CN104508623B - Behavior of credit network mapping - Google Patents
Behavior of credit network mapping Download PDFInfo
- Publication number
- CN104508623B CN104508623B CN201280075055.8A CN201280075055A CN104508623B CN 104508623 B CN104508623 B CN 104508623B CN 201280075055 A CN201280075055 A CN 201280075055A CN 104508623 B CN104508623 B CN 104508623B
- Authority
- CN
- China
- Prior art keywords
- instance
- entity
- identifier
- credit
- search
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Abstract
A kind of method, including: receive the identifier of first instance, perform to return first search of the data base of the identifier of second instance, second instance and first instance have relation, perform to return the second search of the data of the identifier of the 3rd entity, 3rd entity is the creditor of second instance, and constructs in the storage device the data structure being defined via the path of second instance between first instance and the 3rd entity.The method can be performed by the equipment with processor and memorizer, and memorizer has instruction.Make processor perform said method when instruction is read by processor.
Description
Technical field
Present disclosure relates to credit evaluation, more particularly, to behavior of credit network mapping process.
Background technology
Method described in this part is the method that can carry out, but not necessarily previous the most structure
The method thought or carry out.Therefore, unless otherwise noted, otherwise method described in this part is not
The prior art of the claim in the application or should not be considered as owing to being included in this part
Prior art.
The routine techniques of prestige or CREDIT SCORE such as Fei Aizhe (Fair Isaac) company (FICO) believes
Indicate that company repays the probability of its floating debt by score.Credit side such as bank and credit card company make
With CREDIT SCORE to being estimated by lending money to the potential risk that consumer causes.CREDIT SCORE wide
General use makes credit broadly available and less expensive for consumer.
The financial history of company is analyzed generating credit by FICO and other similar technology
Score.Such as, FICO analyze the repayment history of company, credit make expenditure, the length of credit history,
Such as pay by instalments, have enough to meet the need, consume finance and the used credit type of mortgage loan, credit near
Phase search and specific factor such as lien.
But, FICO assessment only financial history to single company is analyzed generating credit and obtains
Point.Which has limited the scope of FICO assessment, and can not identify and explain and global confession in addition
Answer the factor that chain is relevant.
Thus it still remains a need the behavior of credit of company is carried out more extensive and global assessment.
Summary of the invention
Provide the behavior of credit network mapping that the receivable account to the i.e. business of cash flow is estimated
Journey.
Additionally provide a kind of method, including: receive the identifier of first instance;Perform to return second real
First search of the data base of the identifier of body, second instance and first instance have relation;Execution is returned
Returning second search of the data base of the identifier of the 3rd entity, the 3rd entity is the credits of second instance
People;And construct in the storage device road via second instance between first instance and the 3rd entity
The data structure that footpath is defined.
Additionally provide a kind of method, including: receive the identifier of first instance;Perform to return second real
First search of the data base of the identifier of body, second instance is the creditor of first instance;Execution is returned
Returning second search of the data base of the identifier of the 3rd entity, the 3rd entity is the credits of second instance
People;And construct in the storage device road via second instance between first instance and the 3rd entity
The data structure that footpath is defined.
Additionally provide a kind of method, including: receive the identifier of first instance;Perform to return second real
First search of the data base of the identifier of body, second instance is relevant to first instance in level;Hold
Row returns second search of the data base of the identifier of the 3rd entity, and the 3rd entity is the debt of second instance
Power people;And construct in the storage device between first instance and the 3rd entity via second instance
The data structure that path is defined.
Additionally provide a kind of method, including: receive the identifier of first instance;Perform to return second real
First search of the data base of the identifier of body, second instance carries out credit inquiry to first instance;Hold
Row returns second search of the data base of the identifier of the 3rd entity, and the 3rd entity is the debt of second instance
Power people;And construct in the storage device between first instance and the 3rd entity via second instance
The data structure that path is defined.
Additionally provide a kind of method, including: receive the identifier of first instance;Perform to return second real
First search of the data base of the identifier of body, second instance is the creditor of first instance;Execution is returned
Returning second search of the data base of the identifier of the 3rd entity, the 3rd entity carries out credit to second instance
Inquiry;And construct in the storage device between first instance and the 3rd entity via second instance
The data structure that path is defined.
Additionally provide a kind of method, including: receive the identifier of first instance;Perform to return second real
First search of the data base of the identifier of body, second instance is relevant to first instance in level;Hold
Row returns second search of the data base of the identifier of the 3rd entity, and second instance is carried out by the 3rd entity
Credit inquiry;And construct in the storage device real via second between first instance and the 3rd entity
The data structure that the path of body is defined.
Additionally provide a kind of equipment for performing method provided above.This equipment include processor and
Memorizer.Memorizer includes the instruction can read by processor, and when instruction is read by processor
Time make processor perform said method step action.
Additionally, there are the non-transitory memory medium of instruction including to be read by processor.Instruction is worked as
Processor is made to perform the action of method provided above when being read by processor.
Accompanying drawing explanation
Fig. 1 shows the system for generating behavior of credit network mapping;
Fig. 2 shows the example that financial relations maps;
Fig. 3 shows that another financial relations maps;
Fig. 4 shows another example that financial relations maps;
Fig. 5 is the method for being estimated the behavior of credit of entity;
Fig. 6 is the another method for being estimated the behavior of credit of entity;
Fig. 7 is the another method for being estimated the behavior of credit of entity;
Fig. 8 is the another method for being estimated the behavior of credit of entity;
Fig. 9 is the another method for being estimated the behavior of credit of entity.
Parts or feature that more than one figure shares use identical reference to carry out table in each figure
Show.
Detailed description of the invention
This disclosure has described the method and system providing perspective credit network to map, perspective letter
There is provided interested with network mapping by the company from it with different separating degrees being carried out supervision
The financial data of company.This perspective credit network maps provides global accurate finance model, should
Finance model can such as identify the interruption of credit supply chain credit at difference, and by these
Interrupt being associated with the final impact of the operation on company interested.
Referring to the drawings, referring particularly to Fig. 1, it is provided that one is used for generating behavior of credit network mapping
System 100.System 100 includes being connected to user terminal 130 and data base via network 135
Computer 105.
Data base can be one or more physical database.In general, data base includes credit
Inquiry 137, transaction data 140, Enterprise linkage 145, service parameter 150, Financial Network map
155 and output parameter 160.
Computer 105 includes the processor 110 communicated with memorizer 115.Memorizer 115 includes journey
Sequence module 120.Processor 110 is configured to respond to instruction and performs the logic circuitry of instruction.
Term " module " is used herein to mean that and can be presented as individual components or for multiple slave units
The feature operation of integrated configuration.
Although being described as system 100 in this article being arranged on the instruction of the method for present disclosure
In memorizer 115, but instruction can visibly be embodied in outer computer readable storage medium storing program for executing 125
On be used for being subsequently loaded in memorizer 115.Storage medium 125 can be that the storage of any routine is situated between
Matter, includes but not limited to, floppy disk, CD, tape, read only memory, optical storage medium, logical
With universal serial bus (USB) flash drive, digital versatile disk [Sony] or compressed drive.Instruction also may be used
Be embodied in the random access memory being positioned on remote storage system and being coupled to memorizer 115 or
In other kinds of electronic storage device.
Although additionally, being described as being installed in by program schema 120 in this article in memorizer 115 also
And therefore realize with software, but its can with hardware (such as, electronic circuit system), firmware,
In software, any one or a combination thereof realize.
Credit inquiry 137 is commonly stored data, such as, attempt to check the borrowing of credit history of company interested
Borrow mechanism, landlord or the request of employer.It addition, credit inquiry 137 can include the 3rd of credit history
Side's request, such as credit side's viewpoint.Credit inquiry 137 is commonly stored by the company's example asking its credit history
Data as indicated by company interested.
Transaction data 140 includes the financial data of company, the most receivable account data.Receivable account number
According to the information of money of debt balance due from specific company being such as company.It addition, receivable account data will be real
Body is designated the debtor of creditor, and indicates credit line.Receivable account data generally according to
Creditor's information and be instructed to, and specifically include the receivable account of the supplier of company interested.
Processor 110 receives receivable account data according to the instruction of program module 120 from company, and fills
Transaction data 140.
Enterprise linkage 145 includes the business connection data of company interested.Business connection data are senses
Hierarchical relationship between the associated companies of interest company, and the phase of the supplier of company interested
Hierarchical relationship between Guan company.Such as, Enterprise linkage 145 includes that hierarchical relationship identifier is as female male
Department, subsidiary, branch company, business partner and neither parent company is not the relevant public affairs of subsidiary
Department, such as, have the company of common parent company.
Service parameter 150 includes the bankruptcy data of company, corporate statistics data, inquiry data and market value
Data.Bankruptcy data include the designator of the supplier of bankruptcy.Corporate statistics data include company data
Quantity, factory types and size such as employee.Inquiry data include looking into about to company interested
The information of company ask, and amount to the company that company interested is inquired about in addition, such as numerical value.
Market value data include that company is at different time such as every day, city's value information weekly and monthly.
Financial Network maps 155 and includes company interested and the relevant public affairs separated by different separating degrees
The financial relations of department maps.Generally, financial relations maps and represents the supply relevant to company interested
The cash flow signal of the supplier of business and supplier and trend.Supplier is to carry to company interested
For article or the company of service.Supplier includes public utilities, interim post recruitment mechanism and office
Supplier.It addition, financial relations maps can be included in level relevant company, and this is external
The supplier of company relevant in level and the supplier of supplier.The Fig. 2 that will discuss below
It is the example that financial relations maps to Fig. 4.
Output parameter 160 is the assessment result of entity interested.Such as, output parameter 160 is permissible
The change of market value or increment (δ) including entity interested.
User terminal 130 is can to receive input from user and export the input of result/defeated to user
Go out device.Such as, user terminal 130 can include passing to processor 110 for allowing users to
Deliver letters breath and the keyboard of command selection or speech recognition subsystem.User terminal 130 also includes output dress
Put such as display or printer.Cursor controls to allow users to such as mouse, tracking ball or stick
Display upper-pilot light is marked with and transmits additional information and command selection to processor 110.
Fig. 2 is that the example that financial relations maps, such as credit network map 200.Credit network
Map 200 to show and the specific company interested global supply chain that i.e. entity 205 is relevant, such as
Credit is supplied.Specifically, credit network map 200 show relevant from entity 205 shared different
The company of separating degree.Each by the global supply chain of credit puts the finance letter that such as company is provided
The finance that breath finally affects entity 205 are healthy, the such as credit risk of entity 205.
In global supply chain, share include such as credits from the company of the different separating degrees of entity 205
People company, company relevant in level and industry are gone together.In turn, each public affairs in these companies
The healthy early stage credit risk that warning entity 205 can be provided again of finance of department.
The creditor of entity 205 includes entity 210 and entity 220.Credit network maps 200 and also wraps
Include the creditor of the company in global supply chain, such as creditor.Entity 215 is the debt of entity 210
Power people, entity 225 is the creditor of entity 220, and entity 240 is the creditor of entity 235.
The dotted line being connected to each entity in entity 215, entity 225 and entity 240 represents global provisioning
The creditor of an infinite number of creditor in chain.Can expand it is to say, credit network maps 200
Generated includes any desired degree of depth or the width of associated companies.
The company with entity 205 with hierarchical relationship includes entity 230.This hierarchical relationship can include
Parent company's relation, subsidiary's relation or neither parent company is not the associated companies relation of subsidiary.
As it can be seen, entity 230 is the subsidiary of entity 205.
It addition, credit network mapping 200 includes the colleague 250 of the colleague as entity 205.Colleague
250 is from the company of the same trade with entity 205 phase, and is summarized as the matched group of entity 205.
Processor 110 performs to map 155 such as from the instruction of program module 120 to produce Financial Network
Credit network maps 200.
Such as, the instruction from program module 120 makes processor 110: receive the mark of first instance
Symbol;Performing to return first search of the data base of the identifier of second instance, second instance and first is in fact
Body has relation;And perform to return the second of the data base of the identifier of the 3rd entity to search for, the 3rd
Entity is the creditor of second instance.Instruction also makes processor 110 construct in the storage device first
The data structure being defined via the path of second instance between entity and the 3rd entity.
Mapping 200 with reference to credit network, first instance can be entity 205, and second instance can be
Entity 210, and the 3rd entity can be entity 215.First search returns the mark of entity 210
Symbol, and the second search returns the identifier of entity 215, and, as described above, entity 215
I.e. the 3rd entity is the entity 210 i.e. creditor of second instance.Between entity 210 and entity 205
Relation be entity 210 be the creditor of entity 205.Credit network maps 200 and also show entity
The data structure being defined via the path of entity 210 between 205 and entity 215.
Instruction from program module 120 can also make processor 110 according to the 3rd entity such as entity
The feature of 215 such as cash flow, assesses the feature such as credit wind of first instance such as entity 205
Danger assessment.
It addition, the first search can return and expand to first instance example from second instance such as entity 210
Such as the first credit line of entity 205, and the second search can return from the 3rd entity such as entity
215 the second credit lines expanding to second instance such as entity 210.
In other embodiment, second instance can be relevant to first instance in level.Such as,
Second instance can be entity 230, i.e. the subsidiary of entity 205.Therefore, hold when processor 110
When the first of row data base is searched for and return the identifier of second instance, processor 110 returns entity
The identifier of 230, and when processor 110 performs second search of data base and returns the 3rd entity
Identifier time, processor return entity 235 identifier.
Fig. 3 shows that another financial relations maps, and such as credit network maps 300.
It is another embodiment of the whole world finance chain relevant with entity 205 that credit network maps 300.
Especially, credit network mapping 300 also show by credit inquiry entity 205 or entity 230
Inquiry company interested, and company relevant with inquiry company in addition such as inquires about the credits of company
People.In credit network maps 300, entity 305 is the manufacture that entity 205 carries out credit inquiry
Person, and entity 310 is the creditor of entity 305.Entity 315 is also that entity 205 is carried out letter
With the maker of inquiry, and entity 320 is the creditor of entity 315.Entity 325 is to entity
230 makeies carrying out credit inquiry, and entity 330 is the creditor of entity 325.
Processor 110 performs to map 155 such as from the instruction of program module 120 to produce Financial Network
Credit network maps 300.Similarly, use and discussed above make processor 110 produce credit net
Network map 200, produce credit network from the instruction of program schema 120 and map 300.
Specifically, instruction makes processor 110: receive the identifier of first instance;Perform return second
First search of the data base of the identifier of entity, second instance and first instance have relation;Perform
Returning the second search of the data of the identifier of the 3rd entity, the 3rd entity is the credits of second instance
People;And construct in the storage device road via second instance between first instance and the 3rd entity
The data structure that footpath is defined.Additionally, instruction can make processor 110 according to the spy of the 3rd entity
Levy the feature of assessment first instance.
Such as, the identifier of first instance can be the identifier of entity 205.First search returns real
The identifier of body 305, such as, have related second instance with first instance.Entity 205 and entity
Relation between 305 be entity 305 be the maker that entity 205 is carried out credit inquiry.Data base
The second search return the identifier of entity 310, such as creditor the 3rd real of second instance
Body.It addition, the second search returns the credit line expanding to entity 305 from entity 310.Credit net
Network map 300 also show to entity 205 such as first instance and entity 310 the such as the 3rd entity it
Between the data structure that is defined via the path of entity 305 such as second instance.Credit network maps
300 can also include the identifier of entity 205, the identifier of entity 305, the mark of entity 310
Symbol, and the credit line of entity 305 is expanded to from entity 310.
In other embodiment, the instruction from program module 120 can make processor 110:
Receive the identifier of first instance;Perform to return the first of the data base of the identifier of second instance to search
Rope, second instance is relevant to first instance in level;Perform to return the number of the identifier of the 3rd entity
According to second search, the 3rd entity carries out credit inquiry to second instance;And structure in the storage device
Make the data structure being defined via the path of second instance between first instance and the 3rd entity.
Additionally, instruction can make processor 110 according to the feature evaluation of the 3rd entity about the spy of first instance
Levy.
Such as, first instance is entity 205, and second instance is entity 230.Due to entity 230
Being the subsidiary of entity 205, therefore entity 230 is relevant to entity 205 in level.Due to entity
325 pairs of entities 230 carry out credit inquiry, and therefore the second search can return the identifier of entity 325.
Credit network maps 300 and shows to entity 205 such as first instance with entity 325 the such as the 3rd in fact
The data structure being defined via the path of entity 230 such as second instance between body.Additionally, it is special
Levy can be depending on the feature of entity 325, the credit risk of entity 205.
Fig. 4 is that another example that financial relations maps, such as credit network map 400.
Credit network maps 400 and shows and the whole world that i.e. entity 205 the is relevant confession of specific company interested
Answer chain, such as credit supply.Specifically, credit network mapping 400 shows relevant with entity 205
, the company sharing different separating degree, such as entity 405 and entity 410.Entity 405 is real
The creditor of body 205, and entity 410 is the maker that entity 405 carries out credit inquiry.
Processor 110 performs to map 400 from the instruction of program module 120 to produce credit network.
Especially, instruction makes processor 110: receive the identifier of first instance;Perform return second
First search of the data base of the identifier of entity, second instance is the creditor of first instance;Perform
Returning the second search of the data of the identifier of the 3rd entity, the 3rd entity carries out credit to second instance
Inquiry;And construct in the storage device between first instance and the 3rd entity via second instance
The data structure that path is defined.
For example, referring to Fig. 4, the identifier of first instance can be entity 205.First search returns
The identifier of the creditor of entity 405 such as first instance.It is the most right that second search returns entity 410
Entity 405 (second instance) carries out the identifier of the 3rd entity of credit inquiry.Additionally, Fig. 4 shows
Go out construct in the storage device path via connecting line between entity 205 and entity 410 is entered
The data structure that row limits.
In other embodiment, instruction can also make processor 110 according to the feature of the 3rd entity
The feature of assessment first instance.It addition, the first search can also return and expand to first from second instance
First credit line of entity, and when processor structure data structure, processor can also include
The identifier of first instance, the identifier of second instance, the identifier of the 3rd entity and credit line.
Such as, processor 110 can be assessed according to the credit risk of entity 410 that is the 3rd entity
The feature of the entity 205 i.e. credit risk of first instance.
Fig. 5 is the method for being estimated the behavior of credit of entity, i.e. method 500.
Especially, method 500 maps between the entity shown in 200 with reference to the financial relations of Fig. 2
Relation.Specifically, the pass between method 500 reference entity 205, entity 210 and entity 215
System.Entity 210 is the creditor of entity 205, and entity 215 is the creditor of entity 210.
Method 500 starts from step 505.Step 505 regulation receives first instance such as entity 205
Identifier.After step 505, method 500 is carried out to step 510.
The data base of step 510 regulation search second instance such as entity 210, second instance is first
The creditor of entity.After step 510, method 500 is carried out to step 515.
The data base of step 515 regulation search the 3rd entity such as entity 215, the 3rd entity is second
The creditor of entity.After step 515, method 500 is carried out to step 520.
Step 520 regulation structure is to path via second instance between first instance and the 3rd entity
The data structure being defined.After step 510, method 500 is carried out to step 525.
Step 525 specifies the feature of the feature evaluation first instance according to the 3rd entity.In step 525
Afterwards, method 500 terminates.
Fig. 6 is the another method for being estimated the behavior of credit of entity, i.e. method 600.
Especially, method 600 maps between the entity shown in 200 with reference to the financial relations of Fig. 2
Relation.Specifically, the pass between method 600 reference entity 205, entity 230 and entity 235
System.Entity 230 is relevant to entity 205 in level, and entity 235 is the creditor of entity 230.
Method 600 starts from step 605.Step 605 regulation receives first instance such as entity 205
Identifier.After step 605, method 600 is carried out to step 610.
The data base of step 610 regulation search second instance such as entity 230, second instance is in level
Upper relevant to first instance.After step 610, method 600 is carried out to step 615.
The data base of step 615 regulation search the 3rd entity such as entity 235, the 3rd entity is second
The creditor of entity.After step 615, method 600 is carried out to step 620.
Step 620 regulation structure is to path via second instance between first instance and the 3rd entity
The data structure being defined.After step 620, method 600 is carried out to step 625.
Step 625 specifies the feature of the feature evaluation first instance according to the 3rd entity.In step 625
Afterwards, method 600 terminates.
Fig. 7 is the another method for being estimated the behavior of credit of entity.
Especially, method 700 maps between the entity shown in 300 with reference to the financial relations of Fig. 3
Relation.Specifically, the pass between method 700 reference entity 205, entity 305 and entity 310
System.Entity 305 is the maker that entity 205 carries out credit inquiry, and entity 310 is entity
The creditor of 305.
Method 700 starts from step 705.Step 705 regulation receives first instance such as entity 205
Identifier.After step 705, method 700 is carried out to step 710.
The data base of step 710 regulation search second instance such as entity 305, second instance is to first
Entity carries out credit inquiry.After step 710, method 700 is carried out to step 715.
The data base of step 715 regulation search the 3rd entity such as entity 310, the 3rd entity is second
The creditor of entity.After step 715, method 700 is carried out to step 720.
Step 720 regulation structure is to path via second instance between first instance and the 3rd entity
The data structure being defined.After stage 720, method 700 is carried out to step 725.
Step 725 specifies the feature of the feature evaluation first instance according to the 3rd entity.In step 725
Afterwards, method 700 terminates.
Fig. 8 is the another method for being estimated the behavior of credit of entity.
Especially, method 800 maps between the entity shown in 400 with reference to the financial relations of Fig. 4
Relation.Specifically, the pass between method 800 reference entity 205, entity 405 and entity 410
System.Entity 405 is the creditor of entity 205, and entity 410 is entity 405 to be carried out credit look into
The maker ask.
Method 800 starts from step 805.Step 800 regulation receives first instance such as entity 205
Identifier.After step 805, method 800 is carried out to step 810.
The data base of step 810 regulation search second instance such as entity 405, second instance is first
The creditor of entity.After step 810, method 800 is carried out to step 815.
The data base of step 815 regulation search the 3rd entity such as entity 410, the 3rd entity is to second
Entity carries out credit inquiry.After step 815, method 800 is carried out to step 820.
Step 820 regulation structure is to path via second instance between first instance and the 3rd entity
The data structure being defined.After step 820, method 800 is carried out to step 825.
Step 825 specifies the feature of the feature evaluation first instance according to the 3rd entity.In step 825
Afterwards, method 800 terminates.
Fig. 9 is the another method for being estimated the behavior of credit of entity.
Especially, method 900 maps between the entity shown in 300 with reference to the financial relations of Fig. 3
Relation.Specifically, the pass between method 900 reference entity 205, entity 230 and entity 325
System.Entity 230 is relevant to entity 205 in level, and entity 325 is that entity 230 is carried out letter
Maker with inquiry.
Method 900 starts from step 905.Step 905 regulation receives first instance such as entity 205
Identifier.After step 905, method 900 is carried out to step 910.
The data base of step 910 regulation search second instance such as entity 230, second instance is in level
Upper relevant to first instance.After step 910, method 900 is carried out to step 915.
The data base of step 915 regulation search the 3rd entity such as entity 325, the 3rd entity is to second
Entity carries out credit inquiry.After step 915, method 900 is carried out to step 920.
Step 920 regulation structure is to path via second instance between first instance and the 3rd entity
The data structure being defined.After step 920, method 900 is carried out to step 925.
Step 925 specifies the feature of the feature evaluation first instance according to the 3rd entity.In step 925
Afterwards, method 900 terminates.
Technology described herein is exemplary, and should be not construed to imply that the disclosure
Any specific restriction of content.It should be appreciated that can be imagined respectively by those skilled in the art
Plant replacement, combine and revise.Such as, point out unless otherwise noted or by step itself, otherwise with this
The step that process described in literary composition is associated can perform in any order.Present disclosure is intended to
Contain all such replacement, amendment and the modification fallen within the scope of the appended claims.
Claims (59)
1. for the method creating the behavior of credit network mapping between multiple entity, described side
Method includes:
Receive the identifier of first instance;
Perform to return the first of at least one data base of the identifier of second instance to search for, described second
Entity and described first instance have business relations, and wherein, described second instance is described first instance
Creditor;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, its
In, described 3rd entity is the creditor of described second instance;
In the storage device described in described identifier based on described first instance, described second instance
The described identifier of identifier and described 3rd entity constructs data structure, and wherein, described data are tied
Structure limits behavior of credit network mapping, and includes warp between described first instance and described 3rd entity
Path by described second instance;And
Financial characteristics based on described 3rd entity determines the risk of described first instance.
Method the most according to claim 1,
Wherein, described first search also returns and expands to the of described first instance from described second instance
One credit line,
Wherein, described second search also returns and expands to the of described second instance from described 3rd entity
Two credit lines, and
Wherein, described structure includes in the data structure: the described mark of (a) described first instance
Know symbol, the described identifier of (b) described second instance, the described identifier of (c) described 3rd entity,
(d) described first credit line and (e) described second credit line.
Method the most according to claim 1,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity
By amount, and
Wherein, described structure includes in the data structure: the described mark of (a) described first instance
Know symbol, the described identifier of (b) described second instance, the described identifier of (c) described 3rd entity
And (d) described credit line.
Method the most according to claim 1, wherein, the described risk of described first instance is
The credit risk of described first instance.
Method the most according to claim 1, wherein, described data structure represents financial relations
Mapping, described financial relations maps and indicates the supplier of company interested and the supplier of supplier
Cash flow signal and trend.
6. for the method creating the behavior of credit network mapping between multiple entity, described side
Method includes:
Receive the identifier of first instance;
Perform to return the first of at least one data base of the identifier of second instance to search for, described second
Entity and described first instance have business relations, and wherein, described second instance is described first instance
Creditor;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, its
In, described 3rd entity is the creditor of described second instance;And
In the storage device described in described identifier based on described first instance, described second instance
The described identifier of identifier and described 3rd entity constructs data structure, and wherein, described data are tied
Structure limits behavior of credit network mapping, and includes warp between described first instance and described 3rd entity
Path by described second instance.
Method the most according to claim 6, also includes:
The feature of first instance described in feature evaluation according to described 3rd entity.
Method the most according to claim 6,
Wherein, described first search also returns and expands to the of described first instance from described second instance
One credit line,
Wherein, described second search also returns and expands to the of described second instance from described 3rd entity
Two credit lines, and
Wherein, described structure includes described first credit line and described in the data structure
Two credit lines.
9. for the method creating the behavior of credit network mapping between multiple entity, described side
Method includes:
Receive the identifier of first instance;
Perform to return the first of at least one data base of the identifier of second instance to search for, described second
Entity and described first instance have business relations, wherein, described second instance in level with described
First instance is correlated with;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, its
In, described 3rd entity is the creditor of described second instance;And
In the storage device described in described identifier based on described first instance, described second instance
The described identifier of identifier and described 3rd entity constructs data structure, and wherein, described data are tied
Structure limits behavior of credit network mapping, and includes warp between described first instance and described 3rd entity
Path by described second instance.
Method the most according to claim 9, also includes:
The feature of first instance described in feature evaluation according to described 3rd entity.
11. methods according to claim 9,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity
By amount, and
Wherein, described structure includes described credit line in the data structure.
12. 1 kinds for the method creating the behavior of credit network mapping between multiple entity, described side
Method includes:
Receive the identifier of first instance;
Perform to return the first of at least one data base of the identifier of second instance to search for, described second
Entity and described first instance have business relations, and wherein, described second instance is to described first instance
Carry out credit inquiry;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, its
In, described 3rd entity is the creditor of described second instance;And
In the storage device described in described identifier based on described first instance, described second instance
The described identifier of identifier and described 3rd entity constructs data structure, and wherein, described data are tied
Structure limits via the path of described second instance between described first instance and described 3rd entity
Fixed.
13. methods according to claim 12, also include:
The feature of first instance described in feature evaluation according to described 3rd entity.
14. methods according to claim 12,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity
By amount, and
Wherein, described structure includes d) described credit line in the data structure.
15. 1 kinds for the method creating the behavior of credit network mapping between multiple entity, described side
Method includes:
Receive the identifier of first instance;
Perform to return the first of at least one data base of the identifier of second instance to search for, described second
Entity is the creditor of described first instance;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, described
3rd entity and described first instance have business relations, and wherein, described second first instance is to described
Second instance has carried out credit inquiry;And
In the storage device described in described identifier based on described first instance, described second instance
The described identifier of identifier and described 3rd entity constructs data structure, and wherein, described data are tied
Structure limits described behavior of credit network mapping, and include described first instance and described 3rd entity it
Between via the path of described second instance.
16. methods according to claim 15, also include:
The feature of first instance described in feature evaluation according to described 3rd entity.
17. methods according to claim 15,
Wherein, described first search also returns and expands to the of described first instance from described second instance
One credit line, and
Wherein, described structure includes described credit line in the data structure.
18. 1 kinds for the method creating the behavior of credit network mapping between multiple entity, described side
Method includes:
Receive the identifier of first instance;
Perform to return first search of at least one data base of the identifier of second instance, wherein, institute
State second instance relevant to described first instance in level;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, described
3rd entity has carried out credit inquiry to described second instance;And
In the storage device described in described identifier based on described first instance, described second instance
The described identifier of identifier and described 3rd entity constructs data structure, and described data structure limits
Described behavior of credit network mapping, and include between described first instance and described 3rd entity via
The path of described second instance.
19. methods according to claim 18, also include:
The feature of first instance described in feature evaluation according to described 3rd entity.
20. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
Processor;And
Memorizer, described memorizer includes the instruction can read, and described finger by described processor
Make and make the following action of execution of described processor when being read by described processor:
Receive the identifier of first instance;
Perform to return the first of at least one data base of the identifier of second instance to search for, described second
Entity and described first instance have business relations, and wherein, described second instance is described first instance
Creditor;
Perform to return second search of at least one data base described of the identifier of the 3rd entity, its
In, described 3rd entity is the creditor of described second instance;
In the storage device described in described identifier based on described first instance, described second instance
The described identifier of identifier and described 3rd entity constructs data structure, and wherein, described data are tied
Structure limits described behavior of credit network mapping, and include described first instance and described 3rd entity it
Between via the path of described second instance;And
Financial characteristics based on described 3rd entity determines the risk of described first instance.
21. equipment according to claim 20,
Wherein, described first search also returns and expands to the of described first instance from described second instance
One credit line,
Wherein, described second search also returns and expands to the of described second instance from described 3rd entity
Two credit lines, and
Wherein, described structure includes described first credit line and described in the data structure
Two credit lines.
22. equipment according to claim 20,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity
By amount, and
Wherein, described structure includes described credit line in the data structure.
23. equipment according to claim 20,
Wherein, described relation is that described second instance has carried out credit inquiry to described first instance,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity
By amount, and
Wherein, described structure includes described credit line in the data structure.
24. equipment according to claim 20, wherein, the described risk of described first instance
It it is the credit risk of described first instance.
25. equipment according to claim 20, wherein, described data structure represents finance pass
System maps, and described financial relations maps and indicates the supplier of company interested and the supply of supplier
The cash flow signal of business and trend.
26. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
Processor;And
Memorizer, described memorizer includes the instruction can read, and described finger by described processor
Make and make the following action of execution of described processor when being read by described processor:
Receive the identifier of first instance;
Perform to return first search of at least one data base of the identifier of second instance, its
In, described second instance is the creditor of described first instance;
Perform to return second search of at least one data base described of the identifier of the 3rd entity,
Described 3rd entity is the creditor of described second instance;And
Described identifier of based on described first instance, described second instance in the storage device
The described identifier of described identifier and described 3rd entity constructs data structure, described data structure
Limit behavior of credit network mapping, and include between described first instance and described 3rd entity via
The path of described second instance.
27. equipment according to claim 26, wherein, described instruction also makes described processor
Perform following action:
The feature of first instance described in feature evaluation according to described 3rd entity.
28. equipment according to claim 26,
Wherein, described first search also returns and expands to the of described first instance from described second instance
One credit line,
Wherein, described second search also returns and expands to the of described second instance from described 3rd entity
Two credit lines, and
Wherein, described structure includes described first credit line and described in the data structure
Two credit lines.
29. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
Processor;And
Memorizer, described memorizer includes the instruction can read, and described finger by described processor
Make and make the following action of execution of described processor when being read by described processor:
Receive the identifier of first instance;
Perform to return first search of at least one data base of the identifier of second instance, its
In, described second instance is relevant to described first instance in level;
Perform to return second search of at least one data base described of the identifier of the 3rd entity,
Wherein, described 3rd entity is the creditor of described second instance;And
Described identifier of based on described first instance, described second instance in the storage device
The described identifier of described identifier and described 3rd entity constructs data structure, described data structure
Limit behavior of credit network mapping, and include between described first instance and described 3rd entity via
The path of described second instance.
30. equipment according to claim 29, wherein, described instruction also makes described processor
Perform following action:
The feature of first instance described in feature evaluation according to described 3rd entity.
31. equipment according to claim 29,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity
By amount, and
Wherein, described structure includes described credit line in the data structure.
32. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
Processor;And
Memorizer, described memorizer includes the instruction can read, and described finger by described processor
Make and make the following action of execution of described processor when being read by described processor:
Receive the identifier of first instance;
Perform to return first search of at least one data base of the identifier of second instance, its
In, described second instance has carried out credit inquiry to described first instance;
Perform to return second search of at least one data base described of the identifier of the 3rd entity,
Described 3rd entity is the creditor of described second instance;And
Described identifier of based on described first instance, described second instance in the storage device
The described identifier of described identifier and described 3rd entity constructs data structure, described data structure
Limit behavior of credit network mapping, and include between described first instance and described 3rd entity via
The path of described second instance.
33. equipment according to claim 32, wherein, described instruction also makes described processor
Perform following action:
The feature of first instance described in feature evaluation according to described 3rd entity.
34. equipment according to claim 32,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity
By amount, and
Wherein, described structure includes described credit line in the data structure.
35. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
Processor;And
Memorizer, described memorizer includes the instruction can read, and described finger by described processor
Make and make the following action of execution of described processor when being read by described processor:
Receive the identifier of first instance;
Perform to return first search of at least one data base of the identifier of second instance, its
In, described second instance is the creditor of described first instance;
Perform to return second search of at least one data base described of the identifier of the 3rd entity,
Described 3rd entity has carried out credit inquiry to described second instance;And
Described identifier of based on described first instance, described second instance in the storage device
The described identifier of described identifier and described 3rd entity constructs data structure, described data structure
Limit behavior of credit network mapping, and include between described first instance and described 3rd entity via
The path of described second instance.
36. equipment according to claim 35, wherein, described instruction also makes described processor
Perform following action:
The feature of first instance described in feature evaluation according to described 3rd entity.
37. equipment according to claim 35,
Wherein, described first search also returns and expands to the of described first instance from described second instance
One credit line, and
Wherein, described structure includes described credit line in the data structure.
38. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
Processor;And
Memorizer, described memorizer includes the instruction can read by processor, and described instruction is worked as
Make when being read by described processor described processor perform following action:
Receive the identifier of first instance;
Perform to return first search of at least one data base of the identifier of second instance, its
In, described second instance is relevant to described first instance in level;
Perform to return second search of at least one data base described of the identifier of the 3rd entity,
Described 3rd entity has carried out credit inquiry to described second instance;And
Described identifier of based on described first instance, described second instance in the storage device
The described identifier of described identifier and described 3rd entity constructs data structure, described data structure
Limit behavior of credit network mapping, and include between described first instance and described 3rd entity via
The path of described second instance.
39. according to the equipment described in claim 38, and wherein, described instruction also makes described processor
Perform following action:
The feature of first instance described in feature evaluation according to described 3rd entity.
40. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
For receiving the parts of the identifier of first instance;
For performing to return the portion of first search of at least one data base of the identifier of second instance
Part, described second instance and described first instance have business relations, and wherein, described second instance is
The creditor of described first instance;
For performing to return second search of at least one data base described in the identifier of the 3rd entity
Parts, wherein, described 3rd entity is the creditor of described second instance;
For described identifier based on described first instance in the storage device, described second instance
The described identifier of described identifier and described 3rd entity constructs the parts of data structure, wherein,
Described data structure limits behavior of credit network mapping, and it includes that described first instance is real with the described 3rd
Via the path of described second instance between body;And
The portion of the risk of described first instance is determined for financial characteristics based on described 3rd entity
Part.
41. equipment according to claim 40,
Wherein, described first search also returns and expands to the of described first instance from described second instance
One credit line,
Wherein, described second search also returns and expands to the of described second instance from described 3rd entity
Two credit lines, and
Wherein, described structure includes in the data structure: the described mark of (a) described first instance
Know symbol, the described identifier of (b) described second instance, the described identifier of (c) described 3rd entity,
(d) described first credit line and (e) described second credit line.
