+

CN112132694A - Policy and security case confirmation and verification method, device, equipment and storage medium - Google Patents

Policy and security case confirmation and verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN112132694A
CN112132694A CN202011039653.2A CN202011039653A CN112132694A CN 112132694 A CN112132694 A CN 112132694A CN 202011039653 A CN202011039653 A CN 202011039653A CN 112132694 A CN112132694 A CN 112132694A
Authority
CN
China
Prior art keywords
data
security
policy
trial calculation
confirmed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011039653.2A
Other languages
Chinese (zh)
Other versions
CN112132694B (en
Inventor
曹达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Pension Insurance Corp
Original Assignee
Ping An Pension Insurance Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Pension Insurance Corp filed Critical Ping An Pension Insurance Corp
Priority to CN202011039653.2A priority Critical patent/CN112132694B/en
Publication of CN112132694A publication Critical patent/CN112132694A/en
Application granted granted Critical
Publication of CN112132694B publication Critical patent/CN112132694B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a warranty security case confirmation and verification method, which comprises the steps of executing first trial calculation on warranty security data to be confirmed according to a warranty security request instruction to obtain first trial calculation data; performing first verification on the policy and security data to be confirmed based on the first trial calculation data to obtain first verification conclusion data; when the first verification conclusion data is failed to verify, second trial calculation data is called back, and the second trial calculation data is trial calculation data obtained by performing trial calculation based on user change operation; and executing second check on the policy preservation data to be confirmed based on the second trial calculation data to obtain changed policy preservation data to be confirmed, and executing security confirmation on the changed policy preservation data to be confirmed. The invention executes bidirectional verification in the process of confirming and verifying the security-preserving case, can avoid the occurrence of the operation of executing the security confirmation by a background because the operation of re-changing after the user submits the security confirmation and verification is not found in time, and improves the working efficiency of confirming the security-preserving case.

Description

Policy and security case confirmation and verification method, device, equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of big data, in particular to a method, a device, equipment and a storage medium for confirming and checking a policy and security case.
Background
At present, in the insurance industry, the confirmation operation of the policy and the security case can logically separate the sum of trial calculation and the security confirmation calculation in order to ensure the accuracy of the final sum, thereby realizing collision check, and if the sums are not equal, the security confirmation can not be carried out.
However, in the confirmation operation of the policy and security case, after the user commits the trial calculation, when the policy and security case is already submitted to the security confirmation stage, the user may still find that the original related information needs to be modified, and after the user modifies the related information of the policy and security case, the trial calculation amount and the confirmation amount in the security confirmation stage are inconsistent, and the process of security confirmation cannot be carried out, and only rollback or removal redo is performed, which greatly affects the working efficiency.
In the actual operation process, when the method is adopted to execute the security confirmation operation, the problem that the security confirmation amount is inconsistent with the trial calculation amount occurs on average every day.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method, an apparatus, a device, and a storage medium for confirming and checking a policy and security case, so as to solve the problem that when a policy and security case is submitted to a security confirmation stage, a user modifies the original related information, cannot confirm the policy and security case, and can only confirm the policy and security case by rollback or removing a redo, which is low in working efficiency.
The embodiment of the invention solves the technical problems through the following technical scheme:
a warranty and security case confirmation and verification method comprises the following steps:
receiving a security request instruction sent by a client, wherein the security request instruction carries security data of a policy to be confirmed;
executing a first trial calculation on the policy and security data to be confirmed according to the policy and security request instruction to obtain first trial calculation data;
performing first verification on the policy and security data to be confirmed based on the first trial calculation data to obtain first verification conclusion data;
when the first verification conclusion data is failed to verify, second trial calculation data is called back, and the second trial calculation data is trial calculation data obtained by performing trial calculation based on user change operation;
and executing second check on the to-be-confirmed policy and security data based on the second trial calculation data to obtain changed to-be-confirmed policy and security data, and executing security confirmation on the changed to-be-confirmed policy and security data.
Further, the performing a first trial calculation on the policy and security data to be confirmed according to the policy and security request instruction to obtain first trial calculation data further includes:
obtaining the policy preservation type from the policy preservation data to be confirmed;
determining a target trial calculation rule based on the policy and security type;
and executing first trial calculation on the insurance policy and security data to be confirmed based on the target trial calculation rule to obtain first trial calculation data.
Further, the performing a first check on the policy and security data to be confirmed based on the first trial calculation data to obtain first check conclusion data includes:
acquiring the first trial calculation data submission time of the policy and security data to be confirmed;
traversing trial calculation data associated with the policy and security data to be confirmed to determine the latest submission time of the trial calculation data;
and when the latest submission time of the trial calculation data is later than the submission time of the first trial calculation data, generating first verification conclusion data, wherein the first verification conclusion data is verification failure.
Further, after the performing the first check on the policy and security data to be confirmed based on the first trial calculation data to obtain first check conclusion data, the method further includes:
and acquiring first confidence degrees corresponding to a plurality of indexes of the policy preservation data to be confirmed when the first trial calculation is executed.
Further, the performing a second check on the policy and security data to be confirmed based on the second trial calculation data to obtain changed policy and security data to be confirmed includes:
acquiring second confidence degrees corresponding to a plurality of indexes of the policy preservation data to be confirmed when second trial calculation is executed based on the second trial calculation data;
comparing the first confidence degrees and the second confidence degrees corresponding to the indexes to determine the index to be changed;
and replacing the corresponding index in the policy and security data to be confirmed by the index to be changed to obtain the changed policy and security data to be confirmed, and executing security confirmation on the changed policy and security data to be confirmed.
Further, when the first verification conclusion data is failed to be verified, the callback of the second trial calculation data further includes:
generating a bidirectional verification instruction based on the first verification conclusion data;
and calling back second trial calculation data based on the bidirectional verification instruction, and creating a temporary form based on the second trial calculation data.
Further, the executing security confirmation on the changed to-be-confirmed policy security data further includes:
extracting user data from the policy and security request instruction;
determining a risk level based on the policy preservation data to be confirmed and the user data;
generating a policy and security confirmation task based on the risk level and policy and security data to be confirmed, and pushing the policy and security confirmation to the client;
receiving a policy preservation confirmation instruction generated by the client based on the policy preservation confirmation task;
and executing security confirmation on the changed to-be-confirmed security data based on the security guarantee confirmation instruction.
In order to achieve the above object, an embodiment of the present invention further provides a device for verifying and verifying a policy and security case, including:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a security request instruction sent by a client, and the security request instruction carries security data of a policy to be confirmed;
the trial calculation module is used for executing first trial calculation on the to-be-confirmed policy and security data according to the policy and security request instruction to obtain first trial calculation data;
the first checking module is used for performing first checking on the policy and security data to be confirmed based on the first trial calculation data to obtain first checking conclusion data;
the callback module is used for calling back second trial calculation data when the first verification conclusion data is failed to verify, wherein the second trial calculation data is trial calculation data obtained by performing trial calculation after user change operation;
and the second check module is used for executing second check on the policy preservation data to be confirmed based on the second trial calculation data to obtain changed policy preservation data to be confirmed and executing the preservation confirmation on the changed policy preservation data to be confirmed.
In order to achieve the above object, an embodiment of the present invention further provides an apparatus, where the apparatus includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor implements the steps of the policy and security case validation verification method as described above when executing the computer program.
In order to achieve the above object, an embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, where the computer program is executable by at least one processor, so as to cause the at least one processor to execute the steps of the policy and security case verification and verification method described above.
According to the policy preservation case confirmation and verification method, device, equipment and storage medium provided by the embodiment of the invention, through the first verification of the policy preservation data to be confirmed, whether the change of the policy preservation data to be confirmed is carried out after the trial calculation data is submitted by a user is judged; when the first verification conclusion data is failed to verify, the second trial calculation data is recalled, the second verification is executed, the bidirectional verification is executed in the process of verifying and verifying the insurance policy and insurance policy preservation case, the insurance policy and insurance policy preservation data after being changed can be guaranteed to be subjected to insurance verification in time, the phenomenon that the operation of executing insurance policy preservation confirmation in the background is caused because the operation of re-changing after the user submits the insurance policy and insurance policy preservation case verification is not found in time is avoided, and the work efficiency of the insurance policy and insurance policy preservation case confirmation is improved.
The invention is described in detail below with reference to the drawings and specific examples, but the invention is not limited thereto.
Drawings
FIG. 1 is a flowchart illustrating steps of a method for verifying and verifying a policy and security case according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a first trial calculation performed in the method for verifying and verifying a policy and security case according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a first verification process performed in the policy and security case verification method according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating a procedure of retrieving second trial calculation data in the policy and security case verification method according to the first embodiment of the present invention;
FIG. 5 is a flowchart illustrating a second verification process performed in the method for verifying and verifying a security case of a policy protection system according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating a procedure of performing security verification in a security case verification method according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of a program module of a verification device for confirming a security case of a second embodiment of the present invention;
fig. 8 is a schematic hardware structure diagram of an apparatus according to a third embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Technical solutions between various embodiments may be combined with each other, but must be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
Example one
Referring to fig. 1, a flowchart illustrating steps of a method for verifying and verifying a policy and security case according to an embodiment of the present invention is shown. It is to be understood that the flow charts in the embodiments of the present method are not intended to limit the order in which the steps are performed. The following description is given by taking a computer device as an execution subject, specifically as follows:
as shown in fig. 1, the method for verifying and verifying the policy and security case may include steps S100 to S500, wherein:
step S100, receiving a security request instruction sent by a client, wherein the security request instruction carries security data of a policy to be confirmed.
Specifically, the insurance refers to non-public services such as a precondition service, a core service, a basic service, an additional service and the like which are developed around items such as contract change, annuity or full fund payment and the like according to contract clause agreement and application of a client after an insurance contract is established by an insurance company so as to ensure the accuracy and effectiveness of the insurance contract, and the insurance is a service provided by the insurance company for a specific guarantee object. It can be understood that after the insurance company establishes the insurance contract, the insurance company fulfills the insurance payment responsibility of the contract agreement through the core service (claim settlement, payment); maintaining the accuracy of insurance contracts through basic services (change class, refund class, management service class); the effectiveness of the insurance contract is maintained through the precondition service and the additional service. Wherein, the change class service in the basic service refers to: the policyholder conforms to the regulations of the company within the validity period of the contract, applies for the change of the identical content, and takes effect after the approval of the company and the annotation on the contract; and according to the contract rule, the policy of the client is enabled, and the policy is changed under the requirement of the client so as to serve the client.
Illustratively, the policy preservation request instruction is used for requesting the computer device to perform preservation confirmation on the policy preservation data to be confirmed.
And step S200, executing first trial calculation on the to-be-confirmed policy and security data according to the policy and security request instruction to obtain first trial calculation data.
Specifically, the first trial calculation data is first trial calculation amount data after trial calculation is performed by the computer device in response to the application item in the policy and security request instruction sent by the client.
In an exemplary embodiment, with continuing reference to fig. 2, step S200 may further include:
step S201, obtaining the policy preservation type from the policy preservation data to be confirmed;
step S202, determining a target trial calculation rule based on the policy preservation type;
step S203, executing a first trial calculation on the policy and security data to be confirmed based on the target trial calculation rule to obtain first trial calculation data.
In an exemplary embodiment, before performing the trial calculation, the security type is further obtained from the security confirmation request instruction, so that the computer device can quickly identify the security type of the policy requested by the user. The security type includes, but is not limited to, security service of the subject, security service of the contract content, security service of the contract form, and the like.
The insurance subject refers to an object participating in insurance business, and the insurance subject comprises: insurers (insurance companies), insureds, and also insurers and beneficiaries; the subject's security service content includes, but is not limited to: insurance policy migration for insurers, applicant changes (information changes and identification card changes), insured information changes (identification card, gender, age, occupation changes, etc.), beneficiary changes.
The preservation service of the contract content is divided into core content preservation and non-core content preservation. The core content preservation refers to claim settlement, payment and the like; non-core content preservation refers to prerequisite services, basic services (change classes (modifying personal information) such as preservation adding and subtracting, refunding class, management service classes such as renewal, recovery, policy pledge, bonus delivery, etc.) and additional services.
The contract-type security service refers to the security of the policy, such as the loss-reporting and reimbursement of the policy, insurance contract reimbursement, and the like. Step S300, performing first verification on the warranty security data to be confirmed based on the first trial calculation data to obtain first verification conclusion data.
In an exemplary embodiment, when the background receives a policy protection request instruction sent by the client, the computer device automatically executes a first verification operation on the policy protection data to be confirmed. The computer device automatically executes the first verification operation on the security data of the policy to be confirmed, which can be understood as that whether a change operation exists in the client or not is automatically identified before subsequent security confirmation operation is carried out.
In an exemplary embodiment, with continuing reference to fig. 3, step S300 may further include:
step S301, obtaining the first trial calculation data submission time of the policy and security data to be confirmed;
step S302, traversing trial calculation data associated with the policy and security data to be confirmed to determine the latest submission time of the trial calculation data;
step S303, when the latest submission time of the trial calculation data is later than the submission time of the first trial calculation data, generating first verification conclusion data, wherein the first verification conclusion data is verification failure.
In an exemplary embodiment, after receiving a policy and security request instruction sent by a client, a computer device executes a first trial calculation on policy and security data to be confirmed to obtain first trial calculation data, and then sends the first trial calculation data and the policy and security data to be confirmed to a background, at this time, the computer device automatically identifies whether a user has a change operation on the client through the background, if the user finds that the original operation information is wrong, the user changes the operation information of the policy and security data to be confirmed, and then executes a second trial calculation operation according to the changed policy and security data to be confirmed to obtain second trial calculation data. If the user still finds that the operation information is wrong after the second trial calculation operation, the user can continue to change the operation information of the policy and security data to be confirmed, and then executes the latest trial calculation operation according to the latest changed policy and security data to be confirmed so as to obtain the latest trial calculation data.
Trial calculation data for trial calculation of each policy preservation data to be confirmed is associated with the policy preservation data to be confirmed. When the policy and security data to be confirmed are subjected to first verification, trial calculation data associated with the policy and security data to be confirmed are traversed, the submission time corresponding to each trial calculation data is obtained, the first trial calculation data corresponds to the submission time of the first trial calculation data, the second trial calculation data corresponds to the submission time of the second trial calculation data, and the like, and the latest submission time of the trial calculation data is determined. And analyzing the warranty preservation data to be confirmed to obtain the submission time of the warranty preservation data to be confirmed. And if the submission time of the first trial calculation data is equal to the latest submission time of the trial calculation data, determining that no change exists, generating first verification conclusion data with successful verification, and directly executing security confirmation on the policy security data to be confirmed based on the first verification conclusion data. If the first trial calculation data submission time is later than the first trial calculation data submission time, generating first verification conclusion data which fails in verification, and understanding that operation information change exists.
In an exemplary embodiment, after the performing the first check on the policy security data to be confirmed based on the first trial calculation data to obtain first check conclusion data, the method further includes: and acquiring first confidence degrees corresponding to a plurality of indexes of the policy preservation data to be confirmed when the first trial calculation is executed.
And S400, when the first verification conclusion data is failed to verify, calling back second trial calculation data, wherein the second trial calculation data is trial calculation data obtained by performing trial calculation after user change operation.
In an exemplary embodiment, with continuing reference to fig. 4, when the first verification conclusion data is failed to be verified, the step S400 of recalling the second trial data further includes the following steps:
step S401, generating a bidirectional verification instruction based on the first verification conclusion data;
and S402, calling back second trial calculation data based on the bidirectional verification instruction, and creating a temporary form based on the second trial calculation data.
In an exemplary embodiment, if the first verification conclusion data is verified unsuccessfully, it may be understood that there is an operation information change, and the method may generate a bidirectional verification instruction based on the first verification conclusion data, and call back the second trial calculation data based on the bidirectional verification instruction.
Step S500, executing second check-up to the warrant security data to be confirmed based on the second trial calculation data to obtain changed warrant security data to be confirmed, and executing security confirmation to the changed warrant security data to be confirmed.
In an exemplary embodiment, with continuing reference to fig. 5, step S500 may further include:
step S501, based on the second trial calculation data, obtaining second confidence degrees corresponding to a plurality of indexes of the policy and security data to be confirmed when the second trial calculation is executed;
step S502, comparing the first confidence degrees and the second confidence degrees corresponding to the indexes to determine the index to be changed;
step S503, replacing the corresponding index in the policy and security data to be confirmed by the index to be changed to obtain the changed policy and security data to be confirmed, and executing security confirmation on the changed policy and security data to be confirmed.
In an exemplary embodiment, the confidence levels corresponding to the indexes can be calculated by comparing the change models. The plurality of indices (R) include: age, occupation, day of action, gender, level of assurance, date of application for warranty, discount, risk category, etc.
Exemplary model parameters of the contrast variation model include, but are not limited to: the weight corresponding to the age is W1, the dynamic distribution factor (L) corresponding to the age is 0.5, the weight corresponding to the occupation is W2, the dynamic distribution factor corresponding to the occupation is 0.1, the weight corresponding to the effective day is W3, the dynamic distribution factor corresponding to the effective day is 0.005, the weight corresponding to the gender is W4, the dynamic distribution factor corresponding to the gender is 0.005, the weight corresponding to the guarantee level is W5, the dynamic distribution factor corresponding to the guarantee level is 0.3, the weight corresponding to the preservation application day is W6, the dynamic distribution factor corresponding to the preservation application day is 0, the weight corresponding to the discount is W7, the dynamic distribution factor corresponding to the discount is 0, the weight corresponding to the risk species is W8, the dynamic distribution factor corresponding to the risk species is 0, and the like.
The comparison change model specifically comprises the following steps: k ═ (H (r (i)) + di) MOD m × W; wherein, K represents the confidence corresponding to the index, H represents a hash function, m represents the number of hash, di represents the increment sequence, MOD represents the remainder function, R represents the index, and R (i) represents the ith index. The index identification is an influence factor on the premium, and the confidence coefficient represents the influence degree of each index attribute on the premium result. Determining influence factors of the premium through data modeling, then giving the influence degree of the index attribute on the premium result through comparing a change model, and enabling the contrast scattering to be distributed along with the influence degree through comparing the change model, so that the time complexity is changed from O (n) to O (logn).
In an exemplary embodiment, when the warranty preservation data to be confirmed is submitted to the background, a first confidence degree K1 corresponding to a plurality of indexes of the warranty preservation data to be confirmed at the time can be calculated through a comparison change model, when the first verification result is that the verification fails, a second trial calculation data is recalled, and the calculation logic when the second trial calculation data is executed, a temporary form is created, a second confidence degree K2 corresponding to the plurality of indexes of the warranty preservation data to be confirmed at the time is calculated through the comparison change model, an index with the K1 not equal to the K2 is determined as the index to be changed, and the warranty preservation data to be confirmed is replaced based on the index to be changed to obtain the changed warranty preservation data to be confirmed. In an exemplary embodiment, please continue to refer to fig. 6, the method further includes the specific step of performing security validation on the changed policy security data to be validated:
step S601, extracting user data from the policy maintenance request instruction;
step S602, determining a risk level based on the policy and security data to be confirmed and the user data;
step S603, generating a policy and security confirmation task based on the risk level and policy and security data to be confirmed, and pushing the policy and security confirmation to the client;
step S604, receiving a policy preservation confirmation instruction generated by the client based on the policy preservation confirmation task;
and step S605, executing security confirmation on the changed to-be-confirmed security data based on the security confirmation instruction.
Illustratively, after the changed to-be-confirmed policy preservation data is obtained, the computer device receives the policy preservation confirmation instruction, and then triggers the receipt and payment summarizing function again to modify information such as a relevant receipt and invoice, so as to ensure subsequent promotion of the security confirmation process.
The method comprises the steps of judging whether the change of the policy preservation data to be confirmed exists after a user submits trial calculation data through first verification of the policy preservation data to be confirmed; when the first verification conclusion data is failed to verify, the second trial calculation data is recalled, the second verification is executed, the bidirectional verification is executed in the verification process of the warranty security case, the warranty security data after change can be guaranteed to be timely verified, the situation that the operation of executing the security verification at the background is caused because the operation of re-changing after the user submits the verification of the security verification is not timely found is avoided, and the productivity of counter personnel, operation and maintenance personnel and developers is relieved; the working efficiency of confirming the policy and security case is improved; the timeliness is improved, the user experience is well developed, and the company image is improved in a certain program.
Example two
Please refer to fig. 7, which shows a schematic diagram of the program modules of the verification apparatus for confirming the policy and security case of the present invention. In this embodiment, the warranty security case verification apparatus 20 may include or be divided into one or more program modules, and the one or more program modules are stored in a storage medium and executed by one or more processors to implement the present invention and implement the above-mentioned warranty security case verification method. The program module referred to in the embodiments of the present invention is a series of computer program instruction segments capable of performing specific functions, and is more suitable for describing the execution process of the warranty and security case confirmation verification apparatus 20 in the storage medium than the program itself. The following description will specifically describe the functions of the program modules of the present embodiment:
the receiving module 700 is configured to receive a security request instruction sent by a client, where the security request instruction carries security data of a policy to be confirmed.
And the trial calculation module 710 is configured to perform a first trial calculation on the policy and security data to be confirmed according to the policy and security request instruction to obtain first trial calculation data.
A first checking module 720, configured to perform a first check on the policy and security data to be confirmed based on the first trial calculation data to obtain first check conclusion data.
The call-back module 730 is configured to call back second trial calculation data when the first verification conclusion data is failed to be verified, where the second trial calculation data is trial calculation data obtained by performing trial calculation after the user change operation.
And the second checking module 740 is configured to perform a second check on the policy preservation data to be confirmed based on the second trial calculation data to obtain changed policy preservation data to be confirmed, and perform a preservation confirmation on the changed policy preservation data to be confirmed.
In an exemplary embodiment, the trial module 710 is further configured to: obtaining the policy preservation type from the policy preservation data to be confirmed; determining a target trial calculation rule based on the policy and security type; and executing first trial calculation on the insurance policy and security data to be confirmed based on the target trial calculation rule to obtain first trial calculation data.
In an exemplary embodiment, the first checking module 720 is further configured to: acquiring the first trial calculation data submission time of the policy and security data to be confirmed; traversing trial calculation data associated with the policy and security data to be confirmed to determine the latest submission time of the trial calculation data; and when the latest submission time of the trial calculation data is later than the submission time of the first trial calculation data, generating first verification conclusion data, wherein the first verification conclusion data is verification failure.
In an exemplary embodiment, the first checking module 720 is further configured to: and acquiring first confidence degrees corresponding to a plurality of indexes of the policy preservation data to be confirmed when the first trial calculation is executed.
In an exemplary embodiment, the second check module 740 is further configured to: acquiring second confidence degrees corresponding to a plurality of indexes of the policy preservation data to be confirmed when second trial calculation is executed based on the second trial calculation data; comparing the first confidence degrees and the second confidence degrees corresponding to the indexes to determine the index to be changed; and replacing the corresponding index in the policy and security data to be confirmed by the index to be changed to obtain the changed policy and security data to be confirmed, and executing security confirmation on the changed policy and security data to be confirmed.
In an exemplary embodiment, the callback module 730 is further configured to: generating a bidirectional verification instruction based on the first verification conclusion data; and calling back second trial calculation data based on the bidirectional verification instruction, and creating a temporary form based on the second trial calculation data.
In an exemplary embodiment, the policy and security case confirmation and verification method further includes: extracting user data from the policy and security request instruction; determining a risk level based on the policy preservation data to be confirmed and the user data; generating a policy and security confirmation task based on the risk level and policy and security data to be confirmed, and pushing the policy and security confirmation to the client; receiving a policy preservation confirmation instruction generated by the client based on the policy preservation confirmation task; and executing security confirmation on the changed to-be-confirmed security data based on the security guarantee confirmation instruction.
EXAMPLE III
Fig. 8 is a schematic diagram of a hardware architecture of a device according to a third embodiment of the present invention. In the present embodiment, the device 2 is a computer device capable of automatically performing numerical calculation and/or information processing in accordance with a preset or stored instruction. The device 2 may be a rack server, a blade server, a tower server, or a rack server (including an independent server or a server cluster composed of a plurality of servers). As shown in fig. 8, the device 2 includes, but is not limited to, at least a memory 21, a processor 22, a network interface 23, and a policy and security case confirmation checking device 20, which are communicatively connected to each other through a system bus. Wherein:
in this embodiment, the memory 21 includes at least one type of computer-readable storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the storage 21 may be an internal storage unit of the device 2, such as a hard disk or a memory of the device 2. In other embodiments, the memory 21 may also be an external storage device of the device 2, such as a plug-in hard disk provided on the computer device 2, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Of course, the memory 21 may also comprise both an internal memory unit of the device 2 and an external memory device thereof. In this embodiment, the memory 21 is generally used for storing an operating system and various application software installed in the device 2, such as the program codes of the policy and security case verification and verification apparatus 20 in the above embodiment. Further, the memory 21 may also be used to temporarily store various types of data that have been output or are to be output.
Processor 22 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 22 is typically used to control the overall operation of the computer device 2. In this embodiment, the processor 22 is configured to run the program codes stored in the memory 21 or process data, for example, run the policy and security case verification apparatus 20, so as to implement the policy and security case verification method of the above embodiment.
The network interface 23 may comprise a wireless network interface or a wired network interface, and the network interface 23 is typically used for establishing a communication connection between the apparatus 2 and other electronic devices. For example, the network interface 23 is used to connect the device 2 to an external terminal through a network, establish a data transmission channel and a communication connection between the device 2 and the external terminal, and the like. The network may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a Global System of Mobile communication (GSM), Wideband Code Division Multiple Access (WCDMA), a 4G network, a 5G network, Bluetooth (Bluetooth), Wi-Fi, and the like.
It is noted that fig. 8 only shows the device 2 with components 20-23, but it is to be understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead.
In this embodiment, the policy and security case verification apparatus 20 stored in the memory 21 may be further divided into one or more program modules, and the one or more program modules are stored in the memory 21 and executed by one or more processors (in this embodiment, the processor 22) to complete the present invention.
For example, fig. 7 is a schematic diagram of program modules of a second embodiment of the verification apparatus 20 for confirming a policy and security-based case, in which the verification apparatus 20 can be divided into a receiving module 700, a trial calculation module 710, a first verification module 720, a callback module 730, and a second verification module 740. The program module referred to in the present invention refers to a series of computer program instruction segments capable of performing specific functions, and is more suitable than a program for describing the execution process of the warranty and security case verification apparatus 20 in the device 2. The specific functions of the program modules 700 and 740 have been described in detail in the second embodiment, and are not described herein again.
Example four
The present embodiment also provides a storage medium, such as a computer-readable storage medium of a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, a server, an App application mall, etc., on which a computer program is stored, which when executed by a processor implements a corresponding function. The storage medium of this embodiment is used to store the policy and security case verification apparatus 20, and when executed by the processor, the storage medium implements the policy and security case verification method of the above embodiment.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A method for confirming and checking a policy and security case is characterized by comprising the following steps:
receiving a security request instruction sent by a client, wherein the security request instruction carries security data of a policy to be confirmed;
executing a first trial calculation on the policy and security data to be confirmed according to the policy and security request instruction to obtain first trial calculation data;
performing first verification on the policy and security data to be confirmed based on the first trial calculation data to obtain first verification conclusion data;
when the first verification conclusion data is failed to verify, second trial calculation data is called back, and the second trial calculation data is trial calculation data obtained by performing trial calculation based on user change operation;
and executing second check on the to-be-confirmed policy and security data based on the second trial calculation data to obtain changed to-be-confirmed policy and security data, and executing security confirmation on the changed to-be-confirmed policy and security data.
2. The method as claimed in claim 1, wherein the step of performing a first trial calculation on the policy and security data to be confirmed according to the policy and security request command to obtain first trial calculation data further comprises:
obtaining the policy preservation type from the policy preservation data to be confirmed;
determining a target trial calculation rule based on the policy and security type;
and executing first trial calculation on the insurance policy and security data to be confirmed based on the target trial calculation rule to obtain first trial calculation data.
3. The warranty security case confirmation verification method according to claim 2, wherein said performing a first verification on the warranty security data to be confirmed based on the first trial calculation data to obtain first verification conclusion data comprises:
acquiring the first trial calculation data submission time of the policy and security data to be confirmed;
traversing trial calculation data associated with the policy and security data to be confirmed to determine the latest submission time of the trial calculation data;
and when the latest submission time of the trial calculation data is later than the submission time of the first trial calculation data, generating first verification conclusion data, wherein the first verification conclusion data is verification failure.
4. The warranty security case confirmation verification method according to claim 3, wherein after performing the first verification on the warranty security data to be confirmed based on the first trial calculation data to obtain first verification conclusion data, further comprising:
and acquiring first confidence degrees corresponding to a plurality of indexes of the policy preservation data to be confirmed when the first trial calculation is executed.
5. The method of claim 4, wherein said performing a second check on said warranty security data to be validated based on said second trial data to obtain altered warranty security data to be validated, said performing a security validation on said altered warranty security data to be validated comprising:
acquiring second confidence degrees corresponding to a plurality of indexes of the policy preservation data to be confirmed when second trial calculation is executed based on the second trial calculation data;
comparing the first confidence degrees and the second confidence degrees corresponding to the indexes to determine the index to be changed;
and replacing the corresponding index in the policy and security data to be confirmed by the index to be changed to obtain the changed policy and security data to be confirmed, and executing security confirmation on the changed policy and security data to be confirmed.
6. The warranty security case confirmation check method according to claim 1, wherein when the first check conclusion data is a check failure, the recalling the second trial calculation data further comprises:
generating a bidirectional verification instruction based on the first verification conclusion data;
and calling back second trial calculation data based on the bidirectional verification instruction, and creating a temporary form based on the second trial calculation data.
7. The policy and security case verification and verification method according to claim 1, wherein said performing security verification on said changed policy and security data to be verified further comprises:
extracting user data from the policy and security request instruction;
determining a risk level based on the policy preservation data to be confirmed and the user data;
generating a policy and security confirmation task based on the risk level and policy and security data to be confirmed, and pushing the policy and security confirmation to the client;
receiving a policy preservation confirmation instruction generated by the client based on the policy preservation confirmation task;
and executing security confirmation on the changed to-be-confirmed security data based on the security guarantee confirmation instruction.
8. A kind of insurance policy security case confirms the checkout gear, characterized by that, comprising:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a security request instruction sent by a client, and the security request instruction carries security data of a policy to be confirmed;
the trial calculation module is used for executing first trial calculation on the to-be-confirmed policy and security data according to the policy and security request instruction to obtain first trial calculation data;
the first checking module is used for performing first checking on the policy and security data to be confirmed based on the first trial calculation data to obtain first checking conclusion data;
the callback module is used for calling back second trial calculation data when the first verification conclusion data is failed to verify, wherein the second trial calculation data is trial calculation data obtained by performing trial calculation after user change operation;
and the second check module is used for executing second check on the policy preservation data to be confirmed based on the second trial calculation data to obtain changed policy preservation data to be confirmed and executing the preservation confirmation on the changed policy preservation data to be confirmed.
9. An apparatus comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor when executing the computer program implements the steps of the policy and security case validation verification method according to any one of claims 1 to 7.
10. A computer-readable storage medium having stored thereon a computer program executable by at least one processor to cause the at least one processor to perform the steps of the policy and security case validation verification method according to any one of claims 1 to 7.
CN202011039653.2A 2020-09-28 2020-09-28 Method, device, equipment and storage medium for confirming and checking policy and security case Active CN112132694B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011039653.2A CN112132694B (en) 2020-09-28 2020-09-28 Method, device, equipment and storage medium for confirming and checking policy and security case

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011039653.2A CN112132694B (en) 2020-09-28 2020-09-28 Method, device, equipment and storage medium for confirming and checking policy and security case

Publications (2)

Publication Number Publication Date
CN112132694A true CN112132694A (en) 2020-12-25
CN112132694B CN112132694B (en) 2024-04-09

Family

ID=73843113

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011039653.2A Active CN112132694B (en) 2020-09-28 2020-09-28 Method, device, equipment and storage medium for confirming and checking policy and security case

Country Status (1)

Country Link
CN (1) CN112132694B (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4642768A (en) * 1984-03-08 1987-02-10 Roberts Peter A Methods and apparatus for funding future liability of uncertain cost
EP0278132A1 (en) * 1987-02-09 1988-08-17 College Savings Bank Methods and apparatus for funding future liability of uncertain cost
US20110125536A1 (en) * 2009-11-23 2011-05-26 Hartford Fire Insurance Company System and method for administering insurance policies issued before comprehensive underwriting
CN106056348A (en) * 2016-05-18 2016-10-26 平安科技(深圳)有限公司 Maintenance information change method and device
CN107316176A (en) * 2016-04-27 2017-11-03 平安科技(深圳)有限公司 The control method and device of declaration form processing
CN107527099A (en) * 2016-06-21 2017-12-29 平安科技(深圳)有限公司 Save reservation processing method and device from damage
US10121207B1 (en) * 2013-10-04 2018-11-06 United Services Automobile Association Insurance policy alterations using informatic sensor data
CN108765175A (en) * 2018-06-01 2018-11-06 中国平安人寿保险股份有限公司 Declaration form saves information processing method, device, computer equipment and storage medium from damage
CN109242261A (en) * 2018-08-14 2019-01-18 中国平安人寿保险股份有限公司 Save the method and terminal device of risk from damage based on big data assessment
CN109345193A (en) * 2018-09-06 2019-02-15 平安科技(深圳)有限公司 Policy security review method and terminal equipment based on information security
CN109670968A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 Processing method, device, equipment and the computer storage medium of insurance data
CN109685669A (en) * 2018-12-11 2019-04-26 北京量子保科技有限公司 A kind of policy information data processing method and system
CN109801174A (en) * 2018-12-26 2019-05-24 平安科技(深圳)有限公司 Claims Resolution data processing method, device, equipment and computer readable storage medium
CN109902095A (en) * 2019-01-25 2019-06-18 平安科技(深圳)有限公司 Policy information update method, device, terminal and computer readable storage medium
CN111080390A (en) * 2019-11-06 2020-04-28 泰康保险集团股份有限公司 Order information modification method, system, equipment and storage medium
CN111126935A (en) * 2019-11-19 2020-05-08 泰康保险集团股份有限公司 Processing method and device of security data, electronic equipment and storage medium

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4642768A (en) * 1984-03-08 1987-02-10 Roberts Peter A Methods and apparatus for funding future liability of uncertain cost
EP0278132A1 (en) * 1987-02-09 1988-08-17 College Savings Bank Methods and apparatus for funding future liability of uncertain cost
US20110125536A1 (en) * 2009-11-23 2011-05-26 Hartford Fire Insurance Company System and method for administering insurance policies issued before comprehensive underwriting
US10121207B1 (en) * 2013-10-04 2018-11-06 United Services Automobile Association Insurance policy alterations using informatic sensor data
CN107316176A (en) * 2016-04-27 2017-11-03 平安科技(深圳)有限公司 The control method and device of declaration form processing
CN106056348A (en) * 2016-05-18 2016-10-26 平安科技(深圳)有限公司 Maintenance information change method and device
CN107527099A (en) * 2016-06-21 2017-12-29 平安科技(深圳)有限公司 Save reservation processing method and device from damage
CN108765175A (en) * 2018-06-01 2018-11-06 中国平安人寿保险股份有限公司 Declaration form saves information processing method, device, computer equipment and storage medium from damage
CN109242261A (en) * 2018-08-14 2019-01-18 中国平安人寿保险股份有限公司 Save the method and terminal device of risk from damage based on big data assessment
CN109345193A (en) * 2018-09-06 2019-02-15 平安科技(深圳)有限公司 Policy security review method and terminal equipment based on information security
CN109670968A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 Processing method, device, equipment and the computer storage medium of insurance data
CN109685669A (en) * 2018-12-11 2019-04-26 北京量子保科技有限公司 A kind of policy information data processing method and system
CN109801174A (en) * 2018-12-26 2019-05-24 平安科技(深圳)有限公司 Claims Resolution data processing method, device, equipment and computer readable storage medium
CN109902095A (en) * 2019-01-25 2019-06-18 平安科技(深圳)有限公司 Policy information update method, device, terminal and computer readable storage medium
CN111080390A (en) * 2019-11-06 2020-04-28 泰康保险集团股份有限公司 Order information modification method, system, equipment and storage medium
CN111126935A (en) * 2019-11-19 2020-05-08 泰康保险集团股份有限公司 Processing method and device of security data, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN112132694B (en) 2024-04-09

Similar Documents

Publication Publication Date Title
US11798091B2 (en) System and method for image-based vehicle repair estimate verification
CN111192144A (en) Financial data prediction method, device, equipment and storage medium
CN112330471B (en) Service data processing method, device, computer equipment and storage medium
CN109359277B (en) Data monitoring method, device and computer storage medium
US20120278217A1 (en) Systems and methods for improving prediction of future credit risk performances
CN111124917B (en) Method, device, equipment and storage medium for managing and controlling public test cases
CN110941630A (en) Database operation and maintenance method, device and system
CN107798592B (en) Method and apparatus for calculating commission
CN108491304B (en) electronic device, business system risk control method and storage medium
CN108090831A (en) Credit Risk Assessment method, application server and computer readable storage medium
CN111340402A (en) Group insurance service management method, system, device and storage medium
CN111258832A (en) Interface parameter checking method, device, equipment and medium
CN111210109A (en) Method and device for predicting user risk based on associated user and electronic equipment
CN117421311A (en) Data verification method, device, equipment and storage medium based on artificial intelligence
CN103440460A (en) Application system change validation method and system
CN112598422A (en) Transaction risk assessment method, system, device and storage medium
CN112685437A (en) Configuration-based commission calculation method, device, equipment and storage medium
CN112132694B (en) Method, device, equipment and storage medium for confirming and checking policy and security case
CN111027977A (en) Data verification method and device and electronic equipment
CN116680261A (en) Data reporting method, system and device
CN109377378B (en) Industry relevancy risk determination device and system
CN115511458A (en) Data checking method, device, equipment and medium
CN115330365A (en) Data processing method and device based on block chain and computer equipment
CN112862608A (en) Transaction data matching method and device
CN111047303A (en) Carbon emission right transaction settlement method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载