CN110599356B - Insurance underwriting method and system and computer storage medium - Google Patents

Insurance underwriting method and system and computer storage medium Download PDF

Info

Publication number
CN110599356B
CN110599356B CN201910870382.6A CN201910870382A CN110599356B CN 110599356 B CN110599356 B CN 110599356B CN 201910870382 A CN201910870382 A CN 201910870382A CN 110599356 B CN110599356 B CN 110599356B
Authority
CN
China
Prior art keywords
underwriting
insurance
data
rule
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910870382.6A
Other languages
Chinese (zh)
Other versions
CN110599356A (en
Inventor
谭人源
庄伟铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Insurance Exchange Co ltd
Original Assignee
Shanghai Insurance Exchange Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Insurance Exchange Co ltd filed Critical Shanghai Insurance Exchange Co ltd
Priority to CN201910870382.6A priority Critical patent/CN110599356B/en
Publication of CN110599356A publication Critical patent/CN110599356A/en
Application granted granted Critical
Publication of CN110599356B publication Critical patent/CN110599356B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Abstract

The present disclosure relates to an insurance underwriting method and system and a computer storage medium. The insurance underwriting method comprises the following steps: generating a first certification key and a first verification key by the insurance service party according to the first underwriting rule and first rating data corresponding to the first underwriting rule; deploying, by the insurance server, the first underwriting rule, the first rating data, the first certification key and the first verification key on a preset blockchain platform in a manner of the generated first underwriting intelligent contract; acquiring first to-be-certified data generated by an insurance user party according to a first underwriting intelligent contract by an insurance service party; and the insurance server verifies whether the insurance user side meets the requirement of the first rating data according to the first data to be verified and the first verification key through the verification service of the insurance preset according to the first verification rule, so as to obtain a first verification result.

Description

Insurance underwriting method and system and computer storage medium
Technical Field
The present disclosure relates to the field of blockchain technology, and in particular, to an insurance underwriting method and system, and a computer storage medium.
Background
At present, in order to implement insurance underwriting, an insurance service party needs to collect underwriting privacy data provided by an insurance user party. Typically, the insurance server records the collected underwriting privacy data on a centralized database. In addition, due to factors such as technical limitations, insurance services are usually underwritten directly against underwritten private data that is desensitized without encryption. Therefore, in the centralized insurance underwriting mode, underwriting private data is easy to leak and even be tampered, and great potential safety hazards exist. Moreover, in the insurance field, the supervision of the insurance service party by a supervision organization is often involved, and the cooperation between other cooperation parties and the insurance service party is also not convenient for supervision and cooperation docking by the centralized data processing mode, so that the efficiency of the insurance service as a platform-property service is severely limited.
Disclosure of Invention
According to one aspect of the present disclosure, there is provided an insurance underwriting method, including: generating a first certification key and a first verification key by an insurance server according to a first underwriting rule and first rating data corresponding to the first underwriting rule; deploying, by the insurance server, the first underwriting rule, the first rating data, the first attestation key, and the first verification key on a preset blockchain platform in the manner of a generated first underwriting smart contract; acquiring, by the insurance server, first to-be-certified data generated by an insurance user party according to the first underwriting intelligent contract, wherein the first to-be-certified data is related to the first certification key and first underwriting privacy data of the insurance user party corresponding to the first underwriting rule, and the first underwriting privacy data cannot be deduced reversely according to the first to-be-certified data; and verifying whether the insurance user side meets the requirement of the first rating data or not by the insurance server side through an insurance verification service preset according to the first insurance rule according to the first data to be verified and the first verification key, so as to obtain a first verification result.
In some embodiments, the generating of the first forensic data comprises: providing, by the insurance user party, first underwriting privacy data of the insurance user party according to the first underwriting rule; calculating, by the insurance user side, underwriting result data corresponding to the first underwriting privacy data according to the first underwriting rule; calculating commitment data by the insurance user side by adopting a Hash algorithm according to the underwriting result data and the random number; generating, by the insurance user, first data to be certified according to the commitment data, the first rating data and the first certification key.
In some embodiments, the generating of the first forensic data further comprises: sending the commitment data and the first data to be certified to the first underwriting intelligent contract; and sending the commitment data and the first data to be certified to the underwriting verification service through the first underwriting intelligent contract.
In some embodiments, the verifying, by the insurance server, whether the insurance user side satisfies the requirement of the first rating data according to the first data to be authenticated and the first verification key through an underwriting verification service preset for the first underwriting rule includes: and the first underwriting intelligent contract verifies whether the insurance user side meets the requirement of the first rating data or not according to the commitment data, the first rating data, the first data to be verified and the first verification key through the underwriting verification service.
In some embodiments, the insurance underwriting method further comprises: and returning the first verification result to the insurance server, the insurance user and the blockchain platform.
In some embodiments, returning the first verification result to the insurance user side comprises: returning the first verification result to the first underwriting intelligent contract; and obtaining the first verification result by the insurance user side according to the first underwriting intelligent contract.
In some embodiments, verifying that the requirement of the first ratings data is met by the insured user party based on the first attested data and the first verification key is accomplished based on an analog computing circuit with zero knowledge proof of knowledge.
In some embodiments, the first underwriting rule is a weighted sum of one or more underwriting options.
In some embodiments, the first rating data is a weighted sum of expected data corresponding to the underwriting option.
In some embodiments, the insurance underwriting method further comprises: generating a second certification key and a second verification key by the insurance server according to a second underwriting rule and second rating data corresponding to the second underwriting rule; deploying, by the insurance server, the second underwriting rule, the second rating data, the second certification key, and the second verification key on a preset blockchain platform in a manner of a generated second underwriting smart contract; when the insurance user side meets the requirement of the first rating data, acquiring second data to be certified, generated by the insurance user side according to the second underwriting intelligent contract, by the insurance server side, wherein the second data to be certified is related to the second certification secret key and second underwriting privacy data, corresponding to the second underwriting rule, of the insurance user side, and the second underwriting privacy data cannot be reversely deduced according to the second data to be certified; and verifying whether the insurance user side meets the requirement of the second rating data or not by the insurance server side through an insurance verification service preset according to the second insurance rule according to the second data to be verified and the second verification key to obtain a second verification result.
According to another aspect of the present disclosure, there is also provided an insurance underwriting system, including: a memory storing computer instructions; and a processor, coupled to the memory, that performs an insurance underwriting method, the insurance underwriting method comprising: generating a first certification key and a first verification key by an insurance server according to a first underwriting rule and first rating data corresponding to the first underwriting rule; deploying, by the insurance server, the first underwriting rule, the first rating data, the first attestation key, and the first verification key on a preset blockchain platform in the manner of a generated first underwriting smart contract; acquiring, by the insurance server, first to-be-certified data generated by an insurance user party according to the first underwriting intelligent contract, wherein the first to-be-certified data is related to the first certification key and first underwriting privacy data of the insurance user party corresponding to the first underwriting rule, and the first underwriting privacy data cannot be deduced reversely according to the first to-be-certified data; and verifying whether the insurance user side meets the requirement of the first rating data or not through an underwriting verification service preset according to the first data to be verified and the first verification key by the insurance server side to obtain a first verification result. .
According to yet another aspect of the present disclosure, a computer storage medium is presented having computer instructions stored thereon that, when executed by a processor, perform an insurance underwriting method, the insurance underwriting method comprising: generating a first certification key and a first verification key by an insurance server according to a first underwriting rule and first rating data corresponding to the first underwriting rule; deploying, by the insurance server, the first underwriting rule, the first rating data, the first attestation key, and the first verification key on a preset blockchain platform in the manner of a generated first underwriting smart contract; acquiring, by the insurance server, first to-be-certified data generated by an insurance user party according to the first underwriting intelligent contract, wherein the first to-be-certified data is related to the first certification key and first underwriting privacy data of the insurance user party corresponding to the first underwriting rule, and the first underwriting privacy data cannot be deduced reversely according to the first to-be-certified data; and verifying whether the insurance user side meets the requirement of the first rating data or not through an underwriting verification service preset according to the first data to be verified and the first verification key by the insurance server side to obtain a first verification result.
Other features of the present disclosure and advantages thereof will become more apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The present disclosure may be more clearly understood from the following detailed description, taken with reference to the accompanying drawings, in which:
FIG. 1 shows a schematic flow diagram of an insurance underwriting method according to an exemplary embodiment of the present disclosure;
fig. 2 shows a schematic flow diagram of generating first data to be authenticated of an insurance underwriting method according to another exemplary embodiment of the present disclosure;
FIG. 3 shows a flow diagram of an insurance underwriting method according to yet another exemplary embodiment of the present disclosure;
FIG. 4 shows a schematic block diagram of an insurance underwriting system according to an exemplary embodiment of the present disclosure.
Note that in the embodiments described below, the same reference numerals are used in common between different drawings to denote the same portions or portions having the same functions, and a repetitive description thereof will be omitted. In some cases, similar reference numbers and letters are used to denote similar items, and thus, once an item is defined in one figure, it need not be discussed further in subsequent figures.
For convenience of understanding, the positions, sizes, ranges, and the like of the respective structures shown in the drawings and the like do not sometimes indicate actual positions, sizes, ranges, and the like. Therefore, the present disclosure is not limited to the positions, dimensions, ranges, and the like disclosed in the drawings and the like.
Detailed Description
Various exemplary embodiments of the present disclosure will be described in detail below with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses. That is, the structures and methods herein are shown by way of example to illustrate different embodiments of the structures and methods of the present disclosure. Those skilled in the art will understand, however, that they are merely illustrative of exemplary ways in which the disclosure may be practiced and not exhaustive. Furthermore, the figures are not necessarily to scale, some features may be exaggerated to show details of particular components.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
The blockchain is an innovative application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm in the internet era. In a narrow sense, the blockchain is a distributed account book which is a chain data structure formed by combining data blocks in a sequential connection mode according to a time sequence and is guaranteed in a cryptographic mode and cannot be tampered and forged. Broadly speaking, the blockchain technique is a completely new distributed infrastructure and computing paradigm that utilizes blockchain data structures to verify and store data, utilizes distributed node consensus algorithms to generate and update data, cryptographically secure data transmission and access, and utilizes intelligent contracts composed of automated script code to program and manipulate data.
The block chain frees more data by the credibility, the safety and the non-tamper property, and promotes the mass increase of the data. The traceability characteristic of the block chain enables the records of each step of data acquisition, transaction, circulation and calculation analysis to be reserved on the block chain, so that the quality of the data obtains unprecedented strong trust endorsements, and the correctness of the data analysis result and the data mining effect are also ensured. The block chain can further standardize the use of data and refine the authorization range. The desensitized data can be interacted among multiple parties, so that the information isolated island is broken through, a data transverse interaction mechanism is established, and a wide data transaction scene is gradually promoted to be formed based on a value transfer network of a block chain.
The insurance server side realizes the insurance by a verification mode of zero knowledge proof, and avoids the privacy disclosure of an insurance user side while ensuring the credibility of the insurance.
According to an exemplary embodiment of the present disclosure, as shown in fig. 1 and 4, the insurance underwriting method includes the steps of:
step S110, generating a first certification key and a first verification key by an insurance server according to a first underwriting rule and first rating data corresponding to the first underwriting rule;
step S210, the insurance service party deploys a first underwriting rule, first rating data, a first certification key and a first verification key on a preset block chain platform in a mode of a generated first underwriting intelligent contract;
step S310, an insurance service party acquires first to-be-certified data generated by an insurance user party according to a first underwriting intelligent contract, wherein the first to-be-certified data is related to a first certification secret key and first underwriting privacy data, corresponding to a first underwriting rule, of the insurance user party, and the first underwriting privacy data cannot be reversely deduced according to the first to-be-certified data;
step S410, the insurance server verifies whether the insurance user side meets the requirement of the first rating data through the pre-set underwriting verification service aiming at the first underwriting rule according to the first data to be verified and the first verification key, and a first verification result is obtained.
The steps S110 to S410 can be implemented by an underwriting calculation model factory decentralized application (Dapp) 210 of an insurance server. Dapp generally refers to applications that run on a distributed network, where participants' information is secured (and possibly anonymous), decentralized by network nodes. The insurance service side is an insurance company or the like which provides the insurance service, and correspondingly, the insurance user side is an insured person who has obtained the insurance service or wants the insurance service, including individuals and organizations and the like.
The insurance is a necessary link in the insurance process, the insurance rules reflect the basis of the insurance service party for determining whether to provide the insurance service and/or how to provide the insurance service for a certain insurance user party, and correspondingly, the rating data corresponds to the insurance rules and reflects the threshold or range of the insurance rules when determining whether to provide the insurance service and/or how to provide the insurance service.
In a specific example, the underwriting rule may include one or more underwriting options ai (i =1,2.. Once, n), a corresponding option weight pi (i =1,2.. Once, n) exists for each underwriting option ai (i =1,2.. Once, n), and the underwriting rule a is determined according to the weighted sum Σ ai pi of the one or more underwriting options. For different risk varieties, corresponding option weights can be set for the underwriting options respectively, so that the importance degree of the underwriting options in the underwriting process is reflected. For example, in a certain health risk underwriting rule, three underwriting options, i.e., blood lipid test information a1, diabetes history information a2, and gastric ulcer history information a3, may be included, and the option weight corresponding to each underwriting option is p1, p2, and p3, respectively, so that the underwriting rule is a = a 1+ p1+ a 2+ p2+ a3 + p3.
Corresponding to the underwriting option in the underwriting rule, one or more expected data bj (j =1,2.,. M) may be included in the rating data, and each expected data bj (j =1,2.,. M) may have a corresponding expected weight qj (j =1,2.,. M), and the rating data B may be determined according to the weighted sum Σ bj qj of the one or more expected data. Generally, the desired data may correspond to the underwriting options one-to-one, and the option weights and the desired weights of the corresponding underwriting options and the desired data may be equal. Of course, in some cases, the desired data may not correspond one-to-one to the underwriting options. In a specific example, corresponding to three underwriting options of the blood lipid detection information a1, the diabetes history information a2, and the gastric ulcer history information a3, there may be blood lipid expectation data b1, diabetes history expectation data b2, and gastric ulcer history expectation data b3, respectively, and the corresponding expectation weights are q1, q2, and q3, respectively. Then, the rating data B = B1 × q1+ B2 × q2+ B3 × q3 corresponding to the underwriting rule a.
In the process of underwriting, whether the insurance user side passes the underwriting or not can be determined by comparing underwriting rules with corresponding rating data. For example, in a specific example, the following may be set in advance: when the underwriting rule A is smaller than the corresponding rating data B, determining that the insurance user passes the underwriting; otherwise, the insurance user side can not pass the current underwriting.
Of course, in another specific example, there may be two or more different ratings data corresponding to the same underwriting rule, thereby forming multiple ratings. For example, for the underwriting rule a, the rating data B1 and B2 may be set, and B1< B2. When A < B1, confirming that the rating of the insurance user side is higher, and providing insurance service for the insurance user side under a more favorable condition; when B1 is more than or equal to A and less than B2, the user side of the insurance is confirmed to have low rating, but can still pass the current underwriting and provide insurance service for the user side of the insurance under common conditions; and when A is larger than or equal to B2, confirming that the insurance user side fails to pass the current underwriting, and not providing insurance service for the insurance user side. In other specific examples, rating data may also be set for underwriting rules in other ways.
The certification key and the verification key are generated according to the underwriting rule and the rating data corresponding to the underwriting rule and are used for subsequent zero-knowledge certification. In a particular example, the attestation key and the validation key may be determined from a number m of items of the underwriting options in the underwriting rule and a number n of items of the expected data in the ratings data. The attestation key and the authentication key are associated, and data encrypted by the attestation key can be authenticated by the authentication key.
The underwriting rules, rating data, attestation keys, and verification keys are then deployed on the pre-provisioned blockchain platform 100 in the manner of the generated underwriting smart contract 300. The intelligent contract is an application in a blockchain system, is coded and automatically-operated business logic, and usually has a token and a special development language.
After the insurance service party obtains the data to be certified, which is generated by the insurance user party according to the underwriting intelligent contract 300, the insurance service party verifies whether the insurance user party meets the requirement of rating data according to the data to be certified and the verification key through the underwriting verification service 500 preset according to underwriting rules, and a verification result is obtained.
The data to be certified is related to the certification key and the underwriting privacy data of the insurance user side corresponding to the underwriting rule, but the underwriting privacy data cannot be reversely deduced according to the data to be certified, so that the privacy of the insurance user side is effectively protected. That is, the insurance user side directly provides the processed data to be authenticated related to the certified private data to the insurance service side, not the certified private data itself, and the insurance service side confirms the credibility of the data to be authenticated based on the certification key and the verification key, namely, the insurance certification is realized by means of zero-knowledge certification.
It should be noted that, in the process of underwriting, it is also possible to involve multiple levels of underwriting, and for each level of underwriting, the insurance underwriting method in the above embodiment can be basically followed. Accordingly, the underwriting rules may include at least a first underwriting rule and a second underwriting rule, and there may be a first rating data, a first certification key, a first verification key, a first underwriting smart contract, a first piece of data to be certified, a first piece of private data, etc. corresponding to the first underwriting rule, and there may be a second rating data, a second certification key, a second verification key, a second underwriting smart contract, a second piece of data to be certified, a second piece of private data, etc. corresponding to the second underwriting rule.
In a specific example, an insurance user side may be first underwriting according to a first underwriting rule and first rating data, and when the underwriting passes this time, deeper underwriting is performed according to a second underwriting rule and second rating data (that is, when the insurance user side meets the requirement of the first rating data, the insurance service side continues to obtain second data to be certified, which is generated by the insurance user side according to a second underwriting intelligent contract, and the like); if the current underwriting fails, the whole underwriting process can be finished, so that the underwriting efficiency is improved, and the diversity of insurance services is enriched.
The insurance server can synchronously generate a first certification key and a first verification key, and a second certification key and a second verification key according to the first underwriting rule and the first rating data, and the second underwriting rule and the second rating data, or after the underwriting of the first level is completed, generate a second certification key and a second verification key according to the second underwriting rule and the second rating data, and continue the underwriting of the second level. And, the first and second underwriting intelligent contracts may be deployed separately, or the contents of the first and second underwriting intelligent contracts may be configured together in the same underwriting intelligent contract. Of course, the underwriting verification service may be the first underwriting verification service and the second underwriting verification service, respectively, or the underwriting verification service that can be shared verifies whether the insurance user side meets the requirements of each rating data, so as to obtain the corresponding verification result.
More detailed problems will be elaborated below by taking as an example a first-level underwriting process based on a first underwriting rule and first rating data, and related problems in a second-level underwriting process based on a second underwriting rule and second rating data, or other deeper-level underwriting processes, and reference may be made to the following explanations.
In another exemplary embodiment of the present disclosure, as shown in fig. 2 and 4, the generating of the first forensic data may include:
step S610, providing first underwriting privacy data of an insurance user party by the insurance user party according to a first underwriting rule;
step S620, the insurance user side calculates the corresponding underwriting result data of the first underwriting privacy data according to the first underwriting rule;
step S630, the insurance user side calculates commitment data by adopting a Hash algorithm according to the underwriting result data and the random number;
in step S640, the insurance user generates first data to be certified according to the commitment data, the first rating data and the first certification key.
It should be noted that the above steps are not generally performed directly by the insurance server, but may be performed by the insurance user, however, the insurance user may be performed by the underwriting prefix Dapp 220 provided by the insurance server. The pre-insurance Dapp 220 is oriented to the insurance user and is operated by the insurance user.
A first underwriting rule may be included in the underwriting prefix Dapp 220, whereby the insurance user party provides his own first underwriting privacy data related to the first underwriting rule, such as: blood lipid detection information, diabetes history information, gastric ulcer history information, and the like. Certainly, the insurance service party may also set a certain operation rule in the pre-Dapp of the underwriting, and convert some values in the first underwriting privacy data, so as to facilitate processing and/or avoid disclosure of privacy of the insurance user party. For example, in the blood lipid detection information, "1" indicates a value smaller than 60, "2" indicates a value equal to or larger than 60 and smaller than 130, and "3" indicates a value larger than 130.
In the pre-underwriting Dapp 220, underwriting result data corresponding to the first underwriting privacy data may be calculated according to a first underwriting rule. For example, regarding the first underwriting rule, each piece of underwriting result data xi (i =1,2..,., n) may be derived from a product ai pi of an underwriting option ai (i =1,2..,.., n) and an option weight pi thereof (i =1,2.., n), i.e., xi = ai pi, while the first underwriting rule A1= ∑ xi.
Further, according to the underwriting result data and the random number, a hash algorithm may be used to calculate commitment data Ci (i =1,2.., n) corresponding to each underwriting result data ai (i =1,2., n), i.e., ci = H (ai, ri), where H represents a certain hash algorithm, and ri (i =1,2., n) is a random number corresponding to the corresponding underwriting result data Ci (i =1,2., n). The hash algorithm can convert a source data into a committed data, the committed data and the source data have a very close relationship, however, the source data is difficult to reversely push out according to the committed data, and therefore, the credibility of the source data is verified, and meanwhile, the source data is prevented from being leaked. Where the random number may be generated by the prediction engine 400 outside of the blockchain.
Then, the first data to be certified X1 is generated from the above-described respective commitment data Ci (i =1,2.. Once, n), the first rating data B1 (=Σbjqj), and the first certification key pk 1. The first data to be authenticated X1 can be authenticated by the first authentication key vk1 corresponding to the first authentication key pk1, and the first guaranteed private data of the insurance user side is not revealed.
Further, as shown in fig. 2, the generating of the first data to be authenticated further includes:
step S650, the commitment data and the first data to be certified are sent to a first underwriting intelligent contract;
step S660, the commitment data and the first to-be-certified data are sent to a certification service by the first certification intelligent contract.
Wherein step S650 may still be performed by the underwriting prefix Dapp 220. The commitment data and the first data to be certified are firstly sent to the first underwriting intelligent contract deployed on the block chain platform, so that the commitment data and the first data to be certified can be certified, and the credibility of the data is guaranteed.
After the insurance server acquires the first data to be certified X1, the first underwriting intelligent contract passes underwriting verification service, and whether the insurance user side meets the requirement of the first rated data or not is verified according to commitment data Ci (i =1,2.., n), first rated data B1, the first data to be certified X1 and a first verification key vk 1.
In still another exemplary embodiment of the present disclosure, as shown in fig. 3 and 4, the insurance underwriting method may further include:
step S510, returns the first verification result to the insurance service provider, the insurance user, and the blockchain platform 100.
The first verification result returned to the insurance server can provide the information whether the underwriting passes or not for the insurance server, so that the insurance server can determine whether to provide insurance for the insurance user and/or how to provide insurance for the insurance user. The first verification result returned to the insurance user side can enable the insurance user side to know whether the insurance request of the insurance user side passes the current underwriting or not. The first verification result returned to the blockchain platform can be used as a deposit certificate, so that the supervision of the insurance service party by a supervision organization is facilitated, and in some cases, the cooperation between other cooperation parties and the insurance service party is facilitated.
Specifically, returning the first verification result to the insurance user side may include:
step S511, returning the first verification result to the first underwriting intelligent contract;
and step S512, obtaining a first verification result by the insurance user side according to the first underwriting intelligent contract.
That is, the first verification result is returned to the insurance user side through the first underwriting intelligent contract, and the credibility of the first verification result is well guaranteed because the first underwriting intelligent contract is deployed on the blockchain platform.
Further, in the above-described exemplary embodiments of the present disclosure, the verification of whether the insurance user side satisfies the requirement of the first rating data based on the first data to be certified and the first certification key may be implemented based on an analog computation circuit of zero knowledge certification.
According to another aspect of the present disclosure, there is also provided a computer-implemented insurance underwriting system that is based on blockchain technology. As shown in fig. 4, in the insurance underwriting system, the insurance server and the insurance user implement insurance underwriting through their Dapp (underwriting calculation model factory Dapp 210, underwriting pre-Dapp 220) and/or underwriting intelligent contracts 300. The insurance underwriting system may further include a memory storing computer instructions and a processor coupled to the memory to perform the insurance underwriting method described in the above embodiments.
Specifically, the processor may be a Central Processing Unit (CPU), and the memory may be a Read Only Memory (ROM), a Random Access Memory (RAM), or the like. The CPU executes various processes in accordance with a program stored in the ROM or a program loaded from a storage section to the RAM. In the RAM, data necessary when the CPU executes various processes and the like is also stored as necessary. The CPU, ROM, and RAM may be connected to each other via a bus. An input/output interface is also connected to the bus.
Furthermore, the following components may be connected to the input/output interface of the insurance underwriting system: an input section (including a keyboard, a mouse, and the like), an output section (including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker, and the like), a storage section (including a hard disk, and the like), a communication section (including a network interface card such as a LAN card, a modem, and the like).
The communication section performs communication processing via a network such as the internet. The driver may also be connected to an input/output interface as desired. A removable medium such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive as needed, so that the computer program read out therefrom is installed in the storage section as needed.
In the case where the above-described series of processes is realized by software, a program constituting the software is installed from a network such as the internet or a storage medium such as a removable medium.
According to yet another aspect of the present disclosure, a computer storage medium is also presented, having computer instructions stored thereon, which when executed by a processor, perform the insurance underwriting method as described above.
It will be understood by those skilled in the art that such a storage medium is not limited to a removable medium having a program stored therein, distributed separately from the apparatus, to provide the program to a user. Examples of removable media include magnetic disks (including floppy disks), optical disks (including compact disk read-only memories (CD-ROMs) and Digital Versatile Disks (DVDs)), magneto-optical disks (including Minidisks (MDs)), and semiconductor memories. Alternatively, the storage medium may be a ROM, a hard disk included in a storage section, or the like, in which programs are stored and which are distributed to users together with the device including them.
The computer instructions, when read and executed by a machine, may perform the methods according to embodiments of the invention described above.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the computer program instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The terms "front," "back," "top," "bottom," "over," "under," and the like in the description and in the claims, if any, are used for descriptive purposes and not necessarily for describing permanent relative positions. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein are, for example, capable of operation in other orientations than those illustrated or otherwise described herein.
As used herein, the word "exemplary" means "serving as an example, instance, or illustration," and not as a "model" that is to be replicated accurately. Any implementation exemplarily described herein is not necessarily to be construed as preferred or advantageous over other implementations. Furthermore, there is no intention to be bound by any expressed or implied theory presented in the preceding technical field, background, brief summary or the detailed description.
As used herein, the term "substantially" is intended to encompass any minor variation resulting from design or manufacturing imperfections, device or component tolerances, environmental influences, and/or other factors. The word "substantially" also allows for differences from a perfect or ideal situation due to parasitics, noise, and other practical considerations that may exist in a practical implementation.
In addition, the foregoing description may refer to elements or nodes or features being "connected" or "coupled" together. As used herein, unless expressly stated otherwise, "connected" means that one element/node/feature is directly connected to (or directly communicates with) another element/node/feature, either electrically, mechanically, logically, or otherwise. Similarly, unless expressly stated otherwise, "coupled" means that one element/node/feature may be mechanically, electrically, logically, or otherwise joined to another element/node/feature in a direct or indirect manner to allow for interaction, even though the two features may not be directly connected. That is, to "couple" is intended to include both direct and indirect joining of elements or other features, including connection with one or more intermediate elements.
In addition, "first," "second," and like terms may also be used herein for reference purposes only, and thus are not intended to be limiting. For example, the terms "first," "second," and other such numerical terms referring to structures or elements do not imply a sequence or order unless clearly indicated by the context.
It will be further understood that the terms "comprises/comprising," "includes" and/or "including," when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
In the present disclosure, the term "providing" is used broadly to encompass all ways of obtaining an object, and thus "providing an object" includes, but is not limited to, "purchasing," "preparing/manufacturing," "arranging/setting," "installing/assembling," and/or "ordering" the object, and the like.
Those skilled in the art will appreciate that the boundaries between the above described operations merely illustrative. Multiple operations may be combined into a single operation, single operations may be distributed in additional operations, and operations may be performed at least partially overlapping in time. Moreover, alternative embodiments may include multiple instances of a particular operation, and the order of operations may be altered in various other embodiments. However, other modifications, variations, and alternatives are also possible. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the foregoing examples are for purposes of illustration only and are not intended to limit the scope of the present disclosure. The various embodiments disclosed herein may be combined in any combination without departing from the spirit and scope of the present disclosure. It will also be appreciated by those skilled in the art that various modifications may be made to the embodiments without departing from the scope and spirit of the disclosure. The scope of the present disclosure is defined by the appended claims.
The present application may also be configured as follows:
1. an insurance underwriting method, comprising:
generating a first certification key and a first verification key by an insurance server according to a first underwriting rule and first rating data corresponding to the first underwriting rule;
deploying, by the insurance server, the first underwriting rule, the first rating data, the first attestation key, and the first verification key on a preset blockchain platform in the manner of a generated first underwriting smart contract;
acquiring, by the insurance server, first to-be-certified data generated by an insurance user party according to the first underwriting intelligent contract, wherein the first to-be-certified data is related to the first certification key and first underwriting privacy data of the insurance user party corresponding to the first underwriting rule, and the first underwriting privacy data cannot be deduced reversely according to the first to-be-certified data;
and verifying whether the insurance user side meets the requirement of the first rating data or not through an underwriting verification service preset according to the first data to be verified and the first verification key by the insurance server side to obtain a first verification result.
2. The insurance underwriting method according to claim 1, wherein the generation of the first data to be authenticated comprises:
providing, by the insurance user party, first underwriting privacy data of the insurance user party according to the first underwriting rule;
calculating, by the insurance user side, underwriting result data corresponding to the first underwriting privacy data according to the first underwriting rule;
calculating commitment data by the insurance user side by adopting a Hash algorithm according to the underwriting result data and the random number;
generating, by the insurance user, first data to be certified according to the commitment data, the first rating data and the first certification key.
3. The insurance underwriting method of claim 2, wherein the generating of the first data to be authenticated further comprises:
sending the commitment data and the first data to be certified to the first underwriting intelligent contract;
and sending the commitment data and the first data to be certified to the underwriting verification service through the first underwriting intelligent contract.
4. The insurance underwriting method according to claim 2, wherein the verifying, by the insurance server, whether the insurance user side meets the requirement of the first rating data according to the first data to be authenticated and the first verification key through an underwriting verification service preset for the first underwriting rule includes:
and the first underwriting intelligent contract verifies whether the insurance user side meets the requirement of the first rating data or not according to the commitment data, the first rating data, the first data to be certified and the first verification key through the underwriting verification service.
5. The insurance underwriting method according to 1, further comprising:
and returning the first verification result to the insurance server, the insurance user and the blockchain platform.
6. The insurance underwriting method of claim 5, wherein the step of returning the first verification result to the insurance user side comprises:
returning the first verification result to the first underwriting intelligent contract;
and obtaining the first verification result by the insurance user side according to the first underwriting intelligent contract.
7. The insurance underwriting method according to 1, wherein verifying whether the insurance user side meets the requirement of the first rating data according to the first data to be certified and the first verification key is realized by an analog computing circuit based on zero knowledge certification.
8. The insurance underwriting method of claim 1, wherein the first underwriting rule is a weighted sum of one or more underwriting options.
9. The insurance underwriting method of claim 8, the first rating data being a weighted sum of expected data corresponding to the underwriting options.
10. The insurance underwriting method according to 1, further comprising:
generating a second certification key and a second verification key by the insurance server according to a second underwriting rule and second rating data corresponding to the second underwriting rule;
deploying, by the insurance server, the second underwriting rule, the second rating data, the second certification key, and the second verification key on a preset blockchain platform in a manner of a generated second underwriting smart contract;
when the insurance user side meets the requirement of the first rating data, acquiring second data to be certified, generated by the insurance user side according to the second underwriting intelligent contract, by the insurance service side, wherein the second data to be certified is related to the second certification secret key and second underwriting privacy data, corresponding to the second underwriting rule, of the insurance user side, and the second underwriting privacy data cannot be reversely deduced according to the second data to be certified;
and verifying whether the insurance user side meets the requirement of the second rating data or not by the insurance server side through an insurance verification service preset according to the second insurance rule according to the second data to be verified and the second verification key to obtain a second verification result.
11. An insurance underwriting system comprising:
a memory storing computer instructions; and
a processor, coupled to the memory, that performs the insurance underwriting method of any of claims 1-10.
12. A computer storage medium having stored thereon computer instructions which, when executed by a processor, perform an insurance underwriting method as recited in any one of claims 1-10.

Claims (12)

1. An insurance underwriting method, comprising:
generating a first certification key and a first verification key by an insurance server according to a first underwriting rule and first rating data corresponding to the first underwriting rule;
deploying, by the insurance server, the first underwriting rule, the first rating data, the first attestation key, and the first verification key on a preset blockchain platform in the manner of a generated first underwriting smart contract;
acquiring, by the insurance server, first to-be-certified data generated by an insurance user party according to the first underwriting intelligent contract, wherein the first to-be-certified data is related to the first certification key and first underwriting privacy data of the insurance user party corresponding to the first underwriting rule, and the first underwriting privacy data cannot be deduced reversely according to the first to-be-certified data;
and verifying whether the insurance user side meets the requirement of the first rating data or not by the insurance server side through an insurance verification service preset according to the first insurance rule according to the first data to be verified and the first verification key, so as to obtain a first verification result.
2. The insurance underwriting method of claim 1, wherein the generating of the first data to be authenticated comprises:
providing, by the insurance user party, first underwriting privacy data of the insurance user party according to the first underwriting rule;
calculating, by the insurance user side, underwriting result data corresponding to the first underwriting privacy data according to the first underwriting rule;
calculating commitment data by the insurance user side by adopting a Hash algorithm according to the underwriting result data and the random number;
generating, by the insurance user, first data to be certified according to the commitment data, the first rating data and the first certification key.
3. The insurance underwriting method of claim 2, wherein the generating of the first data to be authenticated further comprises:
sending the commitment data and the first data to be certified to the first underwriting intelligent contract;
and sending the commitment data and the first data to be certified to the underwriting verification service through the first underwriting intelligent contract.
4. The insurance underwriting method according to claim 2, wherein the verifying, by the insurance server, whether the insurance user side satisfies the requirement of the first rating data by an underwriting verification service preset for the first underwriting rule according to the first data to be authenticated and the first verification key comprises:
and the first underwriting intelligent contract verifies whether the insurance user side meets the requirement of the first rating data or not according to the commitment data, the first rating data, the first data to be verified and the first verification key through the underwriting verification service.
5. The insurance underwriting method according to claim 1, further comprising:
and returning the first verification result to the insurance server, the insurance user and the blockchain platform.
6. The insurance underwriting method of claim 5, wherein returning the first verification result to the insurance user side comprises:
returning the first verification result to the first underwriting intelligent contract;
and obtaining the first verification result by the insurance user side according to the first underwriting intelligent contract.
7. The insurance underwriting method according to claim 1, wherein verifying whether the insurance user side satisfies the requirements of the first rating data based on the first data to be certified and the first certification key is implemented based on an analog computation circuit of zero knowledge certification.
8. The insurance underwriting method of claim 1, wherein the first underwriting rule is a weighted sum of one or more underwriting options.
9. The insurance underwriting method of claim 8, wherein the first rating data is a weighted sum of expected data corresponding to the underwriting option.
10. The insurance underwriting method of claim 1, further comprising:
generating a second certification key and a second verification key by the insurance server according to a second underwriting rule and second rating data corresponding to the second underwriting rule;
deploying, by the insurance server, the second underwriting rule, the second rating data, the second certification key, and the second verification key on a preset blockchain platform in a manner of a generated second underwriting smart contract;
when the insurance user side meets the requirement of the first rating data, acquiring second data to be certified, generated by the insurance user side according to the second underwriting intelligent contract, by the insurance server side, wherein the second data to be certified is related to the second certification secret key and second underwriting privacy data, corresponding to the second underwriting rule, of the insurance user side, and the second underwriting privacy data cannot be reversely deduced according to the second data to be certified;
and verifying whether the insurance user side meets the requirement of the second rating data or not by the insurance server side through an insurance verification service preset according to the second insurance rule according to the second data to be verified and the second verification key to obtain a second verification result.
11. An insurance underwriting system, comprising:
a memory storing computer instructions; and
a processor, coupled to the memory, that performs the insurance underwriting method of any of claims 1-10.
12. A computer storage medium having stored thereon computer instructions which, when executed by a processor, perform an insurance underwriting method according to any one of claims 1-10.
CN201910870382.6A 2019-09-16 2019-09-16 Insurance underwriting method and system and computer storage medium Active CN110599356B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910870382.6A CN110599356B (en) 2019-09-16 2019-09-16 Insurance underwriting method and system and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910870382.6A CN110599356B (en) 2019-09-16 2019-09-16 Insurance underwriting method and system and computer storage medium

Publications (2)

Publication Number Publication Date
CN110599356A CN110599356A (en) 2019-12-20
CN110599356B true CN110599356B (en) 2022-12-16

Family

ID=68859785

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910870382.6A Active CN110599356B (en) 2019-09-16 2019-09-16 Insurance underwriting method and system and computer storage medium

Country Status (1)

Country Link
CN (1) CN110599356B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108197940A (en) * 2018-01-17 2018-06-22 武汉轻工大学 Payment request response method, mobile terminal and the readable storage medium storing program for executing of mobile terminal
CN109493203A (en) * 2018-09-30 2019-03-19 咪咕文化科技有限公司 A kind of data calculate method, apparatus and storage medium
CN109947848A (en) * 2019-01-30 2019-06-28 阿里巴巴集团控股有限公司 Card method and apparatus are deposited based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108197940A (en) * 2018-01-17 2018-06-22 武汉轻工大学 Payment request response method, mobile terminal and the readable storage medium storing program for executing of mobile terminal
CN109493203A (en) * 2018-09-30 2019-03-19 咪咕文化科技有限公司 A kind of data calculate method, apparatus and storage medium
CN109947848A (en) * 2019-01-30 2019-06-28 阿里巴巴集团控股有限公司 Card method and apparatus are deposited based on block chain

Also Published As

Publication number Publication date
CN110599356A (en) 2019-12-20

Similar Documents

Publication Publication Date Title
US11743052B2 (en) Platform for generating authenticated data objects
US11271754B2 (en) Data authorization based on decentralized identifiers
US10924284B2 (en) System and method for decentralized-identifier authentication
US11093933B1 (en) Data authorization based on decentralized identifiers
US11232415B2 (en) Method for cryptographically managing title transactions
JP2021518685A (en) Computer-implemented systems and methods for exchanging data
CN110600096B (en) Medical data management method and system and computer storage medium
US20210390558A1 (en) Smart logistics management using blockchain
JP2018525729A (en) Computationally efficient transfer processing, auditing and searching apparatus, method and system
JPH09507729A (en) Cryptographic system and method with key escrow function
US11621844B2 (en) Secure data transfer system and method
US20230162182A1 (en) Computer-implemented decision making system and method
CN116743768B (en) Method, apparatus, device and computer readable storage medium for trading computing power resources
US7490755B2 (en) Method and program for establishing peer-to-peer karma and trust
US11863689B1 (en) Security settlement using group signatures
Martinez Jurado et al. Applying assurance levels when issuing and verifying credentials using Trust Frameworks
CN110599356B (en) Insurance underwriting method and system and computer storage medium
CN113706261A (en) Block chain-based power transaction method, device and system
Mazzocca et al. A Survey on Decentralized Identifiers and Verifiable Credentials
US20230010339A1 (en) Methods and systems for device-specific event handler generation
US20230419285A1 (en) NFT Enforcement Control System
US20240046258A1 (en) Group payment accounts
CN115641210A (en) Electric power transaction storage method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 200120 T3, 1788, 1800 Century Avenue, free trade Experimental Zone, Pudong New Area, Shanghai

Applicant after: SHANGHAI INSURANCE EXCHANGE CO.,LTD.

Address before: 200120 Shanghai East Road Pudong New Area Financial Information Center 22

Applicant before: SHANGHAI INSURANCE EXCHANGE CO.,LTD.

GR01 Patent grant
GR01 Patent grant