Method and system for monitoring network behavior data

A behavior and network technology, applied in the field of computer networks, can solve problems such as unmonitored, untimely monitoring, and lag, and achieve the effect of reducing manual intervention, improving timeliness, and improving accuracy

Inactive Publication Date: 2013-05-29
ALIBABA GRP HLDG LTD
View PDF5 Cites 80 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The entire process requires manual intervention, which undoubtedly increases labor costs;
[0006] 2. The method of regular monthly visits by the user manager makes the collection, input and analysis of information data static. In this way, during the analysis, the credit risk of the enterprise has often occurred or been exposed, so it has the disadvantages of being untimely and lagging;
[0007] 3. Since the collection, input and analysis of information data are all done manually, in particular, the risk measurement is a qualitative analysis of information data, which is mainly completed by the analyst’s intuition and experience, so it has the disadvantages of being subjective and inaccurate
[0009] The above-mentioned monitoring method for personal credit card credit risk conducts a comparative analysis of the transaction data that has occurred. Although the analysis of the transaction data can be use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for monitoring network behavior data
  • Method and system for monitoring network behavior data
  • Method and system for monitoring network behavior data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0066] The existing monitoring methods for corporate credit or personal credit card credit risk cannot obtain timely and sufficient user information. For example, only the financial report provided by the company is collected before the loan application, and the corporate financial monthly report is collected regularly every month after the loan application ; Another example is to only collect the identity certificate provided by the individual user before applying for a credit card, and calculate the total monthly consumption amount of the individual user after applying for a loan. Based on the above reasons, the prior art can only perform post-loan and static monitoring, which has the disadvantages of u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and system for monitoring network behavior data. The method particularly comprises the steps of: obtaining network behavior data of a user from an online application program periodically or regularly, and regarding the network behavior data as historical network behavior data for collective storage; determining a corresponding risk model based on the historical network behavior data of the user; calling the collectively stored historical network behavior data for historical risk identification based on the definition of the risk model, and regarding a corresponding historical risk identification result as a parameter of the risk model for storage; obtaining the online network behavior data of the user in real time; performing online risk identification on the online network behavior data based on the risk model so as to obtain an online risk identification result; and processing a credit object associated with the user based on the online risk identification result. The method and system for monitoring the network behavior data can improve timeliness and accuracy of credit risk monitoring.

Description

technical field [0001] The present application relates to the technical field of computer networks, in particular to a method and system for monitoring network behavior data. Background technique [0002] Credit business is the main business category of banks, one of the pillar businesses for banks to obtain profits, and one of the focuses of market competition among commercial banks. However, the credit business is also a risky business. Therefore, timely and accurate monitoring of credit risks to improve asset quality and reduce the proportion of non-performing assets is an important link for commercial banks to improve their own viability and competitiveness. [0003] At present, a typical monitoring method for corporate credit risk in the existing technology is to collect corporate operating data and risk-related information data through visits by bank user managers, and enter the data into the database system after the collection is completed. Finally, through analysis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q40/08
CPCG06Q40/08
Inventor 陈春明
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products