How to identify false information of credit enterprises

How to identify false information of credit enterprises

Under the new normal of economic downturn, in addition to the market economy environment and other reasons, false information provided by credit enterprises is the main factor leading to frequent credit risks. In practice, not only some problem enterprises will provide false information and make false accounts to cover up the truth, but also some normal enterprises generally have information distortion and even fabricate facts to meet credit requirements. The complexity and concealment of enterprise fraud are asymmetric with the recognition ability of bank credit personnel. Effectively identifying the false information of credit enterprises has become the difficulty and focus of credit management under the new normal.

First, the main forms of false information provided by credit enterprises

The information provided by credit enterprises is the most important basic information for bank credit decision-making. Enterprises should provide detailed, reliable and true information as much as possible, so that the application materials can objectively and comprehensively reflect the real situation of enterprises. However, in order to achieve a certain purpose, enterprises will deliberately sort out the information provided, whitewash statements and create illusions, mainly as follows:

1, the relationship is not established.

In order to avoid the unified credit management of group customers, many credit enterprises have registered and established a number of new affiliated companies as loan borrowers in various places through false capital verification, liquidity capital verification and false equity transfer. , and its actual controller generally does not appear as an investor, does not work in related hidden subordinate enterprises, and does not use the same or similar enterprise name in enterprise groups. However, it is often controlled by indirect cross-regional investment, agency shareholding, nepotism shareholding and other hidden means. The membership structure is very complex, and it is difficult to identify the comprehensive relationship of enterprises. Some member enterprises are divorced from the group credit, which leads to the diversification of bank credit lines and the expansion of risk exposure.

2. The use of credit funds is not true.

Many credit granting enterprises make false transactions with a certain enterprise or group as the related core, change the use and flow of transaction funds, and use working capital loans for fixed assets investment or equity investment and real estate project development in unrelated industries that are not in line with the actual situation of enterprises; Off-balance-sheet products, such as trade financing products, are used to cash out and then invest in non-operating turnover purposes such as stock market, futures market and real estate; In order to obtain high profits, some enterprises lend their own funds or even credit funds through private lending channels, or even act as funds? Hacker? Borrowers and borrowers earn spreads through the media. In either case, once the market changes fundamentally and the enterprise capital chain breaks, commercial banks often become the ultimate victims.

3. The trade background is untrue.

Under the new normal, the market is depressed, the capital chain of enterprises is tense or broken, and the trust of cooperation with banks is used to provide false contracts, capital uses, bills, warehouse receipts, counterparties, etc. , and the background of virtual transactions; Do supply chain enterprises provide untrue accounts receivable and accounts payable and domestic and foreign enterprises carry out credit financing without real background to cope with the shortage of liquidity? First aid? The situation of capital fracture. In addition, the enterprise does not know the real situation of the counterparty deeply, and the funds cannot be recovered after the transaction, which leads to the authenticity risk of the transaction and background.

4. The financial statements are untrue.

The financial data provided by enterprises to banks are generally distorted, such as inflating sales revenue and profits through related party transactions and false accounts receivable, increasing profits through less depreciation or no depreciation, changing current profits through changing amortization period of expenses, increasing assets and reducing asset-liability ratio through false inventory and accounts receivable, inflating long-term investments and concealing real contingent liabilities, which makes the financial statements unable to truly reflect the operating conditions and risks of credit-granting enterprises, and the credit risk is difficult to control.

5. Business information is untrue.

In order to achieve the purpose of financing, deliberately provide false information, such as the fact that the circulation, inventory and delivery of goods in the course of operation are inconsistent with the actual situation, the sales quantity and price of product orders are distorted, and the pledged warehouse receipts are financed by many banks. In particular, some enterprises are seriously under-started, with serious brain drain and continuous decline in water and electricity consumption, but the information provided reflects that the enterprises are operating well. In addition, the secured mortgage is untrue. If the value of collateral is seriously overestimated by various means, or the guarantor is a hidden affiliated enterprise, it only meets the requirements of formal guarantee, and once the risk occurs, it is difficult to really make up for the loss.

Second, the main identification methods of credit enterprises providing false information

Needless to say, under the new normal, it is common for credit enterprises to provide false materials, and the means are varied and the patterns are constantly being refurbished. To this end, credit officers must use various screening methods and skills, conduct in-depth and detailed investigation and analysis, cross-check in many ways, restore the objective and true face of credit-granting enterprises, and focus on the following basic identification methods:

1, forward analysis method.

The empirical analysis mainly adopts sequential method, focusing on verifying the authenticity of loan application materials provided by credit enterprises:

First of all, carefully check, verify and verify whether the loan application materials provided by the enterprise are false, including shareholder structure and change, share capital transfer, customs declaration and inspection, commodity transaction supervision, circulation clearance, consistency of transport bills with actual consignors and holders, and identify the authenticity and written materials of relevant bills, signatures, seals, authorizations, accounts, core legal persons, price, cost elements and contract elements.

Secondly, the identity of the legal representative and the source of registered capital are verified and analyzed emphatically. The story of growing up? An unknown ordinary person didn't fall from the sky? Pie? There cannot be many equity funds. If there are many, there must be something fishy, or there is an actual controller behind it; Either declare that the equity funds come from private financing or illegal income.

Thirdly, the authenticity of sales revenue depends on the value-added tax invoice issued by the enterprise, combined with the transaction contract, delivery note and capital statement between the enterprise and downstream customers. If the data are quite different and there is no reasonable analysis and explanation, it can be considered as whitewashing.

4. Pay attention to abnormal performance: such as frequent changes in accounting firms, obvious differences between financial indicators and comparable enterprises, changes in accounting policies or confusion in accounting treatment, inconsistency between actual repayment sources and debt agreements, mutual factoring between buyers and sellers, etc. , we should start with abnormal information, check one by one, identify whether there is falsehood in product transactions and business benefits, and dig deep into arbitrage behaviors such as whether credit funds are transferred to the capital market.

Fifth, analyze whether private lending is involved through the change law of enterprise account funds. If it is found that the account regularly pays the same amount of small funds to a specific object on a specific date, it can be judged that the enterprise is paying interest on private lending; If there is a whole sum of money in the capital flow of the account, but it has not been transferred to upstream and downstream enterprises or used to repay bank loans; Or a few days before the bank loan expires, the funds are transferred in, and the loan stock is transferred out in equal amount after turnover, then the enterprise may have private lending behavior; If it is a large cash withdrawal, it may be to lend funds to other enterprises and individuals or return private financing; If the shareholders of the enterprise borrow a lot, or there are frequent capital exchanges between the enterprise and the shareholders, they should also pay close attention to it.

2. Reverse review method.

The reverse inspection method focuses on checking the conformity of capital flow.

1. Have a deep understanding of the overall situation of long-term account funds of enterprises in a number of banks, and check whether there are any abnormal foreign investments, loans and funds? Unknown source, unknown destination? Phenomenon, to see if there is cross-industry irrational capital flow or foreign investment in the name of false loans. Cover up the abnormal use of funds with superficial authenticity.

Second, after the use of enterprise loans, analyze the laws of enterprise capital flow, check the changes of enterprise inventory before and after the use of credit funds, check the value-added tax invoices issued by upstream enterprises and enterprise freight documents, and confirm the transaction background and the authenticity of the use of credit funds.

The third is to pay attention to the abnormal changes of running water. What if there are microfinance companies, pawn shops and other entities in the counterparty, or they are included in the bank account? Investment, securities, funds, futures, guarantees, etc. In lending transactions, enterprises may participate in private lending. If an enterprise has both bank loans and loans through entrusted loans and entrusted financial management, it is actually participating in private lending.

Fourth, the daily average balance of enterprise deposit accounts can be continuously tapped to judge the operation of enterprises. If the balance of the enterprise deposit account suddenly or gradually drops from a certain day, the customer's funds may be transferred to other banks or poorly managed, which should attract special attention.

Fifth, by analyzing the data of capital flow and consumption behavior of individual accounts such as business owners, shareholders and spouses, we can indirectly judge the quality of business operations and provide data support for identifying the authenticity of information.

3. Interview verification method.

I. Internal interviews of credit granting enterprises, in the process of contact with business owners, shareholders, financial personnel and employees. Through some targeted questions and other means, it is the simplest way to verify the authenticity of enterprise capital transactions and management information.

Pay attention to the method when asking:

First, ask back to back, avoid financial personnel when asking the person in charge of the enterprise, avoid accounting personnel when asking the person in charge of the finance, and then make a comparative analysis according to the inquiry to find out the problem;

Second, we should pay attention to strategy when asking questions, and we can ask questions directly and suddenly in the conversation and find clues in its penetration;

Third, it varies from person to person and highlights key points. For example, learn from business owners about investment ideas, work experience and interpersonal relationships, and pay attention to diversified investment and capital shortage in corporate finance; Focus on understanding the living habits and internal control of business owners and senior managers, especially private lending. In the process of communicating with corporate financial personnel, pay attention to whether to communicate with financial intermediaries (fund brokers, small loan companies, guarantee companies, etc.). ) often by phone, but also often appear in the text. Price, amount and time limit? Words like this; Or the account manager found that he was very familiar with the interest rate of private financing in exploratory communication, which often indicated that the enterprise had set foot in private lending.

Second, relevant interviews. Understand the family history, personal habits and health status of the actual controller of the enterprise through the social circle and periphery, and understand the personal quality and credit status of the operator; Fully understand the rationality of the work energy distribution of key managers, as well as the changes of personal and enterprise assets, whether the management team is stable and whether there is synergy. Third, understand the external situation. Obtain relevant information through local government departments, associations, courts, public media and other surrounding areas; By consulting customers' upstream and downstream enterprises and competitors, we can understand customers' production and operation, credit, industry status and credit risks of private financing and market counterparties, and make a comparative analysis to judge the real situation of credit granting enterprises' production and sales and market product competitiveness.

4. Cross-validation.

In the process of business processing, through system query or automatic retrieval of relevant information for multidimensional cross-validation analysis, false information can be identified in time.

First of all, one is to see the essence through the phenomenon. According to the contextual relationship between bank accounts, bookkeeping subjects and financial statements and the matching relationship of corresponding account funds, we can see whether the information symmetry of enterprise financial statements and the structural rationality of financial data can stand the inference of theory and practice, and judge whether the report data can accurately reflect the actual situation of enterprise operation.

Secondly, the analysis focuses on the enterprise's assets, liabilities and operating benefit information: check the real liabilities and contingent liabilities to see the bank credit registration system, check the output to see the electricity charges and invoices, check the sales to see the tax returns, check the export foreign exchange receipts and payments to see the customs data, check the inventory to see the production date, and check the fund withdrawal to see the bank account; For real estate and other real estate, the combination of warrant verification and on-the-spot inspection is implemented; For machinery and equipment, the combination of checking original invoices and field research is implemented; In terms of inventory, the combination of account books with purchase and sale invoices and physical inventory in warehouses and workshops is implemented; For the verification of business conditions, the combination of checking tax returns and checking with local tax authorities is adopted; In view of the authenticity of the trade financing background, the combination of customs import and export information and financial statement subject information verification is adopted to restore the true financial appearance of the enterprise.

Third, the automatic generation technology is used to automatically verify whether the cross-checking relationship between the balance sheet and the income statement of the credit enterprise is appropriate, and whether the automatically generated net cash flow statement is consistent with the cash flow statement submitted by the enterprise, so as to accurately and quickly judge the authenticity of the financial statement data of the credit enterprise; Automatically generate indicators such as asset-liability ratio, return on capital and cash flow structure, and compare them with the indicators of the same industry to verify whether the individual changes of credit enterprise indicators are normal, so as to analyze the authenticity of their performance. If the industry in which the credit enterprise is located is relatively depressed as a whole, but its performance is outstanding and there is no reasonable explanation, it is likely that the financial statements are untrue.

Special attention should be paid to the existence of the following situations:

First, the amount of other receivables or other payables is huge, which does not match the income scale of the company's main business. There may be problems such as capital flight, long-term occupation by related parties, inflated profits, hidden short-term investments or losses, and interception of investment income.

Second, the increase of accounts receivable is much higher than that of operating income, which deviates from net profit and operating cash flow, which may lead to the problem of inflating operating income through accounts receivable.

Third, the amount of monetary funds listed in the statement is large, so it is necessary to judge whether there are a large number of monetary funds as deposits and other restricted problems through the changes of account flow and balance;

The fourth is to verify whether there is a problem of inflated capital reserve, especially if the paid-in capital is small but the capital reserve is large, to verify whether it is private lending, related party lending or false equity real debt fund;

Fifth, the net cash flow generated by operating activities is lower than the total profit for a long time, indicating that the profitability of enterprises is poor and profits are more likely to be whitewashed. Especially when the total profit of the consolidated financial statements of the parent company is much lower than that of the borrowing enterprise, it is more likely that the parent company will inject profits into the borrowing enterprise through related party transactions.

5. Big data analysis methods.

First of all, make full use of the information provided by social networks, credit information systems and enterprises themselves, cross-analyze and verify the investment, business behavior and wealth accumulation process of actual controllers, and analyze whether their investment in enterprises is commensurate with their business operations, whether there are real estate speculation, raw material speculation, stock futures speculation and other behaviors, and deeply understand the interests and risk preferences of business owners.

Secondly, make full use of the Internet to cross-verify the production and operation of enterprises, such as tax inspection, external audit conclusion, customs inspection, SAFE verification, law-related litigation, inter-bank dynamics, etc., to mutually confirm the authenticity of product sales; By digging up the repayment records of business owners, including the repayment records of other banks, suppliers and other creditors, we can analyze the performance of contracts and taxes in operation and judge the integrity of business owners.

Third, using big data mining to analyze and verify the contingencies of credit enterprises, mainly including endorsement of commercial bills, transfer or discount, providing debt guarantees to other units, product quality assurance, tax disputes, pending claims, pending lawsuits, etc. , or whether to disclose in detail the assets and contingent liabilities transferred through immigration and divorce;

Fourthly, by mining the change data of enterprise water meter, electricity meter, payroll and deposit and remittance account, and analyzing the change data year-on-year and month-on-month, we can verify the real situation of the dynamic changes of enterprise production and operation, so as to take measures to resolve risks as soon as possible; By analyzing the basic data (such as transaction volume, transaction amount, etc. ) upstream and downstream enterprises, especially several relatively concentrated upstream and downstream enterprises in a certain period, combine the correlation coefficient between enterprises to provide side data support for accurately judging the development trend of enterprises.

Fifth, make full use of credit risk monitoring system, credit information system, bank code information and other technical channels, dig deep into the information of group enterprise shareholders, investment subsidiaries, guaranteed or guaranteed enterprises, family relations and so on, and constantly question and confirm each other, and find out the relationships that enterprises deliberately hide or conceal.

Sixth, fully tap the information of internal related party transactions. Use big data to intercept and collect the records of large-sum capital transactions between all enterprises in a certain period of time, analyze the clues and signs of transactions such as anti-transfer, false transactions, unequal transactions and abnormal transactions that often occur in enterprises, and dig out hidden related transactions of enterprises; Through the deep mining of big data, we can identify the credit authenticity risks hidden in product risks, credit risks, market risks, industry risks and country risks.

6. Key verification method.

The first is the identification of business license and qualification. It is mainly verified by the issuing authority or issuing agency, such as verifying the authenticity of the business license through the industrial and commercial registration inquiry system, and comparing whether the elements contained in the license are consistent with the system data; Verify the authenticity of qualifications (such as mining license, sewage permit, real estate enterprise development qualification, construction and installation enterprise qualification, etc.). ) through the website of the competent government department.

The second is the screening of false capital contribution, focusing on checking the amount, structure and changes of monetary funds and other receivables, whether there are current accounts with the same or similar amount before and after capital injection, and comprehensively analyzing whether the funds used by the investors for capital contribution are returned to the other party through loans or other enterprises' capital contribution. After completing the capital verification procedures; Pay attention to whether the amount of other receivables is close to the paid-in capital, and whether there is any behavior of transferring capital injection immediately after a short period of time; Verify whether the counterparty is an affiliated enterprise and judge whether the capital injection is transferred to the affiliated enterprise; Pay attention to the changes of paid-in capital and capital reserve of enterprises. If there is a big change, it is necessary to review the original documents such as bank payment notice, asset transfer procedures, capital verification certificate, etc., to confirm their true existence, and prevent enterprises from whitewashing the asset-liability ratio by inflating the owner's equity.

Third, there are three main items to identify the authenticity of the transaction background: first, the invoice, through the website of the local tax department or the tax control system to check whether the face elements are consistent with the declaration results, whether it is cancelled; Check whether the facial elements are consistent with the business background. Second, the contract, check whether the two parties to the contract have stable historical transaction records, and whether there is any relationship between the counterparty of the contract and the credit enterprise. If there is, it should be strictly examined. Third, documents. For example, order financing needs the buyer's confirmation, and the authenticity of the order needs to be verified through the government open bidding platform and electronic order management system. Prepaid financing needs to be verified through the historical transaction contract between the enterprise and its upstream enterprises, the fund payment voucher or through the written, telephone and electronic order management system.

Fourth, pay attention to the use of funds. Check whether the payment of loan funds meets the requirements of entrusted payment, verify whether the use of funds meets the purpose agreed in the loan contract, whether the payment object is consistent with the specific transaction background, whether the payment time and settlement method meet the industry settlement practice, and whether the capital flow, logistics and document flow match, and ask the counterparty or peer if necessary; Analyze whether the inflow and outflow of large amount of funds conform to the normal law, especially in the case of frequent contacts with affiliated enterprises, and thoroughly analyze whether the use of funds is reasonable; Stock financing basically matches the scale of production. If an enterprise requires a large amount of working capital loans, it should pay attention to whether the enterprise has the investment intention of construction projects or projects to prevent short-term loans from being used for a long time.

Fifth, the authenticity of cash flow can be identified. For example, the real operating cash flow of a single credit enterprise can be identified by the following methods: First, for a credit enterprise with a deposit account in a bank, a detailed list of enterprise transactions can be downloaded through the enterprise fund inquiry function of the internal system of the bank, and the formula is as follows: sales income funds = account withdrawal funds within a certain period-interest income-related inflow funds without trade chain background-inflow funds-inflow funds-inflow funds from similar accounts-loan inflow funds. Second, for credit enterprises with accounts in other banks, it is required to provide legal person accounts, personal card bank details, paper and PDF scanned copies of bank acceptance bills, and EXCEL forms can be used to sort out, summarize, analyze and screen sales revenue funds on a monthly and annual basis. Third, go deep into the enterprise to read the accounts receivable subsidiary ledger, deposit journal and even the original vouchers, and make a comparative analysis with the results of the above methods. If the data of several methods are basically the same, the credibility is high. If the results of several methods are very different, it is necessary to analyze the whitewashing behavior in depth.

The identification and prevention of false information in credit enterprises is an important basic work to ensure the steady development of credit asset business, and account manager is the first level to control the authenticity risk. In the process of due diligence, examination and approval, post-loan management, etc., the scope and requirements of authenticity verification of credit granting enterprises are clarified, the management responsibilities are clarified, and the potential risks of false information are eliminated. Through case analysis, improve the ability of account managers to distinguish the authenticity of credit enterprise information, seriously investigate the responsibility and ensure the authenticity of information with strict accountability? Rigid? Requirements, to curb risks from the source.

;