CN112132694A - Policy and security case confirmation and verification method, device, equipment and storage medium - Google Patents
Policy and security case confirmation and verification method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN112132694A CN112132694A CN202011039653.2A CN202011039653A CN112132694A CN 112132694 A CN112132694 A CN 112132694A CN 202011039653 A CN202011039653 A CN 202011039653A CN 112132694 A CN112132694 A CN 112132694A
- Authority
- CN
- China
- Prior art keywords
- data
- security
- policy
- trial calculation
- confirmed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention provides a warranty security case confirmation and verification method, which comprises the steps of executing first trial calculation on warranty security data to be confirmed according to a warranty security request instruction to obtain first trial calculation data; performing first verification on the policy and security data to be confirmed based on the first trial calculation data to obtain first verification conclusion data; when the first verification conclusion data is failed to verify, second trial calculation data is called back, and the second trial calculation data is trial calculation data obtained by performing trial calculation based on user change operation; and executing second check on the policy preservation data to be confirmed based on the second trial calculation data to obtain changed policy preservation data to be confirmed, and executing security confirmation on the changed policy preservation data to be confirmed. The invention executes bidirectional verification in the process of confirming and verifying the security-preserving case, can avoid the occurrence of the operation of executing the security confirmation by a background because the operation of re-changing after the user submits the security confirmation and verification is not found in time, and improves the working efficiency of confirming the security-preserving case.
Description
Technical Field
The embodiment of the invention relates to the technical field of big data, in particular to a method, a device, equipment and a storage medium for confirming and checking a policy and security case.
Background
At present, in the insurance industry, the confirmation operation of the policy and the security case can logically separate the sum of trial calculation and the security confirmation calculation in order to ensure the accuracy of the final sum, thereby realizing collision check, and if the sums are not equal, the security confirmation can not be carried out.
However, in the confirmation operation of the policy and security case, after the user commits the trial calculation, when the policy and security case is already submitted to the security confirmation stage, the user may still find that the original related information needs to be modified, and after the user modifies the related information of the policy and security case, the trial calculation amount and the confirmation amount in the security confirmation stage are inconsistent, and the process of security confirmation cannot be carried out, and only rollback or removal redo is performed, which greatly affects the working efficiency.
In the actual operation process, when the method is adopted to execute the security confirmation operation, the problem that the security confirmation amount is inconsistent with the trial calculation amount occurs on average every day.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method, an apparatus, a device, and a storage medium for confirming and checking a policy and security case, so as to solve the problem that when a policy and security case is submitted to a security confirmation stage, a user modifies the original related information, cannot confirm the policy and security case, and can only confirm the policy and security case by rollback or removing a redo, which is low in working efficiency.
The embodiment of the invention solves the technical problems through the following technical scheme:
a warranty and security case confirmation and verification method comprises the following steps:
receiving a security request instruction sent by a client, wherein the security request instruction carries security data of a policy to be confirmed;
executing a first trial calculation on the policy and security data to be confirmed according to the policy and security request instruction to obtain first trial calculation data;
performing first verification on the policy and security data to be confirmed based on the first trial calculation data to obtain first verification conclusion data;
when the first verification conclusion data is failed to verify, second trial calculation data is called back, and the second trial calculation data is trial calculation data obtained by performing trial calculation based on user change operation;
and executing second check on the to-be-confirmed policy and security data based on the second trial calculation data to obtain changed to-be-confirmed policy and security data, and executing security confirmation on the changed to-be-confirmed policy and security data.
Further, the performing a first trial calculation on the policy and security data to be confirmed according to the policy and security request instruction to obtain first trial calculation data further includes:
obtaining the policy preservation type from the policy preservation data to be confirmed;
determining a target trial calculation rule based on the policy and security type;
and executing first trial calculation on the insurance policy and security data to be confirmed based on the target trial calculation rule to obtain first trial calculation data.
Further, the performing a first check on the policy and security data to be confirmed based on the first trial calculation data to obtain first check conclusion data includes:
acquiring the first trial calculation data submission time of the policy and security data to be confirmed;
traversing trial calculation data associated with the policy and security data to be confirmed to determine the latest submission time of the trial calculation data;
and when the latest submission time of the trial calculation data is later than the submission time of the first trial calculation data, generating first verification conclusion data, wherein the first verification conclusion data is verification failure.
Further, after the performing the first check on the policy and security data to be confirmed based on the first trial calculation data to obtain first check conclusion data, the method further includes:
and acquiring first confidence degrees corresponding to a plurality of indexes of the policy preservation data to be confirmed when the first trial calculation is executed.
Further, the performing a second check on the policy and security data to be confirmed based on the second trial calculation data to obtain changed policy and security data to be confirmed includes:
acquiring second confidence degrees corresponding to a plurality of indexes of the policy preservation data to be confirmed when second trial calculation is executed based on the second trial calculation data;
comparing the first confidence degrees and the second confidence degrees corresponding to the indexes to determine the index to be changed;
and replacing the corresponding index in the policy and security data to be confirmed by the index to be changed to obtain the changed policy and security data to be confirmed, and executing security confirmation on the changed policy and security data to be confirmed.
Further, when the first verification conclusion data is failed to be verified, the callback of the second trial calculation data further includes:
generating a bidirectional verification instruction based on the first verification conclusion data;
and calling back second trial calculation data based on the bidirectional verification instruction, and creating a temporary form based on the second trial calculation data.
Further, the executing security confirmation on the changed to-be-confirmed policy security data further includes:
extracting user data from the policy and security request instruction;
determining a risk level based on the policy preservation data to be confirmed and the user data;
generating a policy and security confirmation task based on the risk level and policy and security data to be confirmed, and pushing the policy and security confirmation to the client;
receiving a policy preservation confirmation instruction generated by the client based on the policy preservation confirmation task;
and executing security confirmation on the changed to-be-confirmed security data based on the security guarantee confirmation instruction.
In order to achieve the above object, an embodiment of the present invention further provides a device for verifying and verifying a policy and security case, including:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a security request instruction sent by a client, and the security request instruction carries security data of a policy to be confirmed;
the trial calculation module is used for executing first trial calculation on the to-be-confirmed policy and security data according to the policy and security request instruction to obtain first trial calculation data;
the first checking module is used for performing first checking on the policy and security data to be confirmed based on the first trial calculation data to obtain first checking conclusion data;
the callback module is used for calling back second trial calculation data when the first verification conclusion data is failed to verify, wherein the second trial calculation data is trial calculation data obtained by performing trial calculation after user change operation;
and the second check module is used for executing second check on the policy preservation data to be confirmed based on the second trial calculation data to obtain changed policy preservation data to be confirmed and executing the preservation confirmation on the changed policy preservation data to be confirmed.
In order to achieve the above object, an embodiment of the present invention further provides an apparatus, where the apparatus includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor implements the steps of the policy and security case validation verification method as described above when executing the computer program.
In order to achieve the above object, an embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, where the computer program is executable by at least one processor, so as to cause the at least one processor to execute the steps of the policy and security case verification and verification method described above.
According to the policy preservation case confirmation and verification method, device, equipment and storage medium provided by the embodiment of the invention, through the first verification of the policy preservation data to be confirmed, whether the change of the policy preservation data to be confirmed is carried out after the trial calculation data is submitted by a user is judged; when the first verification conclusion data is failed to verify, the second trial calculation data is recalled, the second verification is executed, the bidirectional verification is executed in the process of verifying and verifying the insurance policy and insurance policy preservation case, the insurance policy and insurance policy preservation data after being changed can be guaranteed to be subjected to insurance verification in time, the phenomenon that the operation of executing insurance policy preservation confirmation in the background is caused because the operation of re-changing after the user submits the insurance policy and insurance policy preservation case verification is not found in time is avoided, and the work efficiency of the insurance policy and insurance policy preservation case confirmation is improved.
The invention is described in detail below with reference to the drawings and specific examples, but the invention is not limited thereto.
Drawings
FIG. 1 is a flowchart illustrating steps of a method for verifying and verifying a policy and security case according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a first trial calculation performed in the method for verifying and verifying a policy and security case according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a first verification process performed in the policy and security case verification method according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating a procedure of retrieving second trial calculation data in the policy and security case verification method according to the first embodiment of the present invention;
FIG. 5 is a flowchart illustrating a second verification process performed in the method for verifying and verifying a security case of a policy protection system according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating a procedure of performing security verification in a security case verification method according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of a program module of a verification device for confirming a security case of a second embodiment of the present invention;
fig. 8 is a schematic hardware structure diagram of an apparatus according to a third embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Technical solutions between various embodiments may be combined with each other, but must be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
Example one
Referring to fig. 1, a flowchart illustrating steps of a method for verifying and verifying a policy and security case according to an embodiment of the present invention is shown. It is to be understood that the flow charts in the embodiments of the present method are not intended to limit the order in which the steps are performed. The following description is given by taking a computer device as an execution subject, specifically as follows:
as shown in fig. 1, the method for verifying and verifying the policy and security case may include steps S100 to S500, wherein:
step S100, receiving a security request instruction sent by a client, wherein the security request instruction carries security data of a policy to be confirmed.
Specifically, the insurance refers to non-public services such as a precondition service, a core service, a basic service, an additional service and the like which are developed around items such as contract change, annuity or full fund payment and the like according to contract clause agreement and application of a client after an insurance contract is established by an insurance company so as to ensure the accuracy and effectiveness of the insurance contract, and the insurance is a service provided by the insurance company for a specific guarantee object. It can be understood that after the insurance company establishes the insurance contract, the insurance company fulfills the insurance payment responsibility of the contract agreement through the core service (claim settlement, payment); maintaining the accuracy of insurance contracts through basic services (change class, refund class, management service class); the effectiveness of the insurance contract is maintained through the precondition service and the additional service. Wherein, the change class service in the basic service refers to: the policyholder conforms to the regulations of the company within the validity period of the contract, applies for the change of the identical content, and takes effect after the approval of the company and the annotation on the contract; and according to the contract rule, the policy of the client is enabled, and the policy is changed under the requirement of the client so as to serve the client.
Illustratively, the policy preservation request instruction is used for requesting the computer device to perform preservation confirmation on the policy preservation data to be confirmed.
And step S200, executing first trial calculation on the to-be-confirmed policy and security data according to the policy and security request instruction to obtain first trial calculation data.
Specifically, the first trial calculation data is first trial calculation amount data after trial calculation is performed by the computer device in response to the application item in the policy and security request instruction sent by the client.
In an exemplary embodiment, with continuing reference to fig. 2, step S200 may further include:
step S201, obtaining the policy preservation type from the policy preservation data to be confirmed;
step S202, determining a target trial calculation rule based on the policy preservation type;
step S203, executing a first trial calculation on the policy and security data to be confirmed based on the target trial calculation rule to obtain first trial calculation data.
In an exemplary embodiment, before performing the trial calculation, the security type is further obtained from the security confirmation request instruction, so that the computer device can quickly identify the security type of the policy requested by the user. The security type includes, but is not limited to, security service of the subject, security service of the contract content, security service of the contract form, and the like.
The insurance subject refers to an object participating in insurance business, and the insurance subject comprises: insurers (insurance companies), insureds, and also insurers and beneficiaries; the subject's security service content includes, but is not limited to: insurance policy migration for insurers, applicant changes (information changes and identification card changes), insured information changes (identification card, gender, age, occupation changes, etc.), beneficiary changes.
The preservation service of the contract content is divided into core content preservation and non-core content preservation. The core content preservation refers to claim settlement, payment and the like; non-core content preservation refers to prerequisite services, basic services (change classes (modifying personal information) such as preservation adding and subtracting, refunding class, management service classes such as renewal, recovery, policy pledge, bonus delivery, etc.) and additional services.
The contract-type security service refers to the security of the policy, such as the loss-reporting and reimbursement of the policy, insurance contract reimbursement, and the like. Step S300, performing first verification on the warranty security data to be confirmed based on the first trial calculation data to obtain first verification conclusion data.
In an exemplary embodiment, when the background receives a policy protection request instruction sent by the client, the computer device automatically executes a first verification operation on the policy protection data to be confirmed. The computer device automatically executes the first verification operation on the security data of the policy to be confirmed, which can be understood as that whether a change operation exists in the client or not is automatically identified before subsequent security confirmation operation is carried out.
In an exemplary embodiment, with continuing reference to fig. 3, step S300 may further include:
step S301, obtaining the first trial calculation data submission time of the policy and security data to be confirmed;
step S302, traversing trial calculation data associated with the policy and security data to be confirmed to determine the latest submission time of the trial calculation data;
step S303, when the latest submission time of the trial calculation data is later than the submission time of the first trial calculation data, generating first verification conclusion data, wherein the first verification conclusion data is verification failure.
In an exemplary embodiment, after receiving a policy and security request instruction sent by a client, a computer device executes a first trial calculation on policy and security data to be confirmed to obtain first trial calculation data, and then sends the first trial calculation data and the policy and security data to be confirmed to a background, at this time, the computer device automatically identifies whether a user has a change operation on the client through the background, if the user finds that the original operation information is wrong, the user changes the operation information of the policy and security data to be confirmed, and then executes a second trial calculation operation according to the changed policy and security data to be confirmed to obtain second trial calculation data. If the user still finds that the operation information is wrong after the second trial calculation operation, the user can continue to change the operation information of the policy and security data to be confirmed, and then executes the latest trial calculation operation according to the latest changed policy and security data to be confirmed so as to obtain the latest trial calculation data.
Trial calculation data for trial calculation of each policy preservation data to be confirmed is associated with the policy preservation data to be confirmed. When the policy and security data to be confirmed are subjected to first verification, trial calculation data associated with the policy and security data to be confirmed are traversed, the submission time corresponding to each trial calculation data is obtained, the first trial calculation data corresponds to the submission time of the first trial calculation data, the second trial calculation data corresponds to the submission time of the second trial calculation data, and the like, and the latest submission time of the trial calculation data is determined. And analyzing the warranty preservation data to be confirmed to obtain the submission time of the warranty preservation data to be confirmed. And if the submission time of the first trial calculation data is equal to the latest submission time of the trial calculation data, determining that no change exists, generating first verification conclusion data with successful verification, and directly executing security confirmation on the policy security data to be confirmed based on the first verification conclusion data. If the first trial calculation data submission time is later than the first trial calculation data submission time, generating first verification conclusion data which fails in verification, and understanding that operation information change exists.
In an exemplary embodiment, after the performing the first check on the policy security data to be confirmed based on the first trial calculation data to obtain first check conclusion data, the method further includes: and acquiring first confidence degrees corresponding to a plurality of indexes of the policy preservation data to be confirmed when the first trial calculation is executed.
And S400, when the first verification conclusion data is failed to verify, calling back second trial calculation data, wherein the second trial calculation data is trial calculation data obtained by performing trial calculation after user change operation.
In an exemplary embodiment, with continuing reference to fig. 4, when the first verification conclusion data is failed to be verified, the step S400 of recalling the second trial data further includes the following steps:
step S401, generating a bidirectional verification instruction based on the first verification conclusion data;
and S402, calling back second trial calculation data based on the bidirectional verification instruction, and creating a temporary form based on the second trial calculation data.
In an exemplary embodiment, if the first verification conclusion data is verified unsuccessfully, it may be understood that there is an operation information change, and the method may generate a bidirectional verification instruction based on the first verification conclusion data, and call back the second trial calculation data based on the bidirectional verification instruction.
Step S500, executing second check-up to the warrant security data to be confirmed based on the second trial calculation data to obtain changed warrant security data to be confirmed, and executing security confirmation to the changed warrant security data to be confirmed.
In an exemplary embodiment, with continuing reference to fig. 5, step S500 may further include:
step S501, based on the second trial calculation data, obtaining second confidence degrees corresponding to a plurality of indexes of the policy and security data to be confirmed when the second trial calculation is executed;
step S502, comparing the first confidence degrees and the second confidence degrees corresponding to the indexes to determine the index to be changed;
step S503, replacing the corresponding index in the policy and security data to be confirmed by the index to be changed to obtain the changed policy and security data to be confirmed, and executing security confirmation on the changed policy and security data to be confirmed.
In an exemplary embodiment, the confidence levels corresponding to the indexes can be calculated by comparing the change models. The plurality of indices (R) include: age, occupation, day of action, gender, level of assurance, date of application for warranty, discount, risk category, etc.
Exemplary model parameters of the contrast variation model include, but are not limited to: the weight corresponding to the age is W1, the dynamic distribution factor (L) corresponding to the age is 0.5, the weight corresponding to the occupation is W2, the dynamic distribution factor corresponding to the occupation is 0.1, the weight corresponding to the effective day is W3, the dynamic distribution factor corresponding to the effective day is 0.005, the weight corresponding to the gender is W4, the dynamic distribution factor corresponding to the gender is 0.005, the weight corresponding to the guarantee level is W5, the dynamic distribution factor corresponding to the guarantee level is 0.3, the weight corresponding to the preservation application day is W6, the dynamic distribution factor corresponding to the preservation application day is 0, the weight corresponding to the discount is W7, the dynamic distribution factor corresponding to the discount is 0, the weight corresponding to the risk species is W8, the dynamic distribution factor corresponding to the risk species is 0, and the like.
The comparison change model specifically comprises the following steps: k ═ (H (r (i)) + di) MOD m × W; wherein, K represents the confidence corresponding to the index, H represents a hash function, m represents the number of hash, di represents the increment sequence, MOD represents the remainder function, R represents the index, and R (i) represents the ith index. The index identification is an influence factor on the premium, and the confidence coefficient represents the influence degree of each index attribute on the premium result. Determining influence factors of the premium through data modeling, then giving the influence degree of the index attribute on the premium result through comparing a change model, and enabling the contrast scattering to be distributed along with the influence degree through comparing the change model, so that the time complexity is changed from O (n) to O (logn).
In an exemplary embodiment, when the warranty preservation data to be confirmed is submitted to the background, a first confidence degree K1 corresponding to a plurality of indexes of the warranty preservation data to be confirmed at the time can be calculated through a comparison change model, when the first verification result is that the verification fails, a second trial calculation data is recalled, and the calculation logic when the second trial calculation data is executed, a temporary form is created, a second confidence degree K2 corresponding to the plurality of indexes of the warranty preservation data to be confirmed at the time is calculated through the comparison change model, an index with the K1 not equal to the K2 is determined as the index to be changed, and the warranty preservation data to be confirmed is replaced based on the index to be changed to obtain the changed warranty preservation data to be confirmed. In an exemplary embodiment, please continue to refer to fig. 6, the method further includes the specific step of performing security validation on the changed policy security data to be validated:
step S601, extracting user data from the policy maintenance request instruction;
step S602, determining a risk level based on the policy and security data to be confirmed and the user data;
step S603, generating a policy and security confirmation task based on the risk level and policy and security data to be confirmed, and pushing the policy and security confirmation to the client;
step S604, receiving a policy preservation confirmation instruction generated by the client based on the policy preservation confirmation task;
and step S605, executing security confirmation on the changed to-be-confirmed security data based on the security confirmation instruction.
Illustratively, after the changed to-be-confirmed policy preservation data is obtained, the computer device receives the policy preservation confirmation instruction, and then triggers the receipt and payment summarizing function again to modify information such as a relevant receipt and invoice, so as to ensure subsequent promotion of the security confirmation process.
The method comprises the steps of judging whether the change of the policy preservation data to be confirmed exists after a user submits trial calculation data through first verification of the policy preservation data to be confirmed; when the first verification conclusion data is failed to verify, the second trial calculation data is recalled, the second verification is executed, the bidirectional verification is executed in the verification process of the warranty security case, the warranty security data after change can be guaranteed to be timely verified, the situation that the operation of executing the security verification at the background is caused because the operation of re-changing after the user submits the verification of the security verification is not timely found is avoided, and the productivity of counter personnel, operation and maintenance personnel and developers is relieved; the working efficiency of confirming the policy and security case is improved; the timeliness is improved, the user experience is well developed, and the company image is improved in a certain program.
Example two
Please refer to fig. 7, which shows a schematic diagram of the program modules of the verification apparatus for confirming the policy and security case of the present invention. In this embodiment, the warranty security case verification apparatus 20 may include or be divided into one or more program modules, and the one or more program modules are stored in a storage medium and executed by one or more processors to implement the present invention and implement the above-mentioned warranty security case verification method. The program module referred to in the embodiments of the present invention is a series of computer program instruction segments capable of performing specific functions, and is more suitable for describing the execution process of the warranty and security case confirmation verification apparatus 20 in the storage medium than the program itself. The following description will specifically describe the functions of the program modules of the present embodiment:
the receiving module 700 is configured to receive a security request instruction sent by a client, where the security request instruction carries security data of a policy to be confirmed.
And the trial calculation module 710 is configured to perform a first trial calculation on the policy and security data to be confirmed according to the policy and security request instruction to obtain first trial calculation data.
A first checking module 720, configured to perform a first check on the policy and security data to be confirmed based on the first trial calculation data to obtain first check conclusion data.
The call-back module 730 is configured to call back second trial calculation data when the first verification conclusion data is failed to be verified, where the second trial calculation data is trial calculation data obtained by performing trial calculation after the user change operation.
And the second checking module 740 is configured to perform a second check on the policy preservation data to be confirmed based on the second trial calculation data to obtain changed policy preservation data to be confirmed, and perform a preservation confirmation on the changed policy preservation data to be confirmed.
In an exemplary embodiment, the trial module 710 is further configured to: obtaining the policy preservation type from the policy preservation data to be confirmed; determining a target trial calculation rule based on the policy and security type; and executing first trial calculation on the insurance policy and security data to be confirmed based on the target trial calculation rule to obtain first trial calculation data.
In an exemplary embodiment, the first checking module 720 is further configured to: acquiring the first trial calculation data submission time of the policy and security data to be confirmed; traversing trial calculation data associated with the policy and security data to be confirmed to determine the latest submission time of the trial calculation data; and when the latest submission time of the trial calculation data is later than the submission time of the first trial calculation data, generating first verification conclusion data, wherein the first verification conclusion data is verification failure.
In an exemplary embodiment, the first checking module 720 is further configured to: and acquiring first confidence degrees corresponding to a plurality of indexes of the policy preservation data to be confirmed when the first trial calculation is executed.
In an exemplary embodiment, the second check module 740 is further configured to: acquiring second confidence degrees corresponding to a plurality of indexes of the policy preservation data to be confirmed when second trial calculation is executed based on the second trial calculation data; comparing the first confidence degrees and the second confidence degrees corresponding to the indexes to determine the index to be changed; and replacing the corresponding index in the policy and security data to be confirmed by the index to be changed to obtain the changed policy and security data to be confirmed, and executing security confirmation on the changed policy and security data to be confirmed.
In an exemplary embodiment, the callback module 730 is further configured to: generating a bidirectional verification instruction based on the first verification conclusion data; and calling back second trial calculation data based on the bidirectional verification instruction, and creating a temporary form based on the second trial calculation data.
In an exemplary embodiment, the policy and security case confirmation and verification method further includes: extracting user data from the policy and security request instruction; determining a risk level based on the policy preservation data to be confirmed and the user data; generating a policy and security confirmation task based on the risk level and policy and security data to be confirmed, and pushing the policy and security confirmation to the client; receiving a policy preservation confirmation instruction generated by the client based on the policy preservation confirmation task; and executing security confirmation on the changed to-be-confirmed security data based on the security guarantee confirmation instruction.
EXAMPLE III
Fig. 8 is a schematic diagram of a hardware architecture of a device according to a third embodiment of the present invention. In the present embodiment, the device 2 is a computer device capable of automatically performing numerical calculation and/or information processing in accordance with a preset or stored instruction. The device 2 may be a rack server, a blade server, a tower server, or a rack server (including an independent server or a server cluster composed of a plurality of servers). As shown in fig. 8, the device 2 includes, but is not limited to, at least a memory 21, a processor 22, a network interface 23, and a policy and security case confirmation checking device 20, which are communicatively connected to each other through a system bus. Wherein:
in this embodiment, the memory 21 includes at least one type of computer-readable storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the storage 21 may be an internal storage unit of the device 2, such as a hard disk or a memory of the device 2. In other embodiments, the memory 21 may also be an external storage device of the device 2, such as a plug-in hard disk provided on the computer device 2, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Of course, the memory 21 may also comprise both an internal memory unit of the device 2 and an external memory device thereof. In this embodiment, the memory 21 is generally used for storing an operating system and various application software installed in the device 2, such as the program codes of the policy and security case verification and verification apparatus 20 in the above embodiment. Further, the memory 21 may also be used to temporarily store various types of data that have been output or are to be output.
The network interface 23 may comprise a wireless network interface or a wired network interface, and the network interface 23 is typically used for establishing a communication connection between the apparatus 2 and other electronic devices. For example, the network interface 23 is used to connect the device 2 to an external terminal through a network, establish a data transmission channel and a communication connection between the device 2 and the external terminal, and the like. The network may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a Global System of Mobile communication (GSM), Wideband Code Division Multiple Access (WCDMA), a 4G network, a 5G network, Bluetooth (Bluetooth), Wi-Fi, and the like.
It is noted that fig. 8 only shows the device 2 with components 20-23, but it is to be understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead.
In this embodiment, the policy and security case verification apparatus 20 stored in the memory 21 may be further divided into one or more program modules, and the one or more program modules are stored in the memory 21 and executed by one or more processors (in this embodiment, the processor 22) to complete the present invention.
For example, fig. 7 is a schematic diagram of program modules of a second embodiment of the verification apparatus 20 for confirming a policy and security-based case, in which the verification apparatus 20 can be divided into a receiving module 700, a trial calculation module 710, a first verification module 720, a callback module 730, and a second verification module 740. The program module referred to in the present invention refers to a series of computer program instruction segments capable of performing specific functions, and is more suitable than a program for describing the execution process of the warranty and security case verification apparatus 20 in the device 2. The specific functions of the program modules 700 and 740 have been described in detail in the second embodiment, and are not described herein again.
Example four
The present embodiment also provides a storage medium, such as a computer-readable storage medium of a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, a server, an App application mall, etc., on which a computer program is stored, which when executed by a processor implements a corresponding function. The storage medium of this embodiment is used to store the policy and security case verification apparatus 20, and when executed by the processor, the storage medium implements the policy and security case verification method of the above embodiment.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (10)
1. A method for confirming and checking a policy and security case is characterized by comprising the following steps:
receiving a security request instruction sent by a client, wherein the security request instruction carries security data of a policy to be confirmed;
executing a first trial calculation on the policy and security data to be confirmed according to the policy and security request instruction to obtain first trial calculation data;
performing first verification on the policy and security data to be confirmed based on the first trial calculation data to obtain first verification conclusion data;
when the first verification conclusion data is failed to verify, second trial calculation data is called back, and the second trial calculation data is trial calculation data obtained by performing trial calculation based on user change operation;
and executing second check on the to-be-confirmed policy and security data based on the second trial calculation data to obtain changed to-be-confirmed policy and security data, and executing security confirmation on the changed to-be-confirmed policy and security data.
2. The method as claimed in claim 1, wherein the step of performing a first trial calculation on the policy and security data to be confirmed according to the policy and security request command to obtain first trial calculation data further comprises:
obtaining the policy preservation type from the policy preservation data to be confirmed;
determining a target trial calculation rule based on the policy and security type;
and executing first trial calculation on the insurance policy and security data to be confirmed based on the target trial calculation rule to obtain first trial calculation data.
3. The warranty security case confirmation verification method according to claim 2, wherein said performing a first verification on the warranty security data to be confirmed based on the first trial calculation data to obtain first verification conclusion data comprises:
acquiring the first trial calculation data submission time of the policy and security data to be confirmed;
traversing trial calculation data associated with the policy and security data to be confirmed to determine the latest submission time of the trial calculation data;
and when the latest submission time of the trial calculation data is later than the submission time of the first trial calculation data, generating first verification conclusion data, wherein the first verification conclusion data is verification failure.
4. The warranty security case confirmation verification method according to claim 3, wherein after performing the first verification on the warranty security data to be confirmed based on the first trial calculation data to obtain first verification conclusion data, further comprising:
and acquiring first confidence degrees corresponding to a plurality of indexes of the policy preservation data to be confirmed when the first trial calculation is executed.
5. The method of claim 4, wherein said performing a second check on said warranty security data to be validated based on said second trial data to obtain altered warranty security data to be validated, said performing a security validation on said altered warranty security data to be validated comprising:
acquiring second confidence degrees corresponding to a plurality of indexes of the policy preservation data to be confirmed when second trial calculation is executed based on the second trial calculation data;
comparing the first confidence degrees and the second confidence degrees corresponding to the indexes to determine the index to be changed;
and replacing the corresponding index in the policy and security data to be confirmed by the index to be changed to obtain the changed policy and security data to be confirmed, and executing security confirmation on the changed policy and security data to be confirmed.
6. The warranty security case confirmation check method according to claim 1, wherein when the first check conclusion data is a check failure, the recalling the second trial calculation data further comprises:
generating a bidirectional verification instruction based on the first verification conclusion data;
and calling back second trial calculation data based on the bidirectional verification instruction, and creating a temporary form based on the second trial calculation data.
7. The policy and security case verification and verification method according to claim 1, wherein said performing security verification on said changed policy and security data to be verified further comprises:
extracting user data from the policy and security request instruction;
determining a risk level based on the policy preservation data to be confirmed and the user data;
generating a policy and security confirmation task based on the risk level and policy and security data to be confirmed, and pushing the policy and security confirmation to the client;
receiving a policy preservation confirmation instruction generated by the client based on the policy preservation confirmation task;
and executing security confirmation on the changed to-be-confirmed security data based on the security guarantee confirmation instruction.
8. A kind of insurance policy security case confirms the checkout gear, characterized by that, comprising:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a security request instruction sent by a client, and the security request instruction carries security data of a policy to be confirmed;
the trial calculation module is used for executing first trial calculation on the to-be-confirmed policy and security data according to the policy and security request instruction to obtain first trial calculation data;
the first checking module is used for performing first checking on the policy and security data to be confirmed based on the first trial calculation data to obtain first checking conclusion data;
the callback module is used for calling back second trial calculation data when the first verification conclusion data is failed to verify, wherein the second trial calculation data is trial calculation data obtained by performing trial calculation after user change operation;
and the second check module is used for executing second check on the policy preservation data to be confirmed based on the second trial calculation data to obtain changed policy preservation data to be confirmed and executing the preservation confirmation on the changed policy preservation data to be confirmed.
9. An apparatus comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor when executing the computer program implements the steps of the policy and security case validation verification method according to any one of claims 1 to 7.
10. A computer-readable storage medium having stored thereon a computer program executable by at least one processor to cause the at least one processor to perform the steps of the policy and security case validation verification method according to any one of claims 1 to 7.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202011039653.2A CN112132694B (en) | 2020-09-28 | 2020-09-28 | Method, device, equipment and storage medium for confirming and checking policy and security case |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202011039653.2A CN112132694B (en) | 2020-09-28 | 2020-09-28 | Method, device, equipment and storage medium for confirming and checking policy and security case |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN112132694A true CN112132694A (en) | 2020-12-25 |
| CN112132694B CN112132694B (en) | 2024-04-09 |
Family
ID=73843113
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202011039653.2A Active CN112132694B (en) | 2020-09-28 | 2020-09-28 | Method, device, equipment and storage medium for confirming and checking policy and security case |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN112132694B (en) |
Citations (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4642768A (en) * | 1984-03-08 | 1987-02-10 | Roberts Peter A | Methods and apparatus for funding future liability of uncertain cost |
| EP0278132A1 (en) * | 1987-02-09 | 1988-08-17 | College Savings Bank | Methods and apparatus for funding future liability of uncertain cost |
| US20110125536A1 (en) * | 2009-11-23 | 2011-05-26 | Hartford Fire Insurance Company | System and method for administering insurance policies issued before comprehensive underwriting |
| CN106056348A (en) * | 2016-05-18 | 2016-10-26 | 平安科技(深圳)有限公司 | Maintenance information change method and device |
| CN107316176A (en) * | 2016-04-27 | 2017-11-03 | 平安科技(深圳)有限公司 | The control method and device of declaration form processing |
| CN107527099A (en) * | 2016-06-21 | 2017-12-29 | 平安科技(深圳)有限公司 | Save reservation processing method and device from damage |
| US10121207B1 (en) * | 2013-10-04 | 2018-11-06 | United Services Automobile Association | Insurance policy alterations using informatic sensor data |
| CN108765175A (en) * | 2018-06-01 | 2018-11-06 | 中国平安人寿保险股份有限公司 | Declaration form saves information processing method, device, computer equipment and storage medium from damage |
| CN109242261A (en) * | 2018-08-14 | 2019-01-18 | 中国平安人寿保险股份有限公司 | Save the method and terminal device of risk from damage based on big data assessment |
| CN109345193A (en) * | 2018-09-06 | 2019-02-15 | 平安科技(深圳)有限公司 | Policy security review method and terminal equipment based on information security |
| CN109670968A (en) * | 2018-09-26 | 2019-04-23 | 深圳壹账通智能科技有限公司 | Processing method, device, equipment and the computer storage medium of insurance data |
| CN109685669A (en) * | 2018-12-11 | 2019-04-26 | 北京量子保科技有限公司 | A kind of policy information data processing method and system |
| CN109801174A (en) * | 2018-12-26 | 2019-05-24 | 平安科技(深圳)有限公司 | Claims Resolution data processing method, device, equipment and computer readable storage medium |
| CN109902095A (en) * | 2019-01-25 | 2019-06-18 | 平安科技(深圳)有限公司 | Policy information update method, device, terminal and computer readable storage medium |
| CN111080390A (en) * | 2019-11-06 | 2020-04-28 | 泰康保险集团股份有限公司 | Order information modification method, system, equipment and storage medium |
| CN111126935A (en) * | 2019-11-19 | 2020-05-08 | 泰康保险集团股份有限公司 | Processing method and device of security data, electronic equipment and storage medium |
-
2020
- 2020-09-28 CN CN202011039653.2A patent/CN112132694B/en active Active
Patent Citations (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4642768A (en) * | 1984-03-08 | 1987-02-10 | Roberts Peter A | Methods and apparatus for funding future liability of uncertain cost |
| EP0278132A1 (en) * | 1987-02-09 | 1988-08-17 | College Savings Bank | Methods and apparatus for funding future liability of uncertain cost |
| US20110125536A1 (en) * | 2009-11-23 | 2011-05-26 | Hartford Fire Insurance Company | System and method for administering insurance policies issued before comprehensive underwriting |
| US10121207B1 (en) * | 2013-10-04 | 2018-11-06 | United Services Automobile Association | Insurance policy alterations using informatic sensor data |
| CN107316176A (en) * | 2016-04-27 | 2017-11-03 | 平安科技(深圳)有限公司 | The control method and device of declaration form processing |
| CN106056348A (en) * | 2016-05-18 | 2016-10-26 | 平安科技(深圳)有限公司 | Maintenance information change method and device |
| CN107527099A (en) * | 2016-06-21 | 2017-12-29 | 平安科技(深圳)有限公司 | Save reservation processing method and device from damage |
| CN108765175A (en) * | 2018-06-01 | 2018-11-06 | 中国平安人寿保险股份有限公司 | Declaration form saves information processing method, device, computer equipment and storage medium from damage |
| CN109242261A (en) * | 2018-08-14 | 2019-01-18 | 中国平安人寿保险股份有限公司 | Save the method and terminal device of risk from damage based on big data assessment |
| CN109345193A (en) * | 2018-09-06 | 2019-02-15 | 平安科技(深圳)有限公司 | Policy security review method and terminal equipment based on information security |
| CN109670968A (en) * | 2018-09-26 | 2019-04-23 | 深圳壹账通智能科技有限公司 | Processing method, device, equipment and the computer storage medium of insurance data |
| CN109685669A (en) * | 2018-12-11 | 2019-04-26 | 北京量子保科技有限公司 | A kind of policy information data processing method and system |
| CN109801174A (en) * | 2018-12-26 | 2019-05-24 | 平安科技(深圳)有限公司 | Claims Resolution data processing method, device, equipment and computer readable storage medium |
| CN109902095A (en) * | 2019-01-25 | 2019-06-18 | 平安科技(深圳)有限公司 | Policy information update method, device, terminal and computer readable storage medium |
| CN111080390A (en) * | 2019-11-06 | 2020-04-28 | 泰康保险集团股份有限公司 | Order information modification method, system, equipment and storage medium |
| CN111126935A (en) * | 2019-11-19 | 2020-05-08 | 泰康保险集团股份有限公司 | Processing method and device of security data, electronic equipment and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN112132694B (en) | 2024-04-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11798091B2 (en) | System and method for image-based vehicle repair estimate verification | |
| CN111192144A (en) | Financial data prediction method, device, equipment and storage medium | |
| CN112330471B (en) | Service data processing method, device, computer equipment and storage medium | |
| CN109359277B (en) | Data monitoring method, device and computer storage medium | |
| US20120278217A1 (en) | Systems and methods for improving prediction of future credit risk performances | |
| CN111124917B (en) | Method, device, equipment and storage medium for managing and controlling public test cases | |
| CN110941630A (en) | Database operation and maintenance method, device and system | |
| CN107798592B (en) | Method and apparatus for calculating commission | |
| CN108491304B (en) | electronic device, business system risk control method and storage medium | |
| CN108090831A (en) | Credit Risk Assessment method, application server and computer readable storage medium | |
| CN111340402A (en) | Group insurance service management method, system, device and storage medium | |
| CN111258832A (en) | Interface parameter checking method, device, equipment and medium | |
| CN111210109A (en) | Method and device for predicting user risk based on associated user and electronic equipment | |
| CN117421311A (en) | Data verification method, device, equipment and storage medium based on artificial intelligence | |
| CN103440460A (en) | Application system change validation method and system | |
| CN112598422A (en) | Transaction risk assessment method, system, device and storage medium | |
| CN112685437A (en) | Configuration-based commission calculation method, device, equipment and storage medium | |
| CN112132694B (en) | Method, device, equipment and storage medium for confirming and checking policy and security case | |
| CN111027977A (en) | Data verification method and device and electronic equipment | |
| CN116680261A (en) | Data reporting method, system and device | |
| CN109377378B (en) | Industry relevancy risk determination device and system | |
| CN115511458A (en) | Data checking method, device, equipment and medium | |
| CN115330365A (en) | Data processing method and device based on block chain and computer equipment | |
| CN112862608A (en) | Transaction data matching method and device | |
| CN111047303A (en) | Carbon emission right transaction settlement method and system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |