the identifier of entity, second instance and first instance have relation;Perform Returning the second search of the data of the identifier of the 3rd entity, the 3rd entity is the credits of second instance People;And construct in the storage device road via second instance between first instance and the 3rd entity The data structure that footpath is defined.Additionally, instruction can make processor 110 according to the spy of the 3rd entity Levy the feature of assessment first instance.
Such as, the identifier of first instance can be the identifier of entity 205.First search returns real The identifier of body 305, such as, have related second instance with first instance.Entity 205 and entity Relation between 305 be entity 305 be the maker that entity 205 is carried out credit inquiry.Data base The second search return the identifier of entity 310, such as creditor the 3rd real of second instance Body.It addition, the second search returns the credit line expanding to entity 305 from entity 310.Credit net Network map 300 also show to entity 205 such as first instance and entity 310 the such as the 3rd entity it Between the data structure that is defined via the path of entity 305 such as second instance.Credit network maps 300 can also include the identifier of entity 205, the identifier of entity 305, the mark of entity 310 Symbol, and the credit line of entity 305 is expanded to from entity 310.
In other embodiment, the instruction from program module 120 can make processor 110: Receive the identifier of first instance;Perform to return the first of the data base of the identifier of second instance to search Rope, second instance is relevant to first instance in level;Perform to return the number of the identifier of the 3rd entity According to second search, the 3rd entity carries out credit inquiry to second instance;And structure in the storage device Make the data structure being defined via the path of second instance between first instance and the 3rd entity. Additionally, instruction can make processor 110 according to the feature evaluation of the 3rd entity about the spy of first instance Levy.
Such as, first instance is entity 205, and second instance is entity 230.Due to entity 230 Being the subsidiary of entity 205, therefore entity 230 is relevant to entity 205 in level.Due to entity 325 pairs of entities 230 carry out credit inquiry, and therefore the second search can return the identifier of entity 325. Credit network maps 300 and shows to entity 205 such as first instance with entity 325 the such as the 3rd in fact The data structure being defined via the path of entity 230 such as second instance between body.Additionally, it is special Levy can be depending on the feature of entity 325, the credit risk of entity 205.
Fig. 4 is that another example that financial relations maps, such as credit network map 400.
Credit network maps 400 and shows and the whole world that i.e. entity 205 the is relevant confession of specific company interested Answer chain, such as credit supply.Specifically, credit network mapping 400 shows relevant with entity 205 , the company sharing different separating degree, such as entity 405 and entity 410.Entity 405 is real The creditor of body 205, and entity 410 is the maker that entity 405 carries out credit inquiry.
Processor 110 performs to map 400 from the instruction of program module 120 to produce credit network.
Especially, instruction makes processor 110: receive the identifier of first instance;Perform return second First search of the data base of the identifier of entity, second instance is the creditor of first instance;Perform Returning the second search of the data of the identifier of the 3rd entity, the 3rd entity carries out credit to second instance Inquiry;And construct in the storage device between first instance and the 3rd entity via second instance The data structure that path is defined.
For example, referring to Fig. 4, the identifier of first instance can be entity 205.First search returns The identifier of the creditor of entity 405 such as first instance.It is the most right that second search returns entity 410 Entity 405 (second instance) carries out the identifier of the 3rd entity of credit inquiry.Additionally, Fig. 4 shows Go out construct in the storage device path via connecting line between entity 205 and entity 410 is entered The data structure that row limits.
In other embodiment, instruction can also make processor 110 according to the feature of the 3rd entity The feature of assessment first instance.It addition, the first search can also return and expand to first from second instance First credit line of entity, and when processor structure data structure, processor can also include The identifier of first instance, the identifier of second instance, the identifier of the 3rd entity and credit line.
Such as, processor 110 can be assessed according to the credit risk of entity 410 that is the 3rd entity The feature of the entity 205 i.e. credit risk of first instance.
Fig. 5 is the method for being estimated the behavior of credit of entity, i.e. method 500.
Especially, method 500 maps between the entity shown in 200 with reference to the financial relations of Fig. 2 Relation.Specifically, the pass between method 500 reference entity 205, entity 210 and entity 215 System.Entity 210 is the creditor of entity 205, and entity 215 is the creditor of entity 210.
Method 500 starts from step 505.Step 505 regulation receives first instance such as entity 205 Identifier.After step 505, method 500 is carried out to step 510.
The data base of step 510 regulation search second instance such as entity 210, second instance is first The creditor of entity.After step 510, method 500 is carried out to step 515.
The data base of step 515 regulation search the 3rd entity such as entity 215, the 3rd entity is second The creditor of entity.After step 515, method 500 is carried out to step 520.
Step 520 regulation structure is to path via second instance between first instance and the 3rd entity The data structure being defined.After step 510, method 500 is carried out to step 525.
Step 525 specifies the feature of the feature evaluation first instance according to the 3rd entity.In step 525 Afterwards, method 500 terminates.
Fig. 6 is the another method for being estimated the behavior of credit of entity, i.e. method 600.
Especially, method 600 maps between the entity shown in 200 with reference to the financial relations of Fig. 2 Relation.Specifically, the pass between method 600 reference entity 205, entity 230 and entity 235 System.Entity 230 is relevant to entity 205 in level, and entity 235 is the creditor of entity 230.
Method 600 starts from step 605.Step 605 regulation receives first instance such as entity 205 Identifier.After step 605, method 600 is carried out to step 610.
The data base of step 610 regulation search second instance such as entity 230, second instance is in level Upper relevant to first instance.After step 610, method 600 is carried out to step 615.
The data base of step 615 regulation search the 3rd entity such as entity 235, the 3rd entity is second The creditor of entity.After step 615, method 600 is carried out to step 620.
Step 620 regulation structure is to path via second instance between first instance and the 3rd entity The data structure being defined.After step 620, method 600 is carried out to step 625.
Step 625 specifies the feature of the feature evaluation first instance according to the 3rd entity.In step 625 Afterwards, method 600 terminates.
Fig. 7 is the another method for being estimated the behavior of credit of entity.
Especially, method 700 maps between the entity shown in 300 with reference to the financial relations of Fig. 3 Relation.Specifically, the pass between method 700 reference entity 205, entity 305 and entity 310 System.Entity 305 is the maker that entity 205 carries out credit inquiry, and entity 310 is entity The creditor of 305.
Method 700 starts from step 705.Step 705 regulation receives first instance such as entity 205 Identifier.After step 705, method 700 is carried out to step 710.
The data base of step 710 regulation search second instance such as entity 305, second instance is to first Entity carries out credit inquiry.After step 710, method 700 is carried out to step 715.
The data base of step 715 regulation search the 3rd entity such as entity 310, the 3rd entity is second The creditor of entity.After step 715, method 700 is carried out to step 720.
Step 720 regulation structure is to path via second instance between first instance and the 3rd entity The data structure being defined.After stage 720, method 700 is carried out to step 725.
Step 725 specifies the feature of the feature evaluation first instance according to the 3rd entity.In step 725 Afterwards, method 700 terminates.
Fig. 8 is the another method for being estimated the behavior of credit of entity.
Especially, method 800 maps between the entity shown in 400 with reference to the financial relations of Fig. 4 Relation.Specifically, the pass between method 800 reference entity 205, entity 405 and entity 410 System.Entity 405 is the creditor of entity 205, and entity 410 is entity 405 to be carried out credit look into The maker ask.
Method 800 starts from step 805.Step 800 regulation receives first instance such as entity 205 Identifier.After step 805, method 800 is carried out to step 810.
The data base of step 810 regulation search second instance such as entity 405, second instance is first The creditor of entity.After step 810, method 800 is carried out to step 815.
The data base of step 815 regulation search the 3rd entity such as entity 410, the 3rd entity is to second Entity carries out credit inquiry.After step 815, method 800 is carried out to step 820.
Step 820 regulation structure is to path via second instance between first instance and the 3rd entity The data structure being defined.After step 820, method 800 is carried out to step 825.
Step 825 specifies the feature of the feature evaluation first instance according to the 3rd entity.In step 825 Afterwards, method 800 terminates.
Fig. 9 is the another method for being estimated the behavior of credit of entity.
Especially, method 900 maps between the entity shown in 300 with reference to the financial relations of Fig. 3 Relation.Specifically, the pass between method 900 reference entity 205, entity 230 and entity 325 System.Entity 230 is relevant to entity 205 in level, and entity 325 is that entity 230 is carried out letter Maker with inquiry.
Method 900 starts from step 905.Step 905 regulation receives first instance such as entity 205 Identifier.After step 905, method 900 is carried out to step 910.
The data base of step 910 regulation search second instance such as entity 230, second instance is in level Upper relevant to first instance.After step 910, method 900 is carried out to step 915.
The data base of step 915 regulation search the 3rd entity such as entity 325, the 3rd entity is to second Entity carries out credit inquiry.After step 915, method 900 is carried out to step 920.
Step 920 regulation structure is to path via second instance between first instance and the 3rd entity The data structure being defined.After step 920, method 900 is carried out to step 925.
Step 925 specifies the feature of the feature evaluation first instance according to the 3rd entity.In step 925 Afterwards, method 900 terminates.
Technology described herein is exemplary, and should be not construed to imply that the disclosure Any specific restriction of content.It should be appreciated that can be imagined respectively by those skilled in the art Plant replacement, combine and revise.Such as, point out unless otherwise noted or by step itself, otherwise with this The step that process described in literary composition is associated can perform in any order.Present disclosure is intended to Contain all such replacement, amendment and the modification fallen within the scope of the appended claims.

Claims (59)

1. for the method creating the behavior of credit network mapping between multiple entity, described side Method includes:
Receive the identifier of first instance;
Perform to return the first of at least one data base of the identifier of second instance to search for, described second Entity and described first instance have business relations, and wherein, described second instance is described first instance Creditor;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, its In, described 3rd entity is the creditor of described second instance;
In the storage device described in described identifier based on described first instance, described second instance The described identifier of identifier and described 3rd entity constructs data structure, and wherein, described data are tied Structure limits behavior of credit network mapping, and includes warp between described first instance and described 3rd entity Path by described second instance;And
Financial characteristics based on described 3rd entity determines the risk of described first instance.
Method the most according to claim 1,
Wherein, described first search also returns and expands to the of described first instance from described second instance One credit line,
Wherein, described second search also returns and expands to the of described second instance from described 3rd entity Two credit lines, and
Wherein, described structure includes in the data structure: the described mark of (a) described first instance Know symbol, the described identifier of (b) described second instance, the described identifier of (c) described 3rd entity, (d) described first credit line and (e) described second credit line.
Method the most according to claim 1,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity By amount, and
Wherein, described structure includes in the data structure: the described mark of (a) described first instance Know symbol, the described identifier of (b) described second instance, the described identifier of (c) described 3rd entity And (d) described credit line.
Method the most according to claim 1, wherein, the described risk of described first instance is The credit risk of described first instance.
Method the most according to claim 1, wherein, described data structure represents financial relations Mapping, described financial relations maps and indicates the supplier of company interested and the supplier of supplier Cash flow signal and trend.
6. for the method creating the behavior of credit network mapping between multiple entity, described side Method includes:
Receive the identifier of first instance;
Perform to return the first of at least one data base of the identifier of second instance to search for, described second Entity and described first instance have business relations, and wherein, described second instance is described first instance Creditor;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, its In, described 3rd entity is the creditor of described second instance;And
In the storage device described in described identifier based on described first instance, described second instance The described identifier of identifier and described 3rd entity constructs data structure, and wherein, described data are tied Structure limits behavior of credit network mapping, and includes warp between described first instance and described 3rd entity Path by described second instance.
Method the most according to claim 6, also includes:
The feature of first instance described in feature evaluation according to described 3rd entity.
Method the most according to claim 6,
Wherein, described first search also returns and expands to the of described first instance from described second instance One credit line,
Wherein, described second search also returns and expands to the of described second instance from described 3rd entity Two credit lines, and
Wherein, described structure includes described first credit line and described in the data structure Two credit lines.
9. for the method creating the behavior of credit network mapping between multiple entity, described side Method includes:
Receive the identifier of first instance;
Perform to return the first of at least one data base of the identifier of second instance to search for, described second Entity and described first instance have business relations, wherein, described second instance in level with described First instance is correlated with;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, its In, described 3rd entity is the creditor of described second instance;And
In the storage device described in described identifier based on described first instance, described second instance The described identifier of identifier and described 3rd entity constructs data structure, and wherein, described data are tied Structure limits behavior of credit network mapping, and includes warp between described first instance and described 3rd entity Path by described second instance.
Method the most according to claim 9, also includes:
The feature of first instance described in feature evaluation according to described 3rd entity.
11. methods according to claim 9,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity By amount, and
Wherein, described structure includes described credit line in the data structure.
12. 1 kinds for the method creating the behavior of credit network mapping between multiple entity, described side Method includes:
Receive the identifier of first instance;
Perform to return the first of at least one data base of the identifier of second instance to search for, described second Entity and described first instance have business relations, and wherein, described second instance is to described first instance Carry out credit inquiry;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, its In, described 3rd entity is the creditor of described second instance;And
In the storage device described in described identifier based on described first instance, described second instance The described identifier of identifier and described 3rd entity constructs data structure, and wherein, described data are tied Structure limits via the path of described second instance between described first instance and described 3rd entity Fixed.
13. methods according to claim 12, also include:
The feature of first instance described in feature evaluation according to described 3rd entity.
14. methods according to claim 12,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity By amount, and
Wherein, described structure includes d) described credit line in the data structure.
15. 1 kinds for the method creating the behavior of credit network mapping between multiple entity, described side Method includes:
Receive the identifier of first instance;
Perform to return the first of at least one data base of the identifier of second instance to search for, described second Entity is the creditor of described first instance;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, described 3rd entity and described first instance have business relations, and wherein, described second first instance is to described Second instance has carried out credit inquiry;And
In the storage device described in described identifier based on described first instance, described second instance The described identifier of identifier and described 3rd entity constructs data structure, and wherein, described data are tied Structure limits described behavior of credit network mapping, and include described first instance and described 3rd entity it Between via the path of described second instance.
16. methods according to claim 15, also include:
The feature of first instance described in feature evaluation according to described 3rd entity.
17. methods according to claim 15,
Wherein, described first search also returns and expands to the of described first instance from described second instance One credit line, and
Wherein, described structure includes described credit line in the data structure.
18. 1 kinds for the method creating the behavior of credit network mapping between multiple entity, described side Method includes:
Receive the identifier of first instance;
Perform to return first search of at least one data base of the identifier of second instance, wherein, institute State second instance relevant to described first instance in level;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, described 3rd entity has carried out credit inquiry to described second instance;And
In the storage device described in described identifier based on described first instance, described second instance The described identifier of identifier and described 3rd entity constructs data structure, and described data structure limits Described behavior of credit network mapping, and include between described first instance and described 3rd entity via The path of described second instance.
19. methods according to claim 18, also include:
The feature of first instance described in feature evaluation according to described 3rd entity.
20. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
Processor;And
Memorizer, described memorizer includes the instruction can read, and described finger by described processor Make and make the following action of execution of described processor when being read by described processor:
Receive the identifier of first instance;
Perform to return the first of at least one data base of the identifier of second instance to search for, described second Entity and described first instance have business relations, and wherein, described second instance is described first instance Creditor;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, its In, described 3rd entity is the creditor of described second instance;
In the storage device described in described identifier based on described first instance, described second instance The described identifier of identifier and described 3rd entity constructs data structure, and wherein, described data are tied Structure limits described behavior of credit network mapping, and include described first instance and described 3rd entity it Between via the path of described second instance;And
Financial characteristics based on described 3rd entity determines the risk of described first instance.
21. equipment according to claim 20,
Wherein, described first search also returns and expands to the of described first instance from described second instance One credit line,
Wherein, described second search also returns and expands to the of described second instance from described 3rd entity Two credit lines, and
Wherein, described structure includes described first credit line and described in the data structure Two credit lines.
22. equipment according to claim 20,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity By amount, and
Wherein, described structure includes described credit line in the data structure.
23. equipment according to claim 20,
Wherein, described relation is that described second instance has carried out credit inquiry to described first instance,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity By amount, and
Wherein, described structure includes described credit line in the data structure.
24. equipment according to claim 20, wherein, the described risk of described first instance It it is the credit risk of described first instance.
25. equipment according to claim 20, wherein, described data structure represents finance pass System maps, and described financial relations maps and indicates the supplier of company interested and the supply of supplier The cash flow signal of business and trend.
26. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
Processor;And
Memorizer, described memorizer includes the instruction can read, and described finger by described processor Make and make the following action of execution of described processor when being read by described processor:
Receive the identifier of first instance;
Perform to return first search of at least one data base of the identifier of second instance, its In, described second instance is the creditor of described first instance;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, Described 3rd entity is the creditor of described second instance;And
Described identifier of based on described first instance, described second instance in the storage device The described identifier of described identifier and described 3rd entity constructs data structure, described data structure Limit behavior of credit network mapping, and include between described first instance and described 3rd entity via The path of described second instance.
27. equipment according to claim 26, wherein, described instruction also makes described processor Perform following action:
The feature of first instance described in feature evaluation according to described 3rd entity.
28. equipment according to claim 26,
Wherein, described first search also returns and expands to the of described first instance from described second instance One credit line,
Wherein, described second search also returns and expands to the of described second instance from described 3rd entity Two credit lines, and
Wherein, described structure includes described first credit line and described in the data structure Two credit lines.
29. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
Processor;And
Memorizer, described memorizer includes the instruction can read, and described finger by described processor Make and make the following action of execution of described processor when being read by described processor:
Receive the identifier of first instance;
Perform to return first search of at least one data base of the identifier of second instance, its In, described second instance is relevant to described first instance in level;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, Wherein, described 3rd entity is the creditor of described second instance;And
Described identifier of based on described first instance, described second instance in the storage device The described identifier of described identifier and described 3rd entity constructs data structure, described data structure Limit behavior of credit network mapping, and include between described first instance and described 3rd entity via The path of described second instance.
30. equipment according to claim 29, wherein, described instruction also makes described processor Perform following action:
The feature of first instance described in feature evaluation according to described 3rd entity.
31. equipment according to claim 29,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity By amount, and
Wherein, described structure includes described credit line in the data structure.
32. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
Processor;And
Memorizer, described memorizer includes the instruction can read, and described finger by described processor Make and make the following action of execution of described processor when being read by described processor:
Receive the identifier of first instance;
Perform to return first search of at least one data base of the identifier of second instance, its In, described second instance has carried out credit inquiry to described first instance;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, Described 3rd entity is the creditor of described second instance;And
Described identifier of based on described first instance, described second instance in the storage device The described identifier of described identifier and described 3rd entity constructs data structure, described data structure Limit behavior of credit network mapping, and include between described first instance and described 3rd entity via The path of described second instance.
33. equipment according to claim 32, wherein, described instruction also makes described processor Perform following action:
The feature of first instance described in feature evaluation according to described 3rd entity.
34. equipment according to claim 32,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity By amount, and
Wherein, described structure includes described credit line in the data structure.
35. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
Processor;And
Memorizer, described memorizer includes the instruction can read, and described finger by described processor Make and make the following action of execution of described processor when being read by described processor:
Receive the identifier of first instance;
Perform to return first search of at least one data base of the identifier of second instance, its In, described second instance is the creditor of described first instance;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, Described 3rd entity has carried out credit inquiry to described second instance;And
Described identifier of based on described first instance, described second instance in the storage device The described identifier of described identifier and described 3rd entity constructs data structure, described data structure Limit behavior of credit network mapping, and include between described first instance and described 3rd entity via The path of described second instance.
36. equipment according to claim 35, wherein, described instruction also makes described processor Perform following action:
The feature of first instance described in feature evaluation according to described 3rd entity.
37. equipment according to claim 35,
Wherein, described first search also returns and expands to the of described first instance from described second instance One credit line, and
Wherein, described structure includes described credit line in the data structure.
38. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
Processor;And
Memorizer, described memorizer includes the instruction can read by processor, and described instruction is worked as Make when being read by described processor described processor perform following action:
Receive the identifier of first instance;
Perform to return first search of at least one data base of the identifier of second instance, its In, described second instance is relevant to described first instance in level;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, Described 3rd entity has carried out credit inquiry to described second instance;And
Described identifier of based on described first instance, described second instance in the storage device The described identifier of described identifier and described 3rd entity constructs data structure, described data structure Limit behavior of credit network mapping, and include between described first instance and described 3rd entity via The path of described second instance.
39. according to the equipment described in claim 38, and wherein, described instruction also makes described processor Perform following action:
The feature of first instance described in feature evaluation according to described 3rd entity.
40. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
For receiving the parts of the identifier of first instance;
For performing to return the portion of first search of at least one data base of the identifier of second instance Part, described second instance and described first instance have business relations, and wherein, described second instance is The creditor of described first instance;
For performing to return second search of at least one data base described in the identifier of the 3rd entity Parts, wherein, described 3rd entity is the creditor of described second instance;
For described identifier based on described first instance in the storage device, described second instance The described identifier of described identifier and described 3rd entity constructs the parts of data structure, wherein, Described data structure limits behavior of credit network mapping, and it includes that described first instance is real with the described 3rd Via the path of described second instance between body;And
The portion of the risk of described first instance is determined for financial characteristics based on described 3rd entity Part.
41. equipment according to claim 40,
Wherein, described first search also returns and expands to the of described first instance from described second instance One credit line,
Wherein, described second search also returns and expands to the of described second instance from described 3rd entity Two credit lines, and
Wherein, described structure includes in the data structure: the described mark of (a) described first instance Know symbol, the described identifier of (b) described second instance, the described identifier of (c) described 3rd entity, (d) described first credit line and (e) described second credit line.
42. equipment according to claim 40,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity By amount, and
Wherein, described structure includes in the data structure: the described mark of (a) described first instance Know symbol, the described identifier of (b) described second instance, the described identifier of (c) described 3rd entity And (d) described credit line.
43. equipment according to claim 40,
Wherein, described relation is that described second instance has carried out credit inquiry to described first instance,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity By amount, and
Wherein, described structure includes in the data structure: the described mark of (a) described first instance Know symbol, the described identifier of (b) described second instance, the described identifier of (c) described 3rd entity And (d) described credit line.
44. equipment according to claim 40, wherein, the described risk of described first instance It it is the credit risk of described first instance.
45. equipment according to claim 40, wherein, described data structure represents finance pass System maps, and described financial relations maps and indicates the supplier of company interested and the supply of supplier The cash flow signal of business and trend.
46. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
For receiving the parts of the identifier of first instance;
For performing to return the portion of first search of at least one data base of the identifier of second instance Part, wherein, described second instance is the creditor of described first instance;
For performing to return second search of at least one data base described in the identifier of the 3rd entity Parts, described 3rd entity is the creditor of described second instance;And
For described identifier based on described first instance in the storage device, described second instance The described identifier of described identifier and described 3rd entity constructs the parts of data structure, described number According to structure qualification behavior of credit network mapping, and include described first instance and described 3rd entity it Between via the path of described second instance.
47. equipment according to claim 46, also include:
For the parts of the feature of first instance described in the feature evaluation according to described 3rd entity.
48. equipment according to claim 46,
Wherein, described first search also returns and expands to the of described first instance from described second instance One credit line,
Wherein, described second search also returns and expands to the of described second instance from described 3rd entity Two credit lines, and
Wherein, described structure includes described first credit line and described in the data structure Two credit lines.
49. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
For receiving the parts of the identifier of first instance;
For performing to return the portion of first search of at least one data base of the identifier of second instance Part, wherein, described second instance is relevant to described first instance in level;
For performing to return second search of at least one data base described in the identifier of the 3rd entity Parts, described 3rd entity is the creditor of described second instance;And
For described identifier based on described first instance in the storage device, described second instance The described identifier of described identifier and described 3rd entity constructs the parts of data structure, described number According to structure qualification behavior of credit network mapping, and include described first instance and described 3rd entity it Between via the path of described second instance.
50. equipment according to claim 49, also include:
For the parts of the feature of first instance described in the feature evaluation according to described 3rd entity.
51. equipment according to claim 49,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity By amount, and
Wherein, described structure includes described credit line in the data structure.
52. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
For receiving the parts of the identifier of first instance;
For performing to return the portion of first search of at least one data base of the identifier of second instance Part, wherein, described second instance has carried out credit inquiry to described first instance;
For performing to return second search of at least one data base described in the identifier of the 3rd entity Parts, described 3rd entity is the creditor of described second instance;And
For described identifier based on described first instance in the storage device, described second instance The described identifier of described identifier and described 3rd entity constructs the parts of data structure, described number According to structure qualification behavior of credit network mapping, and include described first instance and described 3rd entity it Between via the path of described second instance.
53. equipment according to claim 52, also include:
For the parts of the feature of first instance described in the feature evaluation according to described 3rd entity.
54. equipment according to claim 52,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity By amount, and
Wherein, described structure includes described credit line in the data structure.
55. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
For receiving the parts of the identifier of first instance;
For performing to return first search of at least one data base of the identifier of second instance, its In, described second instance is the parts of the creditor of described first instance;
For performing to return second search of at least one data base described in the identifier of the 3rd entity, Described 3rd entity has carried out the parts of credit inquiry to described second instance;And
For described identifier based on described first instance in the storage device, described second instance The described identifier of described identifier and described 3rd entity constructs the parts of data structure, described number According to structure qualification behavior of credit network mapping, and include described first instance and described 3rd entity it Between via the path of described second instance.
56. equipment according to claim 55, also include:
For the parts of the feature of first instance described in the feature evaluation according to described 3rd entity.
57. equipment according to claim 55,
Wherein, described first search also returns and expands to the of described first instance from described second instance One credit line, and
Wherein, described structure includes described credit line in the data structure.
58. 1 kinds of devices being used for creating the behavior of credit network mapping between multiple entity, including:
For receiving the parts of the identifier of first instance;
For performing to return the portion of first search of at least one data base of the identifier of second instance Part, wherein, described second instance is relevant to described first instance in level;
For performing to return second search of at least one data base described in the identifier of the 3rd entity Parts, described 3rd entity has carried out credit inquiry to described second instance;And
For described identifier based on described first instance in the storage device, described second instance The described identifier of described identifier and described 3rd entity constructs the parts of data structure, described number According to structure qualification behavior of credit network mapping, and include described first instance and described 3rd entity it Between via the path of described second instance.
59. equipment according to claim 58, also include:
For the parts of the feature of first instance described in the feature evaluation according to described 3rd entity.
CN201280075055.8A 2012-05-30 2012-05-30 Behavior of credit network mapping Active CN104508623B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2012/039972 WO2013180700A1 (en) 2012-05-30 2012-05-30 Credit behavior network mapping

Publications (2)

Publication Number Publication Date
CN104508623A CN104508623A (en) 2015-04-08
CN104508623B true CN104508623B (en) 2016-09-21

Family

ID=49673749

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201280075055.8A Active CN104508623B (en) 2012-05-30 2012-05-30 Behavior of credit network mapping

Country Status (9)

Country Link
JP (1) JP5770961B2 (en)
KR (1) KR101720661B1 (en)
CN (1) CN104508623B (en)
AU (1) AU2012381098A1 (en)
CA (1) CA2874590A1 (en)
HK (1) HK1209206A1 (en)
MX (1) MX2014014523A (en)
RU (1) RU2573198C1 (en)
WO (1) WO2013180700A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050144119A1 (en) * 2003-03-19 2005-06-30 The Norseman Group, Llc Financing structure
CN102243748A (en) * 2011-08-04 2011-11-16 郁晓东 Electronic debt management operation system device and realization method of electronization and financial commercialization of claim and debt
CN102436622A (en) * 2011-12-28 2012-05-02 浙江汇信科技有限公司 Method for evaluating network market operator credit status

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2254611C2 (en) * 2003-03-13 2005-06-20 Общество с ограниченной ответственностью "Мобилити" Method for providing mobile electronic communication devices users with actual commercial information on alternative basis (variants) and information system for realization of said method (variants)
US6991276B2 (en) * 2003-05-20 2006-01-31 Mccauley Alvin D Luggage loft assembly
US7725386B2 (en) * 2004-03-15 2010-05-25 Arthur J Prieston Method for offering representation and warranty insurance for mortgage loans
JP2006099492A (en) * 2004-09-30 2006-04-13 Hitachi Ltd Loan decision index calculation system
US7962403B2 (en) * 2006-03-16 2011-06-14 Sungard Avantgard Llc Method and apparatus for a model assessing debtor behavior
EP2011071A2 (en) * 2006-04-11 2009-01-07 FX Alliance, Llc Credit data processing system for controlling electronic trading based on credit arrangements
US20080133402A1 (en) * 2006-09-05 2008-06-05 Kerry Ivan Kurian Sociofinancial systems and methods
JP5186197B2 (en) * 2007-12-19 2013-04-17 株式会社エヌ・ティ・ティ・データ Evaluation apparatus, evaluation method, and evaluation program
RU99630U1 (en) * 2009-03-23 2010-11-20 Григорий Рафаилович Лифшиц EXCHANGE PLAYER (OPTIONS)
CN101782992A (en) * 2010-03-18 2010-07-21 万易通国际科技(北京)有限公司 Online transaction system and method
US8458074B2 (en) * 2010-04-30 2013-06-04 Corelogic Solutions, Llc. Data analytics models for loan treatment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050144119A1 (en) * 2003-03-19 2005-06-30 The Norseman Group, Llc Financing structure
CN102243748A (en) * 2011-08-04 2011-11-16 郁晓东 Electronic debt management operation system device and realization method of electronization and financial commercialization of claim and debt
CN102436622A (en) * 2011-12-28 2012-05-02 浙江汇信科技有限公司 Method for evaluating network market operator credit status

Also Published As

Publication number Publication date
CN104508623A (en) 2015-04-08
CA2874590A1 (en) 2013-12-05
MX2014014523A (en) 2015-02-24
KR20150024320A (en) 2015-03-06
HK1209206A1 (en) 2016-03-24
JP2015518226A (en) 2015-06-25
RU2573198C1 (en) 2016-01-20
JP5770961B2 (en) 2015-08-26
KR101720661B1 (en) 2017-03-28
WO2013180700A1 (en) 2013-12-05
AU2012381098A1 (en) 2014-12-18

Similar Documents

Publication Publication Date Title
Sornette et al. Financial bubbles, real estate bubbles, derivative bubbles, and the financial and economic crisis
Bellotti et al. Forecasting and stress testing credit card default using dynamic models
Leyshon et al. The capitalization of almost everything: The future of finance and capitalism
Nesvetailova Fragile finance: Debt, speculation and crisis in the age of global credit
Iqbal et al. Islamic banking and finance: new perspectives on profit sharing and risk
Adhikary Factors influencing foreign direct investment in South Asian economies: A comparative analysis
Bakker Migrating into financial markets: How remittances became a development tool
Yost Making IT work: A history of the computer services industry
Awrey Law and finance in the Chinese shadow banking system
Elson The global financial crisis in retrospect: Evolution, resolution, and lessons for prevention
Allen et al. New thinking on the financial crisis
Nyambuu et al. A quantitative approach to assessing sovereign default risk in resource‐rich emerging economies
Kaplinsky Third World Industrialization in the 1980s: Open Economies in a Closing World
McDonald The global financial crisis and behavioural economics
Elayan et al. The impact of receiving debtor‐in‐possession financing on the probability of successful emergence and time spent under Chapter 11 bankruptcy
Bennett et al. Financial analytics with R: building a laptop laboratory for data science
Chimpango The development of African capital markets: a legal and institutional approach
Smith et al. Entrepreneurial finance: Venture capital, deal structure & valuation
CN104508623B (en) Behavior of credit network mapping
O’Hara The global securitized subprime market crisis
Myers New economic thinking and real estate
Ng et al. Hands-On Artificial Intelligence for Banking: A practical guide to building intelligent financial applications using machine learning techniques
Faia et al. The role of Fintech for the Capital Markets Union
Hakim et al. The Probability of the Financing Sustainability of Micro-firms Supported by Islamic Social Fund
Aslan Interest-free banking: reasons for choosing Islamic banking in Bingol city

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1209206

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1209206

Country of ref document: HK