CN107563614A - A kind of business risk appraisal procedure and device - Google Patents
A kind of business risk appraisal procedure and device Download PDFInfo
- Publication number
- CN107563614A CN107563614A CN201710701343.4A CN201710701343A CN107563614A CN 107563614 A CN107563614 A CN 107563614A CN 201710701343 A CN201710701343 A CN 201710701343A CN 107563614 A CN107563614 A CN 107563614A
- Authority
- CN
- China
- Prior art keywords
- risk
- information
- company
- enterprise
- public information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The embodiment of the present invention discloses a kind of business risk appraisal procedure and device, wherein, method includes:Receive the search term of user's input;The Business Name or name matched with the search term is searched in the full dimension public information database of enterprise;Based on the full dimension public information database of the enterprise, risk information corresponding to the matching result is obtained;Critical field is extracted from the risk information, forms the assessment result information for risk warning.The embodiment of the present invention can carry out business risk assessment using public information, for user clear and definite risk warning is provided from multiple data dimensions, improve the accuracy of assessment result, and the integration for passing through public information, allow users to that relevant risk is understood quickly, to make accurate judgement, to reduce the cost that user itself is explored to risk warning demand.
Description
Technical field
The present embodiments relate to risk assessment technology field, and in particular to a kind of business risk appraisal procedure and device.
Background technology
Business risk assesses the important topic of always business professional person concern, and it can help to identify an entity
The adverse events that (such as a factory or Internet firm) may face, think that enterprise or individual make corresponding decision-making and done
Go out favourable guidance.
At present, it is that business risk assessment is carried out by financial statement information mostly in the prior art, but a large amount of enterprises
The financial statement quality of information confidence level of especially medium-sized and small enterprises is relatively low, and typically in addition to listed company, financial statement information
Or industry data seldom can be published to masses as public information.And existing public information is more at random over time and space,
It is not apt to do comprehensive descision.
In consideration of it, how using public information progress business risk assessment, turn into mesh to improve the accuracy of assessment result
The preceding technical issues that need to address.
The content of the invention
Because existing method has above mentioned problem, the embodiment of the present invention proposes a kind of business risk appraisal procedure and device.
In a first aspect, the embodiment of the present invention proposes a kind of business risk appraisal procedure, including:
Receive the search term of user's input;
The Business Name or name matched with the search term is searched in the full dimension public information database of enterprise;
Based on the full dimension public information database of the enterprise, risk information corresponding to the matching result is obtained;
Critical field is extracted from the risk information, forms the assessment result information for risk warning.
Alternatively, the risk information, include but is not limited to:Lawsuit, equity pledge, chattel mortgage, tax arrear bulletin,
Administrative penalty, break the law on a serious scale, manage abnormal, information of breaking one's promise and be performed information.
Alternatively, the matching result includes:Company or people;
Correspondingly, it is described to be based on the full dimension public information database of the enterprise, obtain wind corresponding to the matching result
Dangerous information, including:
If matching result is company, the associated companies of the said firm are obtained, and in the full dimension public information number of the enterprise
The risk information of risk information according to the associated companies that acquired company is searched in storehouse and the company as matching result in itself;
If matching result is people, the associated companies of the people are obtained, and in the full dimension public information database of the enterprise
The risk information of the associated companies of people acquired in middle lookup.
Alternatively, the associated companies of the company, including:The subsidiary of the said firm, parent company, rival firms, invested
Company and upstream company and downstream company.
Alternatively, the associated companies of the people, including:The company invested as shareholder, serve as the public affairs of legal person or senior executive
Department.
Alternatively, if any critical field extracted is corresponding with details link in the risk information, formed
Be used in the assessment result information of risk warning also comprising the details link corresponding to the critical field.
Second aspect, the embodiment of the present invention also propose a kind of business risk apparatus for evaluating, including:
Receiving module, for receiving the search term of user's input;
Matching module, for searching the exabyte matched with the search term in the full dimension public information database of enterprise
Title or name;
Acquisition module, for based on the full dimension public information database of the enterprise, obtaining corresponding to the matching result
Risk information;
Extraction module, for extracting critical field from the risk information, form the assessment result for risk warning
Information.
The third aspect, the embodiment of the present invention also propose a kind of electronic equipment, including:Processor, memory, bus and storage
On a memory and the computer program that can run on a processor;
Wherein, the processor, memory complete mutual communication by the bus;
Described in the computing device above method is realized during computer program.
Fourth aspect, the embodiment of the present invention provide a kind of non-transient computer readable storage medium storing program for executing, the non-transient calculating
Computer program is stored with machine readable storage medium storing program for executing, the computer program realizes the above method when being executed by processor.
As shown from the above technical solution, the search term that the embodiment of the present invention is inputted by receiving user;In the full dimension of enterprise
The Business Name or name matched with the search term is searched in public information database;Disclosed based on the full dimension of the enterprise
Information database, obtain risk information corresponding to the matching result;Critical field is extracted from the risk information, is formed and used
It is user from more numbers thereby, it is possible to carry out business risk assessment using public information in the assessment result information of risk warning
Clear and definite risk warning is provided according to dimension, improves the accuracy of assessment result, and by the integration of public information, make user
Relevant risk can be understood quickly to make accurate judgement, reduce user itself to risk warning demand explored into
This, improves the experience of user.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these figures.
Fig. 1 is a kind of schematic flow sheet for business risk appraisal procedure that one embodiment of the invention provides;
Fig. 2 is a kind of structural representation for business risk apparatus for evaluating that one embodiment of the invention provides;
Fig. 3 is the logic diagram for the electronic equipment that one embodiment of the invention provides.
Embodiment
Below in conjunction with the accompanying drawings, the embodiment of the present invention is further described.Following examples are only used for more
Clearly demonstrate technical scheme, and can not be limited the scope of the invention with this.
Fig. 1 shows a kind of schematic flow sheet for business risk appraisal procedure that one embodiment of the invention provides, such as Fig. 1 institutes
Show, the business risk appraisal procedure of the present embodiment, including:
S101, the search term for receiving user's input.
S102, the Business Name matched with the search term or people are searched in the full dimension public information database of enterprise
Name.
In a particular application, the full dimension public information database of the enterprise, can include:Business Name, substantially industry and commerce
Information, legal person, senior executive, enterprise annual reports, equity structure, enterprise's family tree, investment family tree, intellectual property, recruitment information, tax grading
With risk information etc., the present embodiment is not limited, and can also include enterprise's others open letter according to actual conditions
Breath.Wherein, the senior executive includes:Director, supervisor, manager etc..
S103, based on the full dimension public information database of the enterprise, obtain risk information corresponding to the matching result.
In a particular application, the risk information includes but is not limited to:Lawsuit, equity pledge, chattel mortgage, tax arrear
Bulletin, administrative penalty, break the law on a serious scale, manage abnormal, information of breaking one's promise and be performed information etc., the present embodiment is not limited it
System, can also include other risk informations according to actual conditions.
It should be noted that collected in advance in the full dimension public information database of enterprise and store national enterprise
Every information related to risk of industry (company).
S104, critical field is extracted from the risk information, form the assessment result information for risk warning.
Specifically, the assessment result information can include:Itself risk and periphery risk.Such as, from the risk information
The assessment result information formed after middle extraction critical field can be following forms:
1) itself risk:" the said firm (relevant risk field) " or
2) periphery risk:" the said firm (incidence relation) (associated companies) (relevant risk field) ".
For example, the assessment result information is:
" the said firm Zeng Yinwei fulfills the legal obligation and enforced by law court on time ", the or " ×× of the said firm's investment
× company is the company of breaking one's promise of institute of Supreme People's Court publicity ".
It is understood that the step S104 can form the overview display of corporate risk information, some enterprise is enlightened
Hidden risk, contribute to user to carry out more accurate judgement, confirm that a company or related personnel have risk.
The business risk appraisal procedure of the present embodiment, utilizes a processor to realize, the search term inputted by receiving user;
The Business Name or name matched with the search term is searched in the full dimension public information database of enterprise;Based on the enterprise
The full dimension public information database of industry, obtains risk information corresponding to the matching result;Extract and close from the risk information
Key field, the assessment result information for risk warning is formed, thereby, it is possible to carry out business risk assessment using public information,
Clear and definite risk warning is provided from multiple data dimensions for user, improves the accuracy of assessment result, and pass through open letter
The integration of breath, allow users to that relevant risk is understood quickly to make accurate judgement, reduce user itself and risk is warned
The cost that demand is explored, improve the experience of user.
Further, on the basis of above method embodiment, matching result includes described in the present embodiment:Company or
People;
Correspondingly, above-mentioned steps S103 can include:
If matching result is company, the associated companies of the said firm are obtained, and in the full dimension public information number of the enterprise
The risk information of risk information according to the associated companies that acquired company is searched in storehouse and the company as matching result in itself;
If matching result is people, the associated companies of the people are obtained, and in the full dimension public information database of the enterprise
The risk information of the associated companies of people acquired in middle lookup.
Wherein, the associated companies of the company, can include:The subsidiary of the said firm, parent company, rival firms and thrown
The company of money and upstream company (such as supplier), downstream company (such as agent) etc., the present embodiment is not carried out to it
Limitation, can also include company's others associated companies according to actual conditions.
Wherein, the associated companies of the people, can include:The company invested as shareholder, serve as legal person or senior executive
Company etc., the present embodiment is not limited, and can also include people's others associated companies according to actual conditions.
It is understood that the associated companies of company/people are included within the limit of consideration of risk assessment, can be easier
Where the hidden risk associated by company/people is seen on ground, and then help to predict possible risk.
Further, on the basis of above method embodiment, if any critical field extracted is believed in the risk
Details link is corresponding with breath, being then used in the assessment result information of risk warning for being formed is also right comprising critical field institute
The details link answered.
It is understood that being linked based on the details, user can be made to further appreciate that corresponding to details link
The particular content of a certain risk described by critical field.
The business risk appraisal procedure of the present embodiment, can using public information carry out business risk assessment, be user from
Multiple data dimensions provide clear and definite risk warning, improve the accuracy of assessment result, and by the integration of public information,
Allow users to that relevant risk is understood quickly to make accurate judgement, reduce user itself and risk warning demand is visited
The cost of rope, improve the experience of user.
Fig. 2 shows a kind of structural representation for business risk apparatus for evaluating that one embodiment of the invention provides, such as Fig. 2 institutes
Show, the business risk apparatus for evaluating of the present embodiment, including:Receiving module 21, matching module 22, acquisition module 23 and extraction module
24;Wherein:
The receiving module 21, for receiving the search term of user's input;
The matching module 22, for searching what is matched with the search term in the full dimension public information database of enterprise
Business Name or name;
The acquisition module 23, for based on the full dimension public information database of the enterprise, obtaining the matching result
Corresponding risk information;
The extraction module 24, for extracting critical field from the risk information, form commenting for risk warning
Estimate object information.
Specifically, the receiving module 21 receives the search term of user's input;The matching module 22 is in the full dimension of enterprise
The Business Name or name matched with the search term is searched in public information database;The acquisition module 23 is based on described
The full dimension public information database of enterprise, obtains risk information corresponding to the matching result;The extraction module 24 is from described
Critical field is extracted in risk information, forms the assessment result information for risk warning.
In a particular application, the full dimension public information database of the enterprise, can include:Business Name, substantially industry and commerce
Information, legal person, senior executive, enterprise annual reports, equity structure, enterprise's family tree, investment family tree, intellectual property, recruitment information, tax grading
With risk information etc., the present embodiment is not limited, and can also include enterprise's others open letter according to actual conditions
Breath.Wherein, the senior executive includes:Director, supervisor, manager etc..
It should be noted that collected in advance in the full dimension public information database of enterprise and store national enterprise
Every information related to risk of industry (company).
In a particular application, the risk information includes but is not limited to:Lawsuit, equity pledge, chattel mortgage, tax arrear
Bulletin, administrative penalty, break the law on a serious scale, manage abnormal, information of breaking one's promise and be performed information etc., the present embodiment is not limited it
System, can also include other risk informations according to actual conditions.
Specifically, the assessment result information can include:Itself risk and periphery risk.Such as, from the risk information
The assessment result information formed after middle extraction critical field can be following forms:
1) itself risk:" the said firm (relevant risk field) " or
2) periphery risk:" the said firm (incidence relation) (associated companies) (relevant risk field) ".
It is understood that the extraction module 24 can form the overview display of corporate risk information, some enterprise is enlightened
The hidden risk of industry, contribute to user to carry out more accurate judgement, confirm that a company or related personnel have risk.
The business risk apparatus for evaluating of the present embodiment, can using public information carry out business risk assessment, be user from
Multiple data dimensions provide clear and definite risk warning, improve the accuracy of assessment result, and by the integration of public information,
Allow users to that relevant risk is understood quickly to make accurate judgement, reduce user itself and risk warning demand is visited
The cost of rope, improve the experience of user.
Further, on the basis of above method embodiment, matching result includes described in the present embodiment:Company or
People;
Correspondingly, the acquisition module 23, can be specifically used for
If matching result is company, the associated companies of the said firm are obtained, and in the full dimension public information number of the enterprise
The risk information of risk information according to the associated companies that acquired company is searched in storehouse and the company as matching result in itself;
If matching result is people, the associated companies of the people are obtained, and in the full dimension public information database of the enterprise
The risk information of the associated companies of people acquired in middle lookup.
Wherein, the associated companies of the company, can include:The subsidiary of the said firm, parent company, rival firms, thrown
The company of money and upstream company (such as supplier) and downstream company (such as agent), the present embodiment are not carried out to it
Limitation, can also include company's others associated companies according to actual conditions.
Wherein, the associated companies of the people, can include:The company invested as shareholder, serve as legal person or senior executive
Company etc., the present embodiment is not limited, and can also include people's others associated companies according to actual conditions.
It is understood that the associated companies of company/people are included within the limit of consideration of risk assessment, can be easier
Where the hidden risk associated by company/people is seen on ground, and then help to predict possible risk.
Further, on the basis of above method embodiment, if any critical field extracted is believed in the risk
Details link is corresponding with breath, then what the extraction module 24 was formed is used in the assessment result information of risk warning also include
Details link corresponding to the critical field.
It is understood that being linked based on the details, user can be made to further appreciate that corresponding to details link
The particular content of a certain risk described by critical field.
The business risk apparatus for evaluating of the present embodiment, can using public information carry out business risk assessment, be user from
Multiple data dimensions provide clear and definite risk warning, improve the accuracy of assessment result, and by the integration of public information,
Allow users to that relevant risk is understood quickly to make accurate judgement, reduce user itself and risk warning demand is visited
The cost of rope, improve the experience of user.
The business risk apparatus for evaluating of the present embodiment, it can be used for the technical scheme for performing preceding method embodiment, in fact
Existing principle is similar with technique effect, and here is omitted.
Fig. 3 shows the entity structure schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention, as shown in figure 3, should
Electronic equipment can include:Processor 11, memory 12, bus 13 and it is stored on memory 12 and can be transported on processor 11
Capable computer program;
Wherein, the processor 11, memory 12 complete mutual communication by the bus 13;
The processor 11 realizes the method that above-mentioned each method embodiment is provided when performing the computer program, such as
Including:Receive the search term of user's input;Search what is matched with the search term in the full dimension public information database of enterprise
Business Name or name;Based on the full dimension public information database of the enterprise, risk corresponding to the matching result is obtained
Information;Critical field is extracted from the risk information, forms the assessment result information for risk warning.
The embodiment of the present invention provides a kind of non-transient computer readable storage medium storing program for executing, is stored thereon with computer program, should
Realize the method that above-mentioned each method embodiment is provided when computer program is executed by processor, such as including:It is defeated to receive user
The search term entered;The Business Name matched with the search term or people are searched in the full dimension public information database of enterprise
Name;Based on the full dimension public information database of the enterprise, risk information corresponding to the matching result is obtained;From the risk
Critical field is extracted in information, forms the assessment result information for risk warning.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, apparatus or computer program
Product.Therefore, the application can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the application can use the computer for wherein including computer usable program code in one or more
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The application be with reference to according to the method, apparatus of the embodiment of the present application and the flow chart of computer program product and/or
Block diagram describes.It should be understood that can by each flow in computer program instructions implementation process figure and/or block diagram and/or
Square frame and the flow in flow chart and/or block diagram and/or the combination of square frame.These computer program instructions can be provided to arrive
All-purpose computer, special-purpose computer, the processor of Embedded Processor or other programmable data processing devices are to produce one
Machine so that produced by the instruction of computer or the computing device of other programmable data processing devices and flowed for realizing
The device/system for the function of being specified in one flow of journey figure or multiple flows and/or one square frame of block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality
Body or operation make a distinction with another entity or operation, and not necessarily require or imply and deposited between these entities or operation
In any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to
Nonexcludability includes, so that process, method, article or equipment including a series of elements not only will including those
Element, but also the other element including being not expressly set out, or it is this process, method, article or equipment also to include
Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that
Other identical element also be present in process, method, article or equipment including the key element.Term " on ", " under " etc. refers to
The orientation or position relationship shown is based on orientation shown in the drawings or position relationship, is for only for ease of the description present invention and simplifies
Description, rather than the device or element of instruction or hint meaning must have specific orientation, with specific azimuth configuration and behaviour
Make, therefore be not considered as limiting the invention.Unless otherwise clearly defined and limited, term " installation ", " connected ",
" connection " should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected, or be integrally connected;Can be
Mechanically connect or electrically connect;Can be joined directly together, can also be indirectly connected by intermediary, can be two
The connection of element internal.For the ordinary skill in the art, above-mentioned term can be understood at this as the case may be
Concrete meaning in invention.
In the specification of the present invention, numerous specific details are set forth.Although it is understood that embodiments of the invention can
To be put into practice in the case of these no details.In some instances, known method, structure and skill is not been shown in detail
Art, so as not to obscure the understanding of this description.Similarly, it will be appreciated that disclose in order to simplify the present invention and helps to understand respectively
One or more of individual inventive aspect, in the description to the exemplary embodiment of the present invention above, each spy of the invention
Sign is grouped together into single embodiment, figure or descriptions thereof sometimes.However, should not be by the method solution of the disclosure
Release and be intended in reflection is following:I.e. the present invention for required protection requirement is than the feature that is expressly recited in each claim more
More features.More precisely, as the following claims reflect, inventive aspect is to be less than single reality disclosed above
Apply all features of example.Therefore, it then follows thus claims of embodiment are expressly incorporated in the embodiment,
Wherein each claim is in itself as separate embodiments of the invention.It should be noted that in the case where not conflicting, this
The feature in embodiment and embodiment in application can be mutually combined.The invention is not limited in any single aspect,
Any single embodiment is not limited to, is also not limited to any combination and/or the displacement of these aspects and/or embodiment.And
And can be used alone the present invention each aspect and/or embodiment or with other one or more aspects and/or its implementation
Example is used in combination.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent
The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to
The technical scheme described in foregoing embodiments can so be modified, either which part or all technical characteristic are entered
Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology
The scope of scheme, it all should cover among the claim of the present invention and the scope of specification.
Claims (9)
- A kind of 1. business risk appraisal procedure, it is characterised in that including:Receive the search term of user's input;The Business Name or name matched with the search term is searched in the full dimension public information database of enterprise;Based on the full dimension public information database of the enterprise, risk information corresponding to the matching result is obtained;Critical field is extracted from the risk information, forms the assessment result information for risk warning.
- 2. according to the method for claim 1, it is characterised in that the risk information, include but is not limited to:Lawsuit, Equity pledge, chattel mortgage, owe taxes bulletin, administrative penalty, break the law on a serious scale, manage abnormal, information of breaking one's promise and be performed information.
- 3. according to the method for claim 1, it is characterised in that the matching result includes:Company or people;Correspondingly, it is described to be based on the full dimension public information database of the enterprise, obtain risk corresponding to the matching result and believe Breath, including:If matching result is company, the associated companies of the said firm are obtained, and in the full dimension public information database of the enterprise The risk information of the associated companies of company acquired in middle lookup and company's risk information in itself as matching result;If matching result is people, the associated companies of the people are obtained, and looked into the full dimension public information database of the enterprise Look for the risk information of the associated companies of acquired people.
- 4. according to the method for claim 3, it is characterised in that the associated companies of the company, including:The son of the said firm is public Department, parent company, rival firms, the company invested and upstream company and downstream company.
- 5. according to the method for claim 3, it is characterised in that the associated companies of the people, including:Invested as shareholder Company, serve as the company of legal person or senior executive.
- 6. according to the method any one of claim 1-5, it is characterised in that if any critical field extracted is in institute State and details link is corresponding with risk information, then also include the key in the assessment result information for being used for risk and warning formed Details link corresponding to field.
- A kind of 7. business risk apparatus for evaluating, it is characterised in that including:Receiving module, for receiving the search term of user's input;Matching module, for searched in the full dimension public information database of enterprise the Business Name that is matched with the search term or Person's name;Acquisition module, for based on the full dimension public information database of the enterprise, obtaining risk corresponding to the matching result Information;Extraction module, for extracting critical field from the risk information, form the assessment result information for risk warning.
- 8. a kind of electronic equipment, it is characterised in that including:Processor, memory, bus and storage on a memory and can located The computer program run on reason device;Wherein, the processor, memory complete mutual communication by the bus;The method as any one of claim 1-6 is realized described in the computing device during computer program.
- 9. a kind of non-transient computer readable storage medium storing program for executing, it is characterised in that on the non-transient computer readable storage medium storing program for executing Computer program is stored with, the side as any one of claim 1-6 is realized when the computer program is executed by processor Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710701343.4A CN107563614A (en) | 2017-08-16 | 2017-08-16 | A kind of business risk appraisal procedure and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710701343.4A CN107563614A (en) | 2017-08-16 | 2017-08-16 | A kind of business risk appraisal procedure and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107563614A true CN107563614A (en) | 2018-01-09 |
Family
ID=60975452
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710701343.4A Pending CN107563614A (en) | 2017-08-16 | 2017-08-16 | A kind of business risk appraisal procedure and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107563614A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108520334A (en) * | 2018-03-15 | 2018-09-11 | 考拉征信服务有限公司 | A kind of occupation reference method and apparatus |
CN108710998A (en) * | 2018-05-03 | 2018-10-26 | 苏州朗动网络科技有限公司 | Industrial Data Management method, apparatus, computer equipment and storage medium |
CN109003209A (en) * | 2018-07-06 | 2018-12-14 | 苏州昶彭知识产权运营有限公司 | Intellectual property lawsuit case management system |
CN109523117A (en) * | 2018-10-11 | 2019-03-26 | 平安科技(深圳)有限公司 | Risk Forecast Method, device, computer equipment and storage medium |
CN109657914A (en) * | 2018-11-19 | 2019-04-19 | 平安科技(深圳)有限公司 | Information-pushing method, device, computer equipment and storage medium |
CN109741035A (en) * | 2019-01-03 | 2019-05-10 | 深圳壹账通智能科技有限公司 | Data processing method, device, computer equipment and storage medium |
CN110033159A (en) * | 2019-02-27 | 2019-07-19 | 阿里巴巴集团控股有限公司 | Risk Identification Method, device and equipment |
CN110246032A (en) * | 2019-06-21 | 2019-09-17 | 深圳前海微众银行股份有限公司 | Risk monitoring and control method, apparatus and computer readable storage medium after loan |
CN110738498A (en) * | 2018-07-19 | 2020-01-31 | 北京国双科技有限公司 | Client risk identification method and device |
CN114730444A (en) * | 2019-11-06 | 2022-07-08 | 三菱电机楼宇解决方案株式会社 | User evaluation index calculation method and user evaluation index calculation device for buildings |
CN115689716A (en) * | 2022-12-15 | 2023-02-03 | 浙江汇信科技有限公司 | Enterprise credit risk assessment method based on big data technology |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102005017A (en) * | 2010-12-13 | 2011-04-06 | 苏州德融嘉信信用管理技术有限公司 | Client information inquiry method based on credit management system |
CN103679477A (en) * | 2013-12-13 | 2014-03-26 | 苏州网信工商信用服务有限公司 | Enterprise credit assessment system and method |
CN105512815A (en) * | 2015-11-30 | 2016-04-20 | 安徽融信金模信息技术有限公司 | Enterprise risk assessment system |
CN105677726A (en) * | 2015-12-29 | 2016-06-15 | 上海律巢网络科技有限公司 | Data search and result presenting method and system |
CN106530078A (en) * | 2016-11-29 | 2017-03-22 | 流量海科技成都有限公司 | Loan risk early warning method and system based on multi-industry data |
-
2017
- 2017-08-16 CN CN201710701343.4A patent/CN107563614A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102005017A (en) * | 2010-12-13 | 2011-04-06 | 苏州德融嘉信信用管理技术有限公司 | Client information inquiry method based on credit management system |
CN103679477A (en) * | 2013-12-13 | 2014-03-26 | 苏州网信工商信用服务有限公司 | Enterprise credit assessment system and method |
CN105512815A (en) * | 2015-11-30 | 2016-04-20 | 安徽融信金模信息技术有限公司 | Enterprise risk assessment system |
CN105677726A (en) * | 2015-12-29 | 2016-06-15 | 上海律巢网络科技有限公司 | Data search and result presenting method and system |
CN106530078A (en) * | 2016-11-29 | 2017-03-22 | 流量海科技成都有限公司 | Loan risk early warning method and system based on multi-industry data |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108520334A (en) * | 2018-03-15 | 2018-09-11 | 考拉征信服务有限公司 | A kind of occupation reference method and apparatus |
CN108710998A (en) * | 2018-05-03 | 2018-10-26 | 苏州朗动网络科技有限公司 | Industrial Data Management method, apparatus, computer equipment and storage medium |
CN109003209A (en) * | 2018-07-06 | 2018-12-14 | 苏州昶彭知识产权运营有限公司 | Intellectual property lawsuit case management system |
CN110738498A (en) * | 2018-07-19 | 2020-01-31 | 北京国双科技有限公司 | Client risk identification method and device |
CN109523117A (en) * | 2018-10-11 | 2019-03-26 | 平安科技(深圳)有限公司 | Risk Forecast Method, device, computer equipment and storage medium |
CN109657914A (en) * | 2018-11-19 | 2019-04-19 | 平安科技(深圳)有限公司 | Information-pushing method, device, computer equipment and storage medium |
CN109741035A (en) * | 2019-01-03 | 2019-05-10 | 深圳壹账通智能科技有限公司 | Data processing method, device, computer equipment and storage medium |
CN110033159A (en) * | 2019-02-27 | 2019-07-19 | 阿里巴巴集团控股有限公司 | Risk Identification Method, device and equipment |
CN110246032A (en) * | 2019-06-21 | 2019-09-17 | 深圳前海微众银行股份有限公司 | Risk monitoring and control method, apparatus and computer readable storage medium after loan |
CN114730444A (en) * | 2019-11-06 | 2022-07-08 | 三菱电机楼宇解决方案株式会社 | User evaluation index calculation method and user evaluation index calculation device for buildings |
CN115689716A (en) * | 2022-12-15 | 2023-02-03 | 浙江汇信科技有限公司 | Enterprise credit risk assessment method based on big data technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107563614A (en) | A kind of business risk appraisal procedure and device | |
Jamilov et al. | The anatomy of cyber risk | |
Abukhzam et al. | Factors affecting bank staff attitude towards E‐banking adoption in Libya | |
Hardy | Enterprise risk management: A guide for government professionals | |
Yoon et al. | Protocol to enhance profitability by managing risks in construction projects | |
AU2017200099A1 (en) | Expense report management methods and apparatus | |
Ameen et al. | A systematic strategy for harnessing financial information systems in fighting corruption electronically | |
US20210209689A1 (en) | Computerized System and Method of Navigating Data With Tree Structure Visualization Using Segmented Access Rights | |
Yarovenko | Evaluating the threat to national information security | |
Drimmer | Human rights and the extractive industries: Litigation and compliance trends | |
Kunreuther et al. | Mastering catastrophic risk: How companies are coping with disruption | |
US8738492B1 (en) | Displaying status of and facilitating compliance with regulatory requirements related to municipal bonds | |
Othman et al. | Driving the Development of Smes’ Entrepreneurs in the Era of Digitalisation: From the Dynamic Perspective of Law Enforcement in Malaysia | |
CN109214714A (en) | Asset-liabilities early warning analysis method, apparatus and computer readable storage medium | |
CN107172311B (en) | Service evaluation method and terminal equipment | |
Lyu et al. | Market segmentation and firm survival | |
WO2010019461A2 (en) | Method and apparatus for critical infrastructure protection | |
Smith et al. | Enforcing the rules: Government and citizen oversight of Mining | |
Lenz | Accounting scandals in Germany | |
Unegbu et al. | Identification of false financial statements: A pre-ante tool for investment decisions, solvency analysis and bankruptcy predictions | |
US8676699B2 (en) | System and method for risk monitoring of rated legal entities | |
Matsudaira | Customs Administration and Digitalization | |
CN112598499A (en) | Method and device for determining credit limit | |
Betz et al. | Economic Regulation and Corporate Governance: The Case of Wirecard | |
Authority | General information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180109 |
|
RJ01 | Rejection of invention patent application after publication |