42. equipment according to claim 40,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity
By amount, and
Wherein, described structure includes in the data structure: the described mark of (a) described first instance
Know symbol, the described identifier of (b) described second instance, the described identifier of (c) described 3rd entity
And (d) described credit line.
43. equipment according to claim 40,
Wherein, described relation is that described second instance has carried out credit inquiry to described first instance,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity
By amount, and
Wherein, described structure includes in the data structure: the described mark of (a) described first instance
Know symbol, the described identifier of (b) described second instance, the described identifier of (c) described 3rd entity
And (d) described credit line.
44. equipment according to claim 40, wherein, the described risk of described first instance
It it is the credit risk of described first instance.
45. equipment according to claim 40, wherein, described data structure represents finance pass
System maps, and described financial relations maps and indicates the supplier of company interested and the supply of supplier
The cash flow signal of business and trend.
46. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
For receiving the parts of the identifier of first instance;
For performing to return the portion of first search of at least one data base of the identifier of second instance
Part, wherein, described second instance is the creditor of described first instance;
For performing to return second search of at least one data base described in the identifier of the 3rd entity
Parts, described 3rd entity is the creditor of described second instance;And
For described identifier based on described first instance in the storage device, described second instance
The described identifier of described identifier and described 3rd entity constructs the parts of data structure, described number
According to structure qualification behavior of credit network mapping, and include described first instance and described 3rd entity it
Between via the path of described second instance.
47. equipment according to claim 46, also include:
For the parts of the feature of first instance described in the feature evaluation according to described 3rd entity.
48. equipment according to claim 46,
Wherein, described first search also returns and expands to the of described first instance from described second instance
One credit line,
Wherein, described second search also returns and expands to the of described second instance from described 3rd entity
Two credit lines, and
Wherein, described structure includes described first credit line and described in the data structure
Two credit lines.
49. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
For receiving the parts of the identifier of first instance;
For performing to return the portion of first search of at least one data base of the identifier of second instance
Part, wherein, described second instance is relevant to described first instance in level;
For performing to return second search of at least one data base described in the identifier of the 3rd entity
Parts, described 3rd entity is the creditor of described second instance;And
For described identifier based on described first instance in the storage device, described second instance
The described identifier of described identifier and described 3rd entity constructs the parts of data structure, described number
According to structure qualification behavior of credit network mapping, and include described first instance and described 3rd entity it
Between via the path of described second instance.
50. equipment according to claim 49, also include:
For the parts of the feature of first instance described in the feature evaluation according to described 3rd entity.
51. equipment according to claim 49,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity
By amount, and
Wherein, described structure includes described credit line in the data structure.
52. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
For receiving the parts of the identifier of first instance;
For performing to return the portion of first search of at least one data base of the identifier of second instance
Part, wherein, described second instance has carried out credit inquiry to described first instance;
For performing to return second search of at least one data base described in the identifier of the 3rd entity
Parts, described 3rd entity is the creditor of described second instance;And
For described identifier based on described first instance in the storage device, described second instance
The described identifier of described identifier and described 3rd entity constructs the parts of data structure, described number
According to structure qualification behavior of credit network mapping, and include described first instance and described 3rd entity it
Between via the path of described second instance.
53. equipment according to claim 52, also include:
For the parts of the feature of first instance described in the feature evaluation according to described 3rd entity.
54. equipment according to claim 52,
Wherein, described second search also returns the letter expanding to described second instance from described 3rd entity
By amount, and
Wherein, described structure includes described credit line in the data structure.
55. 1 kinds of equipment being used for creating the behavior of credit network mapping between multiple entity, including:
For receiving the parts of the identifier of first instance;
For performing to return first search of at least one data base of the identifier of second instance, its
In, described second instance is the parts of the creditor of described first instance;
For performing to return second search of at least one data base described in the identifier of the 3rd entity,
Described 3rd entity has carried out the parts of credit inquiry to described second instance;And
For described identifier based on described first instance in the storage device, described second instance
The described identifier of described identifier and described 3rd entity constructs the parts of data structure, described number
According to structure qualification behavior of credit network mapping, and include described first instance and described 3rd entity it
Between via the path of described second instance.
56. equipment according to claim 55, also include:
For the parts of the feature of first instance described in the feature evaluation according to described 3rd entity.
57. equipment according to claim 55,
Wherein, described first search also returns and expands to the of described first instance from described second instance
One credit line, and
Wherein, described structure includes described credit line in the data structure.
58. 1 kinds of devices being used for creating the behavior of credit network mapping between multiple entity, including:
For receiving the parts of the identifier of first instance;
For performing to return the portion of first search of at least one data base of the identifier of second instance
Part, wherein, described second instance is relevant to described first instance in level;
For performing to return second search of at least one data base described in the identifier of the 3rd entity
Parts, described 3rd entity has carried out credit inquiry to described second instance;And
For described identifier based on described first instance in the storage device, described second instance
The described identifier of described identifier and described 3rd entity constructs the parts of data structure, described number
According to structure qualification behavior of credit network mapping, and include described first instance and described 3rd entity it
Between via the path of described second instance.
59. equipment according to claim 58, also include:
For the parts of the feature of first instance described in the feature evaluation according to described 3rd entity.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2012/039972 WO2013180700A1 (en) | 2012-05-30 | 2012-05-30 | Credit behavior network mapping |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104508623A CN104508623A (en) | 2015-04-08 |
CN104508623B true CN104508623B (en) | 2016-09-21 |
Family
ID=49673749
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201280075055.8A Active CN104508623B (en) | 2012-05-30 | 2012-05-30 | Behavior of credit network mapping |
Country Status (9)
Country | Link |
---|---|
JP (1) | JP5770961B2 (en) |
KR (1) | KR101720661B1 (en) |
CN (1) | CN104508623B (en) |
AU (1) | AU2012381098A1 (en) |
CA (1) | CA2874590A1 (en) |
HK (1) | HK1209206A1 (en) |
MX (1) | MX2014014523A (en) |
RU (1) | RU2573198C1 (en) |
WO (1) | WO2013180700A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050144119A1 (en) * | 2003-03-19 | 2005-06-30 | The Norseman Group, Llc | Financing structure |
CN102243748A (en) * | 2011-08-04 | 2011-11-16 | 郁晓东 | Electronic debt management operation system device and realization method of electronization and financial commercialization of claim and debt |
CN102436622A (en) * | 2011-12-28 | 2012-05-02 | 浙江汇信科技有限公司 | Method for evaluating network market operator credit status |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2254611C2 (en) * | 2003-03-13 | 2005-06-20 | Общество с ограниченной ответственностью "Мобилити" | Method for providing mobile electronic communication devices users with actual commercial information on alternative basis (variants) and information system for realization of said method (variants) |
US6991276B2 (en) * | 2003-05-20 | 2006-01-31 | Mccauley Alvin D | Luggage loft assembly |
US7725386B2 (en) * | 2004-03-15 | 2010-05-25 | Arthur J Prieston | Method for offering representation and warranty insurance for mortgage loans |
JP2006099492A (en) * | 2004-09-30 | 2006-04-13 | Hitachi Ltd | Loan decision index calculation system |
US7962403B2 (en) * | 2006-03-16 | 2011-06-14 | Sungard Avantgard Llc | Method and apparatus for a model assessing debtor behavior |
EP2011071A2 (en) * | 2006-04-11 | 2009-01-07 | FX Alliance, Llc | Credit data processing system for controlling electronic trading based on credit arrangements |
US20080133402A1 (en) * | 2006-09-05 | 2008-06-05 | Kerry Ivan Kurian | Sociofinancial systems and methods |
JP5186197B2 (en) * | 2007-12-19 | 2013-04-17 | 株式会社エヌ・ティ・ティ・データ | Evaluation apparatus, evaluation method, and evaluation program |
RU99630U1 (en) * | 2009-03-23 | 2010-11-20 | Григорий Рафаилович Лифшиц | EXCHANGE PLAYER (OPTIONS) |
CN101782992A (en) * | 2010-03-18 | 2010-07-21 | 万易通国际科技(北京)有限公司 | Online transaction system and method |
US8458074B2 (en) * | 2010-04-30 | 2013-06-04 | Corelogic Solutions, Llc. | Data analytics models for loan treatment |
-
2012
- 2012-05-30 CA CA2874590A patent/CA2874590A1/en not_active Abandoned
- 2012-05-30 AU AU2012381098A patent/AU2012381098A1/en not_active Abandoned
- 2012-05-30 RU RU2014153853/08A patent/RU2573198C1/en active
- 2012-05-30 CN CN201280075055.8A patent/CN104508623B/en active Active
- 2012-05-30 WO PCT/US2012/039972 patent/WO2013180700A1/en active Application Filing
- 2012-05-30 MX MX2014014523A patent/MX2014014523A/en unknown
- 2012-05-30 KR KR1020147033441A patent/KR101720661B1/en active IP Right Grant
- 2012-05-30 JP JP2015514970A patent/JP5770961B2/en not_active Expired - Fee Related
-
2015
- 2015-10-08 HK HK15109856.7A patent/HK1209206A1/en not_active IP Right Cessation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050144119A1 (en) * | 2003-03-19 | 2005-06-30 | The Norseman Group, Llc | Financing structure |
CN102243748A (en) * | 2011-08-04 | 2011-11-16 | 郁晓东 | Electronic debt management operation system device and realization method of electronization and financial commercialization of claim and debt |
CN102436622A (en) * | 2011-12-28 | 2012-05-02 | 浙江汇信科技有限公司 | Method for evaluating network market operator credit status |
Also Published As
Publication number | Publication date |
---|---|
CN104508623A (en) | 2015-04-08 |
CA2874590A1 (en) | 2013-12-05 |
MX2014014523A (en) | 2015-02-24 |
KR20150024320A (en) | 2015-03-06 |
HK1209206A1 (en) | 2016-03-24 |
JP2015518226A (en) | 2015-06-25 |
RU2573198C1 (en) | 2016-01-20 |
JP5770961B2 (en) | 2015-08-26 |
KR101720661B1 (en) | 2017-03-28 |
WO2013180700A1 (en) | 2013-12-05 |
AU2012381098A1 (en) | 2014-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sornette et al. | Financial bubbles, real estate bubbles, derivative bubbles, and the financial and economic crisis | |
Bellotti et al. | Forecasting and stress testing credit card default using dynamic models | |
Leyshon et al. | The capitalization of almost everything: The future of finance and capitalism | |
Nesvetailova | Fragile finance: Debt, speculation and crisis in the age of global credit | |
Iqbal et al. | Islamic banking and finance: new perspectives on profit sharing and risk | |
Adhikary | Factors influencing foreign direct investment in South Asian economies: A comparative analysis | |
Bakker | Migrating into financial markets: How remittances became a development tool | |
Yost | Making IT work: A history of the computer services industry | |
Awrey | Law and finance in the Chinese shadow banking system | |
Elson | The global financial crisis in retrospect: Evolution, resolution, and lessons for prevention | |
Allen et al. | New thinking on the financial crisis | |
Nyambuu et al. | A quantitative approach to assessing sovereign default risk in resource‐rich emerging economies | |
Kaplinsky | Third World Industrialization in the 1980s: Open Economies in a Closing World | |
McDonald | The global financial crisis and behavioural economics | |
Elayan et al. | The impact of receiving debtor‐in‐possession financing on the probability of successful emergence and time spent under Chapter 11 bankruptcy | |
Bennett et al. | Financial analytics with R: building a laptop laboratory for data science | |
Chimpango | The development of African capital markets: a legal and institutional approach | |
Smith et al. | Entrepreneurial finance: Venture capital, deal structure & valuation | |
CN104508623B (en) | Behavior of credit network mapping | |
O’Hara | The global securitized subprime market crisis | |
Myers | New economic thinking and real estate | |
Ng et al. | Hands-On Artificial Intelligence for Banking: A practical guide to building intelligent financial applications using machine learning techniques | |
Faia et al. | The role of Fintech for the Capital Markets Union | |
Hakim et al. | The Probability of the Financing Sustainability of Micro-firms Supported by Islamic Social Fund | |
Aslan | Interest-free banking: reasons for choosing Islamic banking in Bingol city |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1209206 Country of ref document: HK |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: GR Ref document number: 1209206 Country of ref document: HK |