Method and system for monitoring network behavior data, risk monitoring method and risk monitoring system

A monitoring system and data technology, applied in the field of computer network, can solve the problems of unmonitoring, untimely monitoring, lagging, etc., and achieve the effect of reducing manual intervention, improving timeliness, and improving accuracy

Inactive Publication Date: 2017-08-29
ADVANCED NEW TECH CO LTD
View PDF6 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. The entire process requires manual intervention, which undoubtedly increases labor costs;
[0007] 2. The method of regular monthly visits by the user manager makes the collection, input and analysis of information data static. In this way, during the analysis, the credit risk of the enterprise has often occurred or been exposed, so it has the disadvantages of being untimely and lagging;
[0008] 3. Since the collection, input and analysis of information data are all done manually, in particular, the risk measurement is a qualitative analysis of information data, which is mainly completed by the analyst’s intuition and experience, so it has the disadvantages of being subjective and inaccurate
[0010] The above-mentioned monitoring method for personal credit card credit risk conducts a comparative analysis of the transaction data that has occurred. Although the analysis of the transaction data can be used to obtain information related to the risk such as the total amount of personal user’s monthly consumption and whether the repayment is timely; however, The transaction data has no rules to follow, and it is impossible to analyze the consumption habits, consumption preferences and other behavior characteristics of individual users based on the transaction data alone. In this way, if a user has the habit of luxury consumption, but The user's salary is far less than the total amount of monthly consumption. Even if the individual user has no bad record of overdue repayment, his credit card credit still has a great risk
The above-mentioned monitoring method is also more focused on the monitoring after the loan, so the risk in this situation cannot be monitored, that is, the above-mentioned monitoring method for personal credit card credit risk also has the disadvantages of untimely and inaccurate monitoring

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for monitoring network behavior data, risk monitoring method and risk monitoring system
  • Method and system for monitoring network behavior data, risk monitoring method and risk monitoring system
  • Method and system for monitoring network behavior data, risk monitoring method and risk monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0067] The existing monitoring methods for corporate credit or personal credit card credit risk cannot obtain timely and sufficient user information. For example, only the financial report provided by the company is collected before the loan application, and the corporate financial monthly report is collected regularly every month after the loan application ; Another example is to only collect the identity certificate provided by the individual user before applying for a credit card, and calculate the total monthly consumption amount of the individual user after applying for a loan. Based on the above reasons, the prior art can only perform post-loan and static monitoring, which has the disadvantages of u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for monitoring network behavior data, a risk monitoring method and a risk monitoring system, wherein the method particularly comprises the steps of regularly acquiring network behavior data of a user from an online application, and using the network behavior data as historical network behavior data for performing cluster storage; determining a corresponding risk model according to the historical network behavior data of the user; according to the definition of the risk model, calling historical network behavior data in cluster storage for performing historical risk identification, and using a corresponding historical risk identification result as a parameter of the risk model for storage; acquiring online network behavior data of the user in real time; performing online risk identification on the online network behavior data according to the risk model, and obtaining an online risk identification result; and according to the online risk identification result, processing a credit object which is related with the user according to the online risk identification result. The method, the system, the risk monitoring method and the risk monitoring system can improve timeliness and accuracy in credit risk monitoring.

Description

[0001] This patent application is a divisional application of the application number 201110366881.5, the application date is November 17, 2011, and the title of the invention is a method and system for monitoring network behavior data. technical field [0002] The present application relates to the technical field of computer networks, in particular to a method and system for monitoring network behavior data and a method and system for risk monitoring. Background technique [0003] Credit business is the main business category of banks, one of the pillar businesses for banks to obtain profits, and one of the focuses of market competition among commercial banks. However, the credit business is also a risky business. Therefore, timely and accurate monitoring of credit risks to improve asset quality and reduce the proportion of non-performing assets is an important link for commercial banks to improve their own viability and competitiveness. [0004] At present, a typical moni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/08
CPCG06Q40/08
Inventor 陈春明
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products