当前位置:网站首页>Achieve secure data sharing among multiple parties and solve the problem of asymmetric information in Inclusive Finance
Achieve secure data sharing among multiple parties and solve the problem of asymmetric information in Inclusive Finance
2022-06-30 22:42:00 【Analysys analysis】
Analysis of Yi Guan : since this year on , The government and the regulatory authorities have increased their support for Inclusive Finance , Carry out Inclusive Finance for financial institutions 、 Support small and micro enterprises 、 Services to special customer groups have been deployed to varying degrees , Information sharing 、 Digital technology 、 Key words such as inclusive coverage have been mentioned many times , The deep development of Inclusive Finance is still one of the key tasks of the banking industry in the next stage . In the face of the huge customer base of Inclusive Finance , How to get data 、 Use the data well 、 Take care of the data , Solve the financing difficulties of small and micro enterprises , Improving the risk control capability of banks' inclusive loans is one of the core objectives .
Based on the requirements of privacy protection laws and regulations , Banks have higher and higher standards for the use of data for security compliance , Government departments 、 As a highly effective data source , Due to different data standards and openness , The channel is blocked , There are real barriers to access to information , As a result, the data dimensions required for big data risk control are not comprehensive , Not enough data , It is difficult to exert intelligent approval 、 Technical advantages in intelligent risk control scenarios ; Whether the loan funds to microenterprises flow to the real economy , Often involving inter-bank 、 Cross border and other complex situations , There is also a lack of effective monitoring means to track the post loan funds , These have become the urgent problems to be solved in front of banking technology users .
Information asymmetry is still
At present, inclusive finance faces prominent problems
The credit data sources of small and micro enterprises mainly include several parts : In addition to the credit reporting system of the people's Bank of China and the bank's own internal data , Mainly concentrated in government departments or public utilities , Other interbank financial institutions , Some of them are scattered in the core enterprises of the supply chain , And alternative data in Internet enterprises , Decentralization of data sources 、 Fragmentation makes it expensive for banks to obtain data 、 Difficulty , In addition, the whole social credit information system has not been fully opened up , Access to information is blocked , There are still organizational barriers between them 、 The problem of data islands .

in addition , Some small and micro enterprises, especially the first loan customers, have no experience in handling credit business , Not clear about bank loan business regulations and inclusive financial products , I don't know whether I have the loan qualification , It is difficult to form effective communication between the demand side and the supply side of financial services , It causes two-way asymmetry of information .
Insufficient validity of data
Increased the difficulty of data governance
In addition to missing data , The validity of data is also a difficult problem . Due to the information collection of alternative data 、 The processing mechanism is different , The source is very complicated , The accuracy of the data 、 The authenticity is relatively low , For compliance reasons, the bank , We are also more cautious about the selection and cooperation of data manufacturers ; Upstream and downstream transaction data mastered by core enterprises in the supply chain 、 The confidentiality of product data is high , In addition, the data caliber of each link of the chain is not uniform , Data quality is hard to guarantee , And there are a lot of semi-structured 、 Unstructured data , As a result, the amount of data actually available to the bank and the effectiveness of the data are insufficient , Data governance is difficult .
Solutions and suggestions :
(1) Explore the cooperation between the bank and the government , Security compliance obtains high-quality data
Relevant laws and regulations require data security protection , It also attaches importance to the compliant development and utilization of data . The quality of government data and financial industry data is high 、 Strong effectiveness , It can help banks fully understand the information of small and micro enterprises , Yinzheng 、 Bank to bank cooperation and layout Inclusive Finance , Can form a government 、 Bank 、 guarantee 、 Insurance and other multi-party data security sharing systems , Jointly solve the data problem of small and micro enterprise loans . Privacy computing “ Available not visible ” The advantage of this process is to achieve data desensitization 、 The key to declassification , It can technically guarantee the compliance and security of data circulation , Satisfy the government 、 Industry 、 Requirements of core enterprises in the supply chain for data confidentiality .
Multi party secure computing technology can be used to enhance the application in credit business scenarios , For example, in the small and micro enterprise credit business application 、 Customer rating 、 Image privacy protection 、 Blacklist sharing 、 Loan fund flow monitoring and other key links , By deploying private computing nodes on all sides , Work together to complete task scheduling .
Apply maturity model according to Analysys analysis technology (AMC) Trend judgment , At present, privacy computing technology is in the exploratory stage , The technology application is not yet fully mature , But with the end of the proof of concept and pilot deployment , In the future, the implementation cases of privacy computing will usher in explosive growth . The introduction of multi-party data requires the deployment of a privacy computing platform , There are certain technical difficulties and scene adaptability problems , You need to combine your own business structure with IT Based on the architecture .
(2) Improve data quality , Strengthen the use of unstructured data
On the basis of strengthening data collection , Data quality needs to be improved 、 Further judgment and Governance on authenticity and compliance . The key element of data governance is to establish a unified data standard throughout the bank , Build enterprise level data capabilities , Create a data base , On the basis of data governance , Promote rapid iteration and reuse of modules , Based on big data 、 Artificial intelligence technology forms the whole process 、 Full lifecycle data governance solutions , Combined with the credit business scenario of small and micro enterprises 、 Contract text 、 Unstructured data such as business images , Parse the original data , Fusion of computer vision 、NLP、 Knowledge map technology , Unstructured data processing through content management , Realize intelligent search 、 Content security insight 、 Automated content management , Improve the availability of small and micro enterprise data , Revitalize the value of data .
(3) Improve model performance , Fully mining data value in the case of limited data
Data itself is a neutral word , Only when the value of data is combined with the business can it really play a role . Introducing multi-party data securely solves the problem of missing data , How to make good use of existing data solves the problem of data validity . In the case of limited data , Data mining 、 The construction of model becomes more important , In addition, online credit business is very important for automation 、 The requirement of timeliness is very high , It is more necessary to improve the ability of the model itself to promote business progress .
On the one hand, we can use the deep learning and knowledge mapping technology of artificial intelligence , Set through business rules 、 Model design to identify 、 The fusion 、 Analyze own data , Deeply excavate the relationship between upstream and downstream enterprises in the industrial chain , Establish the relationship view of small and micro enterprises , Change the irregular financial statements of small and micro enterprises 、 The dilemma of data unavailability ; On the other hand, we can make insight into historical data through machine learning , Analyze which data can be more effective 、 Accurately identify customers , What data is universal , What data is only applicable to specific customer groups , Derive patterns from data to guide the improvement of credit models or business strategies .
On the expansion of inclusive financial business scenarios , Integrate privacy computing technology with big data 、 Cloud computing 、 Artificial intelligence 、 Blockchain 、 Integrated use of Internet of things and other technologies , Give full play to their respective technological advantages , Ensure the accurate identification of risks in the process of joint calculation 、 Requirements for traceability of secure cloud storage and data flow processes , Rich data dimensions , Realize the separation of data ownership and data use right , Solve the problem of information asymmetry between banks and enterprises , Boost the scale expansion and high-quality coordinated development of Inclusive Finance .
Notice of declaration : The third-party data and other information cited by Analysys in this article are from public sources , Analysys analysis assumes no responsibility for this . In any case , This article is for reference only , Not as any basis . The copyright of this article belongs to the publisher , Without authorization from Analysys , It is strictly prohibited to reprint 、 Reference or in any way use Analysys to analyze any content published . Any media authorized 、 When using the website or individual, the original text should be quoted and the source should be indicated , And the analysis point of view is based on the official content of Yiguan analysis , No form of deletion shall be made 、 Add 、 Splicing 、 deductive 、 Distortion, etc . Disputes over improper use , Yi Guan analysis does not assume any responsibility for this , And reserve the right to investigate the responsibility of the relevant subject .
边栏推荐
- leetcode:104. Maximum depth of binary tree
- How to change the win11 computer name? Win11 method of changing computer name
- Youfu network hybrid cloud accelerates enterprise digital transformation and upgrading
- B_ QuRT_ User_ Guide(34)
- MIT博士论文 | 优化理论与机器学习实践
- AtCoder Beginner Contest 257
- Meet the streamnational | yangzike: what made me give up Dachang offer
- During telecommuting, the project team punched in the wechat group | solicited papers from the community
- Jmeter跨线程参数关联无需脚本
- 微信支付WxPayPubHelper v3版 回调xml为空的原因
猜你喜欢
![[无线通信基础-13]:图解移动通信技术与应用发展-1-概述](/img/1d/62e55f1b5445d7349ec383879f4275.png)
[无线通信基础-13]:图解移动通信技术与应用发展-1-概述

2022-06-30: what does the following golang code output? A:0; B:2; C: Running error. package main import “fmt“ func main() { ints := make

Why does the computer speed slow down after vscode is used for a long time?

In depth analysis of Apache bookkeeper series: Part 4 - back pressure

Two way data binding in wechat applet
![Flip the linked list ii[three ways to flip the linked list +dummyhead/ head insertion / tail insertion]](/img/a8/6472e2051a295f5e42a88d64199517.png)
Flip the linked list ii[three ways to flip the linked list +dummyhead/ head insertion / tail insertion]

“飞桨+辨影相机”成为AI界的“预制菜”,工业AI质检落地更简单

Failed to configure a DataSource: ‘url‘ attribute is not specified and no embedded datasource could

与AI结对编程式是什么体验 Copilot vs AlphaCode, Codex, GPT-3

Redis' transaction and locking mechanism
随机推荐
Deployment of microservices based on kubernetes platform
win11更新后任务栏空白怎么办? win11更新后任务栏空白卡死的解决方法
[career planning for Digital IC graduates] Chap.1 overview of IC industry chain and summary of representative enterprises
企业出海数字化转型解决方案介绍
KVM IO performance test data
The Sandbox 正在 Polygon 网络上进行部署
Where can I find the computer device manager
“飞桨+辨影相机”成为AI界的“预制菜”,工业AI质检落地更简单
Smart streetlights | cloud computing lights up the "spark" of smart cities
In depth analysis of Apache bookkeeper series: Part 4 - back pressure
How does win11 optimize services? Win11 method of optimizing service
后疫情时代,云计算如何为在线教育保驾护航
Win11电脑名如何更改?Win11更改电脑名的方法
B_ QuRT_ User_ Guide(31)
Go language learning notes - Gorm usage - database configuration, table addition | web framework gin (VII)
2022-06-30: what does the following golang code output? A:0; B:2; C: Running error. package main import “fmt“ func main() { ints := make
多線程經典案例
10 airbags are equipped as standard, and Chery arizer 8 has no dead corner for safety protection
The sandbox is being deployed on the polygon network
软件测试报告包含哪些内容?如何获取高质量软件测试报告?