CN116402621A - Bottom asset penetration management method and system based on blockchain and artificial intelligence - Google Patents
Bottom asset penetration management method and system based on blockchain and artificial intelligence Download PDFInfo
- Publication number
- CN116402621A CN116402621A CN202310341838.6A CN202310341838A CN116402621A CN 116402621 A CN116402621 A CN 116402621A CN 202310341838 A CN202310341838 A CN 202310341838A CN 116402621 A CN116402621 A CN 116402621A
- Authority
- CN
- China
- Prior art keywords
- asset
- blockchain
- report
- penetration management
- penetration
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000007726 management method Methods 0.000 title claims abstract description 117
- 230000035515 penetration Effects 0.000 title claims abstract description 116
- 238000013473 artificial intelligence Methods 0.000 title claims abstract description 31
- 238000012545 processing Methods 0.000 claims description 48
- 238000005516 engineering process Methods 0.000 claims description 44
- 238000004458 analytical method Methods 0.000 claims description 42
- 238000000034 method Methods 0.000 claims description 25
- 238000004590 computer program Methods 0.000 claims description 14
- 238000011156 evaluation Methods 0.000 claims description 12
- 238000012549 training Methods 0.000 claims description 10
- 230000000977 initiatory effect Effects 0.000 claims description 8
- 238000012937 correction Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 9
- 238000012986 modification Methods 0.000 description 7
- 230000004048 modification Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 238000012544 monitoring process Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 230000001276 controlling effect Effects 0.000 description 2
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 229910052799 carbon Inorganic materials 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Asset management; Financial planning or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
- G06F16/2471—Distributed queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- Databases & Information Systems (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Computing Systems (AREA)
- Game Theory and Decision Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Operations Research (AREA)
- Fuzzy Systems (AREA)
- Mathematical Physics (AREA)
- Probability & Statistics with Applications (AREA)
- Software Systems (AREA)
- Computational Linguistics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to the technical field of asset management, in particular to a bottom asset penetration management method and system based on blockchain and artificial intelligence.
Description
Technical Field
The invention relates to the technical field of asset management, in particular to a bottom asset penetration management method and system based on blockchain and artificial intelligence.
Background
The underlying asset concept is inundated with financial innovations and is only frequently appeared in financial regulatory policies in recent years; the penetration is reduction, the original and original purpose is found, and the disguise of the indication is uncovered, so that the investment funds are prevented from being greasy due to the operation of a camera bellows such as period mismatch, mixed operation and the like, the risks are managed and controlled, and the benefits of investors are protected; in terms of administration, banking financial products and asset securitization projects are generally required to penetrate into the underlying assets.
In the financial industry, the bottom layer asset penetration management is a very important ring, and in the traditional bottom layer asset penetration management, risks are managed and benefits of investors are protected; in terms of administration, banking financial products and asset securitization projects are generally required to penetrate into the underlying assets.
However, the conventional underlying asset penetration informatization system has problems of asymmetric information, low management efficiency and the like, which results in that underlying asset penetration management becomes difficult and complicated and risks easily occur, and particularly, in the conventional underlying asset penetration management, a great deal of time and labor are often required to be invested for investigation and verification due to the opacity and the unreliability of information, so that the management efficiency is low, and meanwhile, due to the asymmetry of information, the language conversion and the link in the asset and investment fields have variability, so that investors are difficult to comprehensively know the real condition of the underlying asset by using the investment perspective system, so that the investment risk is increased.
Disclosure of Invention
Aiming at the problems of asymmetric information, low management efficiency and the like in the traditional underlying asset penetration management, the underlying asset penetration management becomes difficult and complicated. With the development of blockchain and artificial intelligence technology, the efficiency and precision of the underlying asset penetration management can be improved by linking the underlying asset information up and analyzing by using the artificial intelligence technology.
In order to achieve the above purpose, the present invention provides the following technical solutions:
the invention discloses a bottom asset penetration management method based on a blockchain and artificial intelligent content generation technology, which comprises the following steps:
s1: the bottom asset information of the asset generator is uplink according to the blockchain technology;
s2: analyzing and processing the historical asset evaluation report to obtain an analysis and processing result, and simultaneously uploading the original file and the analysis and processing result;
s3: starting model training and tuning, generating an asset penetration management report generation model according to the data of the asset evaluation report, and uploading the asset penetration management report generation model to the blockchain;
s4: initiating an asset penetration management report generation service, loading the asset penetration management report generation model from the blockchain;
s5: triggering analysis processing service after the new bottom asset information of the asset generator is uplink according to the new bottom asset information of the asset generator, and uplink the analysis processing result;
s6: invoking the asset penetration report generation service, generating an asset penetration management report according to the analysis processing result, and linking;
s7: and the internal personnel conduct auditing and error correction according to the report inquiring system of the blockchain to obtain an approval result, and the approval result is issued and updated to the asset penetration management report.
As a preferred real-time aspect of the present invention, the underlying asset information includes loan contract information, repayment information, asset assessment information, and the like.
As a preferred real-time aspect of the present invention, the asset assessment report includes an asset service report, a risk report, a market analysis report, and the like.
As a preferred real-time aspect of the present invention, investment institutions, third party institutions view the asset penetration management report via the blockchain download.
As a preferred real-time scheme of the present invention, the asset penetration management report generating service is initiated in step S4, different types of asset penetration management reports are generated through artificial intelligence content technology, and the asset penetration management report generating model is loaded from the blockchain.
As a preferred real-time scheme of the invention, the underlying asset information uplink of the asset generator is realized by intelligent contract technology.
The invention also discloses a bottom asset penetration management system based on the blockchain and the artificial intelligent content generation technology, which comprises:
the information acquisition system is used for linking the bottom asset information of the asset generation party according to the blockchain technology; the analysis processing system is used for carrying out analysis processing on the historical asset evaluation report to obtain an analysis processing result, and simultaneously uploading the original file and the analysis processing result; the model training generation system is used for starting model training and tuning, generating an asset penetration management report generation model according to the data of the asset evaluation report, and uploading the asset penetration management report generation model to the blockchain; the service loading system is used for initiating an asset penetration management report generating service, loading the asset penetration management report generating model from the blockchain, triggering an analysis processing service after the new bottom asset information of the asset generator is uplink, uploading the analysis processing result, calling the asset penetration report generating service, generating an asset penetration management report according to the analysis processing result, and uplink; and the report inquiry system is used for auditing and correcting errors by internal personnel according to the asset penetration management report to obtain an approval result, and issuing and updating the asset penetration management report by the approval result.
As a preferred real-time scheme of the present invention, further comprising: the report downloading system is used for the investment institutions and third-party institutions to download and check the asset penetration management report through the blockchain.
As a preferred real-time scheme of the invention, the service loading system is used for initiating an asset penetration management report generating service, generating asset penetration management reports of different types through artificial intelligence content technology, and loading the asset penetration management report generating model from the blockchain.
As a preferable real-time scheme of the invention, the information acquisition system realizes automatic acquisition of the bottom asset information of the asset generator through an intelligent contract technology.
The present invention discloses a computer readable medium having stored thereon a computer program which when executed by a processor implements the underlying asset penetration management method based on blockchain and artificial intelligence content generation technology as claimed in any of claims 1 to 6.
The invention discloses a computer device comprising a memory for storing information including program instructions and a processor for controlling execution of the program instructions, which when loaded and executed by the processor implement the underlying asset penetration management method based on blockchain and artificial intelligence content generation technology of any of claims 1 to 6.
One or more technical schemes provided by the invention have at least the following technical effects or advantages:
the invention links the information of the bottom layer asset through the blockchain technology, automatically generates asset penetration management reports of different types through real-time monitoring of asset penetration management reports by utilizing the artificial intelligent content technology, realizes automatic asset penetration monitoring and management by combining the intelligent contract technology, enables clients to master the state of the asset at any time, timely adjusts and optimizes, meets different requirements of the clients, ensures the authenticity and non-tamper modification of the information, avoids the problems of asymmetric information, low management efficiency and the like, reduces the risk of the bottom layer asset penetration management, and improves the management efficiency.
The foregoing description is only an overview of the technical solutions of the present application, and may be implemented according to the content of the specification in order to make the technical means of the present application more clearly understood, and in order to make the above-mentioned and other objects, features and advantages of the present application more clearly understood, the following detailed description of the present application will be given.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a method for underlying asset penetration management based on blockchain and artificial intelligence content generation techniques provided by the present invention.
FIG. 2 is a flow chart of a method for underlying asset penetration management based on blockchain and artificial intelligence content generation techniques provided by the present invention.
FIG. 3 is a block chain and artificial intelligence content generation technology based framework diagram of an underlying asset penetration management system in accordance with the present invention.
Fig. 4 is a schematic structural diagram of a computer device according to the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention.
Thus, the following detailed description of the embodiments of the invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1-4, the invention provides a bottom asset penetration management method and system based on blockchain and artificial intelligence, which links bottom asset information by blockchain technology, automatically generates different types of asset penetration management reports by real-time monitoring of asset penetration management reports and by artificial intelligence content technology, realizes automatic asset penetration monitoring and management by combining intelligent contract technology, enables clients to master the status of assets at any time, adjusts and optimizes in time, meets different requirements of clients better, ensures the authenticity and non-tamper modification of information, avoids the problems of information asymmetry, low management efficiency and the like, reduces the risk of bottom asset penetration management, improves the management efficiency, and specifically comprises:
as shown in fig. 1 and 2, the present invention provides an underlying asset penetration management method based on blockchain and artificial intelligence content generation technology, comprising the steps of:
s1: the bottom asset information of the asset generator is uplink according to the blockchain technology;
s2: analyzing and processing the historical asset evaluation report to obtain an analysis and processing result, and simultaneously uploading the original file and the analysis and processing result;
s3: starting model training and tuning, generating an asset penetration management report generation model according to the data of the asset evaluation report, and uploading the asset penetration management report generation model to the blockchain;
s4: initiating an asset penetration management report generation service, loading the asset penetration management report generation model from the blockchain;
s5: triggering analysis processing service after the new bottom asset information of the asset generator is uplink according to the new bottom asset information of the asset generator, and uplink the analysis processing result;
s6: invoking the asset penetration report generation service, generating an asset penetration management report according to the analysis processing result, and linking;
s7: and the internal personnel conduct auditing and error correction according to the report inquiring system of the blockchain to obtain an approval result, and the approval result is issued and updated to the asset penetration management report.
Specifically, the bottom asset information of the resource generating party is uplink through a blockchain technology, including loan contract information, repayment information, asset assessment information and the like, historical asset service reports, risk reports, market analysis reports and the like are subjected to data deduplication and standardization processing, original files and results are simultaneously uplink, model training and tuning are started, asset penetration management report generation models are generated based on asset assessment report data, the models are uploaded to a blockchain, asset penetration management report generation services are initiated, report generation models are loaded from the blockchain, after a new batch of bottom assets are uplink, analysis services are triggered, the results are uplink, asset penetration report generation services are called, asset penetration management reports are generated according to analysis results, and are uplink, and staff in the interior conduct auditing and error correction from a blockchain-based report query system, and update reports are released after approval
In an embodiment of the present invention, the underlying asset information includes loan contract information, repayment information, asset assessment information, and the like.
In an embodiment of the invention, the asset assessment report includes an asset service report, a risk report, a market analysis report, and the like.
In an embodiment of the invention, investment institutions and third party institutions view the asset penetration management report through the blockchain download.
In the embodiment of the present invention, an asset penetration management report generation service is initiated in step S4, different types of asset penetration management reports are generated by artificial intelligence content technology, the asset penetration management report generation model is loaded from the blockchain, and the different types of asset penetration management reports satisfy more demands of clients.
In the embodiment of the invention, the bottom asset information uplink of the asset generation party is realized by an intelligent contract technology.
As shown in FIG. 3, the present invention also provides an underlying asset penetration management system based on blockchain and artificial intelligence content generation technology, comprising:
the information acquisition system is used for linking the bottom asset information of the asset generation party according to the blockchain technology; the analysis processing system is used for carrying out analysis processing on the historical asset evaluation report to obtain an analysis processing result, and simultaneously uploading the original file and the analysis processing result; the model training generation system is used for starting model training and tuning, generating an asset penetration management report generation model according to the data of the asset evaluation report, and uploading the asset penetration management report generation model to the blockchain; the service loading system is used for initiating an asset penetration management report generating service, loading the asset penetration management report generating model from the blockchain, triggering an analysis processing service after the new bottom asset information of the asset generator is uplink, uploading the analysis processing result, calling the asset penetration report generating service, generating an asset penetration management report according to the analysis processing result, and uplink; and the report inquiry system is used for auditing and correcting errors by internal personnel according to the asset penetration management report to obtain an approval result, and issuing and updating the asset penetration management report by the approval result.
In an embodiment of the present invention, the method further includes: the report downloading system is used for the investment institutions and third-party institutions to download and check the asset penetration management report through the blockchain.
In the embodiment of the invention, the service loading system is used for initiating an asset penetration management report generating service, generating asset penetration management reports of different types by artificial intelligence content technology, loading the asset penetration management report generating model from the blockchain, and enabling the asset penetration management reports of different types to meet more requirements of clients.
In the embodiment of the invention, the information acquisition system automatically acquires the bottom asset information of the asset generator through an intelligent contract technology.
The embodiment of the invention provides a computer device, which comprises a memory and a processor, wherein the memory is used for storing information comprising program instructions, the processor is used for controlling the execution of the program instructions, and the program instructions realize the steps of the embodiment of the carbon asset financing management method when being loaded and executed by the processor.
As shown in fig. 4, which shows a schematic structural diagram of a computer device 600 suitable for implementing an embodiment of the present application, the computer device 600 includes a Central Processing Unit (CPU) 601 that can perform various appropriate operations and processes according to a program stored in a Read Only Memory (ROM) 602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. In the RAM603, various programs and data required for the operation of the computer device 600 are also stored. The CPU601, ROM602, and RAM603 are connected to each other through a bus 604. An input/output (I/O) interface 605 is also connected to bus 604. The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, mouse, etc.; an output portion 607 including a Cathode Ray Tube (CRT), a liquid crystal feedback device (LCD), and the like, and a speaker, and the like; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The drive 610 is also connected to the I/O interface 605 as needed. Removable media 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on drive 610 as needed, so that a computer program read therefrom is mounted as needed as storage section 608.
In particular, according to embodiments of the present invention, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present invention include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method shown in the flowchart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication portion 609, and/or installed from the removable medium 611.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transshipment) such as modulated data signals and carrier waves.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each element may be implemented in one or more software and/or hardware elements when implemented in the present application.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
The data acquisition, storage, use, processing and the like in the technical scheme meet the relevant regulations of national laws and regulations.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
Although the present application has been described in connection with specific features and embodiments thereof, it will be apparent that various modifications and combinations can be made without departing from the spirit and scope of the application. Accordingly, the specification and figures are merely exemplary illustrations of the present application and are considered to cover any and all modifications, variations, combinations, or equivalents that fall within the scope of the present application. It will be apparent to those skilled in the art that various modifications and variations can be made in the present application without departing from the scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the present application and the equivalents thereof, the present application is intended to cover such modifications and variations.
Claims (12)
1. An underlying asset penetration management method based on blockchain and artificial intelligence content generation technology is characterized by comprising the following steps:
s1: the bottom asset information of the asset generator is uplink according to the blockchain technology;
s2: analyzing and processing the historical asset evaluation report to obtain an analysis and processing result, and simultaneously uploading the original file and the analysis and processing result;
s3: starting model training and tuning, generating an asset penetration management report generation model according to the data of the asset evaluation report, and uploading the asset penetration management report generation model to the blockchain;
s4: initiating an asset penetration management report generation service, loading the asset penetration management report generation model from the blockchain;
s5: triggering analysis processing service after the new bottom asset information of the asset generator is uplink according to the new bottom asset information of the asset generator, and uplink the analysis processing result;
s6: invoking the asset penetration report generation service, generating an asset penetration management report according to the analysis processing result, and linking;
s7: and the internal personnel conduct auditing and error correction according to the report inquiring system of the blockchain to obtain an approval result, and the approval result is issued and updated to the asset penetration management report.
2. The method of claim 1, wherein the underlying asset information includes loan contract information, repayment information, asset assessment information, etc.
3. The method for underlying asset penetration management based on blockchain and artificial intelligence content generation technology of claim 1, wherein the asset assessment report comprises an asset service report, a risk report, a market analysis report, etc.
4. The method for underlying asset penetration management based on blockchain and artificial intelligence content generation technology of claim 1, wherein investment institutions, third party institutions view the asset penetration management report via the blockchain download.
5. The method according to claim 1, wherein the asset penetration management report generating service is initiated in step S4, different types of asset penetration management reports are generated by artificial intelligence content technology, and the asset penetration management report generating model is loaded from the blockchain.
6. The method for underlying asset penetration management based on blockchain and artificial intelligence content generation techniques of claim 1, wherein the underlying asset information uplink of the asset generator is implemented by intelligent contract techniques.
7. An underlying asset penetration management system based on blockchain and artificial intelligence content generation technology, comprising:
the information acquisition system is used for linking the bottom asset information of the asset generation party according to the blockchain technology; the analysis processing system is used for carrying out analysis processing on the historical asset evaluation report to obtain an analysis processing result, and simultaneously uploading the original file and the analysis processing result; the model training generation system is used for starting model training and tuning, generating an asset penetration management report generation model according to the data of the asset evaluation report, and uploading the asset penetration management report generation model to the blockchain; the service loading system is used for initiating an asset penetration management report generating service, loading the asset penetration management report generating model from the blockchain, triggering an analysis processing service after the new bottom asset information of the asset generator is uplink, uploading the analysis processing result, calling the asset penetration report generating service, generating an asset penetration management report according to the analysis processing result, and uplink; and the report inquiry system is used for auditing and correcting errors by internal personnel according to the asset penetration management report to obtain an approval result, and issuing and updating the asset penetration management report by the approval result.
8. The blockchain and artificial intelligence content generation technology based underlying asset penetration management system of claim 7, further comprising: the report downloading system is used for the investment institutions and third-party institutions to download and check the asset penetration management report through the blockchain.
9. The underlying asset penetration management system based on blockchain and artificial intelligence content generation technology of claim 7, wherein the service loading system is configured to initiate asset penetration management report generation services, generate different types of asset penetration management reports via artificial intelligence content technology, and load the asset penetration management report generation model from the blockchain.
10. The system for underlying asset penetration management based on blockchain and artificial intelligence content generation technology of claim 7, wherein the information collection system implements automated collection of underlying asset information of the asset generator through intelligent contract technology.
11. A computer readable medium having stored thereon a computer program which when executed by a processor implements the underlying asset penetration management method based on blockchain and artificial intelligence content generation technology as claimed in any of claims 1 to 6.
12. A computer device comprising a memory for storing information including program instructions and a processor for controlling execution of the program instructions, wherein the program instructions when loaded and executed by the processor implement the underlying asset penetration management method based on blockchain and artificial intelligence content generation technology of any of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310341838.6A CN116402621B (en) | 2023-03-28 | 2023-03-28 | Underlying asset penetration management method and system based on blockchain and artificial intelligence content generation technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310341838.6A CN116402621B (en) | 2023-03-28 | 2023-03-28 | Underlying asset penetration management method and system based on blockchain and artificial intelligence content generation technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116402621A true CN116402621A (en) | 2023-07-07 |
CN116402621B CN116402621B (en) | 2024-01-30 |
Family
ID=87019353
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310341838.6A Active CN116402621B (en) | 2023-03-28 | 2023-03-28 | Underlying asset penetration management method and system based on blockchain and artificial intelligence content generation technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116402621B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108805709A (en) * | 2018-05-23 | 2018-11-13 | 陈旭 | A method of based on the logical card of bottom assets distribution block chain number |
CN110097463A (en) * | 2019-03-28 | 2019-08-06 | 众安信息技术服务有限公司 | Credit Assets based on block chain support the method for commerce and transaction system of logical card |
CN110310204A (en) * | 2019-06-21 | 2019-10-08 | 成都积微物联集团股份有限公司 | Based on the financing by accounts receivable management system and method for block chain in supply chain industry |
CN110322130A (en) * | 2019-06-21 | 2019-10-11 | 成都积微物联集团股份有限公司 | Based on the current assets mortgage finance management system and method for block chain in supply chain industry |
CN110866822A (en) * | 2019-11-14 | 2020-03-06 | 腾讯科技(深圳)有限公司 | Wind control management method and device for securitization of assets, electronic equipment and storage medium |
US20200250753A1 (en) * | 2019-02-05 | 2020-08-06 | Edmon Blount | System and method for securities finance smart contracts on blockchains and distributed ledgers |
CN113065869A (en) * | 2021-04-01 | 2021-07-02 | 湖南大学 | Block chain-based ABS bond issuing and trading method, system, equipment and medium |
CN113592657A (en) * | 2021-08-03 | 2021-11-02 | 上海交通大学 | TOKENIZED REITS Block chain asset management system |
WO2022036702A1 (en) * | 2020-08-21 | 2022-02-24 | 深圳技术大学 | Warning method and apparatus for asset security product, electronic device, and storage medium |
US20230014140A1 (en) * | 2021-07-14 | 2023-01-19 | Fortior Blockchain, Lllp | Smart contract system using artificial intelligence |
CN115713315A (en) * | 2022-12-05 | 2023-02-24 | 中信银行股份有限公司 | Labor service reward penetration payment management method and system based on block chain |
-
2023
- 2023-03-28 CN CN202310341838.6A patent/CN116402621B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108805709A (en) * | 2018-05-23 | 2018-11-13 | 陈旭 | A method of based on the logical card of bottom assets distribution block chain number |
US20200250753A1 (en) * | 2019-02-05 | 2020-08-06 | Edmon Blount | System and method for securities finance smart contracts on blockchains and distributed ledgers |
CN110097463A (en) * | 2019-03-28 | 2019-08-06 | 众安信息技术服务有限公司 | Credit Assets based on block chain support the method for commerce and transaction system of logical card |
CN110310204A (en) * | 2019-06-21 | 2019-10-08 | 成都积微物联集团股份有限公司 | Based on the financing by accounts receivable management system and method for block chain in supply chain industry |
CN110322130A (en) * | 2019-06-21 | 2019-10-11 | 成都积微物联集团股份有限公司 | Based on the current assets mortgage finance management system and method for block chain in supply chain industry |
CN110866822A (en) * | 2019-11-14 | 2020-03-06 | 腾讯科技(深圳)有限公司 | Wind control management method and device for securitization of assets, electronic equipment and storage medium |
WO2022036702A1 (en) * | 2020-08-21 | 2022-02-24 | 深圳技术大学 | Warning method and apparatus for asset security product, electronic device, and storage medium |
CN113065869A (en) * | 2021-04-01 | 2021-07-02 | 湖南大学 | Block chain-based ABS bond issuing and trading method, system, equipment and medium |
US20230014140A1 (en) * | 2021-07-14 | 2023-01-19 | Fortior Blockchain, Lllp | Smart contract system using artificial intelligence |
CN113592657A (en) * | 2021-08-03 | 2021-11-02 | 上海交通大学 | TOKENIZED REITS Block chain asset management system |
CN115713315A (en) * | 2022-12-05 | 2023-02-24 | 中信银行股份有限公司 | Labor service reward penetration payment management method and system based on block chain |
Non-Patent Citations (2)
Title |
---|
YULIN DENG 等: ""Optimization of blockchain investment portfolio under artificial bee colony algorithm"", 《JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS》, vol. 385, pages 1 - 12 * |
张文越: "资产证券化中区块链技术的应用探索、 问题挑战与监管对策", 《科技与金融》, no. 4, pages 76 - 81 * |
Also Published As
Publication number | Publication date |
---|---|
CN116402621B (en) | 2024-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11943225B2 (en) | Hierarchical permissions model for case management | |
CN112183708A (en) | Cognitive robot process automation | |
US11941068B2 (en) | Case leaf nodes pointing to business objects or document types | |
CN111259040B (en) | SQL statement auditing method and system | |
US20240111741A1 (en) | Placeholder case nodes and child case nodes in a case model | |
CN108595276A (en) | Processing method, system, computer equipment and the storage medium of service logic | |
US11507445B2 (en) | Systems and methods for data quality management | |
CN116402621B (en) | Underlying asset penetration management method and system based on blockchain and artificial intelligence content generation technology | |
US11341575B1 (en) | Meta data driven state transition engine for order management system | |
US10867355B1 (en) | Computer implemented methods systems and articles of manufacture for preparing electronic tax return with assumption data | |
US20210209709A1 (en) | System and method for implementing a digital rights management adoption reference architecture | |
US20180284712A1 (en) | Integrated services platform | |
CN114528051B (en) | Method, system, equipment and medium for processing business process based on engine platform | |
FI20216072A1 (en) | A method and an arrangement for a regulation management and audit in a process | |
US11934800B2 (en) | Generating metadata to facilitate code generation | |
CN116934456A (en) | Method and device for counting and submitting dial-up of inferior loan | |
CN111652501B (en) | Financial product evaluation device and method, electronic equipment and storage medium | |
CN115600005A (en) | Method and device for automatically recommending reviewers of project group | |
CN115081869A (en) | Audit project generation method and device | |
CN115456757A (en) | Index threshold dynamic generation method and device | |
CN115099872A (en) | Method and device for generating bottom-layer pricing factor | |
CN117370556A (en) | Document classification method and device, computer readable storage medium and electronic equipment | |
CN117093237A (en) | Data checking method, system, storage medium and server | |
CN117710088A (en) | Post-loan inspection method, device, equipment and storage medium | |
CN116701402A (en) | Log recording method, system, equipment and medium based on cyclic archive table |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |