CN114003879A - Asset proxy method, device, electronic equipment and storage medium - Google Patents

Asset proxy method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114003879A
CN114003879A CN202111252140.4A CN202111252140A CN114003879A CN 114003879 A CN114003879 A CN 114003879A CN 202111252140 A CN202111252140 A CN 202111252140A CN 114003879 A CN114003879 A CN 114003879A
Authority
CN
China
Prior art keywords
asset
holder
proxy
identity
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111252140.4A
Other languages
Chinese (zh)
Inventor
邹鸿宇
杨一鸣
冯文
谢圳
廖欣欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Futuo Network Technology Shenzhen Co ltd
Original Assignee
Futuo Network Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Futuo Network Technology Shenzhen Co ltd filed Critical Futuo Network Technology Shenzhen Co ltd
Priority to CN202111252140.4A priority Critical patent/CN114003879A/en
Publication of CN114003879A publication Critical patent/CN114003879A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes

Abstract

The embodiment of the application discloses an asset proxy method, an asset proxy device, electronic equipment and a computer-readable storage medium based on ESOP, wherein the method comprises the following steps: receiving an asset proxy request sent by a client, wherein the asset proxy request comprises identity information of an asset holder; performing identity authentication on the asset holder according to the identity information; updating the authentication state associated with the user name affiliated under the target proxy account according to the identity authentication result, wherein the user name is used for identifying an asset holder, and the asset holder is affiliated to an asset consignor corresponding to the target proxy account; and if the updated authentication state indicates that the identity authentication is successful, the asset to be held of the asset holder is proxied, wherein the asset to be held of the asset holder comprises the incentive asset acquired from the asset principal corresponding to the target proxy account. The scheme of the embodiment of the application can reduce the risk of asset agency.

Description

Asset proxy method, device, electronic equipment and storage medium
Technical Field
The present application relates to the field of financial technologies, and in particular, to an asset proxy method based on an ESOP, an asset proxy apparatus based on an ESOP, an electronic device, and a computer-readable storage medium.
Background
In recent years, with the rapid development of the financial industry, financial supervision is continuously perfected, and the financial institution faces the stricter requirements of the supervision institution, and deep knowledge of customers and rapid identification of customers are one of the important requirements.
Trust is a property management system and legal action taking assets as cores, based on trust and in a delegation mode, and refers to an action that a delegation delegates delegate their property rights to a delegate based on trust of the delegate, and the delegate manages or punishs the benefits or specific purposes of the beneficiary on the behalf of the delegation. Before the property of the client is proxied, the trust company usually adopts a manual mode to perform identity authentication on the client, but the reliability of the mode is low, and the efficiency of data management in the property proxying process is also reduced.
Disclosure of Invention
To solve the above technical problem, embodiments of the present application provide an ESOP-based asset proxy method, an ESOP-based asset proxy apparatus, an electronic device, and a computer-readable storage medium.
According to an aspect of the embodiments of the present application, there is provided an asset proxy method based on an ESOP, the method is applied to an asset hosting system based on the ESOP, different asset consignors correspond to different proxy accounts in the asset hosting system, and the method includes: receiving an asset proxy request sent by a client, wherein the asset proxy request comprises identity information of an asset holder; performing identity authentication on the asset holder according to the identity information; updating the authentication state associated with the user name affiliated under the target proxy account according to the identity authentication result, wherein the user name is used for identifying an asset holder, and the asset holder is affiliated to an asset consignor corresponding to the target proxy account; and if the updated authentication state indicates that the identity authentication is successful, the asset to be held of the asset holder is proxied, wherein the asset to be held of the asset holder comprises the incentive asset acquired from the asset principal corresponding to the target proxy account.
In an exemplary embodiment, authenticating the asset holder based on the identity information includes: identifying the asset holder; and if the identification is passed, performing risk examination on the asset holder.
In an exemplary embodiment, risk review of an asset holder includes: transferring the identity information into a verification server by calling a designated interface so that the verification server judges whether the asset holder exists in a preset risk list or not; and receiving an examination result returned by the authentication server.
In an exemplary embodiment, risk review of an asset holder includes: acquiring total asset information of an asset holder; the total asset information of the assets to be held and the asset holders is reviewed.
In an exemplary embodiment, the method further comprises: and if the identity recognition fails, sending a recognition result representing the identity recognition failure to the client so that the client sends the identity information of the asset holder to the asset hosting system based on the ESOP and triggers the asset holder to perform identity authentication again in the asset hosting system based on the ESOP.
In an exemplary embodiment, brokering an asset holder's asset includes: receiving a target instruction sent by a client; the asset holder's proxy asset is processed in response to the target instruction.
In an exemplary embodiment, the method further comprises: creating a proxy account, wherein the proxy account is used for storing assets of an asset consignor, and the asset consignor is associated with a plurality of asset holders; and according to the asset allocation strategy of the asset consignor for each asset holder, dividing the assets held by the asset consignor into user names corresponding to the corresponding asset holders.
According to an aspect of the embodiment of the present application, an asset proxy apparatus based on an ESOP is provided, which includes a receiving module, configured to receive an asset proxy request sent by a client, where the asset proxy request includes identity information of an asset holder; the authentication module is used for performing identity authentication on the asset holder according to the identity information; the updating module is used for updating the authentication state associated with the user name affiliated under the target proxy account according to the identity authentication result, wherein the user name is used for identifying an asset holder, and the asset holder is affiliated to an asset consignor corresponding to the target proxy account; and the proxy module is used for carrying out proxy on the asset to be held of the asset holder after the identity authentication is successfully marked in the updated authentication state, wherein the asset to be held of the asset holder comprises the incentive asset acquired from the asset consignor corresponding to the target proxy account.
According to an aspect of the embodiments of the present application, there is provided an electronic device, including a processor and a memory, the memory having stored thereon computer readable instructions, which when executed by the processor, implement the ESOP-based asset proxy method as above.
According to an aspect of embodiments herein, there is provided a computer readable storage medium having stored thereon computer readable instructions which, when executed by a processor of a computer, cause the computer to perform the ESOP based asset brokering method as previously provided.
According to an aspect of embodiments herein, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The computer instructions are read by a processor of a computer device from a computer-readable storage medium, and the computer instructions are executed by the processor to cause the computer device to perform the ESOP based asset proxy method provided in the various alternative embodiments described above.
In the technical scheme provided by the embodiment of the application, each time the client sends an asset proxy request to the asset hosting system, the asset hosting system based on the ESOP performs identity authentication on the corresponding asset holder, and the authentication state associated with the user name affiliated under the target agent account is updated according to the obtained identity authentication result, that is, the present embodiment replaces the existing manual authentication manner with the asset agent management system based on the ESOP to perform automatic authentication and information update for the asset agent request initiated by the client each time, the method and the system enable an asset agent side (namely a trust company) to determine whether to act on the asset of an asset holder according to the updated authentication state in the asset hosting system based on the ESOP, and improve the reliability of identity authentication of clients of the asset agent side and the data management efficiency of each party in the asset acting process.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application. It is obvious that the drawings in the following description are only some embodiments of the application, and that for a person skilled in the art, other drawings can be derived from them without inventive effort. In the drawings:
FIG. 1 is a flow chart illustrating an ESOP based asset brokering method in accordance with an exemplary embodiment of the present application;
FIG. 2 is an interface diagram in an exemplary embodiment of the ESOP based asset hosting system in the embodiment shown in FIG. 1;
FIG. 3 is a flowchart of an exemplary embodiment of step S200 in the embodiment shown in FIG. 1;
FIG. 4 is a flowchart of step S220 in an exemplary embodiment of the embodiment shown in FIG. 3;
FIG. 5 is a flowchart of an exemplary embodiment of step S200 in the embodiment shown in FIG. 1;
FIG. 6 is a flowchart of step S220 in an exemplary embodiment of the embodiment shown in FIG. 3;
FIG. 7 is a flowchart of step S400 in an exemplary embodiment of the embodiment shown in FIG. 1;
FIG. 8 is a flow chart of an exemplary ESOP-based asset brokering method set forth in connection with the embodiment shown in FIG. 1;
FIG. 9 is a block diagram of an ESOP based asset proxy device shown in an exemplary embodiment of the present application;
FIG. 10 illustrates a schematic structural diagram of a computer system suitable for use in implementing the electronic device of an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
It should also be noted that: reference to "a plurality" in this application means two or more. "and/or" describe the association relationship of the associated objects, meaning that there may be three relationships, e.g., A and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
Usually, only before signing a contract with an asset holder requesting an asset agent, a trust company sends staff to perform identity authentication on information data of a client so as to ensure the validity of the asset under the name of the asset holder, if the identity authentication is successful, the identity authentication is not repeated before specific fund agent business is executed, because the information of the client, such as the information of the client in a credit investigation system, is updated in real time, if the identity authentication is performed on the client again by using the updated user information, the client which passes the identity authentication before can not pass the identity authentication again, and if the asset agent business of the client is continued, the risk of the trust company for fund agent is increased.
To solve at least the above problems in the prior art, embodiments of the present application respectively propose an asset proxy method, an asset proxy apparatus, an electronic device, and a computer-readable storage medium, which will be described in detail below.
It should be noted that, the embodiment of the present application relates to an asset hosting system based on an ESOP, which can be understood as an information platform for providing data support for the operation of a trust company, and generally has functions of data collection, processing, display, and the like. ESOP (Employee Stock Ownership plants, called ESOP for short) refers to a novel Stock right arrangement mode for sharing dividends according to shares, wherein employees in an enterprise pay for and pay for partial Stock rights of the enterprise, and entrust a special organization (such as Employee holdings, trust foundation and the like) to host and operate with the identity of a corporate law, manage in a centralized manner, participate in management of the trust foundation and share dividends. ESOP is a stock form of ownership of the enterprise property owned by the enterprise staff, and comprises two modes: non-lever type ESOP and lever type ESOP. The non-lever type ESOP refers to a method for solving the problem that the stock prize money or the combination of the stock prize money and the purchase fund is mainly adopted in the process of carrying out the employee share-holding plan without depending on the support of external funds. Lever type ESOP (LESOP), which is a type of financial instrument that is usually deployed by a company to fund a commercial bank or other financial institution in a mortgage of stock to be purchased by LESOP, and the resulting money is used to purchase the stock, which can only be gradually and proportionally allocated to the employee's private account when LESOP regularly uses the company's donations to pay back principal and interest. The method aims to provide one of measures for encouraging the morale to take for the retention of people due to the fact that the high-tech company lacks mobile funds at the initial stage of creation.
In the asset hosting system based on the ESOP, different proxy accounts are respectively established for different asset consignors, and it should be understood that the asset consignors may be companies, groups and other subjects, and a plurality of user identifications may be associated under each asset consignor, for example, the user identifications may be employees under a certain company. In an exemplary application scenario, the assets of a company are required to be distributed to subordinate employees, and the assets distributed to the subordinate employees are also to some extent owned by the company, so the assets distributed to the employees should also be uniformly managed by the trust company, and the employees are also called as asset holders for the trust company.
Referring to fig. 1, fig. 1 is a flowchart illustrating an ESOP-based asset brokering method applied to an ESOP-based asset hosting system as mentioned above according to an exemplary embodiment of the present application. As shown in fig. 1, the asset proxy method based on the ESOP provided by the embodiment includes steps S100 to S400, and the detailed description refers to the following:
step S100: and receiving an asset proxy request sent by the client, wherein the asset proxy request comprises the identity information of the asset holder.
In this embodiment, the asset holder sends an asset proxy request to the asset escrow system based on the ESOP through the client when the asset trustee needs to change its assets, and the asset change includes option, buy and sell stocks, withdraw funds, public fund, private fund, securities trader's fund, futures fund, bank financing, trust products, etc., which is not limited herein.
Assets are resources that are created by past transactions or events by a subject such as an enterprise, owned or controlled by the subject such as the enterprise, and are expected to provide economic benefits to the enterprise. Resources that do not bring economic benefits cannot be assets and are the rights of entities such as enterprises. Assets can be classified by liquidity into liquidity assets, long-term investments, fixed assets, intangible assets, and other assets. The liquidity refers to an asset which can be realized or consumed within 1 year or within 1 business period of more than 1 year, and comprises cash, bank deposit, short-term investment, receivable and prepaid money, expense to be shared, inventory and the like. Long term investments refer to investments other than short term investments, including investments of various equity properties with time to be prepared for more than 1 year (not including 1 year), bonds that cannot be rendered or are not prepared for rendering, other equity investments, and other long term investments. Fixed assets refer to houses, buildings, machines, machinery, transportation vehicles, and other production and operation related equipment, appliances, tools, etc., which have a lifetime of over 1 year for an enterprise. Intangible assets are non-monetary long-term assets that an enterprise rents to produce goods or provide labor, or are held without physical form for regulatory purposes. Other assets are assets other than mobile assets, long term investments, fixed assets, intangible assets, such as fixed assets, repair, reconstruction expenditures, etc. resulting in long term amortization costs.
In this embodiment, the asset holder is the owner of the asset, and includes but is not limited to individuals, companies, partners, trusts, insurance companies, and banking institutions.
The identity information of the asset holder in the asset proxy request includes, but is not limited to, name, gender, ethnicity, date of birth, address, citizenship number, issuing authority, expiration date, cell phone number, social security records, transaction flow, individual units, occupation, income, residence and the like.
In this embodiment, the identity information of the asset holder may be submitted in various information forms, such as words, pictures, sound recordings, etc., which are not specifically limited herein, for example, the residents in continental china may provide photos of the front and back sides of the second-generation identity card of the residents as the identity information, and the residents in non-continental china provide passports, etc. as the identity information.
Step S200: and performing identity authentication on the asset holder according to the identity information.
In this embodiment, the identity authentication of the asset holder mainly includes the following aspects.
1. Identity information and credit investigation condition verification:
by taking natural people in China as an example, a national citizen identity card number query service center is currently set in China, the national citizen identity card number query service center provides citizen identity card information authentication service, the authentication mode is that a user transmits data such as a citizen identity number, a name and the like of a person to be authenticated to a national population information social application platform of the Ministry of public Security through a network channel of a telecommunication operator for comparison, and the query center returns a comparison result of 'consistency' or 'inconsistency'. In an actual application scene, when the due-work investigation is carried out, the identity identification of a client can be completed by comparing the identity information of each main body of insurance and trust relation.
For another example, for the case of personal credit investigation, the financial institution may check the credit investigation of the customer and the related personnel by purchasing and accessing the credit investigation system.
2. Customer asset status matching and verification emphasis.
In order to eliminate the situations of asset support, illegal property sources and the like to the maximum extent and fulfill related risk examination obligations, in particular practice, each financial institution, whether a bank, a trust company or an insurance company, pays high attention to the problem of the matching degree of the asset conditions of the customers. For example, in the family trusted service, a trusted company as a trusted party is obligated to check the matching degree between the size of the property of a client and the size of the property to be delivered to the trusted party, so as to eliminate the possibility of illegal benefit delivery by trust. As another example, in life insurance business, one of the important ways to avoid insurance risk is to verify the customer's asset status, match the revenue generating capacity with the amount of the insurance they are supposed to cover. When the full-time investigation is carried out on the matching degree of the property condition of the natural person, the personal property of the natural person client is mainly concerned, and the personal property mainly comprises own property, property from a third party and occasional income, wherein the own property can be divided into active income and passive income.
In this embodiment, the identity authentication of the asset holder may be performed based on financial platforms such as a global financial risk data system, a national population information social application platform, and a credit investigation system, which is not specifically limited herein.
The embodiment authenticates the identity of the asset holder before the asset of the asset holder is proxied, so that the client can be ensured to meet the market supervision requirement, and the risk of carrying out fund proxy service is further reduced.
Step S300: and updating the authentication state associated with the user name affiliated under the target proxy account according to the identity authentication result, wherein the user name is used for identifying the asset holder, and the asset holder is affiliated to the asset consignor corresponding to the target proxy account.
In this embodiment, the asset trustee creates one or more proxy accounts for the asset delegator in advance for depositing the assets of the asset delegator. The proxy account comprises user names associated with one or more asset holders, asset information under the corresponding user names and authentication states associated with the user names, wherein the authentication states associated with the user names are used for representing the identity authentication results of the asset holders corresponding to the user names. In this embodiment, the result of the identity authentication is success of the identity authentication and failure of the identity authentication, for example, when the result of the identity authentication of a certain asset holder is success of the identity authentication or failure of the identity authentication, the authentication state associated with the user name corresponding to the asset holder affiliated to the proxy account is "success of the identity authentication" or "failure of the identity authentication".
In this embodiment, the target proxy account is a proxy account corresponding to an asset principal to which the asset holder belongs.
In this embodiment, as long as the asset hosting system based on the ESOP receives the asset proxy request sent by the receiving client, the asset hosting system performs identity authentication on the identity information of the asset holder included in the asset proxy request, and further updates the authentication state associated with the user name affiliated to the target proxy account according to the result of the identity authentication. Due to the fact that the authentication state associated with the user name affiliated to the target agent account is updated in real time, the property holders who do not accord with the market supervision rules can be found in time, and the risk of property agents is reduced. In addition, the embodiment shows the structure of the identity authentication through a parameter, namely, the authentication state, so that the asset trustee can check the identity examination result of the corresponding asset holder at any time through the asset management system based on the ESOP, and the user experience is improved.
In this embodiment, the asset hosting system based on the ESOP can display the related information of the asset delegate having the delegation relationship with the asset delegate, for example, the ID number uniquely identifying the asset delegate, the information of a plurality of asset holders affiliated to the asset delegate, and the information of the asset holders includes the corresponding user names of the asset holders, the contact ways, the identity information, the authentication statuses associated with the corresponding user names of the asset holders affiliated under the corresponding proxy accounts, and the like, which are not limited herein.
Referring illustratively to fig. 2, fig. 2 is an interface diagram of an exemplary embodiment of the ESOP-based asset hosting system of the embodiment shown in fig. 1, as shown in fig. 2, the current interface is an account management page under a company named dawnTest for the asset delegator, in the current page, a plurality of employee information belonging to the dawnTest company is included, the employee information includes employee user name, employee mobile phone number, employee certificate, employee asset information and authentication state of the employee, the authentication state includes three states of "pass", "fail" or "unauthenticated", the asset agent method based on the ESOP provided by the embodiment can know the latest authentication state of the asset holder, namely the employee of the dawnTest company, through the interface of the asset agent system based on the ESOP, and determining whether to perform proxy service on the asset of the corresponding asset holder according to the authentication state.
Step S400: and if the updated authentication state indicates that the identity authentication is successful, the assets to be held of the asset holder are proxied.
In this embodiment, the asset to be held by the asset holder, that is, the part of the asset holder requesting the proxy of the asset trustee, may be all or part of the asset holder, and is not particularly limited herein.
In the technical scheme provided by this embodiment, each time the client sends an asset proxy request to the asset hosting system based on the ESOP, the asset hosting system based on the ESOP performs identity authentication on a corresponding asset holder, and updates the authentication state associated with the user name under the target proxy account according to the obtained result of the identity authentication, that is, the present embodiment replaces the existing manual authentication manner with the asset hosting system based on the ESOP to perform automatic authentication and information update on the asset proxy request initiated by the client each time, so that an asset proxy party (i.e., a trust company) can determine whether to proxy the asset of the asset holder according to the updated authentication state in the asset hosting system based on the ESOP, thereby improving the reliability of the asset authentication of the client by the asset proxy party and further reducing the asset proxy risk of the asset proxy party, and the data management efficiency when all the parties act on the assets in the asset incentive process is improved.
Referring to fig. 3, fig. 3 is a flowchart of step S200 in an exemplary embodiment shown in fig. 1, and as shown in fig. 3, step S200 may include steps S210 to S220, which are described in detail as follows:
step S210: the asset holder is identified.
In this embodiment, if the asset owner has authority to change the asset request to the requesting agent only if the asset owner belongs to the asset information name of the asset owner in the asset agent request, the asset security of the client of the asset trustee can be ensured by identifying the asset owner including the asset owner to the asset agent request.
In this embodiment, the identity of the client may be identified and authenticated by methods of performing due diligence research on the client, enhancing due diligence research, fingerprint face recognition and other biological information, which is not specifically limited herein.
In a specific application scenario, when an asset trustee establishes a trust relationship with an asset trust authority, the asset trustee collects in advance the identity information of the asset holder belonging to the corresponding asset trust authority, establishes an identity information table of the asset holder and displays the identity information table in an asset hosting system based on an ESOP, matches the identity information of the asset holder in the asset proxy request with the identity information table, further determines the asset under the asset holder name matched with the identity information of the asset holder in the asset proxy request, and if the asset of the requesting proxy belongs to the asset under the asset holder name matched with the identity information of the asset holder in the asset proxy request, determines the asset of the requesting proxy belongs to the identity information name of the asset holder in the asset proxy request.
Illustratively, if the identification fails, an identification result representing the identification failure is sent to the client, so that the client sends the identity information of the asset holder to the ESOP-based asset hosting system to trigger the re-authentication of the asset holder in the ESOP-based asset hosting system. Considering that the reason for the failure of the identification of the asset holder may be that the identity information sent by the client to the asset hosting system based on the ESOP is incorrect, in this case, the information of the failure of the identification is fed back to the client, so that the client sends correct identity information to the asset hosting system based on the ESOP to trigger the re-authentication of the asset holder in the asset hosting system based on the ESOP. Illustratively, the identification result representing the identity identification failure includes a specific reason for identifying the identity identification failure or specific parameters of the identity identification failure, such as an identification number, a telephone number, and the like, so that the client can check the identity information in a targeted manner according to the identification result, and the process of identity identification is simplified.
Step S220: and if the identification is passed, performing risk examination on the asset holder.
In this embodiment, multiple types of risk review programs may be performed on the asset holder according to different risk review strengths or different application scenarios, which is not specifically limited herein. Illustratively, the identity information of the asset holder in the asset proxy request is matched with the credit investigation system to determine if the asset holder has adverse financial activity, and thus to determine if there is an unlawful possibility of the asset in the name of the asset holder. The credit investigation system comprises an enterprise credit information basic database and a personal credit information basic database. The main users of the credit investigation system are financial institutions such as the trust company, which are connected with the headquarters of the financial institutions through private lines and extend terminals to business counters of internal personnel of the trust company through an intranet system of the trust company. The information sources of the credit investigation system are mainly financial institutions such as trust companies and commercial banks, and the recorded information comprises basic information of enterprises and individuals, credit information such as borrowing and guarantee at the financial institutions, and main financial indexes of the enterprises.
Illustratively, the identity information of the asset holder in the asset proxy request is matched against a global financial risk data system to determine if the asset holder has a record relating to financial risk, the global financial risk data being a list of people who have financial risk measures such as bribery, corruption, fraud, etc.
In this embodiment, the asset trustee cannot perform risk review on the asset holder for various reasons, for example, the asset trustee has no authority to perform risk review on the asset holder, the asset trustee cannot collect the identity information or background information of the asset holder, so that the asset holder cannot be fully risk reviewed, and so on. Illustratively, compliance risk prevention and remediation is made faster and more intelligent by invoking a designated interface, which is a designated application program interface, to risk review the asset holder, such as by simplifying, speeding up the due diligence process by the user. Risk is reduced by the three-stage procedures of "identity, location and ownership screening", "risk screening" and "enhanced due diligence background screening", preventing businesses or individuals from being inadvertently involved in the business activities of financial risk.
Referring to fig. 4, fig. 4 is a flowchart illustrating step S220 in an exemplary embodiment shown in fig. 3, and as shown in fig. 4, step S220 may include steps S221 to S222, which are described in detail as follows:
step S221: and transferring the identity information into the verification server by calling a specified interface so that the verification server judges whether the asset holder exists in a preset risk list.
In this step, a variety of different application program interfaces may be invoked to perform a more comprehensive risk review procedure for the asset holder. The method comprises the steps that a risk blacklist is pre-stored in a verification server, suspicious personnel or personnel with historical crime records are recorded in the risk blacklist, when the verification server judges that an asset holder is in the risk blacklist, the verification result is determined to be not passed, and otherwise, the verification result is passed.
Step S222: and receiving an examination result returned by the authentication server.
In this embodiment, after receiving the review result, if the review result does not pass, the asset hosting system based on the ESOP feeds back the review result indicating that the review failed to the background of the asset hosting system based on the ESOP, so as to initiate the operation of risk review for the asset holder again based on the background.
Illustratively, after the background of the ESOP-based asset management system receives the examination result representing the examination failure, the background checks whether the identity information of the asset holder transmitted to the verification server is correct, and if not, transmits the correct identity information of the asset holder to the verification server, so that the verification server judges whether the asset holder is in the risk list again.
Illustratively, after receiving the review result representing the review failure, the background calls other application program interfaces and transmits the identity information to the verification server corresponding to the application program interfaces, so that the verification server judges whether the asset holder is in the risk list. If the examination result identification fails for the preset times, determining that the corresponding asset holder fails to pass the identity authentication, and the asset management system based on ESOP does not act on the proxy asset under the name of the asset holder.
In a specific application scenario, referring to fig. 5, fig. 5 is a flowchart of an exemplary embodiment of step S200 in the embodiment shown in fig. 1, as shown in fig. 5, after receiving identity information of an asset holder, an asset hosting system based on an ESOP performs identity identification on the asset holder, and determines whether the identity identification passes or not, if the identity identification fails, a result representing the identity identification failure is fed back to a client, so that the client re-inputs identity information of a user, if the identity identification succeeds, risk review is continuously performed on the asset holder, and whether the risk review passes or not is determined, if the risk review succeeds, the identity authentication on the asset holder is successful, and if the risk review fails, a review result representing the risk review failure is sent to a background of the asset hosting system based on the ESOP, so that a background worker performs a targeted artificial risk review on the asset holder according to the review result, if the manual risk examination is successful, the identity authentication of the asset holder is successful, and if the manual risk examination is failed, the examination result is sent to the client so that the client initiates the identity authentication process of the asset holder again.
In the embodiment, the risk examination is carried out on the asset holder by calling the designated interface, so that on one hand, an asset trustee does not need to develop a complete examination program, the risk examination cost of the trustee is reduced, and the risk examination cost is simplified; on the other hand, because a designated interface such as the World-Check One screening platform of the louit (refinitv) can realize a more comprehensive and accurate risk examination program and provide comprehensive risk examination data for risk examination, the accuracy of the risk examination can be improved, and the agent risk of an asset trustee is reduced.
Referring to fig. 6, fig. 6 is a flowchart illustrating step S220 in an exemplary embodiment of the embodiment shown in fig. 3, and as shown in fig. 6, step S220 may include steps S223-S224, which are described in detail as follows:
step S223: total asset information of an asset holder is obtained.
The total asset information of the asset holder includes all stock, bond or fund information under the name of the asset holder. Illustratively, the total asset information of the asset holder is that the asset holder submits its total asset information including the amount of the asset and the legal certificate of the corresponding asset, etc., on request of the asset trustee.
Step S224: and auditing the assets to be held according to the total asset information of the asset holder.
In this embodiment, the asset trustee may delegate third-party institutions such as an accounting firm, a law firm, and an asset evaluation institution, issue a professional opinion regarding the assets to be held of the asset holder according to the total asset information of the asset holder, and refer to the professional opinion when reviewing the project. The trust company, whether it is the owner that audits the asset holder's proxy asset or entrusts a third party to audit, needs to bear the risks and responsibilities associated with the asset holder's proxy asset audit.
Optionally, in this embodiment, the examining and verifying the assets to be held according to the total asset information of the asset holder may further include: the match between the size of the asset holder's asset and the size of the asset to be delivered to the trust is reviewed to eliminate the possibility of illegal benefit delivery by trust. Specifically, the difference degree between the total asset and the assets to be held is determined according to the total asset information of the asset holder and the size of the assets to be held to be delivered to the trust, and if the difference degree is higher than a set threshold value, the risk is present. Specifically, the difference can be calculated by the following formula:
Figure BDA0003322408450000121
wherein Dif represents the difference degree between the total assets and the assets to be held; α represents a dissimilarity factor; ass1Represents a total asset; ass2Representing a proxy asset.
Referring to fig. 7, fig. 7 is a flowchart illustrating step S400 in an exemplary embodiment of the embodiment shown in fig. 1, and as shown in fig. 7, step S400 may include steps S410-S420, which are described in detail as follows:
step S410: and receiving a target instruction sent by the client.
In this embodiment, the target instructions are used to instruct the asset trustee to change the asset of the asset holder, such as option, buy and sell stock, withdraw funds, public fund, private fund, securities trader's fund, futures fund, buy bank financing products, buy and sell trust products, and so on, and are not limited in this respect.
Step S420: and responding to the target instruction to process the assets to be held of the asset holder.
For example, after the asset trusted party performs corresponding processing on the asset of the asset holder according to the target instruction, the processing result is fed back to the client, so that the asset holder knows the asset change condition of the asset holder.
The scheme provided by the embodiment can perform identity authentication on the asset holder on the ESOP-based asset hosting system and process the asset of the asset holder passing the identity authentication, so that the online operation of the asset proxy service is realized, and the complexity and the inefficiency of the offline operation can be avoided.
Referring to fig. 8, fig. 8 is a flow chart of an exemplary ESOP-based asset brokering method based on the embodiment shown in fig. 1.
In the prior art, an asset agent usually creates an account with its own name for storing the assets which it needs to proxy, and hands the account to the asset trustee, but in most cases, the enterprise where the asset agent is located cannot or does not want the asset holder to open a real account for various reasons, and the stocks, bonds or cash of the account which the asset holder should place in its own name after the enterprise rights or affiliation where the asset holder is located are nowhere to place. Based on this, the present embodiment creates a proxy account belonging to the name of the asset delegate for depositing assets of a plurality of asset holders of the asset delegator in a manner that avoids the above-described situation.
As shown in fig. 8, the method further includes step S10-step S40 before step S100 based on the embodiment shown in fig. 1, and the detailed description is as follows:
step S10: information of a plurality of asset holders associated with an asset principal and a corresponding asset principal is obtained.
In this embodiment, the information of the asset delegator includes asset information of the asset delegator, an asset allocation policy for each asset holder of the corresponding asset delegator, and identity information of a plurality of asset holders associated with the corresponding asset delegator.
Illustratively, the identity information of a plurality of asset holders associated with the asset principal is used for identification before the asset holder needs the asset trustee to change his/her asset, including the name, year and month of birth, certificate photo, contact, etc., of the asset holder, and is not limited in particular.
Illustratively, the asset information of the asset delegator includes the number of assets, such as equity, option, or funds, number of assets, and the like, of the asset delegator.
Illustratively, an asset delegate is an enterprise that assigns assets such as equities, options, or funds to certain of its employees based on long-term incentive schemes. The long-term incentive mechanism is the owner (stockholder) of the enterprise, and encourages the operation manager to work together with the staff, so that the management manager can stably work in the enterprise for a long time and pay attention to the long-term benefits of the enterprise to achieve the long-term development goal of the enterprise, and a business management system of the staff and the senior personnel is restrained and encouraged by giving the senior manager the right to purchase the shares (stocks) of the company for a certain period in the future at an agreed price. The asset allocation policy of the corresponding asset delegate for each asset holder includes the asset class, asset share, etc. that the enterprise allocates to all asset holders under the corresponding user names.
Step S20: information about a plurality of asset holders associated with the asset delegate and the corresponding asset delegate is displayed on the ESOP-based asset hosting system.
In the embodiment, the information of a plurality of asset holders associated with the asset consignor and the corresponding asset consignor is displayed in the asset management system based on the ESOP, so that the asset consignor can conveniently check, record, export and the like the information of the asset consignor, a basis is provided for asset proxy business, the asset proxy efficiency is improved, and the user experience is improved.
Step S30: an agent account is created for holding an asset of an asset principal having associated therewith a plurality of asset holders.
In this embodiment, the created proxy account belongs to the name of the asset trustee, that is, the proxy accounts of the asset holders of the asset trustee are stored under the name of the asset trustee. Illustratively, the asset trusted party builds a proxy account for each customer enterprise and deposits all of the asset holders' assets of the corresponding customer enterprise into the proxy account.
Step S40: and according to the asset allocation strategy of the asset consignor for a plurality of asset holders, dividing the assets held by the consignor into user names corresponding to the corresponding asset holders.
In this embodiment, according to the asset allocation policy of the asset delegation party for a plurality of asset holders, the assets held by the delegation party are divided into user names corresponding to the respective asset holders, so as to perform subsequent proxy business on the assets under the user names corresponding to the respective asset holders, for example, an enterprise allocates a share of a certain stock in a first proportion to employee a, allocates a share of the certain stock in a second proportion to employee B, and allocates a share of the certain option in a third proportion to employee C.
Referring to fig. 9, fig. 9 is a block diagram of an ESOP-based asset proxy device according to an exemplary embodiment of the present application, and as shown in fig. 9, an ESOP-based asset proxy device 30 includes a receiving module 31, an authentication module 32, an update module 33, and a proxy module 34.
The receiving module 31 is configured to receive an asset proxy request sent by a client, where the asset proxy request includes identity information of an asset holder; the authentication module 32 is used for performing identity authentication on the asset holder according to the identity information; the updating module 33 is configured to update an authentication state associated with a user name affiliated to the target proxy account according to an identity authentication result, where the user name is used to identify an asset holder, and the asset holder is affiliated to an asset principal corresponding to the target proxy account; and the proxy module 34 is configured to proxy the asset to be held of the asset holder after the updated authentication state indicates that the identity authentication is successful, where the asset to be held of the asset holder includes the incentive asset obtained from the asset consignor corresponding to the target proxy account.
In another exemplary embodiment, the authentication module 32 includes an identification unit and a risk review unit.
The identity recognition unit is used for carrying out identity recognition on an asset holder; and the risk examination unit is used for carrying out risk examination on the asset holder after the identity identification is passed.
In another exemplary embodiment, the risk examination unit comprises a first risk examination subunit and a receiving subunit, wherein the first risk examination subunit is configured to transfer the identity information to the verification server by calling a specified interface, so that the verification server determines whether the asset holder exists in a preset risk list; the receiving subunit is configured to receive an examination result returned by the authentication server.
In another exemplary embodiment, the risk review unit comprises an acquisition subunit and a second risk review subunit, wherein the acquisition subunit is configured to acquire total asset information of an asset holder; and the second risk examination subunit is used for examining the total asset information of the assets to be held and the asset holders.
In another exemplary embodiment, the proxy module 34 includes a receiving unit and a proxy unit, wherein the receiving unit is used for receiving a target instruction sent by a client; the proxy unit is used for responding to the target instruction and processing the asset of the asset holder.
In another exemplary embodiment, the asset proxy apparatus 30 based on an ESOP provided in this embodiment further includes a creating module and a dividing module, where the creating module is configured to create a proxy account, the proxy account is configured to store an asset of an asset delegator, and the asset delegator is associated with a plurality of asset holders; the dividing module is used for dividing the assets held by the asset consignor into user names corresponding to the corresponding asset holders according to the asset allocation strategy of the asset consignor for each asset holder.
In another exemplary embodiment, the asset proxy apparatus 30 based on an ESOP provided in this embodiment further includes an obtaining module and a displaying module, where the obtaining module is configured to obtain information of a plurality of asset holders associated with the asset principal and the corresponding asset principal, and the information of the asset principal includes asset information, an asset allocation policy for each asset holder of the corresponding asset principal, and identity information of the plurality of asset holders associated with the corresponding asset principal; the display module is used for displaying information of a plurality of asset holders associated with the asset consignor and the corresponding asset consignor to the ESOP-based asset management system.
It should be noted that the apparatus provided in the foregoing embodiment and the method provided in the foregoing embodiment belong to the same concept, and the specific manner in which each module and unit execute operations has been described in detail in the method embodiment, and is not described again here.
In another exemplary embodiment, the present application provides an electronic device comprising a processor and a memory, wherein the memory has stored thereon computer readable instructions that, when executed by the processor, implement the foregoing ESOP based asset proxy method.
FIG. 10 illustrates a schematic structural diagram of a computer system suitable for use in implementing the electronic device of an embodiment of the present application.
It should be noted that the computer system 1000 of the electronic device shown in fig. 10 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 10, the computer system 1000 includes a Central Processing Unit (CPU)1001 that can perform various appropriate actions and processes, such as performing the information recommendation method in the above-described embodiment, according to a program stored in a Read-Only Memory (ROM) 1002 or a program loaded from a storage portion 1008 into a Random Access Memory (RAM) 1003. In the RAM 1003, various programs and data necessary for system operation are also stored. The CPU 1001, ROM 1002, and RAM 1003 are connected to each other via a bus 1004. An Input/Output (I/O) interface 1005 is also connected to the bus 1004.
The following components are connected to the I/O interface 1005: an input section 1006 including a keyboard, a mouse, and the like; an output section 1007 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and a speaker; a storage portion 1008 including a hard disk and the like; and a communication section 1009 including a Network interface card such as a LAN (Local Area Network) card, a modem, or the like. The communication section 1009 performs communication processing via a network such as the internet. The driver 1010 is also connected to the I/O interface 1005 as necessary. A removable medium 1011 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 1010 as necessary, so that a computer program read out therefrom is mounted into the storage section 1008 as necessary.
In particular, according to embodiments of the application, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising a computer program for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication part 1009 and/or installed from the removable medium 1011. When the computer program is executed by a Central Processing Unit (CPU)1001, various functions defined in the system of the present application are executed.
It should be noted that the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read-Only Memory (ROM), an Erasable Programmable Read-Only Memory (EPROM), a flash Memory, an optical fiber, a portable Compact Disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with a computer program embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. The computer program embodied on the computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
Yet another aspect of the present application provides a computer readable storage medium having computer readable instructions stored thereon which, when executed by a processor, implement the ESOP based asset brokering method as in any one of the preceding embodiments.
Another aspect of the application also provides a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The computer instructions are read by a processor of a computer device from a computer-readable storage medium, and the computer instructions are executed by the processor to cause the computer device to perform the ESOP based asset proxy method provided in the various embodiments described above.
It should be noted that the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. The computer readable storage medium may be, for example, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read-Only Memory (ROM), an Erasable Programmable Read-Only Memory (EPROM), a flash Memory, an optical fiber, a portable Compact Disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with a computer program embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. The computer program embodied on the computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
The above description is only a preferred exemplary embodiment of the present application, and is not intended to limit the embodiments of the present application, and those skilled in the art can easily make various changes and modifications according to the main concept and spirit of the present application, so that the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (11)

1. An ESOP-based asset brokering method applied to an ESOP-based asset hosting system, wherein different asset consignors correspond to different broker accounts in the asset hosting system, the method comprising:
receiving an asset proxy request sent by a client, wherein the asset proxy request comprises identity information of an asset holder;
performing identity authentication on the asset holder according to the identity information;
updating an authentication state associated with a user name affiliated under a target proxy account according to an identity authentication result, wherein the user name is used for identifying the asset holder, and the asset holder is affiliated to an asset consignor corresponding to the target proxy account;
and if the updated authentication state indicates that the identity authentication is successful, the asset to be held of the asset holder is proxied, wherein the asset to be held of the asset holder comprises the incentive asset acquired from the asset principal corresponding to the target proxy account.
2. The method of claim 1, wherein authenticating the asset holder based on the identity information comprises:
identifying the asset holder;
and if the identification is passed, performing risk examination on the asset holder.
3. The method of claim 2, wherein the risk review of the asset holder comprises:
transferring the identity information into a verification server by calling a designated interface so that the verification server judges whether the asset holder exists in a preset risk list or not;
and receiving the examination result returned by the verification server.
4. The method of claim 2, wherein the risk review of the asset holder comprises:
acquiring total asset information of the asset holder;
and checking the total asset information of the assets to be held and the asset holders.
5. The method of claim 2, further comprising:
and if the identity recognition fails, sending a recognition result representing the identity recognition failure to the client so that the client sends the identity information of the asset holder to the ESOP-based asset hosting system and triggers the identity authentication of the asset holder to be carried out again in the ESOP-based asset hosting system.
6. The method of claim 1, wherein said proxying the asset of the asset holder comprises:
receiving a target instruction sent by a client;
processing the asset holder's proxy asset in response to the target instruction.
7. The method of claim 1, further comprising:
creating the proxy account for storing assets of an asset principal having associated therewith a plurality of asset holders;
and according to the asset allocation strategy of the asset consignor for each asset holder, dividing the assets held by the asset consignor into user names corresponding to the corresponding asset holders.
8. The method of claim 7, prior to said creating said proxy account, comprising:
acquiring information of a plurality of asset holders associated with the asset consignor and the corresponding asset consignor, wherein the information of the asset consignor comprises asset information, an asset allocation strategy of the corresponding asset consignor for each asset holder, and identity information of the plurality of asset holders associated with the corresponding asset consignor;
displaying information on a plurality of asset holders with which the asset delegate and corresponding asset delegates are associated to the ESOP-based asset hosting system.
9. An ESOP-based asset proxy device, comprising:
the system comprises a receiving module, a sending module and a processing module, wherein the receiving module is used for receiving an asset proxy request sent by a client, and the asset proxy request comprises the identity information of an asset holder;
the authentication module is used for performing identity authentication on the asset holder according to the identity information;
the updating module is used for updating the authentication state associated with the user name affiliated under the target proxy account according to the identity authentication result, wherein the user name is used for identifying the asset holder, and the asset holder is affiliated to the asset consignor corresponding to the target proxy account;
and the proxy module is used for carrying out proxy on the asset to be held of the asset holder after the identity authentication of the updated authentication state is successfully marked, wherein the asset to be held of the asset holder comprises the incentive asset acquired from the asset consignor corresponding to the target proxy account.
10. An electronic device, comprising:
a memory storing computer readable instructions;
a processor to read computer readable instructions stored by the memory to perform the method of any of claims 1-8.
11. A computer-readable storage medium having computer-readable instructions stored thereon, which, when executed by a processor of a computer, cause the computer to perform the method of any one of claims 1-8.
CN202111252140.4A 2021-10-26 2021-10-26 Asset proxy method, device, electronic equipment and storage medium Pending CN114003879A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111252140.4A CN114003879A (en) 2021-10-26 2021-10-26 Asset proxy method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111252140.4A CN114003879A (en) 2021-10-26 2021-10-26 Asset proxy method, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114003879A true CN114003879A (en) 2022-02-01

Family

ID=79924345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111252140.4A Pending CN114003879A (en) 2021-10-26 2021-10-26 Asset proxy method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114003879A (en)

Similar Documents

Publication Publication Date Title
US20200042989A1 (en) Asset-backed tokens
CA3102678C (en) Information processing device, information processing method, and computer program background
US8255325B2 (en) Method and apparatus for facilitating online payment transactions in a network-based transaction facility using multiple payment instruments
US20140172679A1 (en) Systems And Methods Of An Online Secured Loan Manager
CN111738844A (en) Resource allocation system, method and device based on block chain
KR20150002436U (en) Loan matching platform system
KR102022462B1 (en) Method for providing blockchain based contract manaement for p2p claim-oblligation relationship using token and virtual currency
US20130159165A1 (en) Automated process guidance application and method for credit instrument origination, administration and fractionalization system
KR102022453B1 (en) Method for providing blockchain based debt collection law service using token and virtual currency
US20210224759A1 (en) Method and System for Implementing a Currency Guaranteed By An Investment Vehicle
US20080222041A1 (en) Methods and Systems for Electronic Agency in Performance of Services
CN111598679A (en) Multi-legal-person joint loan method, system and medium based on block chain
Shehada et al. The challenges facing IFRS for accounting of cryptocurrencies
CN111179050A (en) Digital bank implementation method and system based on block chain technology
KR20170108903A (en) escrow system .
WO2014098796A1 (en) Systems and methods of an online secured loan manager
KR102468192B1 (en) Blockchain based crowd funding device and method
CN113989040A (en) Asset securitization management method and device
CN114003879A (en) Asset proxy method, device, electronic equipment and storage medium
US20140236793A1 (en) Business And Professional Network System And Method For Identifying Prospective Clients That Are Unlikely To Pay For Professional Services
CN111178826A (en) Consumption financial risk management method based on block chain and cloud platform
Jadhav et al. Ethereum-Based Decentralized Crowdfunding Platform
US20230316841A1 (en) Dynamic voting exchange platform
US11580478B1 (en) Facilitating shareholder voting and associated proxy rights
KR20220066786A (en) Real asset investment method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination