CN109345193A - Declaration form based on information security saves checking method and terminal device from damage - Google Patents
Declaration form based on information security saves checking method and terminal device from damage Download PDFInfo
- Publication number
- CN109345193A CN109345193A CN201811039193.6A CN201811039193A CN109345193A CN 109345193 A CN109345193 A CN 109345193A CN 201811039193 A CN201811039193 A CN 201811039193A CN 109345193 A CN109345193 A CN 109345193A
- Authority
- CN
- China
- Prior art keywords
- information
- factor
- core
- declaration form
- damage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 230000008859 change Effects 0.000 claims abstract description 79
- 230000004048 modification Effects 0.000 claims abstract description 69
- 238000012986 modification Methods 0.000 claims abstract description 69
- 238000012550 audit Methods 0.000 claims abstract description 27
- 239000000284 extract Substances 0.000 claims abstract description 10
- 238000012795 verification Methods 0.000 claims description 19
- 238000004590 computer program Methods 0.000 claims description 14
- 230000004044 response Effects 0.000 claims description 12
- 238000000605 extraction Methods 0.000 claims description 7
- 238000012552 review Methods 0.000 abstract description 13
- 230000005540 biological transmission Effects 0.000 abstract description 5
- 238000005516 engineering process Methods 0.000 abstract description 4
- 230000006870 function Effects 0.000 description 11
- 230000008569 process Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000003862 health status Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 201000010099 disease Diseases 0.000 description 2
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 2
- 230000036541 health Effects 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 1
- 239000010931 gold Substances 0.000 description 1
- 229910052737 gold Inorganic materials 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Marketing (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Operations Research (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The present invention is suitable for field of information security technology, it provides the declaration form based on information security and saves checking method and terminal device from damage, this method comprises: request is saved in reception client transmission from damage, if this saves request from damage comprising changing the factor comprising insurance information in client identity mark and the declaration form modification information declaration form change factor, core then, which is extracted, from the insurance information change factor protects the factor, obtain core guarantor's factor coefficient that each core protects the factor, the different degree grade of factor coefficient and client is protected according to core, determine the risk index of client, it is identified according to client identity and obtains customer information, extract multiple risk keywords in customer information, score is protected according to the corresponding core of multiple risk keywords, and core guarantor's index that score obtains client is protected according to core, the comparison result of index is protected based on the risk index and the core, save the upper phase of request addition from damage for described The audit label answered, can save the human cost that declaration form saves audit from damage, improve review efficiency, improve the accuracy of audit.
Description
Technical field
The invention belongs to field of information security technology, more particularly to the declaration form based on information security saves checking method and end from damage
End equipment.
Background technique
Insurance policy (abbreviation declaration form) is the written document that insurance company and insurant conclude insurance contract.Insurant is
The client of insurance company, insurance company can provide declaration form correlation letter according to the request of the insurer for client in Effective Period of Insurance
Breath change service, referred to as declaration form saves service from damage.It includes newly-increased accessory risk that declaration form, which is saved from damage to the relevant information changed to declaration form, is subtracted
Protect, add guarantor or beneficiary change, insurer etc..In order to be controlled in the risk for handling declaration form and saving from damage business client, protect
Dangerous company, which needs to save information from damage to the declaration form of client, to be audited.
Currently, the existing declaration form to client saves the mode that information is audited from damage, usually saves declaration form from damage information and send
To underwriting department door, manual examination and verification are carried out by the employee of underwriting department door, but the mode of manual examination and verification needs to consume great manpower
Cost, and there is a problem of that review efficiency is low, auditing result is inaccurate.
Summary of the invention
The embodiment of the present invention provides a kind of declaration form based on information security and saves checking method and terminal device from damage, existing to solve
There is technology to save information from damage to the declaration form of client and carry out manual examination and verification, needs to consume great human cost, and there are review efficiencies
Problem low, auditing result is inaccurate.
The first aspect of the embodiment of the present invention provides a kind of declaration form based on information security and saves checking method from damage, comprising:
Receive that client sends saves request from damage, described to save request from damage and include client identity mark and declaration form modification information;
The declaration form change factor is extracted from declaration form modification information according to the type of modification information in declaration form modification information;
If changing the factor comprising insurance information in the declaration form change factor, mentioned from the insurance information change factor
Core is taken to protect the factor;The corresponding relationship that the core prestored protects the factor and core guarantor's factor coefficient is inquired, the core for obtaining each core guarantor factor is protected
Factor coefficient protects the different degree grade of factor coefficient and client according to the core that each core protects the factor, determines the risk index of client;
It is identified according to the client identity and obtains customer information, extract multiple risk keywords in the customer information,
It obtains the corresponding core of the multiple risk keyword and protects score, and referred to according to the core guarantor that core guarantor's score obtains the client
Number;
The comparison result that index is protected based on the risk index and the core saves that request addition is upper corresponding to be examined from damage for described
Core label.
The second aspect of the embodiment of the present invention provides a kind of terminal device, including memory, processor and is stored in
In the memory and the computer program that can run on the processor, when the processor executes the computer program
Realize following steps:
Receive that client sends saves request from damage, described to save request from damage and include client identity mark and declaration form modification information;
The declaration form change factor is extracted from declaration form modification information according to the type of modification information in declaration form modification information;
If changing the factor comprising insurance information in the declaration form change factor, mentioned from the insurance information change factor
Core is taken to protect the factor;The corresponding relationship that the core prestored protects the factor and core guarantor's factor coefficient is inquired, the core for obtaining each core guarantor factor is protected
Factor coefficient protects the different degree grade of factor coefficient and client according to the core that each core protects the factor, determines the risk index of client;
It is identified according to the client identity and obtains customer information, extract multiple risk keywords in the customer information,
It obtains the corresponding core of the multiple risk keyword and protects score, and referred to according to the core guarantor that core guarantor's score obtains the client
Number;
The comparison result that index is protected based on the risk index and the core saves that request addition is upper corresponding to be examined from damage for described
Core label.
The third aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage
Media storage has computer program, and such as the above-mentioned declaration form based on information security is realized when the computer program is executed by processor
The step of saving checking method from damage.
Existing beneficial effect is the embodiment of the present invention compared with prior art: provided in an embodiment of the present invention based on information
The declaration form of safety saves checking method and terminal device from damage, and what reception client was sent first saves request from damage, this is saved request from damage and includes
Client identity mark and declaration form modification information, mention from declaration form modification information according to the type of modification information in declaration form modification information
The monotropic more factor of going bail for is mentioned from the insurance information change factor if changing the factor comprising insurance information in the declaration form change factor
It takes core to protect the factor, obtains core guarantor's factor coefficient that each core protects the factor, factor coefficient and visitor are protected according to the core that each core protects the factor
The different degree grade at family, determines the risk index of client, is identified according to client identity and obtains customer information, extracts in customer information
Multiple risk keywords, obtain the corresponding core of multiple risk keywords and protect score, and the core that score obtains client is protected according to core
Index is protected, the comparison result of index is protected based on the risk index and the core, saves that request addition is upper corresponding to be examined from damage for described
Core label can save the human cost that declaration form saves audit from damage, improve and examine due to not needing manually to carry out saving from damage the audit of request
Core efficiency, while the influence of manual examination and verification supervisor's factor is eliminated, improve the accuracy of audit.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some
Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is the exemplary flow that a kind of declaration form based on information security that one embodiment of the invention provides saves checking method from damage
Figure;
Fig. 2 be another embodiment of the present invention provides a kind of declaration form based on information security save the signal stream of checking method from damage
Cheng Tu;
Fig. 3 is the signal stream that a kind of declaration form based on information security that yet another embodiment of the invention provides saves checking method from damage
Cheng Tu;
Fig. 4 is the signal stream that a kind of declaration form based on information security that further embodiment of this invention provides saves checking method from damage
Cheng Tu;
Fig. 5 is the structural schematic diagram of terminal device provided in an embodiment of the present invention;
Fig. 6 is the functional block diagram that the declaration form provided in an embodiment of the present invention based on information security saves review procedure from damage.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed
Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific
The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity
The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
It is that a kind of declaration form based on information security that one embodiment of the invention provides saves checking method from damage referring to Fig. 1, Fig. 1
Schematic flow diagram is illustrated by taking server-side as an example in this embodiment, and here, server can be one or more.
As shown in Figure 1, in this embodiment, the treatment process of server may comprise steps of:
S101: receive client transmission saves request from damage, saves request from damage and includes client identity mark and declaration form modification information.
In the present embodiment, client includes mobile phone, tablet computer (Personal Digital Assistant, PDA)
Or PC etc..Client saves request from damage by the change generation for carrying out policy information to declaration form of having insured on the client, visitor
What family end was sent saves request from damage to server.Client identity identifies the user name, ID card No., cell-phone number that can be client
Deng.
S102: extracted from declaration form modification information according to the type of modification information in declaration form modification information declaration form change because
Son.
In the present embodiment, the declaration form change factor is to carry out in declaration form modification information to the different types of information in declaration form
The information unit of change.For example, the type of modification information can be divided into the insurance plan itself to declaration form in declaration form modification information
Modification information, the modification information to client's essential information and the modification information three types to income pickup information.
Specifically, multiple identifiers can be added in declaration form modification information, the corresponding type of each identifier
Modification information extracts keyword in the modification information between identifier, and the keyword is determined as the declaration form change factor.Example
Such as, insurance information is extracted from the modification information of the insurance plan of declaration form itself change the factor;From the change of client's essential information
Client's essential information is extracted in information changes the factor;Income pickup information change is extracted from the modification information of income pickup information
The factor.
S103: it if changing the factor comprising insurance information in the declaration form change factor, is extracted from the insurance information change factor
Core protects the factor.
In the present embodiment, the insurance information change factor refers to insurance plan of declaration form modification information itself.For example, can be with
Including letters such as beneficiary's change, insurer's change, insured amount change, premium change (additional premium), postponement payment or surrenders
Breath.
Specifically, projects classification for obtaining insurance plan itself modification information in the insurance information change factor, according to every
A project category determines that corresponding core protects the factor.For example, becoming in the insurance information change factor comprising beneficiary's change, insurer
More, insured amount changes, premium changes the project of four classifications, then it is that beneficiary changes the factor, throwing that the core extracted, which protects the factor,
Guarantor changes the factor, the insured amount change factor, premium and changes the factor.
S104: the corresponding relationship that the core prestored protects the factor and core guarantor's factor coefficient is inquired, the core that each core protects the factor is obtained
Factor coefficient is protected, the different degree grade of factor coefficient and client is protected according to the core that each core protects the factor, determines that the risk of client refers to
Number.
In the present embodiment, different core protects factor pair and answers different core guarantor's factor coefficients.It is corresponded to for example, beneficiary changes
It is 5 that core, which protects factor coefficient, and it is 10 that insurer, which changes corresponding core and protects factor coefficient, and insured amount changes corresponding core and protects factor system
Number is 20, and the corresponding core guarantor factor coefficient of premium change (additional premium) is 20, postponement is paid the fees, and corresponding core guarantor factor coefficient is
20, it is 50 that the corresponding core of surrender, which protects factor coefficient,.
Specifically, it can be identified by client identity, inquire the client identity mark and customer's importance degree grade prestored
Corresponding relationship obtains the different degree grade of client.For example, the first estate client is VVIP client, grade mark 1;Second
Tier customer is VIP client, grade mark 2;Tertiary gradient client is common customer, grade mark 3;The fourth estate
Client is blacklist client, grade mark 4.
The different degree grade that factor coefficient and client are protected according to each core, determines the process of the risk index of client are as follows: visitor
The risk index at family is that each core protects factor coefficient sum multiplied by customer grade.For example, it includes being benefited that core, which protects factor coefficient,
It is 5 that people, which changes corresponding core and protects factor coefficient, and the corresponding core of premium change (additional premium) protects factor coefficient and is 20, postpones payment pair
It is 20 that the core answered, which protects factor coefficient, customer grade 2, then the risk index of client=(5+20+20) × 2=90.
S105: identifying according to client identity and obtain customer information, extracts multiple risk keywords in customer information, obtains
The corresponding core of multiple risk keywords protects score, and according to core protects score and obtain the core of client and protect index.
In the present embodiment, from the corresponding relation database of the client identity mark and customer information that prestore, in acquisition
It states client identity and identifies corresponding customer information.Wherein, customer information is that client submits during historical trading and client
The related information aggregate of credit standing, trading situation, health status, for example, may include but be not limited to credit report, history is insured
Record, client health report.
Specifically, score is protected according to the corresponding core of multiple risk keywords, and score is protected according to core and obtains the core guarantor of client
The process of index, which may is that, obtains classification belonging to each risk keyword, and the core of each risk keyword is determined according to classification
Protect score;Radix is protected with default core and subtracts each core guarantor score, and the core for obtaining client protects index.For example, belonging to risk keyword
Classification include customers' credit situation class, trading situation class, health status class.It has recorded and drinks in the statement-of-health of client day
0.5kg, serious disease is hospitalized twice the year before, then risk keyword is " drink day 0.5kg ", " serious disease is hospitalized twice ", belongs to health
Situation class, obtaining the corresponding core guarantor score of health status class is 5, and presetting core and protecting radix is 100, then core guarantor's index of client is
100-5-5=90.
S106: protecting the comparison result of index based on risk index and core, will save the upper corresponding audit label of request addition from damage.
In the present embodiment, it is poor that risk index and core can be protected to index work, request will be saved from damage according to obtained difference and added
In addition corresponding audit label, different differences corresponds to different audit labels.Wherein, audit label can include but is not limited to
Directly declinature label, label or the direct writing label of accepting insurance of having ready conditions.
As can be seen from the above description, can save declaration form due to the audit for not needing manually to carry out saving from damage request and save audit from damage
Human cost, improve review efficiency, while eliminate manual examination and verification supervisor factor influence, improve the accuracy of audit.
Referring to Fig. 2, Fig. 2 be another embodiment of the present invention provides a kind of declaration form based on information security save audit side from damage
The schematic flow diagram of method.On the basis of the above embodiments, after step s 102, the method also includes:
S201: if only comprising client's essential information change factor and/or income pickup information change in the declaration form change factor
The factor then sends verification information to the client.
In the present embodiment, client's essential information change factor refers to the modification information of client's essential information.For example, can be with
Including mailing address change, telephone number changing, Bank Account Number change etc..Income pickup information changes the factor, and this is client's income
Pickup information's change.It such as may include pickup information's change of existence gold, bonus etc..Verification information can be short-message verification,
Mailbox verifying etc.
S202: the authentication response information that client returns is received.
In the present embodiment, authentication response information is the response message that client sends according to the content of verification information.For example,
Authentication response information is the answer for the validation problem in verification information.
S203: if authentication response information matches with verification information, request will be saved from damage and add upper direct writing label.
In the present embodiment, when authentication response information is the answer for the validation problem in verification information, if verifying
The answer of problem matches with the answer prestored, then will save request from damage and add upper direct writing label.
As can be seen from the above description, since the change of client's essential information and income pickup information are not related to the core benefit of declaration form
Benefit if only changing the factor comprising client's essential information change factor and/or income pickup information in the declaration form change factor, and passes through
When verifying, then saves request from damage and add upper direct writing label, improve the review efficiency that declaration form saves request from damage.
Referring to Fig. 3, Fig. 3 is that a kind of declaration form based on information security that yet another embodiment of the invention provides saves audit side from damage
The schematic flow diagram of method.On the basis of the above embodiments, details are as follows by above-mentioned steps S106:
S301: if the difference that risk index and core protect index is greater than or equal to the first preset threshold, request addition will be saved from damage
On directly declinature label.
In the present embodiment, the first preset threshold represents higher risk, and the difference that risk index and core protect index is greater than
Or it is equal to the first preset threshold, illustrate that the risk for saving request from damage is higher, can directly declinature, improves the audit that declaration form saves request from damage
Efficiency.
S302:, will if risk index and core protect the difference of index less than the first preset threshold and is greater than the second preset threshold
Save label of accepting insurance of having ready conditions in request addition from damage.
In the present embodiment, the second preset threshold represents certain risk, and the difference that risk index and core protect index is small
In the first preset threshold and it is greater than the second preset threshold, illustrates that saving request from damage has certain risk, in order to not influence client's
Save request from damage, can will save label of accepting insurance of having ready conditions in request addition from damage, is sent to processing node and continues with, be unlikely to
Directly the client for having certain risk is directly declinatured, influence client saves audit experience from damage.
S303: if the difference that risk index and core protect index is less than or equal to the second preset threshold, request addition will be saved from damage
Upper direct writing label.
In the present embodiment, the first preset threshold and the second preset threshold can according to need and be configured.
As can be seen from the above description, then risk index and core are protected by the first preset threshold of setting and the second preset threshold
The difference of index will save request from damage according to comparison result and add upper different examine compared with the first preset threshold and the second preset threshold
Core label can be avoided the influence of manual examination and verification supervisor's factor, accurately determine the auditing result for saving request from damage.
In one embodiment of the invention, on the basis of the above embodiments, after above-mentioned steps S106, the method
Further include:
Additional conditions of accepting insurance are established according to risk index, and the additional conditions that will accept insurance are sent to client.
In the present embodiment, when risk index is more than to be no more than default risk threshold value, transmission pre-pays risk guarantee fund's
Additional conditions of accepting insurance are to client;When risk index is more than default risk threshold value, what transmission needed to handle to sales counter accepts insurance attached
Add condition to client.
As can be seen from the above description, additional conditions of accepting insurance are established by risk index, it is higher to risk to save request progress from damage
It accepts insurance, meets the mode demand of accepting insurance of the multiplicity for the client for saving request from damage.
Referring to Fig. 4, Fig. 4 is that a kind of declaration form based on information security that further embodiment of this invention provides saves audit side from damage
The schematic flow diagram of method.The type of modification information includes the modification information of insurance plan to declaration form itself, is believed substantially client
The modification information of breath and modification information three types to income pickup information, can root during generating declaration form modification information
According to the type of modification information in declaration form modification information, each type modification information is stored in after corresponding identifier.Upper
On the basis of stating embodiment, the declaration form modification information is format message, added with first identifier symbol, the in the format message
Two identifiers and third identifier, wherein first identifier symbol, second identifier symbol and third identifier are to have spy in format message
The character string of different code, if first identifier symbol is " 00010 ", second identifier symbol is " 0020 ", and third identifier is " 0030 ", the
The effect of one identifier, second identifier symbol and third mark is by three types in modification information (i.e. to the insurance plan of declaration form
The modification information of itself, the modification information to client's essential information and the modification information to income pickup information) it is separated, it protects
The monotropic more factor includes that the insurance information change factor, client's essential information change factor or income pickup information change the factor.?
On the basis of this, details are as follows by above-mentioned steps S102:
S401: if detecting the first keyword in the declaration form modification information that first identifier accords between second identifier symbol,
First keyword is determined as the insurance information change factor.
In the present embodiment, terminate to detect whether to extract the first key to second identifier symbol since first identifier symbol
First keyword is determined as the insurance information change factor if extracting the first keyword by word.
Wherein, the first keyword is word related with insurance information, including works as and be not limited to: surname (e.g., Zhao's money grandson Lee),
" expense ", " member ", " ten thousand yuan ", " thousand yuan ", " hundred million " etc..
S402: if detecting the second keyword in the declaration form modification information that second identifier accords between third identifier,
Second keyword is determined as client's essential information change factor.
In the present embodiment, the second keyword is word related with client's essential information, including works as and be not limited to: Bank Account Number
(initial several of each bank be it is identical, as agricultural bank 622848...), phone number (such as 138...), address information are (specific
The keyword in place name or " street ", " road ") etc..
S403: if detecting in declaration form modification information between third identifier and the end mark of format message, third is closed
The third keyword is determined as income pickup information and changes the factor by keyword.
In the present embodiment, the end mark of format message is last for being used to carry data message part in format message
A character.Third keyword is to get the related word of letter with income, including when being not limited to: " extraction ", " getting ", " income ",
" member ", " ten thousand yuan ", " thousand yuan ", " hundred million " etc..
As can be seen from the above description, by can be accurately added with first identifier symbol, second identifier symbol and third identifier
The different types of declaration form change factor is extracted from declaration form modification information.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
Save checking method from damage corresponding to the declaration form described in foregoing embodiments based on information security, Fig. 5 shows the present invention
The structural schematic diagram for the terminal device that embodiment provides.For ease of description, only the parts related to this embodiment are shown.
In the present embodiment, the declaration form based on information security saves review procedure 600 from damage and installs and run on terminal device 60
In.The terminal device 60 can be mobile terminal, palm PC, server etc..The terminal device 60 may include, but not only limit
In memory 601, processor 602 and display 603.Fig. 5 illustrates only the terminal device 60 with component 601-603, still
It should be understood that, it is not required that implement all components shown, the implementation that can be substituted is more or less component.
The memory 601 can be the internal storage unit of the terminal device 60 in some embodiments, such as should
The hard disk or memory of terminal device 60.The memory 601 is also possible to the terminal device 60 in further embodiments
The plug-in type hard disk being equipped on External memory equipment, such as the terminal device 60, intelligent memory card (Smart Media
Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, described to deposit
Reservoir 601 can also both including the terminal device 60 internal storage unit and also including External memory equipment.The memory
601 for storing the application software and Various types of data for being installed on the terminal device 60, such as the guarantor based on information security
Singly save the program code etc. of review procedure 600 from damage.The memory 601, which can be also used for temporarily storing, to have exported or has incited somebody to action
The data to be exported.
The processor 602 can be a central processing unit (Central Processing in some embodiments
Unit, CPU), microprocessor or other data processing chips, for run the program code stored in the memory 601 or
Data are handled, such as executes the declaration form based on information security and saves review procedure 600 etc. from damage.
The display 603 can be light-emitting diode display, liquid crystal display, touch control type LCD in some embodiments and show
Device and Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) touch device etc..The display 603
For being shown in the information handled in the terminal device 60 and for showing visual user interface, such as application menu
Interface, application icon interface etc..The component 601-603 of the terminal device 60 is in communication with each other by system bus.
Referring to Fig. 6, being the function that the declaration form provided in an embodiment of the present invention based on information security saves review procedure 600 from damage
Module map.In the present embodiment, the declaration form based on information security save from damage review procedure 600 can be divided into one or
Multiple modules, one or more of modules are stored in the memory 601, and by one or more processors (this
Embodiment is the processor 602) it is performed, to complete the present invention.For example, in Fig. 6, the guarantor based on information security
Singly save from damage review procedure 600 can be divided into save from damage request reception unit 701, declaration form change factor extraction unit 702, core protect
Factor extraction unit 703, risk index determination unit 704 and core protect index determination unit 705.The so-called unit of the present invention refers to
The series of computation machine program instruction section that can complete specific function, it is more described based on information security more suitable for describing than program
Declaration form saves implementation procedure of the review procedure 600 in the terminal device 60 from damage.The unit will specifically be introduced by being described below
701-706 function.
Wherein, save request reception unit 701 from damage, it is described to save request packet from damage for receiving the request of saving from damage of client transmission
Containing client identity mark and declaration form modification information;
Declaration form changes factor extraction unit 702, is changed with according to the type of modification information in declaration form modification information from declaration form
Declaration form is extracted in information changes the factor;
Core protects factor extraction unit 703, if for changing the factor comprising insurance information in the declaration form change factor, from
Core, which is extracted, in the insurance information change factor protects the factor;
Risk index determination unit 704 is protected the corresponding relationship of the factor and core guarantor's factor coefficient for inquiring the core prestored, is obtained
The core for taking each core to protect the factor protects factor coefficient, protects factor coefficient and the different degree of client etc. according to the core that each core protects the factor
Grade, determines the risk index of client;
Core protects index determination unit 705, obtains customer information for identifying according to the client identity, extracts the client
Multiple risk keywords in information obtain the corresponding core of the multiple risk keyword and protect score, and protected and divided according to the core
The core that number obtains the client protects index;
Audit label adding unit 706, for protecting the comparison result of index based on the risk index and the core, by institute
It states and saves the upper corresponding audit label of request addition from damage.
In one embodiment of the invention, the audit marks adding unit 706, if be also used to the declaration form change because
The factor only is changed comprising client's essential information change factor and/or income pickup information in son, then sends verification information described in
Client;
Receive the authentication response information that the client returns;
If the authentication response information matches with the verification information, save the upper direct writing mark of request addition from damage for described
Note.
In one embodiment of the invention, audit label adding unit 706 includes:
Direct writing module 7061, if it is pre- to be greater than or equal to first for the difference that the risk index and the core protect index
If threshold value, then by it is described save from damage request addition on directly declinature label;
It has ready conditions module 7062 of accepting insurance, if for the difference of the risk index and core guarantor's index less than the first default threshold
It is worth and is greater than the second preset threshold, then saves label of accepting insurance of having ready conditions in request addition from damage for described;
The direct writing module 7061, if the difference for being also used to the risk index and core guarantor's index is less than or equal to
Second preset threshold then saves the upper direct writing label of request addition from damage for described
In one embodiment of the invention, audit label adding unit 706 can also include that additional conditions of accepting insurance are established
Module 7063 for being accepted insurance additional conditions according to risk index foundation, and sends the additional conditions of accepting insurance to described
Client.
In one embodiment of the invention, the declaration form modification information is format message, in the format message successively
Added with first identifier symbol, second identifier symbol and third identifier, the declaration form change factor include the insurance information change factor,
Client's essential information changes the factor or income pickup information changes the factor, and the declaration form changes factor extraction unit 702, specific to use
If detecting the first keyword in the declaration form modification information between first identifier symbol and second identifier symbol,
First keyword is determined as the insurance information change factor;If between second identifier symbol and the third identifier
The declaration form modification information in detect the second keyword, by second keyword be determined as client's essential information change because
Son;If detecting third key in the declaration form modification information between the third identifier and the end mark of format message
The third keyword is determined as income pickup information and changes the factor by word.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also
To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list
Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system
The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment
The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with
It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute
The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as
Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately
A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device
Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or
In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation
All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program
Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium
It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code
Dish, CD, computer storage, read-only memory (Read-Only Memory, ROM), random access memory (Random
Access Memory, RAM), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that the meter
The content that calculation machine readable medium includes can carry out increase and decrease appropriate according to the requirement made laws in jurisdiction with patent practice,
It such as does not include electric carrier signal and telecommunications according to legislation and patent practice, computer-readable medium in certain jurisdictions
Signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (10)
1. a kind of declaration form based on information security saves checking method from damage characterized by comprising
Receive that client sends saves request from damage, described to save request from damage and include client identity mark and declaration form modification information;
The declaration form change factor is extracted from declaration form modification information according to the type of modification information in declaration form modification information;
If changing the factor comprising insurance information in the declaration form change factor, core is extracted from the insurance information change factor
Protect the factor;
The corresponding relationship that the core prestored protects the factor and core guarantor's factor coefficient is inquired, the core for obtaining each core guarantor factor protects factor system
Number protects the different degree grade of factor coefficient and client according to the core that each core protects the factor, determines the risk index of client;
It is identified according to the client identity and obtains customer information, extract multiple risk keywords in the customer information, obtained
The corresponding core of the multiple risk keyword protects score, and according to the core protects score and obtain the core of the client and protect index;
The comparison result that index is protected based on the risk index and the core saves the upper corresponding audit mark of request addition from damage for described
Note.
2. the declaration form according to claim 1 based on information security saves checking method from damage, which is characterized in that described from declaration form
In modification information after the extraction declaration form change factor, further includes:
If only changing the factor comprising client's essential information change factor and/or income pickup information in the declaration form change factor,
Verification information is then sent to the client;
Receive the authentication response information that the client returns;
If the authentication response information matches with the verification information, save the upper direct writing label of request addition from damage for described.
3. the declaration form according to claim 1 based on information security saves checking method from damage, which is characterized in that described to be based on institute
It states risk index and the core protects the comparison result of index, the upper corresponding audit label of request addition will be saved from damage, comprising:
If the difference that the risk index and the core protect index is greater than or equal to the first preset threshold, saves request from damage by described and add
In addition directly declinaturing label;
If the risk index and the core protect the difference of index less than the first preset threshold and are greater than the second preset threshold, by institute
It states and saves label of accepting insurance of having ready conditions in request addition from damage;
If the difference that the risk index and the core protect index is less than or equal to the second preset threshold, saves request from damage by described and add
In addition direct writing marks.
4. the declaration form according to claim 3 based on information security saves checking method from damage, which is characterized in that it is described will be described
Save from damage after having ready conditions in request addition and accept insurance label, further includes:
Additional conditions of accepting insurance are established according to the risk index, and send the client for the additional conditions of accepting insurance.
5. the declaration form according to claim 1 based on information security saves checking method from damage, which is characterized in that the declaration form becomes
More information is format message, is successively accorded with added with first identifier in the format message, second identifier accords with and third identifier, institute
State declaration form change the factor include insurance information change the factor, client's essential information change the factor or income pickup information change because
Son;
It is described that at least one declaration form change factor is extracted from declaration form modification information, comprising:
If detecting the first key in the declaration form modification information between first identifier symbol and second identifier symbol
First keyword is determined as the insurance information change factor by word;
If detecting the second key in the declaration form modification information between second identifier symbol and the third identifier
Second keyword is determined as client's essential information change factor by word;
If detecting in the declaration form modification information between the third identifier and the end mark of format message, third is closed
The third keyword is determined as income pickup information and changes the factor by keyword.
6. a kind of terminal device, which is characterized in that in the memory and can be in institute including memory, processor and storage
The computer program run on processor is stated, the processor realizes following steps when executing the computer program:
Receive that client sends saves request from damage, described to save request from damage and include client identity mark and declaration form modification information;
The declaration form change factor is extracted from declaration form modification information according to the type of modification information in declaration form modification information;
If changing the factor comprising insurance information in the declaration form change factor, core is extracted from the insurance information change factor
Protect the factor;The corresponding relationship that the core prestored protects the factor and core guarantor's factor coefficient is inquired, the core for obtaining each core guarantor factor protects the factor
Coefficient protects the different degree grade of factor coefficient and client according to the core that each core protects the factor, determines the risk index of client;
It is identified according to the client identity and obtains customer information, extract multiple risk keywords in the customer information, obtained
The corresponding core of the multiple risk keyword protects score, and according to the core protects score and obtain the core of the client and protect index;
The comparison result that index is protected based on the risk index and the core saves the upper corresponding audit mark of request addition from damage for described
Note.
7. terminal device as claimed in claim 6, which is characterized in that it is described from declaration form modification information extract declaration form change because
After son, further includes:
If only changing the factor comprising client's essential information change factor and/or income pickup information in the declaration form change factor,
Verification information is then sent to the client;
Receive the authentication response information that the client returns;
If the authentication response information matches with the verification information, save the upper direct writing label of request addition from damage for described.
8. terminal device as claimed in claim 6, which is characterized in that described to protect index based on the risk index and the core
Comparison result, the upper corresponding audit label of request addition will be saved from damage, comprising:
If the difference that the risk index and the core protect index is greater than or equal to the first preset threshold, saves request from damage by described and add
In addition directly declinaturing label;
If the risk index and the core protect the difference of index less than the first preset threshold and are greater than the second preset threshold, by institute
It states and saves label of accepting insurance of having ready conditions in request addition from damage;
If the difference that the risk index and the core protect index is less than or equal to the second preset threshold, saves request from damage by described and add
In addition direct writing marks.
9. terminal device as claimed in claim 8, which is characterized in that it is described by it is described save from damage have ready conditions and accept insurance in request addition
After label, further includes:
Additional conditions of accepting insurance are established according to the risk index, and send the client for the additional conditions of accepting insurance.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In realization is as described in any one of claim 1 to 5 based on the declaration form of information security when the computer program is executed by processor
The step of saving checking method from damage.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811039193.6A CN109345193A (en) | 2018-09-06 | 2018-09-06 | Declaration form based on information security saves checking method and terminal device from damage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811039193.6A CN109345193A (en) | 2018-09-06 | 2018-09-06 | Declaration form based on information security saves checking method and terminal device from damage |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109345193A true CN109345193A (en) | 2019-02-15 |
Family
ID=65292502
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811039193.6A Pending CN109345193A (en) | 2018-09-06 | 2018-09-06 | Declaration form based on information security saves checking method and terminal device from damage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109345193A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110033168A (en) * | 2019-03-12 | 2019-07-19 | 平安普惠企业管理有限公司 | A kind of order allocation method and relevant device based on data processing |
CN110111207A (en) * | 2019-04-12 | 2019-08-09 | 中国平安人寿保险股份有限公司 | Core protects method and relevant device |
CN112132694A (en) * | 2020-09-28 | 2020-12-25 | 平安养老保险股份有限公司 | Policy and security case confirmation and verification method, device, equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101588364A (en) * | 2009-03-31 | 2009-11-25 | 北京飞天诚信科技有限公司 | Signature method, device and system thereof |
CN107292746A (en) * | 2016-04-13 | 2017-10-24 | 平安科技(深圳)有限公司 | The information processing method and device of surrender business |
CN107292150A (en) * | 2016-04-13 | 2017-10-24 | 平安科技(深圳)有限公司 | Save user identification confirmation method and apparatus in information processing from damage |
CN108256809A (en) * | 2016-12-28 | 2018-07-06 | 平安科技(深圳)有限公司 | Insure request checking method and the device of a kind of accessory risk |
-
2018
- 2018-09-06 CN CN201811039193.6A patent/CN109345193A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101588364A (en) * | 2009-03-31 | 2009-11-25 | 北京飞天诚信科技有限公司 | Signature method, device and system thereof |
CN107292746A (en) * | 2016-04-13 | 2017-10-24 | 平安科技(深圳)有限公司 | The information processing method and device of surrender business |
CN107292150A (en) * | 2016-04-13 | 2017-10-24 | 平安科技(深圳)有限公司 | Save user identification confirmation method and apparatus in information processing from damage |
CN108256809A (en) * | 2016-12-28 | 2018-07-06 | 平安科技(深圳)有限公司 | Insure request checking method and the device of a kind of accessory risk |
Non-Patent Citations (1)
Title |
---|
陈启军等编著: "嵌入式系统及其应用 基于Cortex-M3内核和STM32F103系列微控制器的系统设计与开发", 31 May 2011, 上海:同济大学出版社, pages: 367 - 370 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110033168A (en) * | 2019-03-12 | 2019-07-19 | 平安普惠企业管理有限公司 | A kind of order allocation method and relevant device based on data processing |
CN110033168B (en) * | 2019-03-12 | 2024-05-14 | 珠海名家色彩创意设计有限公司 | Order distribution method based on data processing and related equipment |
CN110111207A (en) * | 2019-04-12 | 2019-08-09 | 中国平安人寿保险股份有限公司 | Core protects method and relevant device |
CN112132694A (en) * | 2020-09-28 | 2020-12-25 | 平安养老保险股份有限公司 | Policy and security case confirmation and verification method, device, equipment and storage medium |
CN112132694B (en) * | 2020-09-28 | 2024-04-09 | 平安养老保险股份有限公司 | Method, device, equipment and storage medium for confirming and checking policy and security case |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109242261A (en) | Save the method and terminal device of risk from damage based on big data assessment | |
US8365986B2 (en) | Credit card security system and method | |
CN108596771A (en) | Method, apparatus, user terminal and the block chain node device of insurance underwriting | |
CN108520073A (en) | Air control data integration method, device, equipment and computer readable storage medium | |
CN109345193A (en) | Declaration form based on information security saves checking method and terminal device from damage | |
CN108446968A (en) | A kind of method, apparatus and terminal device of accounting entry | |
CN106980995A (en) | A kind of identification of electronic invoice layout files and checking method and relevant apparatus | |
CN101114359A (en) | IC card electronic payment system with bidirectional data-transmission network | |
CN107800894A (en) | A kind of phonetic prompt method and terminal device for telephony service system | |
CN109345417A (en) | The on-line examination method and terminal device of the business personnel of identity-based certification | |
CN109087194A (en) | Invoice checking method, device, computer equipment and storage medium | |
CN107292747A (en) | Save the optimization method and device of processing from damage | |
CN108665364A (en) | Sell bill of lading checking method and terminal device | |
CN106296201A (en) | Bus Card equipment off-line credit payment verification method | |
CN112801645A (en) | Smart supply chain financial AIOT BDaaS big data operation platform | |
US20070255651A1 (en) | Batch processing of financial transactions | |
CN108428108A (en) | Government affairs information dissemination method, device and terminal device | |
CN102073969A (en) | Method for realizing debit and credit integrated card | |
CN201307311Y (en) | IC card electronic payment system of dual-direction data transmitting network | |
JP7424678B2 (en) | Management device, management method, management system and program | |
CN102667822B (en) | There is the transportation card of national compatibility function | |
CN110555589A (en) | Risk order identification method and device | |
CN101201957A (en) | Trans-regional trans-account bank card system and processing method thereof | |
CN108848061A (en) | A kind of user information transmission method and terminal device | |
CN107610369A (en) | A kind of payment of fees method violating the regulations and ATM |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |