Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present application.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
It will be understood by those within the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
For convenience of understanding, the terms used in the examples of the present application will now be explained:
enterprise portrait: the information describing the state and the behavior of the enterprise is labeled, and the enterprise is labeled based on the data related to the state and the behavior of the enterprise, so that the overall appearance of the enterprise is depicted. Generally, the method can be divided into basic conditions, business conditions, financial conditions and financing conditions. Based on the enterprise portrait, the real-time production and the development of the enterprise can be comprehensively known.
The enterprise representation may be described based on information of various dimensions, for example, taking the enterprise representation as described based on the above basic situation, business situation, financial situation, and financing situation, the above basic situation may include: historical welfare, stockholder situation and enterprise nature; a high management team; operating qualification and honor awards; organization architecture and external investment. The operational situation may include: the development condition and the occupation ratio of main products/main services are increased over the years; annual sales plan and completion situation, new business development situation; profit, market share; project progress and fund availability; major stakeholder resolution, core post personnel change; upstream and downstream enterprises; transaction structure and settlement features; the industrial status and the life cycle. The financial conditions may include: financial statements and important indexes are analyzed in the same proportion and the cause of transaction in the last three years; analyzing the cash flow condition; long and short term repayment ability analysis, profit ability analysis and operation ability analysis; and comparing and analyzing the average level of the same industry/the same type of enterprises. Financing situations may include: the basic conditions of the clients in the credit service comprise credit service number, credit service balance, credit service varieties, guarantee conditions, tertiary classification, due date or overdue amount and days, credit service share and the like; various risk factors/points of risk that affect the ability of a customer to pay liabilities; other special or important matters refer to the occurrence of high-authority personal arrests, waders, administrative penalties, credit overdue, evasion liabilities, asset/business reorganization, major investments/acquisitions, illegal violations, property freezes, negative reports on media, and other important notices/disclosures or matters to be explained.
An enterprise map: the (enterprise profile, E-profile) is an important application in the field of knowledge graphs, and means that by integrating massive enterprise and enterprise associated information, unstructured, semi-structured and structured data of the internet are mined, and various analysis algorithms, models and the like are applied, so that enterprise information is comprehensively known, the enterprise is helped to make intelligent application in the fields of risk control, enterprise marketing, market monitoring and the like, the client value and risk of the enterprise are more clearly known, and the data can play a greater value for the enterprise.
Because the existing risk assessment measures are simple and rough and are difficult to evaluate a potential partner accurately and timely, the embodiment of the application provides an enterprise information assessment method for evaluating the risk of the potential partner accurately and timely.
As shown in fig. 1, a schematic flow chart of an enterprise information evaluation method provided in this embodiment includes S201 to S203:
s201, acquiring target information of a target object.
And the target information is obtained based on the public information of the target object.
For example, the target object may be an insurance service object, which may be an enterprise or an individual, and in general, because the enterprise has more information and the determination factor is more complex, the embodiment of the present application is mainly applied to the enterprise, but when the service object is an individual, the risk assessment may also be performed by referring to the enterprise information assessment method provided in the embodiment of the present application.
Illustratively, the public information of the target object may be information disclosed from the internet, newspapers, magazines, books, intranets, and the like. After the name of the target object is obtained, the content related to the target object may be retrieved from the internet, a newspaper, a magazine, an intranet, or the like according to the name of the target object.
Specifically, a web crawler (web crawler) may be used to crawl the public information of the target object. And after the public information of the target object is acquired, the acquired public information is cleaned to obtain information with useful value, namely the target information.
In a possible implementation manner, the target information includes: the business information of the business to which the target object belongs, and/or the enterprise information of the target object.
Specifically, the industry information may include at least one of: industry prospect, industry risk, industry scale. The enterprise information may include at least one of: company data, team information, industry rankings, significant risks that may exist.
Wherein the company data may include at least one of: financial status, company development (e.g., registration time, registration capital, number of employees, nature of business, whether to market, etc.). The team information may include at least one of: team core member information, shareholder structure information. The industry ranking may include at least one of: whether the test is a unicorn company, whether the test is domestic five hundred strong, whether the test is world five hundred strong, and evaluating website scores. The significant risk that may exist may include at least one of: whether it is on an industry blacklist, whether it is subject to significant penalties, whether there is significant credit taint, whether there is significant associated risk.
It should be noted that the target information includes, but is not limited to, the public information, and may also include related information of the acquired target object.
S202, performing risk assessment on the target object based on the target information and the partner assessment model, and generating an assessment result.
Illustratively, after the target information is acquired, risk assessment is performed on the target object by using a partner assessment model based on the target information, and an assessment result is generated.
Illustratively, in order to complete the risk assessment of the target object quickly and accurately, a reasonable data model may be built, and based on the target information, the data model is used to perform the risk assessment on the target object.
S203, determining the target object as a cooperative object under the condition that the evaluation result meets the preset condition.
Wherein the partner evaluation model is: and updating basic information of the partner evaluation model based on the target information in the risk evaluation process of the target object.
For example, in the process of risk assessment of a target object by using a partner assessment model, basic data of the partner assessment model may be updated based on the acquired target information of the target object. Wherein, the process of updating the basic data can occur before the risk assessment is carried out on the target object, and the partner assessment model is optimized to increase the accuracy of the assessment result; it may also occur that after risk assessment of the target object, the partner assessment model is updated based on the assessment results and the target information.
Optionally, in order to increase the accuracy of the result, the partner evaluation model may be updated based on the target information before the target object is risk-evaluated based on the target information and the partner evaluation model. Namely, the risk assessment model is: updating the partner evaluation model based on the target information before performing risk evaluation on the target object based on the target information and a partner evaluation model.
For example, after risk assessment is performed on the target object and an assessment result is generated, it may be determined whether or not the target object may be determined as a cooperative object according to the assessment result.
Specifically, in the case where the risk evaluation result of the target object satisfies a preset condition, the target object is determined as a cooperative object.
In this way, when the insurance company wants to perform risk assessment on potential partners, target information of the target object obtained based on the public information of the target object is acquired. And then, performing risk assessment on the target object based on the target information to generate an assessment result. And determining the target object as a cooperative object under the condition that the evaluation result meets the preset condition. The difficulty of risk assessment is reduced, so that the insurance company can carry out comprehensive and accurate risk assessment on potential partners in time.
Optionally, in this embodiment of the application, after the target information is obtained, in order to increase accuracy of an evaluation result, a business prejudgment may be performed on the target object, a potential cooperation benefit is predicted, and based on this, risk evaluation is performed on the target object.
Exemplarily, as shown in fig. 2, the step S202 may further include the following step S202 a:
s202a, performing risk assessment on the target object based on the target information and the business prediction information of the target object, and generating an assessment result.
The service prediction information is: based on the cooperation of other enterprises which are the same as or similar to the target object.
Illustratively, the traffic prediction information may include at least one of: forecasting premium, annual premium growth space, cooperation risk, forecasting pay amount, and customer acquisition cost.
For example, after target information of a target object is acquired, an enterprise that is the same as or similar to the target object in the industry may be found based on the target information, and a business anticipation may be performed on the target object according to a cooperation situation with the found enterprise, and then the target information and an anticipation result are used together as basic data for performing risk assessment on the target object.
Further optionally, in the embodiment of the present application, a partner evaluation model may be used to perform risk evaluation on the target object.
For example, the target information may be classified into different evaluation factors according to different categories of information in the target information. The target information includes a plurality of evaluation factors determined according to the category of the public information, wherein the plurality of evaluation factors are: determined according to different classifications of the above-mentioned public information.
Exemplarily, as shown in fig. 3, the above S202a may include the following S202a 1:
s202a1, taking the business prediction information as an initial parameter of a partner evaluation model, and using the partner evaluation model to score the target object based on the weight of each evaluation factor in the target information.
Illustratively, the target object may be scored according to the weights of the different scoring factors. Specifically, the plurality of scoring factors of the target information include at least one of: industry factors, enterprise factors, team factors, cooperation factors, industry ranking factors, major risk factors.
The industry factors, the enterprise factors, the team factors and the cooperation factors are used for carrying out basic scoring on the target object, and the proportion of the basic scoring is corresponding to the weight of the factors, namely the quantitative calculation scoring items of the evaluation model of the cooperation partners. The industry ranking factor and the major risk factor are additional scoring items and subtraction items of the target object on the basis of the basic scoring, namely the scoring items and the subtraction items of the partner evaluation model respectively.
Illustratively, after performing business prediction on the target object, initializing the partner evaluation model by using the business prediction information as an initial parameter of the partner evaluation model, and then scoring the target object based on the target information and the weight of a plurality of evaluation factors included in the target information.
Therefore, the target object can be scored based on the target information of the target object and the service prejudgment of the target object, so that the scoring result is more accurate.
Further optionally, in this embodiment of the application, after the target object is scored, the target object may be graded according to a scoring result.
For example, as shown in fig. 4, after the step S202a1, the enterprise information assessment method provided in the embodiment of the present application may further include the step S202a 2:
s202a2, according to the grading result of the grading, grading the risk of the target object.
For example, in this embodiment of the application, the target object may be divided into five levels according to the scoring result of the target object, including: a +, A, B, C, F, and specifies whether each level of partners are available for docking, docking modes, additional expert review, etc. Wherein, the cooperation modes of the cooperation objects of different levels are not completely the same.
For example, when the level of the target object is a +, the target object is docked in a non-standard manner; when the grade of the target object is A, the docking grade of the target object is recommended nonstandard docking; when the grade of the target object is B, the docking grade of the target object is recommended standard docking/acceptable nonstandard docking; when the grade of the target object is C, the docking grade of the target object is standard docking/URL support; and when the grade of the target object is F, applying for the examination of an expert, if the examination is passed, the butt joint grade of the target object is only URL support, and if the examination is not passed, rejecting cooperation.
Illustratively, as shown in fig. 5, the above S203 may include the following S203 a:
s203a, determining the target object as a cooperative object under the condition that the risk level of the target object meets a preset condition.
Illustratively, on the basis of the divided grades, in the case that the risk grade of the target object meets a preset condition, the target object is determined as a cooperative object, and according to the grade of the target object, a docking manner corresponding to the grade of the target object is determined.
For example, taking the above five levels as an example, when the level of the target object is a level of F or more, determining that the target object is a cooperative object, and determining a docking manner corresponding to the level of the target object according to the level of the target object; or when the grade of the target object is F, performing expert review on the target object, determining the target object as a cooperative object after the expert review is passed, and determining the butt joint mode of the target object as the URL.
Optionally, in the embodiment of the application, for a good partner that has already been docked, other potential partners can be mined according to the enterprise portrait of the partner.
For example, as shown in fig. 6, after S203, the enterprise information evaluation method provided in the embodiment of the present application may further include S204 and S205:
and S204, performing enterprise portrait on the target object according to the target information.
Illustratively, when the level of the target object meets a preset level, the target object is determined to be a good-quality partner, and the enterprise portrait of the target object is performed based on the target information.
In one implementation, the target object may be enterprise-profiled with at least one of the following information: enterprise corporate information, enterprise shareholder information, enterprise subsidiary information, enterprise external investment company information, and other company information in the industry. Based on the information, an enterprise portrait is performed on the target object.
And S205, acquiring other cooperative objects which are the same as or similar to the target object through an enterprise map technology based on the enterprise portrait.
Illustratively, after enterprise profiling is performed on the target object, enterprises which are highly similar to the target object are mined through enterprise profiling technology, and a partner relationship is established with the enterprises.
It can be understood that when the target object is a good partner, the probability that an enterprise highly similar to the target object is also a good partner is very high, and therefore, other partners can be mined through enterprise mapping technology based on an enterprise representation of the target object.
According to the enterprise information evaluation method provided by the embodiment, when an insurance company wants to perform risk evaluation on potential partners, the target information of the target object obtained based on the public information of the target object is acquired. And then, based on the target information and the business prediction result of the target object, performing risk assessment on the target object by using a partner assessment model to generate an assessment result. And determining the target object as a cooperative object under the condition that the evaluation result meets the preset condition. The difficulty of risk assessment is reduced, so that the insurance company can carry out comprehensive and accurate risk assessment on potential partners in time.
It should be noted that, in the enterprise information evaluation method provided in the embodiment of the present application, the execution subject may be an enterprise information evaluation device, or a control module in the enterprise information evaluation device for executing the enterprise information evaluation method. The embodiment of the present application takes an example in which an enterprise information evaluation device executes an enterprise information evaluation method, and describes an enterprise information evaluation device provided in the embodiment of the present application.
In the embodiment of the present application, the enterprise information evaluation methods shown in the above method drawings are all exemplarily described by referring to one drawing in the embodiment of the present application. In specific implementation, the enterprise information evaluation method shown in each method drawing can also be implemented by combining any other drawing which can be combined and is illustrated in the above embodiments, and details are not described here.
Referring to fig. 7, fig. 7 is a schematic diagram of a basic structure of the enterprise information evaluation device according to the embodiment.
As shown in fig. 7, an enterprise information evaluation apparatus includes: an acquisition module 2100, an evaluation module 2200, and a determination module 2300. The acquiring module 2100 is configured to acquire target information of a target object, where the target information is obtained based on public information of the target object; an evaluation module 2200, configured to perform risk evaluation on the target object based on the target information acquired by the acquisition module 2100 and a partner evaluation model, and generate an evaluation result; a determining module 2300, configured to determine the target object as a cooperative object if the evaluation result of the evaluating module 2200 satisfies a preset condition; wherein the partner evaluation model is: and updating basic information of the partner evaluation model based on the target information in the risk evaluation process of the target object.
When an insurance company wants to perform risk assessment on potential partners, target information of a target object obtained based on the public information of the target object is acquired. And then, performing risk assessment on the target object based on the target information to generate an assessment result. And determining the target object as a cooperative object under the condition that the evaluation result meets the preset condition. The difficulty of risk assessment is reduced, so that the insurance company can carry out comprehensive and accurate risk assessment on potential partners in time.
In some embodiments, the target information comprises: the industry information of the industry to which the target object belongs, and/or the enterprise information of the target object; wherein the enterprise information is used for indicating the enterprise operation condition of the target object.
In some embodiments, the evaluation module 2200 is specifically configured to perform risk evaluation on the target object based on the target information acquired by the acquisition module 2100 and the business prediction information of the target object, and generate an evaluation result; the service prediction information is: based on the cooperation of other enterprises which are the same as or similar to the target object.
In some implementations, the target information includes a plurality of evaluation factors determined according to categories of the public information; the evaluation module 2200 is further specifically configured to use the business prediction information as an initial parameter of a partner evaluation model, and use the partner evaluation model to score the target object based on the weight of each evaluation factor in the target information.
In some embodiments, the evaluating module 2200 is further configured to grade the risk of the target object according to the scoring result of the scoring; the determining module 2300 is specifically configured to determine the target object as a cooperative object when the risk level of the target object divided by the evaluating module 2200 meets a preset condition; wherein, the cooperation modes of the cooperation objects of different levels are not completely the same.
In some embodiments, the apparatus further comprises: the mining module 2400 is configured to perform enterprise portrayal on the target object according to the target information acquired by the acquiring module 2100; and the mining module is also used for acquiring other cooperative objects which are the same as or similar to the target object through an enterprise map technology based on the enterprise portrait.
In some embodiments, the risk assessment model is: updating the partner evaluation model based on the target information before performing risk evaluation on the target object based on the target information and a partner evaluation model.
The enterprise information evaluation device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The enterprise information evaluation device provided by the embodiment of the application can implement the method embodiments of fig. 1 to 6. The processes implemented by the device are not described herein again to avoid repetition.
The beneficial effects of the various implementation manners in this embodiment may specifically refer to the beneficial effects of the corresponding implementation manners in the above method embodiments, and are not described herein again to avoid repetition.
The enterprise information evaluation device provided by the embodiment of the application acquires the target information of the target object obtained based on the public information of the target object when an insurance company wants to carry out risk evaluation on potential partners. And then, based on the target information and the business prediction result of the target object, performing risk assessment on the target object by using a partner assessment model to generate an assessment result. And determining the target object as a cooperative object under the condition that the evaluation result meets the preset condition. The difficulty of risk assessment is reduced, so that the insurance company can carry out comprehensive and accurate risk assessment on potential partners in time.
In order to solve the above technical problem, an embodiment of the present invention further provides a computer device. Referring to fig. 8, fig. 8 is a block diagram of a basic structure of a computer device according to the present embodiment.
As shown in fig. 8, the internal structure of the computer device is schematically illustrated. The computer device includes a processor, a non-volatile storage medium, a memory, and a network interface connected by a system bus. The non-volatile storage medium of the computer device stores an operating system, a database and computer readable instructions, the database can store control information sequences, and the computer readable instructions can enable the processor to realize the enterprise information evaluation method when being executed by the processor. The processor of the computer device is used for providing calculation and control capability and supporting the operation of the whole computer device. The memory of the computer device may have stored therein computer readable instructions that, when executed by the processor, may cause the processor to perform a method of enterprise information assessment. The network interface of the computer device is used for connecting and communicating with the terminal. Those skilled in the art will appreciate that the architecture shown in fig. 8 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In this embodiment, the processor is configured to execute specific functions of the obtaining module 2100, the evaluating module 2200, and the determining module 2300 in fig. 7, and the memory stores program codes and various data required for executing the modules. The network interface is used for data transmission to and from a user terminal or a server. The memory in this embodiment stores program codes and data necessary for executing all the sub-modules in the enterprise information evaluation device, and the server can call the program codes and data of the server to execute the functions of all the sub-modules.
And the computer equipment acquires the target information of the target object obtained based on the public information of the target object when the insurance company wants to carry out risk assessment on potential partners. And then, based on the target information and the business prediction result of the target object, performing risk assessment on the target object by using a partner assessment model to generate an assessment result. And determining the target object as a cooperative object under the condition that the evaluation result meets the preset condition. The difficulty of risk assessment is reduced, so that the insurance company can carry out comprehensive and accurate risk assessment on potential partners in time.
The present invention also provides a storage medium storing computer-readable instructions, which when executed by one or more processors, cause the one or more processors to perform the steps of any of the above-described embodiments of the enterprise information assessment method.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the computer program is executed. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random Access Memory (RAM).
The present invention also provides a storage medium storing computer-readable instructions, which when executed by one or more processors, cause the one or more processors to perform the steps of any of the above-described embodiments of the enterprise information assessment method.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the computer program is executed. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random Access Memory (RAM).
Those of skill in the art will appreciate that the various operations, methods, steps in the processes, acts, or solutions discussed in this application can be interchanged, modified, combined, or eliminated. Further, other steps, measures, or schemes in various operations, methods, or flows that have been discussed in this application can be alternated, altered, rearranged, broken down, combined, or deleted. Further, steps, measures, schemes in the prior art having various operations, methods, procedures disclosed in the present application may also be alternated, modified, rearranged, decomposed, combined, or deleted.
The foregoing is only a partial embodiment of the present application, and it should be noted that, for those skilled in the art, several modifications and decorations can be made without departing from the principle of the present application, and these modifications and decorations should also be regarded as the protection scope of the present application.