CN109345193A - Declaration form based on information security saves checking method and terminal device from damage - Google Patents

Declaration form based on information security saves checking method and terminal device from damage Download PDF

Info

Publication number
CN109345193A
CN109345193A CN201811039193.6A CN201811039193A CN109345193A CN 109345193 A CN109345193 A CN 109345193A CN 201811039193 A CN201811039193 A CN 201811039193A CN 109345193 A CN109345193 A CN 109345193A
Authority
CN
China
Prior art keywords
information
factor
core
declaration form
damage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811039193.6A
Other languages
Chinese (zh)
Inventor
唐红俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811039193.6A priority Critical patent/CN109345193A/en
Publication of CN109345193A publication Critical patent/CN109345193A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Operations Research (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention is suitable for field of information security technology, it provides the declaration form based on information security and saves checking method and terminal device from damage, this method comprises: request is saved in reception client transmission from damage, if this saves request from damage comprising changing the factor comprising insurance information in client identity mark and the declaration form modification information declaration form change factor, core then, which is extracted, from the insurance information change factor protects the factor, obtain core guarantor's factor coefficient that each core protects the factor, the different degree grade of factor coefficient and client is protected according to core, determine the risk index of client, it is identified according to client identity and obtains customer information, extract multiple risk keywords in customer information, score is protected according to the corresponding core of multiple risk keywords, and core guarantor's index that score obtains client is protected according to core, the comparison result of index is protected based on the risk index and the core, save the upper phase of request addition from damage for described The audit label answered, can save the human cost that declaration form saves audit from damage, improve review efficiency, improve the accuracy of audit.

Description

Declaration form based on information security saves checking method and terminal device from damage
Technical field
The invention belongs to field of information security technology, more particularly to the declaration form based on information security saves checking method and end from damage End equipment.
Background technique
Insurance policy (abbreviation declaration form) is the written document that insurance company and insurant conclude insurance contract.Insurant is The client of insurance company, insurance company can provide declaration form correlation letter according to the request of the insurer for client in Effective Period of Insurance Breath change service, referred to as declaration form saves service from damage.It includes newly-increased accessory risk that declaration form, which is saved from damage to the relevant information changed to declaration form, is subtracted Protect, add guarantor or beneficiary change, insurer etc..In order to be controlled in the risk for handling declaration form and saving from damage business client, protect Dangerous company, which needs to save information from damage to the declaration form of client, to be audited.
Currently, the existing declaration form to client saves the mode that information is audited from damage, usually saves declaration form from damage information and send To underwriting department door, manual examination and verification are carried out by the employee of underwriting department door, but the mode of manual examination and verification needs to consume great manpower Cost, and there is a problem of that review efficiency is low, auditing result is inaccurate.
Summary of the invention
The embodiment of the present invention provides a kind of declaration form based on information security and saves checking method and terminal device from damage, existing to solve There is technology to save information from damage to the declaration form of client and carry out manual examination and verification, needs to consume great human cost, and there are review efficiencies Problem low, auditing result is inaccurate.
The first aspect of the embodiment of the present invention provides a kind of declaration form based on information security and saves checking method from damage, comprising:
Receive that client sends saves request from damage, described to save request from damage and include client identity mark and declaration form modification information;
The declaration form change factor is extracted from declaration form modification information according to the type of modification information in declaration form modification information;
If changing the factor comprising insurance information in the declaration form change factor, mentioned from the insurance information change factor Core is taken to protect the factor;The corresponding relationship that the core prestored protects the factor and core guarantor's factor coefficient is inquired, the core for obtaining each core guarantor factor is protected Factor coefficient protects the different degree grade of factor coefficient and client according to the core that each core protects the factor, determines the risk index of client;
It is identified according to the client identity and obtains customer information, extract multiple risk keywords in the customer information, It obtains the corresponding core of the multiple risk keyword and protects score, and referred to according to the core guarantor that core guarantor's score obtains the client Number;
The comparison result that index is protected based on the risk index and the core saves that request addition is upper corresponding to be examined from damage for described Core label.
The second aspect of the embodiment of the present invention provides a kind of terminal device, including memory, processor and is stored in In the memory and the computer program that can run on the processor, when the processor executes the computer program Realize following steps:
Receive that client sends saves request from damage, described to save request from damage and include client identity mark and declaration form modification information;
The declaration form change factor is extracted from declaration form modification information according to the type of modification information in declaration form modification information;
If changing the factor comprising insurance information in the declaration form change factor, mentioned from the insurance information change factor Core is taken to protect the factor;The corresponding relationship that the core prestored protects the factor and core guarantor's factor coefficient is inquired, the core for obtaining each core guarantor factor is protected Factor coefficient protects the different degree grade of factor coefficient and client according to the core that each core protects the factor, determines the risk index of client;
It is identified according to the client identity and obtains customer information, extract multiple risk keywords in the customer information, It obtains the corresponding core of the multiple risk keyword and protects score, and referred to according to the core guarantor that core guarantor's score obtains the client Number;
The comparison result that index is protected based on the risk index and the core saves that request addition is upper corresponding to be examined from damage for described Core label.
The third aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, and such as the above-mentioned declaration form based on information security is realized when the computer program is executed by processor The step of saving checking method from damage.
Existing beneficial effect is the embodiment of the present invention compared with prior art: provided in an embodiment of the present invention based on information The declaration form of safety saves checking method and terminal device from damage, and what reception client was sent first saves request from damage, this is saved request from damage and includes Client identity mark and declaration form modification information, mention from declaration form modification information according to the type of modification information in declaration form modification information The monotropic more factor of going bail for is mentioned from the insurance information change factor if changing the factor comprising insurance information in the declaration form change factor It takes core to protect the factor, obtains core guarantor's factor coefficient that each core protects the factor, factor coefficient and visitor are protected according to the core that each core protects the factor The different degree grade at family, determines the risk index of client, is identified according to client identity and obtains customer information, extracts in customer information Multiple risk keywords, obtain the corresponding core of multiple risk keywords and protect score, and the core that score obtains client is protected according to core Index is protected, the comparison result of index is protected based on the risk index and the core, saves that request addition is upper corresponding to be examined from damage for described Core label can save the human cost that declaration form saves audit from damage, improve and examine due to not needing manually to carry out saving from damage the audit of request Core efficiency, while the influence of manual examination and verification supervisor's factor is eliminated, improve the accuracy of audit.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is the exemplary flow that a kind of declaration form based on information security that one embodiment of the invention provides saves checking method from damage Figure;
Fig. 2 be another embodiment of the present invention provides a kind of declaration form based on information security save the signal stream of checking method from damage Cheng Tu;
Fig. 3 is the signal stream that a kind of declaration form based on information security that yet another embodiment of the invention provides saves checking method from damage Cheng Tu;
Fig. 4 is the signal stream that a kind of declaration form based on information security that further embodiment of this invention provides saves checking method from damage Cheng Tu;
Fig. 5 is the structural schematic diagram of terminal device provided in an embodiment of the present invention;
Fig. 6 is the functional block diagram that the declaration form provided in an embodiment of the present invention based on information security saves review procedure from damage.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
It is that a kind of declaration form based on information security that one embodiment of the invention provides saves checking method from damage referring to Fig. 1, Fig. 1 Schematic flow diagram is illustrated by taking server-side as an example in this embodiment, and here, server can be one or more. As shown in Figure 1, in this embodiment, the treatment process of server may comprise steps of:
S101: receive client transmission saves request from damage, saves request from damage and includes client identity mark and declaration form modification information.
In the present embodiment, client includes mobile phone, tablet computer (Personal Digital Assistant, PDA) Or PC etc..Client saves request from damage by the change generation for carrying out policy information to declaration form of having insured on the client, visitor What family end was sent saves request from damage to server.Client identity identifies the user name, ID card No., cell-phone number that can be client Deng.
S102: extracted from declaration form modification information according to the type of modification information in declaration form modification information declaration form change because Son.
In the present embodiment, the declaration form change factor is to carry out in declaration form modification information to the different types of information in declaration form The information unit of change.For example, the type of modification information can be divided into the insurance plan itself to declaration form in declaration form modification information Modification information, the modification information to client's essential information and the modification information three types to income pickup information.
Specifically, multiple identifiers can be added in declaration form modification information, the corresponding type of each identifier Modification information extracts keyword in the modification information between identifier, and the keyword is determined as the declaration form change factor.Example Such as, insurance information is extracted from the modification information of the insurance plan of declaration form itself change the factor;From the change of client's essential information Client's essential information is extracted in information changes the factor;Income pickup information change is extracted from the modification information of income pickup information The factor.
S103: it if changing the factor comprising insurance information in the declaration form change factor, is extracted from the insurance information change factor Core protects the factor.
In the present embodiment, the insurance information change factor refers to insurance plan of declaration form modification information itself.For example, can be with Including letters such as beneficiary's change, insurer's change, insured amount change, premium change (additional premium), postponement payment or surrenders Breath.
Specifically, projects classification for obtaining insurance plan itself modification information in the insurance information change factor, according to every A project category determines that corresponding core protects the factor.For example, becoming in the insurance information change factor comprising beneficiary's change, insurer More, insured amount changes, premium changes the project of four classifications, then it is that beneficiary changes the factor, throwing that the core extracted, which protects the factor, Guarantor changes the factor, the insured amount change factor, premium and changes the factor.
S104: the corresponding relationship that the core prestored protects the factor and core guarantor's factor coefficient is inquired, the core that each core protects the factor is obtained Factor coefficient is protected, the different degree grade of factor coefficient and client is protected according to the core that each core protects the factor, determines that the risk of client refers to Number.
In the present embodiment, different core protects factor pair and answers different core guarantor's factor coefficients.It is corresponded to for example, beneficiary changes It is 5 that core, which protects factor coefficient, and it is 10 that insurer, which changes corresponding core and protects factor coefficient, and insured amount changes corresponding core and protects factor system Number is 20, and the corresponding core guarantor factor coefficient of premium change (additional premium) is 20, postponement is paid the fees, and corresponding core guarantor factor coefficient is 20, it is 50 that the corresponding core of surrender, which protects factor coefficient,.
Specifically, it can be identified by client identity, inquire the client identity mark and customer's importance degree grade prestored Corresponding relationship obtains the different degree grade of client.For example, the first estate client is VVIP client, grade mark 1;Second Tier customer is VIP client, grade mark 2;Tertiary gradient client is common customer, grade mark 3;The fourth estate Client is blacklist client, grade mark 4.
The different degree grade that factor coefficient and client are protected according to each core, determines the process of the risk index of client are as follows: visitor The risk index at family is that each core protects factor coefficient sum multiplied by customer grade.For example, it includes being benefited that core, which protects factor coefficient, It is 5 that people, which changes corresponding core and protects factor coefficient, and the corresponding core of premium change (additional premium) protects factor coefficient and is 20, postpones payment pair It is 20 that the core answered, which protects factor coefficient, customer grade 2, then the risk index of client=(5+20+20) × 2=90.
S105: identifying according to client identity and obtain customer information, extracts multiple risk keywords in customer information, obtains The corresponding core of multiple risk keywords protects score, and according to core protects score and obtain the core of client and protect index.
In the present embodiment, from the corresponding relation database of the client identity mark and customer information that prestore, in acquisition It states client identity and identifies corresponding customer information.Wherein, customer information is that client submits during historical trading and client The related information aggregate of credit standing, trading situation, health status, for example, may include but be not limited to credit report, history is insured Record, client health report.
Specifically, score is protected according to the corresponding core of multiple risk keywords, and score is protected according to core and obtains the core guarantor of client The process of index, which may is that, obtains classification belonging to each risk keyword, and the core of each risk keyword is determined according to classification Protect score;Radix is protected with default core and subtracts each core guarantor score, and the core for obtaining client protects index.For example, belonging to risk keyword Classification include customers' credit situation class, trading situation class, health status class.It has recorded and drinks in the statement-of-health of client day 0.5kg, serious disease is hospitalized twice the year before, then risk keyword is " drink day 0.5kg ", " serious disease is hospitalized twice ", belongs to health Situation class, obtaining the corresponding core guarantor score of health status class is 5, and presetting core and protecting radix is 100, then core guarantor's index of client is 100-5-5=90.
S106: protecting the comparison result of index based on risk index and core, will save the upper corresponding audit label of request addition from damage.
In the present embodiment, it is poor that risk index and core can be protected to index work, request will be saved from damage according to obtained difference and added In addition corresponding audit label, different differences corresponds to different audit labels.Wherein, audit label can include but is not limited to Directly declinature label, label or the direct writing label of accepting insurance of having ready conditions.
As can be seen from the above description, can save declaration form due to the audit for not needing manually to carry out saving from damage request and save audit from damage Human cost, improve review efficiency, while eliminate manual examination and verification supervisor factor influence, improve the accuracy of audit.
Referring to Fig. 2, Fig. 2 be another embodiment of the present invention provides a kind of declaration form based on information security save audit side from damage The schematic flow diagram of method.On the basis of the above embodiments, after step s 102, the method also includes:
S201: if only comprising client's essential information change factor and/or income pickup information change in the declaration form change factor The factor then sends verification information to the client.
In the present embodiment, client's essential information change factor refers to the modification information of client's essential information.For example, can be with Including mailing address change, telephone number changing, Bank Account Number change etc..Income pickup information changes the factor, and this is client's income Pickup information's change.It such as may include pickup information's change of existence gold, bonus etc..Verification information can be short-message verification, Mailbox verifying etc.
S202: the authentication response information that client returns is received.
In the present embodiment, authentication response information is the response message that client sends according to the content of verification information.For example, Authentication response information is the answer for the validation problem in verification information.
S203: if authentication response information matches with verification information, request will be saved from damage and add upper direct writing label.
In the present embodiment, when authentication response information is the answer for the validation problem in verification information, if verifying The answer of problem matches with the answer prestored, then will save request from damage and add upper direct writing label.
As can be seen from the above description, since the change of client's essential information and income pickup information are not related to the core benefit of declaration form Benefit if only changing the factor comprising client's essential information change factor and/or income pickup information in the declaration form change factor, and passes through When verifying, then saves request from damage and add upper direct writing label, improve the review efficiency that declaration form saves request from damage.
Referring to Fig. 3, Fig. 3 is that a kind of declaration form based on information security that yet another embodiment of the invention provides saves audit side from damage The schematic flow diagram of method.On the basis of the above embodiments, details are as follows by above-mentioned steps S106:
S301: if the difference that risk index and core protect index is greater than or equal to the first preset threshold, request addition will be saved from damage On directly declinature label.
In the present embodiment, the first preset threshold represents higher risk, and the difference that risk index and core protect index is greater than Or it is equal to the first preset threshold, illustrate that the risk for saving request from damage is higher, can directly declinature, improves the audit that declaration form saves request from damage Efficiency.
S302:, will if risk index and core protect the difference of index less than the first preset threshold and is greater than the second preset threshold Save label of accepting insurance of having ready conditions in request addition from damage.
In the present embodiment, the second preset threshold represents certain risk, and the difference that risk index and core protect index is small In the first preset threshold and it is greater than the second preset threshold, illustrates that saving request from damage has certain risk, in order to not influence client's Save request from damage, can will save label of accepting insurance of having ready conditions in request addition from damage, is sent to processing node and continues with, be unlikely to Directly the client for having certain risk is directly declinatured, influence client saves audit experience from damage.
S303: if the difference that risk index and core protect index is less than or equal to the second preset threshold, request addition will be saved from damage Upper direct writing label.
In the present embodiment, the first preset threshold and the second preset threshold can according to need and be configured.
As can be seen from the above description, then risk index and core are protected by the first preset threshold of setting and the second preset threshold The difference of index will save request from damage according to comparison result and add upper different examine compared with the first preset threshold and the second preset threshold Core label can be avoided the influence of manual examination and verification supervisor's factor, accurately determine the auditing result for saving request from damage.
In one embodiment of the invention, on the basis of the above embodiments, after above-mentioned steps S106, the method Further include:
Additional conditions of accepting insurance are established according to risk index, and the additional conditions that will accept insurance are sent to client.
In the present embodiment, when risk index is more than to be no more than default risk threshold value, transmission pre-pays risk guarantee fund's Additional conditions of accepting insurance are to client;When risk index is more than default risk threshold value, what transmission needed to handle to sales counter accepts insurance attached Add condition to client.
As can be seen from the above description, additional conditions of accepting insurance are established by risk index, it is higher to risk to save request progress from damage It accepts insurance, meets the mode demand of accepting insurance of the multiplicity for the client for saving request from damage.
Referring to Fig. 4, Fig. 4 is that a kind of declaration form based on information security that further embodiment of this invention provides saves audit side from damage The schematic flow diagram of method.The type of modification information includes the modification information of insurance plan to declaration form itself, is believed substantially client The modification information of breath and modification information three types to income pickup information, can root during generating declaration form modification information According to the type of modification information in declaration form modification information, each type modification information is stored in after corresponding identifier.Upper On the basis of stating embodiment, the declaration form modification information is format message, added with first identifier symbol, the in the format message Two identifiers and third identifier, wherein first identifier symbol, second identifier symbol and third identifier are to have spy in format message The character string of different code, if first identifier symbol is " 00010 ", second identifier symbol is " 0020 ", and third identifier is " 0030 ", the The effect of one identifier, second identifier symbol and third mark is by three types in modification information (i.e. to the insurance plan of declaration form The modification information of itself, the modification information to client's essential information and the modification information to income pickup information) it is separated, it protects The monotropic more factor includes that the insurance information change factor, client's essential information change factor or income pickup information change the factor.? On the basis of this, details are as follows by above-mentioned steps S102:
S401: if detecting the first keyword in the declaration form modification information that first identifier accords between second identifier symbol, First keyword is determined as the insurance information change factor.
In the present embodiment, terminate to detect whether to extract the first key to second identifier symbol since first identifier symbol First keyword is determined as the insurance information change factor if extracting the first keyword by word.
Wherein, the first keyword is word related with insurance information, including works as and be not limited to: surname (e.g., Zhao's money grandson Lee), " expense ", " member ", " ten thousand yuan ", " thousand yuan ", " hundred million " etc..
S402: if detecting the second keyword in the declaration form modification information that second identifier accords between third identifier, Second keyword is determined as client's essential information change factor.
In the present embodiment, the second keyword is word related with client's essential information, including works as and be not limited to: Bank Account Number (initial several of each bank be it is identical, as agricultural bank 622848...), phone number (such as 138...), address information are (specific The keyword in place name or " street ", " road ") etc..
S403: if detecting in declaration form modification information between third identifier and the end mark of format message, third is closed The third keyword is determined as income pickup information and changes the factor by keyword.
In the present embodiment, the end mark of format message is last for being used to carry data message part in format message A character.Third keyword is to get the related word of letter with income, including when being not limited to: " extraction ", " getting ", " income ", " member ", " ten thousand yuan ", " thousand yuan ", " hundred million " etc..
As can be seen from the above description, by can be accurately added with first identifier symbol, second identifier symbol and third identifier The different types of declaration form change factor is extracted from declaration form modification information.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Save checking method from damage corresponding to the declaration form described in foregoing embodiments based on information security, Fig. 5 shows the present invention The structural schematic diagram for the terminal device that embodiment provides.For ease of description, only the parts related to this embodiment are shown.
In the present embodiment, the declaration form based on information security saves review procedure 600 from damage and installs and run on terminal device 60 In.The terminal device 60 can be mobile terminal, palm PC, server etc..The terminal device 60 may include, but not only limit In memory 601, processor 602 and display 603.Fig. 5 illustrates only the terminal device 60 with component 601-603, still It should be understood that, it is not required that implement all components shown, the implementation that can be substituted is more or less component.
The memory 601 can be the internal storage unit of the terminal device 60 in some embodiments, such as should The hard disk or memory of terminal device 60.The memory 601 is also possible to the terminal device 60 in further embodiments The plug-in type hard disk being equipped on External memory equipment, such as the terminal device 60, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, described to deposit Reservoir 601 can also both including the terminal device 60 internal storage unit and also including External memory equipment.The memory 601 for storing the application software and Various types of data for being installed on the terminal device 60, such as the guarantor based on information security Singly save the program code etc. of review procedure 600 from damage.The memory 601, which can be also used for temporarily storing, to have exported or has incited somebody to action The data to be exported.
The processor 602 can be a central processing unit (Central Processing in some embodiments Unit, CPU), microprocessor or other data processing chips, for run the program code stored in the memory 601 or Data are handled, such as executes the declaration form based on information security and saves review procedure 600 etc. from damage.
The display 603 can be light-emitting diode display, liquid crystal display, touch control type LCD in some embodiments and show Device and Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) touch device etc..The display 603 For being shown in the information handled in the terminal device 60 and for showing visual user interface, such as application menu Interface, application icon interface etc..The component 601-603 of the terminal device 60 is in communication with each other by system bus.
Referring to Fig. 6, being the function that the declaration form provided in an embodiment of the present invention based on information security saves review procedure 600 from damage Module map.In the present embodiment, the declaration form based on information security save from damage review procedure 600 can be divided into one or Multiple modules, one or more of modules are stored in the memory 601, and by one or more processors (this Embodiment is the processor 602) it is performed, to complete the present invention.For example, in Fig. 6, the guarantor based on information security Singly save from damage review procedure 600 can be divided into save from damage request reception unit 701, declaration form change factor extraction unit 702, core protect Factor extraction unit 703, risk index determination unit 704 and core protect index determination unit 705.The so-called unit of the present invention refers to The series of computation machine program instruction section that can complete specific function, it is more described based on information security more suitable for describing than program Declaration form saves implementation procedure of the review procedure 600 in the terminal device 60 from damage.The unit will specifically be introduced by being described below 701-706 function.
Wherein, save request reception unit 701 from damage, it is described to save request packet from damage for receiving the request of saving from damage of client transmission Containing client identity mark and declaration form modification information;
Declaration form changes factor extraction unit 702, is changed with according to the type of modification information in declaration form modification information from declaration form Declaration form is extracted in information changes the factor;
Core protects factor extraction unit 703, if for changing the factor comprising insurance information in the declaration form change factor, from Core, which is extracted, in the insurance information change factor protects the factor;
Risk index determination unit 704 is protected the corresponding relationship of the factor and core guarantor's factor coefficient for inquiring the core prestored, is obtained The core for taking each core to protect the factor protects factor coefficient, protects factor coefficient and the different degree of client etc. according to the core that each core protects the factor Grade, determines the risk index of client;
Core protects index determination unit 705, obtains customer information for identifying according to the client identity, extracts the client Multiple risk keywords in information obtain the corresponding core of the multiple risk keyword and protect score, and protected and divided according to the core The core that number obtains the client protects index;
Audit label adding unit 706, for protecting the comparison result of index based on the risk index and the core, by institute It states and saves the upper corresponding audit label of request addition from damage.
In one embodiment of the invention, the audit marks adding unit 706, if be also used to the declaration form change because The factor only is changed comprising client's essential information change factor and/or income pickup information in son, then sends verification information described in Client;
Receive the authentication response information that the client returns;
If the authentication response information matches with the verification information, save the upper direct writing mark of request addition from damage for described Note.
In one embodiment of the invention, audit label adding unit 706 includes:
Direct writing module 7061, if it is pre- to be greater than or equal to first for the difference that the risk index and the core protect index If threshold value, then by it is described save from damage request addition on directly declinature label;
It has ready conditions module 7062 of accepting insurance, if for the difference of the risk index and core guarantor's index less than the first default threshold It is worth and is greater than the second preset threshold, then saves label of accepting insurance of having ready conditions in request addition from damage for described;
The direct writing module 7061, if the difference for being also used to the risk index and core guarantor's index is less than or equal to Second preset threshold then saves the upper direct writing label of request addition from damage for described
In one embodiment of the invention, audit label adding unit 706 can also include that additional conditions of accepting insurance are established Module 7063 for being accepted insurance additional conditions according to risk index foundation, and sends the additional conditions of accepting insurance to described Client.
In one embodiment of the invention, the declaration form modification information is format message, in the format message successively Added with first identifier symbol, second identifier symbol and third identifier, the declaration form change factor include the insurance information change factor, Client's essential information changes the factor or income pickup information changes the factor, and the declaration form changes factor extraction unit 702, specific to use If detecting the first keyword in the declaration form modification information between first identifier symbol and second identifier symbol, First keyword is determined as the insurance information change factor;If between second identifier symbol and the third identifier The declaration form modification information in detect the second keyword, by second keyword be determined as client's essential information change because Son;If detecting third key in the declaration form modification information between the third identifier and the end mark of format message The third keyword is determined as income pickup information and changes the factor by word.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code Dish, CD, computer storage, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that the meter The content that calculation machine readable medium includes can carry out increase and decrease appropriate according to the requirement made laws in jurisdiction with patent practice, It such as does not include electric carrier signal and telecommunications according to legislation and patent practice, computer-readable medium in certain jurisdictions Signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of declaration form based on information security saves checking method from damage characterized by comprising
Receive that client sends saves request from damage, described to save request from damage and include client identity mark and declaration form modification information;
The declaration form change factor is extracted from declaration form modification information according to the type of modification information in declaration form modification information;
If changing the factor comprising insurance information in the declaration form change factor, core is extracted from the insurance information change factor Protect the factor;
The corresponding relationship that the core prestored protects the factor and core guarantor's factor coefficient is inquired, the core for obtaining each core guarantor factor protects factor system Number protects the different degree grade of factor coefficient and client according to the core that each core protects the factor, determines the risk index of client;
It is identified according to the client identity and obtains customer information, extract multiple risk keywords in the customer information, obtained The corresponding core of the multiple risk keyword protects score, and according to the core protects score and obtain the core of the client and protect index;
The comparison result that index is protected based on the risk index and the core saves the upper corresponding audit mark of request addition from damage for described Note.
2. the declaration form according to claim 1 based on information security saves checking method from damage, which is characterized in that described from declaration form In modification information after the extraction declaration form change factor, further includes:
If only changing the factor comprising client's essential information change factor and/or income pickup information in the declaration form change factor, Verification information is then sent to the client;
Receive the authentication response information that the client returns;
If the authentication response information matches with the verification information, save the upper direct writing label of request addition from damage for described.
3. the declaration form according to claim 1 based on information security saves checking method from damage, which is characterized in that described to be based on institute It states risk index and the core protects the comparison result of index, the upper corresponding audit label of request addition will be saved from damage, comprising:
If the difference that the risk index and the core protect index is greater than or equal to the first preset threshold, saves request from damage by described and add In addition directly declinaturing label;
If the risk index and the core protect the difference of index less than the first preset threshold and are greater than the second preset threshold, by institute It states and saves label of accepting insurance of having ready conditions in request addition from damage;
If the difference that the risk index and the core protect index is less than or equal to the second preset threshold, saves request from damage by described and add In addition direct writing marks.
4. the declaration form according to claim 3 based on information security saves checking method from damage, which is characterized in that it is described will be described Save from damage after having ready conditions in request addition and accept insurance label, further includes:
Additional conditions of accepting insurance are established according to the risk index, and send the client for the additional conditions of accepting insurance.
5. the declaration form according to claim 1 based on information security saves checking method from damage, which is characterized in that the declaration form becomes More information is format message, is successively accorded with added with first identifier in the format message, second identifier accords with and third identifier, institute State declaration form change the factor include insurance information change the factor, client's essential information change the factor or income pickup information change because Son;
It is described that at least one declaration form change factor is extracted from declaration form modification information, comprising:
If detecting the first key in the declaration form modification information between first identifier symbol and second identifier symbol First keyword is determined as the insurance information change factor by word;
If detecting the second key in the declaration form modification information between second identifier symbol and the third identifier Second keyword is determined as client's essential information change factor by word;
If detecting in the declaration form modification information between the third identifier and the end mark of format message, third is closed The third keyword is determined as income pickup information and changes the factor by keyword.
6. a kind of terminal device, which is characterized in that in the memory and can be in institute including memory, processor and storage The computer program run on processor is stated, the processor realizes following steps when executing the computer program:
Receive that client sends saves request from damage, described to save request from damage and include client identity mark and declaration form modification information;
The declaration form change factor is extracted from declaration form modification information according to the type of modification information in declaration form modification information;
If changing the factor comprising insurance information in the declaration form change factor, core is extracted from the insurance information change factor Protect the factor;The corresponding relationship that the core prestored protects the factor and core guarantor's factor coefficient is inquired, the core for obtaining each core guarantor factor protects the factor Coefficient protects the different degree grade of factor coefficient and client according to the core that each core protects the factor, determines the risk index of client;
It is identified according to the client identity and obtains customer information, extract multiple risk keywords in the customer information, obtained The corresponding core of the multiple risk keyword protects score, and according to the core protects score and obtain the core of the client and protect index;
The comparison result that index is protected based on the risk index and the core saves the upper corresponding audit mark of request addition from damage for described Note.
7. terminal device as claimed in claim 6, which is characterized in that it is described from declaration form modification information extract declaration form change because After son, further includes:
If only changing the factor comprising client's essential information change factor and/or income pickup information in the declaration form change factor, Verification information is then sent to the client;
Receive the authentication response information that the client returns;
If the authentication response information matches with the verification information, save the upper direct writing label of request addition from damage for described.
8. terminal device as claimed in claim 6, which is characterized in that described to protect index based on the risk index and the core Comparison result, the upper corresponding audit label of request addition will be saved from damage, comprising:
If the difference that the risk index and the core protect index is greater than or equal to the first preset threshold, saves request from damage by described and add In addition directly declinaturing label;
If the risk index and the core protect the difference of index less than the first preset threshold and are greater than the second preset threshold, by institute It states and saves label of accepting insurance of having ready conditions in request addition from damage;
If the difference that the risk index and the core protect index is less than or equal to the second preset threshold, saves request from damage by described and add In addition direct writing marks.
9. terminal device as claimed in claim 8, which is characterized in that it is described by it is described save from damage have ready conditions and accept insurance in request addition After label, further includes:
Additional conditions of accepting insurance are established according to the risk index, and send the client for the additional conditions of accepting insurance.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In realization is as described in any one of claim 1 to 5 based on the declaration form of information security when the computer program is executed by processor The step of saving checking method from damage.
CN201811039193.6A 2018-09-06 2018-09-06 Declaration form based on information security saves checking method and terminal device from damage Pending CN109345193A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811039193.6A CN109345193A (en) 2018-09-06 2018-09-06 Declaration form based on information security saves checking method and terminal device from damage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811039193.6A CN109345193A (en) 2018-09-06 2018-09-06 Declaration form based on information security saves checking method and terminal device from damage

Publications (1)

Publication Number Publication Date
CN109345193A true CN109345193A (en) 2019-02-15

Family

ID=65292502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811039193.6A Pending CN109345193A (en) 2018-09-06 2018-09-06 Declaration form based on information security saves checking method and terminal device from damage

Country Status (1)

Country Link
CN (1) CN109345193A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110033168A (en) * 2019-03-12 2019-07-19 平安普惠企业管理有限公司 A kind of order allocation method and relevant device based on data processing
CN110111207A (en) * 2019-04-12 2019-08-09 中国平安人寿保险股份有限公司 Core protects method and relevant device
CN112132694A (en) * 2020-09-28 2020-12-25 平安养老保险股份有限公司 Policy and security case confirmation and verification method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588364A (en) * 2009-03-31 2009-11-25 北京飞天诚信科技有限公司 Signature method, device and system thereof
CN107292746A (en) * 2016-04-13 2017-10-24 平安科技(深圳)有限公司 The information processing method and device of surrender business
CN107292150A (en) * 2016-04-13 2017-10-24 平安科技(深圳)有限公司 Save user identification confirmation method and apparatus in information processing from damage
CN108256809A (en) * 2016-12-28 2018-07-06 平安科技(深圳)有限公司 Insure request checking method and the device of a kind of accessory risk

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588364A (en) * 2009-03-31 2009-11-25 北京飞天诚信科技有限公司 Signature method, device and system thereof
CN107292746A (en) * 2016-04-13 2017-10-24 平安科技(深圳)有限公司 The information processing method and device of surrender business
CN107292150A (en) * 2016-04-13 2017-10-24 平安科技(深圳)有限公司 Save user identification confirmation method and apparatus in information processing from damage
CN108256809A (en) * 2016-12-28 2018-07-06 平安科技(深圳)有限公司 Insure request checking method and the device of a kind of accessory risk

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈启军等编著: "嵌入式系统及其应用 基于Cortex-M3内核和STM32F103系列微控制器的系统设计与开发", 31 May 2011, 上海:同济大学出版社, pages: 367 - 370 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110033168A (en) * 2019-03-12 2019-07-19 平安普惠企业管理有限公司 A kind of order allocation method and relevant device based on data processing
CN110033168B (en) * 2019-03-12 2024-05-14 珠海名家色彩创意设计有限公司 Order distribution method based on data processing and related equipment
CN110111207A (en) * 2019-04-12 2019-08-09 中国平安人寿保险股份有限公司 Core protects method and relevant device
CN112132694A (en) * 2020-09-28 2020-12-25 平安养老保险股份有限公司 Policy and security case confirmation and verification method, device, equipment and storage medium
CN112132694B (en) * 2020-09-28 2024-04-09 平安养老保险股份有限公司 Method, device, equipment and storage medium for confirming and checking policy and security case

Similar Documents

Publication Publication Date Title
CN109242261A (en) Save the method and terminal device of risk from damage based on big data assessment
US8365986B2 (en) Credit card security system and method
CN108596771A (en) Method, apparatus, user terminal and the block chain node device of insurance underwriting
CN108520073A (en) Air control data integration method, device, equipment and computer readable storage medium
CN109345193A (en) Declaration form based on information security saves checking method and terminal device from damage
CN108446968A (en) A kind of method, apparatus and terminal device of accounting entry
CN106980995A (en) A kind of identification of electronic invoice layout files and checking method and relevant apparatus
CN101114359A (en) IC card electronic payment system with bidirectional data-transmission network
CN107800894A (en) A kind of phonetic prompt method and terminal device for telephony service system
CN109345417A (en) The on-line examination method and terminal device of the business personnel of identity-based certification
CN109087194A (en) Invoice checking method, device, computer equipment and storage medium
CN107292747A (en) Save the optimization method and device of processing from damage
CN108665364A (en) Sell bill of lading checking method and terminal device
CN106296201A (en) Bus Card equipment off-line credit payment verification method
CN112801645A (en) Smart supply chain financial AIOT BDaaS big data operation platform
US20070255651A1 (en) Batch processing of financial transactions
CN108428108A (en) Government affairs information dissemination method, device and terminal device
CN102073969A (en) Method for realizing debit and credit integrated card
CN201307311Y (en) IC card electronic payment system of dual-direction data transmitting network
JP7424678B2 (en) Management device, management method, management system and program
CN102667822B (en) There is the transportation card of national compatibility function
CN110555589A (en) Risk order identification method and device
CN101201957A (en) Trans-regional trans-account bank card system and processing method thereof
CN108848061A (en) A kind of user information transmission method and terminal device
CN107610369A (en) A kind of payment of fees method violating the regulations and ATM

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination