CN116402621B - Underlying asset penetration management method and system based on blockchain and artificial intelligence content generation technology - Google Patents

Underlying asset penetration management method and system based on blockchain and artificial intelligence content generation technology Download PDF

Info

Publication number
CN116402621B
CN116402621B CN202310341838.6A CN202310341838A CN116402621B CN 116402621 B CN116402621 B CN 116402621B CN 202310341838 A CN202310341838 A CN 202310341838A CN 116402621 B CN116402621 B CN 116402621B
Authority
CN
China
Prior art keywords
asset
blockchain
report
penetration management
penetration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310341838.6A
Other languages
Chinese (zh)
Other versions
CN116402621A (en
Inventor
宋吉鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New Share Technology Services Shenzhen Ltd
Original Assignee
New Share Technology Services Shenzhen Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New Share Technology Services Shenzhen Ltd filed Critical New Share Technology Services Shenzhen Ltd
Priority to CN202310341838.6A priority Critical patent/CN116402621B/en
Publication of CN116402621A publication Critical patent/CN116402621A/en
Application granted granted Critical
Publication of CN116402621B publication Critical patent/CN116402621B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2471Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The utility model relates to the technical field of asset management, in particular to a bottom asset penetration management method and system based on blockchain and artificial intelligence.

Description

Underlying asset penetration management method and system based on blockchain and artificial intelligence content generation technology
Technical Field
The utility model relates to the technical field of asset management, in particular to a bottom asset penetration management method and system based on a blockchain and an artificial intelligent content generation technology.
Background
The underlying asset concept is inundated with financial innovations and is only frequently appeared in financial regulatory policies in recent years; the penetration is reduction, the original and original purpose is found, and the disguise of the indication is uncovered, so that the investment funds are prevented from being greasy due to the operation of a camera bellows such as period mismatch, mixed operation and the like, the risks are managed and controlled, and the benefits of investors are protected; in terms of administration, banking financial products and asset securitization projects are generally required to penetrate into the underlying assets.
In the financial industry, the bottom layer asset penetration management is a very important ring, and in the traditional bottom layer asset penetration management, risks are managed and benefits of investors are protected; in terms of administration, banking financial products and asset securitization projects are generally required to penetrate into the underlying assets.
However, the conventional underlying asset penetration informatization system has problems of asymmetric information, low management efficiency and the like, which results in that underlying asset penetration management becomes difficult and complicated and risks easily occur, and particularly, in the conventional underlying asset penetration management, a great deal of time and labor are often required to be invested for investigation and verification due to the opacity and the unreliability of information, so that the management efficiency is low, and meanwhile, due to the asymmetry of information, the language conversion and the link in the asset and investment fields have variability, so that investors are difficult to comprehensively know the real condition of the underlying asset by using the investment perspective system, so that the investment risk is increased.
Disclosure of Invention
Aiming at the problems of asymmetric information, low management efficiency and the like in the traditional underlying asset penetration management, the underlying asset penetration management becomes difficult and complicated. With the development of blockchain and artificial intelligence technology, the efficiency and precision of the underlying asset penetration management can be improved by linking the underlying asset information up and analyzing by using the artificial intelligence technology.
In order to achieve the above purpose, the present utility model provides the following technical solutions:
the utility model discloses a bottom asset penetration management method based on a blockchain and artificial intelligent content generation technology, which comprises the following steps:
s1: the bottom asset information of the asset generator is uplink according to the blockchain technology;
s2: analyzing and processing the historical asset evaluation report to obtain an analysis and processing result, and simultaneously uploading the original file and the analysis and processing result;
s3: starting model training and tuning, generating an asset penetration management report generation model according to the data of the asset evaluation report, and uploading the asset penetration management report generation model to the blockchain;
s4: initiating an asset penetration management report generation service, loading the asset penetration management report generation model from the blockchain;
s5: triggering analysis processing service after the new bottom asset information of the asset generator is uplink according to the new bottom asset information of the asset generator, and uplink the analysis processing result;
s6: invoking the asset penetration report generation service, generating an asset penetration management report according to the analysis processing result, and linking;
s7: and the internal personnel conduct auditing and error correction according to the report inquiring system of the blockchain to obtain an approval result, and the approval result is issued and updated to the asset penetration management report.
As a preferred real-time aspect of the present utility model, the underlying asset information includes loan contract information, repayment information, asset assessment information.
As a preferred real-time aspect of the present utility model, the asset assessment report includes an asset service report, a risk report, and a market analysis report.
As a preferred real-time aspect of the present utility model, investment institutions, third party institutions view the asset penetration management report via the blockchain download.
As a preferred real-time scheme of the present utility model, the asset penetration management report generating service is initiated in step S4, different types of asset penetration management reports are generated through artificial intelligence content technology, and the asset penetration management report generating model is loaded from the blockchain.
As a preferred real-time scheme of the utility model, the underlying asset information uplink of the asset generator is realized by intelligent contract technology.
The utility model also discloses a bottom asset penetration management system based on the blockchain and the artificial intelligent content generation technology, which comprises:
the information acquisition system is used for linking the bottom asset information of the asset generation party according to the blockchain technology; the analysis processing system is used for carrying out analysis processing on the historical asset evaluation report to obtain an analysis processing result, and simultaneously uploading the original file and the analysis processing result; the model training generation system is used for starting model training and tuning, generating an asset penetration management report generation model according to the data of the asset evaluation report, and uploading the asset penetration management report generation model to the blockchain; the service loading system is used for initiating an asset penetration management report generating service, loading the asset penetration management report generating model from the blockchain, triggering an analysis processing service after the new bottom asset information of the asset generator is uplink, uploading the analysis processing result, calling the asset penetration report generating service, generating an asset penetration management report according to the analysis processing result, and uplink; and the report inquiry system is used for auditing and correcting errors by internal personnel according to the asset penetration management report to obtain an approval result, and issuing and updating the asset penetration management report by the approval result.
As a preferred real-time scheme of the present utility model, further comprising: the report downloading system is used for the investment institutions and third-party institutions to download and check the asset penetration management report through the blockchain.
As a preferred real-time scheme of the utility model, the service loading system is used for initiating an asset penetration management report generating service, generating asset penetration management reports of different types through artificial intelligence content technology, and loading the asset penetration management report generating model from the blockchain.
As a preferable real-time scheme of the utility model, the information acquisition system realizes automatic acquisition of the bottom asset information of the asset generator through an intelligent contract technology.
The present utility model discloses a computer readable medium having stored thereon a computer program which when executed by a processor implements the underlying asset penetration management method based on blockchain and artificial intelligence content generation technology as claimed in any of claims 1 to 6.
The utility model discloses a computer device comprising a memory for storing information including program instructions and a processor for controlling execution of the program instructions, which when loaded and executed by the processor implement the underlying asset penetration management method based on blockchain and artificial intelligence content generation technology of any of claims 1 to 6.
One or more technical schemes provided by the utility model have at least the following technical effects or advantages:
the utility model links the information of the bottom layer asset through the blockchain technology, automatically generates asset penetration management reports of different types through real-time monitoring of asset penetration management reports by utilizing the artificial intelligent content technology, realizes automatic asset penetration monitoring and management by combining the intelligent contract technology, enables clients to master the state of the asset at any time, timely adjusts and optimizes, meets different requirements of the clients, ensures the authenticity and non-tamper modification of the information, avoids the problems of asymmetric information, low management efficiency and the like, reduces the risk of the bottom layer asset penetration management, and improves the management efficiency.
The foregoing description is only an overview of the technical solutions of the present application, and may be implemented according to the content of the specification in order to make the technical means of the present application more clearly understood, and in order to make the above-mentioned and other objects, features and advantages of the present application more clearly understood, the following detailed description of the present application will be given.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present utility model, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present utility model, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a method for underlying asset penetration management based on blockchain and artificial intelligence content generation techniques provided by the present utility model.
FIG. 2 is a flow chart of a method for underlying asset penetration management based on blockchain and artificial intelligence content generation techniques provided by the present utility model.
FIG. 3 is a block chain and artificial intelligence content generation technology based framework diagram of an underlying asset penetration management system in accordance with the present utility model.
Fig. 4 is a schematic structural diagram of a computer device according to the present utility model.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present utility model more apparent, the technical solutions of the embodiments of the present utility model will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present utility model, and it is apparent that the described embodiments are some embodiments of the present utility model, but not all embodiments of the present utility model.
Thus, the following detailed description of the embodiments of the utility model, as presented in the figures, is not intended to limit the scope of the utility model, as claimed, but is merely representative of selected embodiments of the utility model. All other embodiments, which can be made by those skilled in the art based on the embodiments of the utility model without making any inventive effort, are intended to be within the scope of the utility model.
As shown in fig. 1-4, the present utility model provides a method and a system for bottom asset penetration management based on blockchain and artificial intelligence content generation technology, which links the bottom asset information by blockchain technology, automatically generates different types of asset penetration management reports by real-time monitoring of asset penetration management reports, and implements automatic asset penetration monitoring and management by combining intelligent contract technology, so that clients can master the status of assets at any time, make adjustments and optimizations in time, more meet different needs of clients, ensure the authenticity and non-tamper modification of information, avoid the problems of information asymmetry and management inefficiency, etc., reduce the risk of bottom asset penetration management, improve management efficiency, and specifically, the method comprises:
as shown in fig. 1 and 2, the present utility model provides an underlying asset penetration management method based on blockchain and artificial intelligence content generation technology, comprising the steps of:
s1: the bottom asset information of the asset generator is uplink according to the blockchain technology;
s2: analyzing and processing the historical asset evaluation report to obtain an analysis and processing result, and simultaneously uploading the original file and the analysis and processing result;
s3: starting model training and tuning, generating an asset penetration management report generation model according to the data of the asset evaluation report, and uploading the asset penetration management report generation model to the blockchain;
s4: initiating an asset penetration management report generation service, loading the asset penetration management report generation model from the blockchain;
s5: triggering analysis processing service after the new bottom asset information of the asset generator is uplink according to the new bottom asset information of the asset generator, and uplink the analysis processing result;
s6: invoking the asset penetration report generation service, generating an asset penetration management report according to the analysis processing result, and linking;
s7: and the internal personnel conduct auditing and error correction according to the report inquiring system of the blockchain to obtain an approval result, and the approval result is issued and updated to the asset penetration management report.
Specifically, the bottom asset information of the resource generating party is uplink through a blockchain technology, including loan contract information, repayment information, asset assessment information and the like, historical asset service reports, risk reports, market analysis reports and the like are subjected to data deduplication and standardization processing, original files and results are simultaneously uplink, model training and tuning are started, asset penetration management report generation models are generated based on asset assessment report data, the models are uploaded to a blockchain, asset penetration management report generation services are initiated, report generation models are loaded from the blockchain, after a new batch of bottom assets are uplink, analysis services are triggered, the results are uplink, asset penetration report generation services are called, asset penetration management reports are generated according to analysis results, and are uplink, and staff in the interior conduct auditing and error correction from a blockchain-based report query system, and update reports are released after approval
In the embodiment of the utility model, the bottom asset information comprises loan contract information, repayment information and asset assessment information.
In an embodiment of the utility model, the asset assessment report includes an asset service report, a risk report, and a market analysis report.
In an embodiment of the utility model, investment institutions and third party institutions view the asset penetration management report through the blockchain download.
In the embodiment of the present utility model, an asset penetration management report generation service is initiated in step S4, different types of asset penetration management reports are generated by artificial intelligence content technology, the asset penetration management report generation model is loaded from the blockchain, and the different types of asset penetration management reports satisfy more demands of clients.
In the embodiment of the utility model, the bottom asset information uplink of the asset generation party is realized by an intelligent contract technology.
As shown in FIG. 3, the present utility model also provides an underlying asset penetration management system based on blockchain and artificial intelligence content generation technology, comprising:
the information acquisition system is used for linking the bottom asset information of the asset generation party according to the blockchain technology; the analysis processing system is used for carrying out analysis processing on the historical asset evaluation report to obtain an analysis processing result, and simultaneously uploading the original file and the analysis processing result; the model training generation system is used for starting model training and tuning, generating an asset penetration management report generation model according to the data of the asset evaluation report, and uploading the asset penetration management report generation model to the blockchain; the service loading system is used for initiating an asset penetration management report generating service, loading the asset penetration management report generating model from the blockchain, triggering an analysis processing service after the new bottom asset information of the asset generator is uplink, uploading the analysis processing result, calling the asset penetration report generating service, generating an asset penetration management report according to the analysis processing result, and uplink; and the report inquiry system is used for auditing and correcting errors by internal personnel according to the asset penetration management report to obtain an approval result, and issuing and updating the asset penetration management report by the approval result.
In an embodiment of the present utility model, the method further includes: the report downloading system is used for the investment institutions and third-party institutions to download and check the asset penetration management report through the blockchain.
In the embodiment of the utility model, the service loading system is used for initiating an asset penetration management report generating service, generating asset penetration management reports of different types by artificial intelligence content technology, loading the asset penetration management report generating model from the blockchain, and enabling the asset penetration management reports of different types to meet more requirements of clients.
In the embodiment of the utility model, the information acquisition system automatically acquires the bottom asset information of the asset generator through an intelligent contract technology.
The embodiment of the utility model provides a computer device, which comprises a memory and a processor, wherein the memory is used for storing information comprising program instructions, the processor is used for controlling the execution of the program instructions, and the program instructions realize the steps of the embodiment of the carbon asset financing management method when being loaded and executed by the processor.
As shown in fig. 4, which shows a schematic structural diagram of a computer device 600 suitable for implementing an embodiment of the present application, the computer device 600 includes a Central Processing Unit (CPU) 601 that can perform various appropriate operations and processes according to a program stored in a Read Only Memory (ROM) 602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. In the RAM603, various programs and data required for the operation of the computer device 600 are also stored. The CPU601, ROM602, and RAM603 are connected to each other through a bus 604. An input/output (I/O) interface 605 is also connected to bus 604. [0156] The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, mouse, etc.; an output portion 607 including a Cathode Ray Tube (CRT), a liquid crystal feedback device (LCD), and the like, and a speaker, and the like; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The drive 610 is also connected to the I/O interface 605 as needed. Removable media 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on drive 610 as needed, so that a computer program read therefrom is mounted as needed as storage section 608.
In particular, according to embodiments of the present utility model, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present utility model include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method shown in the flowchart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication portion 609, and/or installed from the removable medium 611.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transshipment) such as modulated data signals and carrier waves.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each element may be implemented in one or more software and/or hardware elements when implemented in the present application.
The present utility model is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the utility model. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
The data acquisition, storage, use, processing and the like in the technical scheme meet the relevant regulations of national laws and regulations.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
Although the present application has been described in connection with specific features and embodiments thereof, it will be apparent that various modifications and combinations can be made without departing from the spirit and scope of the application. Accordingly, the specification and figures are merely exemplary illustrations of the present application and are considered to cover any and all modifications, variations, combinations, or equivalents that fall within the scope of the present application. It will be apparent to those skilled in the art that various modifications and variations can be made in the present application without departing from the scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the present application and the equivalents thereof, the present application is intended to cover such modifications and variations.

Claims (12)

1. An underlying asset penetration management method based on blockchain and artificial intelligence content generation technology is characterized by comprising the following steps:
s1: the bottom asset information of the asset generator is uplink according to the blockchain technology;
s2: analyzing and processing the historical asset evaluation report to obtain an analysis and processing result, and simultaneously uploading the original file and the analysis and processing result;
s3: starting model training and tuning, generating an asset penetration management report generation model according to the data of the asset evaluation report, and uploading the asset penetration management report generation model to the blockchain;
s4: initiating an asset penetration management report generation service, loading the asset penetration management report generation model from the blockchain;
s5: triggering analysis processing service after the new bottom asset information of the asset generator is uplink according to the new bottom asset information of the asset generator, and uplink the analysis processing result;
s6: invoking the asset penetration report generation service, generating an asset penetration management report according to the analysis processing result, and linking;
s7: and the internal personnel conduct auditing and error correction according to the report inquiring system of the blockchain to obtain an approval result, and the approval result is issued and updated to the asset penetration management report.
2. The method of claim 1, wherein the underlying asset information includes loan contract information, repayment information, asset assessment information.
3. The method of claim 1, wherein the asset assessment report comprises an asset service report, a risk report, a market analysis report.
4. The method for underlying asset penetration management based on blockchain and artificial intelligence content generation technology of claim 1, wherein investment institutions, third party institutions view the asset penetration management report via the blockchain download.
5. The method according to claim 1, wherein the asset penetration management report generating service is initiated in step S4, different types of asset penetration management reports are generated by artificial intelligence content technology, and the asset penetration management report generating model is loaded from the blockchain.
6. The method for underlying asset penetration management based on blockchain and artificial intelligence content generation techniques of claim 1, wherein the underlying asset information uplink of the asset generator is implemented by intelligent contract techniques.
7. An underlying asset penetration management system based on blockchain and artificial intelligence content generation technology, comprising:
the information acquisition system is used for linking the bottom asset information of the asset generation party according to the blockchain technology; the analysis processing system is used for carrying out analysis processing on the historical asset evaluation report to obtain an analysis processing result, and simultaneously uploading the original file and the analysis processing result; the model training generation system is used for starting model training and tuning, generating an asset penetration management report generation model according to the data of the asset evaluation report, and uploading the asset penetration management report generation model to the blockchain; the service loading system is used for initiating an asset penetration management report generating service, loading the asset penetration management report generating model from the blockchain, triggering an analysis processing service after the new bottom asset information of the asset generator is uplink, uploading the analysis processing result, calling the asset penetration report generating service, generating an asset penetration management report according to the analysis processing result, and uplink; and the report inquiry system is used for auditing and correcting errors by internal personnel according to the asset penetration management report to obtain an approval result, and issuing and updating the asset penetration management report by the approval result.
8. The blockchain and artificial intelligence content generation technology based underlying asset penetration management system of claim 7, further comprising: the report downloading system is used for the investment institutions and third-party institutions to download and check the asset penetration management report through the blockchain.
9. The underlying asset penetration management system based on blockchain and artificial intelligence content generation technology of claim 7, wherein the service loading system is configured to initiate asset penetration management report generation services, generate different types of asset penetration management reports via artificial intelligence content technology, and load the asset penetration management report generation model from the blockchain.
10. The system for underlying asset penetration management based on blockchain and artificial intelligence content generation technology of claim 7, wherein the information collection system implements automated collection of underlying asset information of the asset generator through intelligent contract technology.
11. A computer readable medium having stored thereon a computer program which when executed by a processor implements the underlying asset penetration management method based on blockchain and artificial intelligence content generation technology as claimed in any of claims 1 to 6.
12. A computer device comprising a memory for storing information including program instructions and a processor for controlling execution of the program instructions, wherein the program instructions when loaded and executed by the processor implement the underlying asset penetration management method based on blockchain and artificial intelligence content generation technology of any of claims 1 to 6.
CN202310341838.6A 2023-03-28 2023-03-28 Underlying asset penetration management method and system based on blockchain and artificial intelligence content generation technology Active CN116402621B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310341838.6A CN116402621B (en) 2023-03-28 2023-03-28 Underlying asset penetration management method and system based on blockchain and artificial intelligence content generation technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310341838.6A CN116402621B (en) 2023-03-28 2023-03-28 Underlying asset penetration management method and system based on blockchain and artificial intelligence content generation technology

Publications (2)

Publication Number Publication Date
CN116402621A CN116402621A (en) 2023-07-07
CN116402621B true CN116402621B (en) 2024-01-30

Family

ID=87019353

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310341838.6A Active CN116402621B (en) 2023-03-28 2023-03-28 Underlying asset penetration management method and system based on blockchain and artificial intelligence content generation technology

Country Status (1)

Country Link
CN (1) CN116402621B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108805709A (en) * 2018-05-23 2018-11-13 陈旭 A method of based on the logical card of bottom assets distribution block chain number
CN110097463A (en) * 2019-03-28 2019-08-06 众安信息技术服务有限公司 Credit Assets based on block chain support the method for commerce and transaction system of logical card
CN110310204A (en) * 2019-06-21 2019-10-08 成都积微物联集团股份有限公司 Based on the financing by accounts receivable management system and method for block chain in supply chain industry
CN110322130A (en) * 2019-06-21 2019-10-11 成都积微物联集团股份有限公司 Based on the current assets mortgage finance management system and method for block chain in supply chain industry
CN110866822A (en) * 2019-11-14 2020-03-06 腾讯科技(深圳)有限公司 Wind control management method and device for securitization of assets, electronic equipment and storage medium
CN113065869A (en) * 2021-04-01 2021-07-02 湖南大学 Block chain-based ABS bond issuing and trading method, system, equipment and medium
CN113592657A (en) * 2021-08-03 2021-11-02 上海交通大学 TOKENIZED REITS Block chain asset management system
WO2022036702A1 (en) * 2020-08-21 2022-02-24 深圳技术大学 Warning method and apparatus for asset security product, electronic device, and storage medium
CN115713315A (en) * 2022-12-05 2023-02-24 中信银行股份有限公司 Labor service reward penetration payment management method and system based on block chain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11416934B2 (en) * 2019-02-05 2022-08-16 Edmon Blount System and method for securities finance smart contracts on blockchains and distributed ledgers
US20230014140A1 (en) * 2021-07-14 2023-01-19 Fortior Blockchain, Lllp Smart contract system using artificial intelligence

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108805709A (en) * 2018-05-23 2018-11-13 陈旭 A method of based on the logical card of bottom assets distribution block chain number
CN110097463A (en) * 2019-03-28 2019-08-06 众安信息技术服务有限公司 Credit Assets based on block chain support the method for commerce and transaction system of logical card
CN110310204A (en) * 2019-06-21 2019-10-08 成都积微物联集团股份有限公司 Based on the financing by accounts receivable management system and method for block chain in supply chain industry
CN110322130A (en) * 2019-06-21 2019-10-11 成都积微物联集团股份有限公司 Based on the current assets mortgage finance management system and method for block chain in supply chain industry
CN110866822A (en) * 2019-11-14 2020-03-06 腾讯科技(深圳)有限公司 Wind control management method and device for securitization of assets, electronic equipment and storage medium
WO2022036702A1 (en) * 2020-08-21 2022-02-24 深圳技术大学 Warning method and apparatus for asset security product, electronic device, and storage medium
CN113065869A (en) * 2021-04-01 2021-07-02 湖南大学 Block chain-based ABS bond issuing and trading method, system, equipment and medium
CN113592657A (en) * 2021-08-03 2021-11-02 上海交通大学 TOKENIZED REITS Block chain asset management system
CN115713315A (en) * 2022-12-05 2023-02-24 中信银行股份有限公司 Labor service reward penetration payment management method and system based on block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Optimization of blockchain investment portfolio under artificial bee colony algorithm";Yulin Deng 等;《Journal of Computational and Applied Mathematics》;第385卷;1-12 *
资产证券化中区块链技术的应用探索、 问题挑战与监管对策;张文越;《科技与金融》(第4期);76-81 *

Also Published As

Publication number Publication date
CN116402621A (en) 2023-07-07

Similar Documents

Publication Publication Date Title
US20240070487A1 (en) Systems and methods for enriching modeling tools and infrastructure with semantics
US11941068B2 (en) Case leaf nodes pointing to business objects or document types
CN112183708A (en) Cognitive robot process automation
CN111259040B (en) SQL statement auditing method and system
CN107909486A (en) Commission management method, application server and computer-readable recording medium
CN111133391A (en) Method for controlled sharing of wind farm and wind turbine data, data analysis algorithms and results of data analysis
US20240111741A1 (en) Placeholder case nodes and child case nodes in a case model
CN116402621B (en) Underlying asset penetration management method and system based on blockchain and artificial intelligence content generation technology
AU2016101535A4 (en) Computer-implemented methods and management systems for managing membership of a group
US20170163565A1 (en) System for analysis of resource usage and availability
CN114022295A (en) Group fraud identification method and system
CN113469546A (en) Project management and control method based on standard and regulation, electronic equipment and storage medium
CN112907362A (en) Loan transaction processing method and device, electronic equipment and storage medium
US20210209709A1 (en) System and method for implementing a digital rights management adoption reference architecture
US11507445B2 (en) Systems and methods for data quality management
US20180284712A1 (en) Integrated services platform
FI20216072A1 (en) A method and an arrangement for a regulation management and audit in a process
CN112069244B (en) Method and storage device based on visualization web page data mining
US10867355B1 (en) Computer implemented methods systems and articles of manufacture for preparing electronic tax return with assumption data
CN116934456A (en) Method and device for counting and submitting dial-up of inferior loan
CN111652501B (en) Financial product evaluation device and method, electronic equipment and storage medium
CN115600005A (en) Method and device for automatically recommending reviewers of project group
CN115081869A (en) Audit project generation method and device
CN116432457A (en) Loan enterprise combination determination method and device based on improved simulated annealing algorithm
CN115099872A (en) Method and device for generating bottom-layer pricing factor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant