CN111126935A - Processing method and device of security data, electronic equipment and storage medium - Google Patents

Processing method and device of security data, electronic equipment and storage medium Download PDF

Info

Publication number
CN111126935A
CN111126935A CN201911135060.3A CN201911135060A CN111126935A CN 111126935 A CN111126935 A CN 111126935A CN 201911135060 A CN201911135060 A CN 201911135060A CN 111126935 A CN111126935 A CN 111126935A
Authority
CN
China
Prior art keywords
policy
security
target
group
individual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911135060.3A
Other languages
Chinese (zh)
Other versions
CN111126935B (en
Inventor
石士硕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taikang Insurance Group Co Ltd
Original Assignee
Taikang Insurance Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taikang Insurance Group Co Ltd filed Critical Taikang Insurance Group Co Ltd
Priority to CN201911135060.3A priority Critical patent/CN111126935B/en
Publication of CN111126935A publication Critical patent/CN111126935A/en
Application granted granted Critical
Publication of CN111126935B publication Critical patent/CN111126935B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/102Bill distribution or payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Technology Law (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a processing method and device of security data, electronic equipment and a storage medium, and relates to the technical field of computers. One embodiment of the method comprises: traversing the security state of each group policy in the group policy set, and screening out the target group policy of which the security state is security postponed; judging whether a target individual policy with a security state of security delay exists in the target group policy; if so, changing the security identification of the target individual policy from the first identification to a second identification so as to separate the target individual policy from the target group policy; and updating the security state of the target group policy according to the policy information of the individual policy with the security identifier of the first identifier in the target group policy. The embodiment can avoid the problem that the security data of the whole group policy can not be normally processed and the security execution time of the group policy is prolonged because the individual policies in the group policy use the same security identifier and the security data of the individual policies can not be sequentially executed.

Description

Processing method and device of security data, electronic equipment and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and an apparatus for processing security data, an electronic device, and a storage medium.
Background
With the development of computer technology, many jobs in various industries have been processed by computers, for example, the process of security policy. The insurance of the insurance policy refers to the processes of changing information in the original insurance policy, auditing, paying, deducting and the like for the changed insurance policy after the user applies for insurance.
When the policy is preserved, the preservation data is usually processed according to the preservation identifier, and policies belonging to the same preservation identifier need to execute the process of preservation at the same time. When group policy (called group policy for short) is kept, the group policy belongs to a whole, so that the same security identifier is usually generated for each individual policy in the group policy, and each individual policy in the group policy simultaneously executes the security process.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art:
each individual policy in the group policy uses the same security identifier, and when the security data of the group policy is processed, the problems that part of the individual policies fail to be checked and approved, fail to pay and the like may exist, which may result in that the security data of the individual policies cannot be sequentially executed, and further may result in that the security data of the whole group policy cannot be normally processed, thereby prolonging the execution time of the security of the group policy and bringing inconvenience to the whole user of the group policy.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method, an apparatus, an electronic device, and a storage medium for processing security data, which can avoid the problem that the security data of an individual policy cannot be normally processed and the execution time of the security of the policy is prolonged because the individual policies in a group policy use the same security identifier and the security data of the individual policy cannot be sequentially executed.
To achieve the above object, according to an aspect of an embodiment of the present invention, a method for processing security data is provided.
The processing method of the security data of the embodiment of the invention comprises the following steps: traversing the security state of each group policy in the group policy set, and screening out the target group policy of which the security state is security postponed; judging whether a target individual policy with a security state of security delay exists in the target group policy; if so, changing the security identifier of the target individual policy from the first identifier to a second identifier so as to separate the target individual policy from the target group policy; and updating the security state of the target group security policy according to the security policy information of the individual security policy of which the security identifier is the first identifier in the target group security policy.
In one embodiment, after the changing the security identity of the target individual policy from the first identity to the second identity, the method further comprises: receiving policy update information of the target individual policy; updating the security status of the target individual policy based on the policy update information; judging whether the security state of the target individual policy is consistent with the security state of the target group policy; if so, changing the security identifier of the target individual policy from the second identifier to the first identifier so as to merge the target individual policy with the target group policy.
In yet another embodiment, before said determining whether the security status of said target individual policy is consistent with the security status of said group policy, further comprising: inquiring a group policy with the policy identification being the same as the target policy identification based on the target policy identification of the target individual policy; and determining the security state of the group policy with the policy identification being the same as the target policy identification as the security state of the target group policy.
In yet another embodiment, the hold delay includes a payment failure; the policy update information comprises payment information of the target individual policy; said updating the security status of said target individual policy based on said policy update information comprising: judging whether the target personal insurance policy is paid successfully or not based on the payment information of the target personal insurance policy; and if so, updating the security state of the target personal insurance policy to be successful in payment.
In yet another embodiment, the security deferral comprises a failure of the self-core; the policy update information includes content change information of the target individual policy; said updating the security status of said target individual policy based on said policy update information comprising: updating the policy content of the target individual policy according to the content change information; judging whether the updated target individual policy meets the auditing conditions; and if so, updating the security state of the target personal policy to be self-checking pass.
In yet another embodiment, the security deferral comprises a failure of the self-core; the policy update information includes revocation information;
said updating the security status of said target individual policy based on said policy update information comprising: and executing a security revocation operation according to the content change information, and updating the security state of the target personal policy to be revocation.
In yet another embodiment, the hold delay includes a payment failure and a self-approval failure; the judging whether the target individual policy with the security status of security postponed exists in the target group policy includes: if the security state of the target group policy is that the self-check does not pass, judging whether the target group policy has a target individual policy that the self-check does not pass; and if the security state of the target group policy is that the payment fails, judging whether the target group policy has a target individual policy with the failure of the payment.
To achieve the above object, according to another aspect of the present invention, there is provided a processing apparatus for securing data.
A processing apparatus of security data according to the present invention includes: the screening unit is used for traversing the security state of each group policy in the group policy set and screening the security state as a target group policy with security delay; the judging unit is used for judging whether a target individual policy with a security state of security delay exists in the target group policy; a changing unit, configured to change the security identifier of the target individual policy from the first identifier to the second identifier if the target individual policy is the group policy, so as to separate the target individual policy from the target group policy; and the updating unit is used for updating the security state of the target group security policy according to the security information of the individual security policy with the first identifier in the target group security policy.
In one embodiment, further comprising:
a receiving unit for receiving policy update information of the target individual policy;
the updating unit is further used for updating the security state of the target individual policy based on the policy updating information;
the judging unit is also used for judging whether the security state of the target individual policy is consistent with the security state of the target group policy;
and if so, changing the security identifier of the target individual policy from the second identifier to the first identifier so as to merge the target individual policy with the target group policy.
In yet another embodiment, further comprising:
the query unit is used for querying a group policy with the policy identification being the same as the target policy identification based on the target policy identification of the target individual policy;
and the determining unit is used for determining the security state of the group policy with the policy identification being the same as the target policy identification as the security state of the target group policy.
In yet another embodiment, the hold delay includes a payment failure; the policy update information comprises payment information of the target individual policy;
the update unit is specifically configured to: judging whether the target personal insurance policy is paid successfully or not based on the payment information of the target personal insurance policy; and if so, updating the security state of the target personal insurance policy to be successful in payment.
In yet another embodiment, the security deferral comprises a failure of the self-core; the policy update information includes content change information of the target individual policy;
the update unit is specifically configured to: updating the policy content of the target individual policy according to the content change information; judging whether the updated target individual policy meets the auditing conditions; and if so, updating the security state of the target personal policy to be self-checking pass.
In yet another embodiment, the security deferral comprises a failure of the self-core; the policy update information includes revocation information;
the update unit is specifically configured to: and executing a security revocation operation according to the content change information, and updating the security state of the target personal policy to be revocation.
In yet another embodiment, the hold delay includes a payment failure and a self-approval failure; the judging unit is specifically configured to: if the security state of the target group policy is that the self-check does not pass, judging whether the target group policy has a target individual policy that the self-check does not pass; and if the security state of the target group policy is that the payment fails, judging whether the target group policy has a target individual policy with the failure of the payment.
To achieve the above object, according to still another aspect of an embodiment of the present invention, there is provided an electronic apparatus.
An electronic device of an embodiment of the present invention includes: one or more processors; the storage device is used for storing one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the method for processing the security data provided by the embodiment of the invention.
To achieve the above object, according to still another aspect of an embodiment of the present invention, there is provided a computer-readable medium.
A computer-readable medium of an embodiment of the present invention stores thereon a computer program, and the computer program, when executed by a processor, implements a method for processing security data provided by an embodiment of the present invention.
One embodiment of the above invention has the following advantages or benefits: in the embodiment of the invention, a target group policy with delayed security is screened out in a group policy set according to the security state, and then the security identification of a target individual policy with delayed security in the target group policy is changed from a first identification to a second identification so as to separate the target individual policy from the target group policy; and updating the security state of the target group policy according to the policy information of the individual policy with the security identifier as the first identifier in the target group policy. Therefore, after the security identification of the target individual policy is changed from the first identification to the second identification, the target individual policy is separated from the target group policy, the policy with the security identification of the first identification in the target group policy can continuously execute the security flow, and the security flow of the whole group policy caused by partial individual policies is prevented from being prolonged.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
FIG. 1 is a schematic diagram of a main flow of a method of processing security data according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of another main flow of a method for processing security data according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of another main flow of a method for processing security data according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of another main flow of a method for processing security data according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of the main elements of a device for processing secured data according to an embodiment of the invention;
FIG. 6 is an exemplary system architecture diagram in which embodiments of the present invention may be employed;
FIG. 7 is a schematic block diagram of a computer system suitable for use in implementing embodiments of the present invention.
Detailed Description
Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, in which various details of embodiments of the invention are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
The embodiment of the invention is suitable for a scene of preserving the group policy. The overall process of security includes many steps, such as self-approval of the policy, payment of the policy, and so on. The preservation of a group policy is typically a corresponding operation on each individual policy in the group policy at each link. If each individual policy in the group policy meets the requirements of this link, the group policy may perform the subsequent processes. If the individual policy in the group policy does not meet the requirement of the link, the group policy stays in the link, the subsequent process cannot be executed, and the group policy can execute the subsequent process only when each individual policy meets the requirement of the link.
Each link of the security data processing has a corresponding security state, so that the security link of the policy can be judged according to the security state of each policy. In each security state of the security data processing, some security states are required to wait for the policy to be updated and then meet the requirement of the link, so as to execute the states of the subsequent security processes, and the security states belong to the security delay. The preservation delay means that the preservation requirement can be met after the policy is updated, and the preservation state of the preservation process is continued. For example, the security postponement may include that the self-check fails, the self-check fails to indicate that there is a problem in the policy information in the link of the policy self-check, such as incomplete information, wrong information, and the like, and at this time, it is necessary to wait until the policy information is manually checked or the user updates the policy content, so as to solve the problem in the policy information, and then execute the subsequent security procedure. When the policy is in the security state of the security delay, if the policy fails to perform the update operation for a long time, the policy will be in the state for a long time, and the subsequent security process cannot be executed, thereby resulting in slow execution of the security process. For the group policy, each of the personal policies included in the group policy has the same security identifier, and because the group policy stays in the link if the personal policy does not meet the requirement of the security link, the group policy also stays in the security state of the security delay if the personal policy in the group policy is in the security state of the security delay, and the group policy continues to execute the subsequent security flow until the personal policy in the security delay meets the requirement of the security link after the policy update, so that the execution time of the security flow of the group policy is prolonged.
An embodiment of the present invention provides a method for processing security data, where the method is executable by a terminal device, and as shown in fig. 1, the method includes the following steps.
S101: and traversing the security state of each group policy in the group policy set, and screening the target group policy of which the security state is the security delay.
In the embodiment of the present invention, the group policy set is each group policy for executing security, and each group policy has a security status to indicate the security stage of the group policy. Therefore, according to the security body of the group policy, the target group policy with the security status of the security delay can be screened from the group policy set.
It should be noted that, in the embodiment of the present invention, a single group policy is usually processed, so the target group policy screened from the group policy set in this step is a group policy. If there are a plurality of group policies in the group policy set whose security status is the security suspension, one of the plurality of group policies may be selected as the target group policy.
When the group policy is secured, a security identifier, i.e. a security number, is generated for the group policy.
S102: and judging whether a target individual policy with the security status of security postponing exists in the target group policy.
When the security data of the group policy is processed, if the group policy is in the security state of the security suspension, it usually indicates that the group policy includes the individual policy in the security suspension. Therefore, after the target group policy is determined in step S101, it can be determined whether there is a target individual policy whose security status is security-deferred in the target group policy, and if so, the target individual policy is subsequently processed.
The security delay may include a payment failure and a self-approval failure. When the group policy includes individual policies whose security status is security-deferred, the security status of the group policy is consistent with the security status of the individual policies. Therefore, if the security status of the target group policy is that the self-approval fails, it needs to be determined in this step whether the target group policy has a target individual policy that the self-approval fails; if the security status of the target group policy is to be paid by the individual, then the step judges whether the target group policy has the target individual policy which is not passed by self-check.
S103: if yes, the security identification of the target individual policy is changed from the first identification to the second identification.
Wherein, every policy carries out the security and all has the security sign, and when group's policy was kept, the security sign of the individual policy that group's policy included was the same. In the embodiment of the present invention, the first identifier is a security identifier of the target group policy, and if it is determined in step S102 that there is a target individual policy whose security status is security-deferred in the target group policy, this step changes the security identifier of the target individual policy from the first identifier to the second identifier. The second mark is a new security mark, the security mark of the target individual policy is changed from the first mark to the second mark, which represents that the target individual policy is separated from the target group policy, thereby avoiding the target individual policy from influencing the security flow of the target group policy. After the security identification of the target personal policy is changed from the first identification to the second identification, the first identification represents the personal policy with the security status of non-security-delayed in the target group policy, and the second identification represents the personal policy with the security status of security-delayed in the target group policy.
After this step, the target individual policy causing the extension of the security procedure of the target group policy is separated from the target group policy, and the security status of the remaining individual policies is non-security-delayed, so that the subsequent security procedure can be continuously executed.
S104: and updating the security state of the target group policy according to the policy information of the individual policy with the security identifier of the first identifier in the target group policy.
After the target individual policy changes the security identifier, the individual policies whose security identifiers are the first identifiers can be screened according to the security identifiers of the individual policies in the target group policy, and the security states of the individual policies whose security identifiers are the first identifiers are all non-security-deferred, so that the subsequent security process can be continuously executed, that is, the security process is continuously executed according to the security information of the individual policies whose security identifiers are the first identifiers, and the security state of the target group policy is updated based on the subsequent security process.
In addition, after this step, the target individual policy is separated from the target group policy, and since the security status of the target individual policy is security suspension and it is necessary to wait until the policy is updated, this step may further include: receiving policy update information of a target individual policy; updating the security status of the target individual policy based on the policy update information; judging whether the preservation state of the target individual policy is consistent with the preservation state of the group policy; if yes, the security identification of the target individual policy is changed from the second identification to the first identification, so that the target individual policy and the target group policy are merged.
After receiving the policy update information of the target individual policy, before the security confirmation, the target individual policy can be updated based on the policy update information, and after the target individual policy is updated, if the policy update information meets the requirements of the current security link, the subsequent security process can be executed, so that the copyright state is updated. After the security status of the target individual policy is updated, the target individual policy may be added back to the target group policy to bring the validation time of each policy in the group policy into agreement. Since the security status of the target individual policy may be updated when the security status of the target group policy is updated, the security status of the target individual policy and the security status of the target group policy are not always the same, and if the security status of the target individual policy and the security status of the target group policy are not the same, the target individual policy cannot be added back to the target group policy. If so, the security identity of the target individual policy may be changed from the second identity to the first identity, i.e., the target individual policy is added to the target group policy. If not, the target individual policy and the individual policy identified as the first policy in the target group policy are respectively executed with the security process.
Before judging whether the preservation state of the target individual policy is consistent with that of the group policy, the target group policy can be inquired based on the target policy identification of the target individual policy, such as the policy number, so as to determine the preservation state of the target group policy.
In the embodiment of the invention, a target group policy with delayed security is screened out in a group policy set according to the security state, and then the security identification of a target individual policy with delayed security in the target group policy is changed from a first identification to a second identification so as to separate the target individual policy from the target group policy; and updating the security state of the target group policy according to the policy information of the individual policy with the security identifier as the first identifier in the target group policy. Therefore, after the security identification of the target individual policy is changed from the first identification to the second identification, the target individual policy is separated from the target group policy, the policy with the security identification of the first identification in the target group policy can continuously execute the security flow, and the security flow of the whole group policy caused by partial individual policies is prevented from being prolonged.
It should be noted that, when the group policy executes the security process, if the individual policy is to be revoked during the security process, the security identifier of the individual policy to be revoked may be changed to the original first identifier, so that the individual policy to be revoked is separated from the group policy, and the other individual policies not to be revoked execute the security process, and the individual policies to be revoked execute the security revocation process.
If the group insurance policy is the group insurance policy of the enterprise staff, the payment mode is mixed payment, and the individual pays the insurance fee, and in the process of waiting for the enterprise payment, some staff have the situations of insurance leaving, and need to withdraw the insurance, the insurance policy of the staff can be changed into the insurance mark, and the insurance mark is stripped from the group insurance policy, and the insurance withdrawing operation is carried out.
In the embodiment of the present invention, a flow of processing the security data is described as an example in fig. 2. As shown in fig. 2, the processing flow of the security data mainly includes several flows S201, S202, S203, and S204. Wherein, the process S201 refers to a self-checking process of the group insurance policy, the process S202 refers to a payment process of the group insurance policy needing payment, the process S202 refers to a fee deduction process of the group insurance policy paid by an individual, and the process S202 refers to a fee deduction process of the group insurance policy paid by an unaided person.
When group insurance policy is in security, each individual insurance policy in the group insurance policy is converted into electronic insurance policy by means of scanning and the like, each electronic insurance policy comprises information corresponding to the insurance policy, and whether the insurance policy needs to pay or charge is marked. Payment refers to a need to refund a premium to the group policy user, and scenarios such as refund require refund. Charging refers to the situation that a group policy user needs to pay, for example, a company carries out policy insurance security of increasing the security risk for all employees of the company. The charging scene also comprises personal payment and non-personal payment, wherein the personal payment means that each personal insurance policy in the group insurance policy is paid by a person, and the non-personal payment means that the personal insurance policy in the group insurance policy is paid by an enterprise or the enterprise and the person pay together. The security process is divided into the above processes based on the different circumstances of the above different group policies.
The process S201 is a process of executing self-check after the electronic policy of the group policy is obtained at the start of security. The self-checking process is used for judging whether the policy information in the group policy meets the requirements of policy checking, for example, whether the policy information is accurate and comprehensive, whether the policy information meets the requirements of the insurance type corresponding to the user, and the like. And obtaining a result of whether the policy passes the self-check after the self-check, wherein if each individual policy in the group policy passes the self-check, the security state of the group policy is that the self-check passes, and if the individual policy in the group policy does not pass the self-check, the security state of the group policy is that the self-check does not pass. For the group policy whose security status is self-checking non-passing, including the individual policy whose respective policy is non-passing, manual review is required or the user is required to update the content of the policy (fig. 2 only shows the manual review step), and after the above operation reaches the self-checking requirement, the security status of the group policy can be updated to self-checking passing.
After the group insurance policy self-check passes, the group insurance policy self-check enters an insurance policy confirmation pool, and then a corresponding processing flow is determined by judging whether the charging or the payment is carried out or not and whether the payment is carried out by individuals or not.
If the group policy is to be paid, flow S202 is executed. In process S202, if it is determined that the group policy requires payment, then a financial payment may be performed. The financial payment usually comprises refunding to an account corresponding to each individual policy in the group policy, and if the refunding of each individual policy is successful, the security state of the group policy is successful in payment; if the individual policy has a refund failure, the security status of the group policy is a payment failure, and the financial payment is executed after waiting for the operation of updating the account in the policy information of the refund failure until the refund is successful and the security status of the group policy is updated to a payment success.
As the group policy has the personal policy of the refund failure, the security state of the group policy is the payment failure, the financial payment is executed after waiting the operation of updating the account in the policy information of the refund failure until the refund is successful, and the payment failure is the security state of the security delay. With reference to the method of fig. 1, if the group policy is a payment failure, it may be determined that the group policy is a security deferred security state, and it may be determined that the group policy is a target group policy, and then it is determined whether there is a target individual policy with a payment failure, and if so, the policy number of the target individual policy is changed from the original first identifier to the second identifier.
If the group policy is to be charged and the individual pays, the process S203 is executed. In the process S203, if it is determined that the group policy requires individual payment, a deduction may be performed, where the deduction is usually performed in such a manner that a deduction is made to an account corresponding to each individual policy in the group policy, and if each individual policy is successful, the security status of the group policy is successful in payment; if the insurance policy of each person has the insurance policy with the payment failure, the security state of the group insurance policy is the payment failure, and the payment is executed after waiting for the operations of updating the account in the insurance policy information with the payment failure and the like until the payment is successful and the security state of the group insurance policy is updated to the payment success.
If the group policy is to be charged and not paid by the individual, the process S203 is executed. In the process S203, if it is determined that the group policy requires non-personal payment, the deduction can be performed in a manner including enterprise payment, withholding payment, and mixed payment, and the group policy can be divided into an enterprise payment group policy, a withholding payment group policy, and a mixed payment group policy, and the deduction is performed on the group policy. If the payment of each personal insurance policy in the group insurance policy is successful, the security state of the group insurance policy is successful payment; if the insurance policy of each person has the insurance policy with the payment failure, the security state of the group insurance policy is the payment failure, and the payment is executed after waiting for the operations of updating the account in the insurance policy information with the payment failure and the like until the payment is successful and the security state of the group insurance policy is updated to the payment success.
The following describes a method for processing the security data in the embodiment shown in fig. 1 in detail with reference to the flow of S201 in the security method shown in fig. 2, taking the security suspension as the self-check and not passing through as an example. An embodiment of the present invention provides a method for processing security data, as shown in fig. 3, the method includes the following steps.
S301: and traversing the security state of each group policy in the group policy set, and screening out the target group policy of which the security state is not passed by the self-check.
In the embodiment of the present invention, the security suspension is taken as the self-core failing, and the group policy whose security status is the self-core failing is taken as the target group policy. The security identity of each individual policy in the target group policy is the first identity.
The execution principle of this step is the same as that of step S101, and is not described herein again.
S302: and judging whether a target individual policy with the security state of failure of self-checking exists in the target group policy.
Wherein, for the group policy, if it is in the security status of not passing the self-check, it usually means that the group policy includes the personal policy of not passing the self-check. Therefore, after the target group policy is determined, whether the target individual policy with the security state of not passing the self-check exists in the target group policy can be judged, if so, the target individual policy can be determined, and the target individual policy is subsequently processed.
The execution principle of this step is the same as that of step S102, and is not described herein again.
S303: if yes, the security identification of the target individual policy is changed from the first identification to the second identification.
Wherein, the security identification of the target individual policy is changed from the first identification to the second identification, so that the target individual policy is separated from the target group policy.
The execution principle of this step is the same as that of step S103, and is not described herein again. After the present step is performed, steps S304 and S305 may be performed, respectively.
S304: and screening the individual policy with the security identification as the first identification according to the security identification of each policy in the target group policy, and updating the security state of the target group policy according to the policy information of the individual policy with the security identification as the first identification.
After the target individual policy changes the security identifier, the individual policies whose security identifiers are the first identifiers can be screened according to the security identifiers of the individual policies in the target group policy, and the security states of the individual policies whose security identifiers are the first identifiers are all self-checking, so that the subsequent security process can be continuously executed, that is, the security process of the target group policy is continuously executed according to the policy information of the individual policies whose security identifiers are the first identifiers, and the security state of the target group policy is updated based on the execution result of the subsequent security process.
S305: and receiving the content change information of the target personal insurance policy, and updating the security state of the target personal insurance policy to be self-checking pass based on the content change information.
After the target individual policy changes the security identifier, the target individual policy may be used as an individual policy to perform the security procedure. For the target individual policy that the self-check does not pass, usually, manual review is performed to determine whether the policy is a target body. If the target individual policy is manually checked to be a target body, the security state of the target individual policy is changed into self-checking passing; if the target individual policy is checked to be a non-standard body manually, a decision notice is sent to the user of the target individual policy, and the user is informed to change the policy content of the target individual policy in the modes of refusal to guarantee or delay, charging, derating, except liability and the like. After the user of the target personal policy changes the policy content of the target personal policy, the content change information of the target personal policy may be received, then the policy content of the target personal policy may be updated according to the content change information, the target personal policy is self-checked based on the content change information, and it is determined whether the updated target personal policy satisfies the audit condition. If the self-check passes, the security state of the target personal insurance policy can be updated to be the self-check pass, and if the self-check does not pass, the procedures of insurance policy revocation or contract relief and the like can be executed on the target personal insurance policy.
It should be noted that the content change information of the target individual policy may be revocation information, and in this case, when it is described that the security of the target individual policy is revoked, the security revocation operation may be performed on the target individual policy, and the security state of the target individual policy may be updated to revocation.
In the embodiment of the present invention, the self-checking pass is taken as an example when the target personal policy is self-checked based on the content change information, and the security state of the target personal policy is updated by the content change information.
S306: judging whether the security state of the target individual policy is consistent with the security state of the target group policy, if so, executing step S307; if not, go to step S308.
After the preservation status of the target individual policy is updated, before preservation confirmation, the target individual policy may be added back to the target group policy to simplify the preservation operation and make the effective time of each policy in the group policy consistent. Since the security status of the target individual policy may be updated when the security status of the target group policy is updated, the security status of the target individual policy and the security status of the target group policy are not always the same, and if the security status of the target individual policy and the security status of the target group policy are not the same, the target individual policy cannot be added back to the target group policy. If so, the security identity of the target individual policy may be changed from the second identity to the first identity, i.e., the target individual policy is added to the target group policy, and step S307 is performed. If not, the target individual policy and the target group policy respectively execute the security procedure to the individual policy identified as the first identifier, and execute step S308.
Before executing this step, the security status of the target group policy needs to be determined, and the specific manner may be: based on the target policy identification of the target individual policy, such as the policy number, the group policy with the policy identification identical to the target policy identification is inquired, and the group policy with the policy identification identical to the target policy identification is the target group policy, so the security state of the group policy with the policy identification identical to the target policy identification can be determined as the security state of the target group policy.
S307: if yes, the security identification of the target individual policy is changed from the second identification to the first identification, and the security state of the target group policy is updated according to the policy information of the individual policy with the security identification as the first identification.
The security identification of the target individual policy is changed from the second identification to the first identification, which means that the target individual policy is added back to the target group policy, and then the security process can be executed together, namely, the security state of the target group policy is updated according to the policy information of the individual policy with the security identification as the first identification.
S308: updating the security status of the target group policy according to the policy information of the individual policy whose security identifier is the first identifier, and updating the security status of the target group policy according to the policy information of the target individual policy.
The security status of the target individual policy is inconsistent with the security status of the group policy, and the target individual policy cannot be added back to the target group policy, so the security procedures are respectively executed by the target individual policy and the individual policies identified as the first identifier in the target group policy, that is, the security status of the target group policy is updated according to the policy information of the individual policies identified as the first identifier, and the security status of the target group policy is updated according to the policy information of the target individual policy.
In the embodiment of the invention, after the security identifier of the target individual policy is changed from the first identifier to the second identifier, the target individual policy is separated from the target group policy, and the policy with the security identifier of the first identifier in the target group policy can continuously execute the security flow, thereby avoiding the extension of the security flow of the whole group policy caused by part of the individual policies.
The following describes the processing method of the security data in the embodiment of the present invention with reference to the flows of S203 and S204 in the processing method of the security data shown in fig. 2, taking the security suspension as the scene of payment failure as an example. An embodiment of the present invention provides a method for processing security data, as shown in fig. 4, the method includes the following steps.
S401: and traversing the security state of each group policy in the group policy set, and screening out the target group policy of which the security state is failure in payment.
The execution principle of this step is the same as that of step S301, and is not described herein again.
S402: and judging whether a target personal insurance policy with the security state of failure payment exists in the target group insurance policy.
The execution principle of this step is the same as that of step S302, and is not described herein again.
S403: if yes, the security identification of the target individual policy is changed from the first identification to the second identification.
The execution principle of this step is the same as that of step S303, and is not described herein again.
S404: and screening the individual policy with the security identification as the first identification according to the security identification of each policy in the target group policy, and updating the security state of the target group policy according to the policy information of the individual policy with the security identification as the first identification.
The execution principle of this step is the same as that of step S304, and is not described herein again.
If the target group policy belongs to the mixed payment in the non-individual payment, after the target individual policy is separated from the target group policy, the individual policy with the security identifier of the first identifier in the target group policy can execute the fee deduction, at this time, the enterprise can pay the premium of all the employees at one time, the fee deduction is successful after the individual policy with the security identifier of the first identifier executes the fee deduction process, and the security is confirmed. And (4) hanging account of the residual insurance premium paid by the enterprise, and preferentially selecting the hung account amount for payment when the target individual insurance policy self-check executes the fee deduction process.
S405: and receiving content change information of the target personal insurance policy, and updating the security state of the target personal insurance policy to be successful in payment based on the content change information.
After the target individual policy changes the security identity, the target individual policy may perform the security procedure as a separate policy. For the target personal insurance policy with failed payment, the account information of the target personal insurance policy may need to be changed, and then the operation of deducting money is executed until the payment is successful, so that the payment information of the target personal insurance policy can be received in the process, and whether the payment of the target personal insurance policy is successful or not can be judged based on the payment information of the target personal insurance policy. If the payment is successful, updating the security state of the target personal insurance policy to be the successful payment; if the payment fails, the security status of the target personal insurance policy is maintained. The embodiment of the invention takes the successful payment as an example for explanation, and then the preservation state of the target personal insurance policy is updated based on the content change information as the successful payment.
S406: judging whether the security state of the target individual policy is consistent with the security state of the target group policy, if so, executing step S407; if not, go to step S408.
The execution principle of this step is the same as that of step S306, and is not described herein again.
S407: if yes, the security identification of the target individual policy is changed from the second identification to the first identification, and the security state of the target group policy is updated according to the policy information of the individual policy with the security identification as the first identification.
The execution principle of this step is the same as that of step S307, and is not described herein again.
S408: updating the security status of the target group policy according to the policy information of the individual policy whose security identifier is the first identifier, and updating the security status of the target group policy according to the policy information of the target individual policy.
The execution principle of this step is the same as that of step S308, and is not described herein again.
In the embodiment of the invention, after the security identifier of the target individual policy is changed from the first identifier to the second identifier, the target individual policy is separated from the target group policy, and the policy with the security identifier of the first identifier in the target group policy can continuously execute the security flow, thereby avoiding the extension of the security flow of the whole group policy caused by part of the individual policies.
In order to solve the problems in the prior art, an embodiment of the present invention provides an apparatus 500 for processing security data, as shown in fig. 5, the apparatus 500 includes:
a screening unit 501, configured to traverse the security status of each group policy in the group policy set, and screen out a target group policy whose security status is the security delay;
a determining unit 502, configured to determine whether a target individual policy whose security status is security-deferred exists in the target group policy;
a changing unit 503, configured to change the security identifier of the target individual policy from the first identifier to the second identifier if yes, so as to separate the target individual policy from the target group policy;
an updating unit 504, configured to update the security status of the target group policy according to the policy information of the individual policy identified as the first identifier in the target group policy.
It should be understood that the manner of implementing the embodiment of the present invention is the same as the manner of implementing the embodiment shown in fig. 1, and the description thereof is omitted.
In an implementation manner of the embodiment of the present invention, the apparatus 500 further includes:
a receiving unit for receiving policy update information of the target individual policy;
the updating unit 504 is further configured to update the security status of the target individual policy based on the policy update information;
the determining unit 502 is further configured to determine whether the security status of the target individual policy is consistent with the security status of the target group policy;
the changing unit 503 is further configured to change the security identifier of the target individual policy from the second identifier to the first identifier if the target individual policy is satisfied, so that the target individual policy and the target group policy are merged.
In another implementation manner of the embodiment of the present invention, the apparatus 500 further includes:
the query unit is used for querying a group policy with the policy identification being the same as the target policy identification based on the target policy identification of the target individual policy;
and the determining unit is used for determining the security state of the group policy with the policy identification being the same as the target policy identification as the security state of the target group policy.
In another implementation manner of the embodiment of the present invention, the security delay includes a payment failure; the policy update information comprises payment information of the target individual policy;
the updating unit 504 is specifically configured to:
judging whether the target personal insurance policy is paid successfully or not based on the payment information of the target personal insurance policy; and if so, updating the security state of the target personal insurance policy to be successful in payment.
In yet another implementation of an embodiment of the present invention, the security deferral comprises a failure of a self-core; the policy update information includes content change information of the target individual policy;
the updating unit 504 is specifically configured to:
updating the policy content of the target individual policy according to the content change information; judging whether the updated target individual policy meets the auditing conditions; and if so, updating the security state of the target personal policy to be self-checking pass.
In yet another implementation of an embodiment of the present invention, the security deferral comprises a failure of a self-core; the policy update information includes revocation information;
the updating unit 504 is specifically configured to:
and executing a security revocation operation according to the content change information, and updating the security state of the target personal policy to be revocation.
In another implementation manner of the embodiment of the present invention, the security delay includes payment failure and failure of self-check;
the determining unit 502 is specifically configured to:
if the security state of the target group policy is that the self-check does not pass, judging whether the target group policy has a target individual policy that the self-check does not pass; and if the security state of the target group policy is that the payment fails, judging whether the target group policy has a target individual policy with the failure of the payment.
It should be understood that the embodiment of the present invention is implemented in the same manner as the embodiment shown in fig. 1-4, and is not repeated herein.
In the embodiment of the invention, a target group policy with delayed security is screened out in a group policy set according to the security state, and then the security identification of a target individual policy with delayed security in the target group policy is changed from a first identification to a second identification so as to separate the target individual policy from the target group policy; and updating the security state of the target group policy according to the policy information of the individual policy with the security identifier as the first identifier in the target group policy. Therefore, after the security identification of the target individual policy is changed from the first identification to the second identification, the target individual policy is separated from the target group policy, the policy with the security identification of the first identification in the target group policy can continuously execute the security flow, and the security flow of the whole group policy caused by partial individual policies is prevented from being prolonged.
The invention also provides an electronic device and a readable storage medium according to the embodiment of the invention.
The electronic device of the present invention includes: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the processor to cause the processor to perform a method of securing processing of data as provided by embodiments of the invention.
Fig. 6 illustrates an exemplary system architecture 600 of a method of processing secured data or a device for processing secured data to which embodiments of the invention may be applied.
As shown in fig. 6, the system architecture 600 may include terminal devices 601, 602, 603, a network 604, and a server 605. The network 604 serves to provide a medium for communication links between the terminal devices 601, 602, 603 and the server 605. Network 604 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few.
A user may use the terminal devices 601, 602, 603 to interact with the server 605 via the network 604 to receive or send messages or the like. The terminal devices 601, 602, 603 may have installed thereon various communication client applications, such as shopping applications, web browser applications, search applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 601, 602, 603 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 605 may be a server providing various services, such as a background management server (for example only) providing support for shopping websites browsed by users using the terminal devices 601, 602, 603. The backend management server may analyze and perform other processing on the received data such as the product information query request, and feed back a processing result (for example, product information — just an example) to the terminal device.
It should be noted that the method for processing the security data according to the embodiment of the present invention is generally executed by the server 605, and accordingly, the processing device for the security data is generally provided in the server 605.
It should be understood that the number of terminal devices, networks, and servers in fig. 6 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 7, a block diagram of a computer system 700 suitable for use in implementing embodiments of the present invention is shown. The computer system illustrated in FIG. 7 is only an example and should not impose any limitations on the scope of use or functionality of embodiments of the invention.
As shown in fig. 7, the computer system 700 includes a Central Processing Unit (CPU)701, which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data necessary for the operation of the system 700 are also stored. The CPU 701, the ROM 702, and the RAM 703 are connected to each other via a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
In particular, according to the embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 709, and/or installed from the removable medium 711. The computer program performs the above-described functions defined in the system of the present invention when executed by the Central Processing Unit (CPU) 701.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a unit, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present invention may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes a filtering unit, a judging unit, and a changing unit. Where the names of these elements do not in some cases constitute a limitation on the elements themselves, for example, a screening element may also be described as a "functional element of a screening element".
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to perform the method for processing secured data provided by the present invention.
The above-described embodiments should not be construed as limiting the scope of the invention. Those skilled in the art will appreciate that various modifications, combinations, sub-combinations, and substitutions can occur, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method for processing security data, comprising:
traversing the security state of each group policy in the group policy set, and screening out the target group policy of which the security state is security postponed;
judging whether a target individual policy with a security state of security delay exists in the target group policy;
if so, changing the security identifier of the target individual policy from the first identifier to a second identifier so as to separate the target individual policy from the target group policy;
and updating the security state of the target group security policy according to the security policy information of the individual security policy of which the security identifier is the first identifier in the target group security policy.
2. The method of claim 1, wherein after said changing the security identification of the target individual policy from the first identification to the second identification, further comprising:
receiving policy update information of the target individual policy;
updating the security status of the target individual policy based on the policy update information;
judging whether the security state of the target individual policy is consistent with the security state of the target group policy;
if so, changing the security identifier of the target individual policy from the second identifier to the first identifier so as to merge the target individual policy with the target group policy.
3. The method of claim 2, further comprising, prior to said determining whether the security status of the target individual policy is consistent with the security status of the group policy:
based on the target policy identification of the target individual policy, inquiring a group policy with the same policy identification as the target policy identification;
and determining the security state of the group policy with the policy identification being the same as the target policy identification as the security state of the target group policy.
4. The method of claim 2, wherein the hold delay comprises a payment failure; the policy update information comprises payment information of the target individual policy;
said updating the security status of said target individual policy based on said policy update information comprising:
judging whether the target personal insurance policy is paid successfully or not based on the payment information of the target personal insurance policy;
and if so, updating the security state of the target personal insurance policy to be successful in payment.
5. The method of claim 2, wherein the security deferral comprises a non-passing of a self-core; the policy update information includes content change information of the target individual policy;
said updating the security status of said target individual policy based on said policy update information comprising:
updating the policy content of the target individual policy according to the content change information;
judging whether the updated target individual policy meets the auditing conditions;
and if so, updating the security state of the target personal policy to be self-checking pass.
6. The method of claim 2, wherein the security deferral comprises a non-passing of a self-core; the policy update information includes revocation information;
said updating the security status of said target individual policy based on said policy update information comprising:
and executing a security revocation operation according to the content change information, and updating the security state of the target personal policy to be revocation.
7. The method of claim 1, wherein the hold delay comprises a payment failure and a self-approval failure;
the judging whether the target individual policy with the security status of security postponed exists in the target group policy includes:
if the security state of the target group policy is that the self-check does not pass, judging whether the target group policy has a target individual policy that the self-check does not pass;
and if the security state of the target group policy is that the payment fails, judging whether the target group policy has a target individual policy with the failure of the payment.
8. A device for processing security data, comprising:
the screening unit is used for traversing the security state of each group policy in the group policy set and screening the security state as a target group policy with security delay;
the judging unit is used for judging whether a target individual policy with a security state of security delay exists in the target group policy;
a changing unit, configured to change the security identifier of the target individual policy from the first identifier to the second identifier if the target individual policy is the group policy, so as to separate the target individual policy from the target group policy;
and the updating unit is used for updating the security state of the target group security policy according to the security information of the individual security policy with the first identifier in the target group security policy.
9. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-7.
10. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-7.
CN201911135060.3A 2019-11-19 2019-11-19 Method and device for processing security data, electronic equipment and storage medium Active CN111126935B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911135060.3A CN111126935B (en) 2019-11-19 2019-11-19 Method and device for processing security data, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911135060.3A CN111126935B (en) 2019-11-19 2019-11-19 Method and device for processing security data, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111126935A true CN111126935A (en) 2020-05-08
CN111126935B CN111126935B (en) 2023-07-21

Family

ID=70495794

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911135060.3A Active CN111126935B (en) 2019-11-19 2019-11-19 Method and device for processing security data, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111126935B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111507853A (en) * 2020-06-02 2020-08-07 泰康保险集团股份有限公司 Group insurance policy and insurance data processing method and device
CN112132694A (en) * 2020-09-28 2020-12-25 平安养老保险股份有限公司 Policy and security case confirmation and verification method, device, equipment and storage medium

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130006673A1 (en) * 2011-06-29 2013-01-03 Continental Casualty Company Consolidating Billing Statements in an Agency Business Model
US8463625B1 (en) * 2005-01-20 2013-06-11 Daniel L. Owen System, method and computer program product for facilitating informed decisions relating to the fair sharing of the costs of insurance between a group and a third party
US20130282406A1 (en) * 2012-04-19 2013-10-24 Eric William Snyder Apparatus, method and article to automate and manage electronic documents in a networked environment
CN106022710A (en) * 2016-05-09 2016-10-12 平安科技(深圳)有限公司 Insurance check method and apparatus
CN106779924A (en) * 2016-12-01 2017-05-31 国云科技股份有限公司 A kind of cloud platform request for product form processing method under Multistage Proxy pattern
CN106980636A (en) * 2016-07-22 2017-07-25 平安科技(深圳)有限公司 Declaration form data processing method and device
CN107527099A (en) * 2016-06-21 2017-12-29 平安科技(深圳)有限公司 Save reservation processing method and device from damage
CN107689010A (en) * 2017-07-25 2018-02-13 平安科技(深圳)有限公司 Method, apparatus, computer equipment and the storage medium of batch processing declaration form task
CN107704529A (en) * 2017-09-20 2018-02-16 平安科技(深圳)有限公司 The recognition methods of information uniqueness, application server, system and storage medium
CN108074069A (en) * 2016-11-15 2018-05-25 平安科技(深圳)有限公司 Information processing method and device are saved in insurance from damage
CN109460884A (en) * 2018-09-03 2019-03-12 中国平安人寿保险股份有限公司 Orphan's list distribution method, electronic device and readable storage medium storing program for executing
CN109544389A (en) * 2018-11-29 2019-03-29 爱保科技(横琴)有限公司 Intelligent analysis system based on declaration form
KR20190105921A (en) * 2018-03-07 2019-09-18 김형종 Refundable insurance service system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8463625B1 (en) * 2005-01-20 2013-06-11 Daniel L. Owen System, method and computer program product for facilitating informed decisions relating to the fair sharing of the costs of insurance between a group and a third party
US20130006673A1 (en) * 2011-06-29 2013-01-03 Continental Casualty Company Consolidating Billing Statements in an Agency Business Model
US20130282406A1 (en) * 2012-04-19 2013-10-24 Eric William Snyder Apparatus, method and article to automate and manage electronic documents in a networked environment
CN106022710A (en) * 2016-05-09 2016-10-12 平安科技(深圳)有限公司 Insurance check method and apparatus
CN107527099A (en) * 2016-06-21 2017-12-29 平安科技(深圳)有限公司 Save reservation processing method and device from damage
CN106980636A (en) * 2016-07-22 2017-07-25 平安科技(深圳)有限公司 Declaration form data processing method and device
CN108074069A (en) * 2016-11-15 2018-05-25 平安科技(深圳)有限公司 Information processing method and device are saved in insurance from damage
CN106779924A (en) * 2016-12-01 2017-05-31 国云科技股份有限公司 A kind of cloud platform request for product form processing method under Multistage Proxy pattern
CN107689010A (en) * 2017-07-25 2018-02-13 平安科技(深圳)有限公司 Method, apparatus, computer equipment and the storage medium of batch processing declaration form task
WO2019019381A1 (en) * 2017-07-25 2019-01-31 平安科技(深圳)有限公司 Batch processing method and apparatus for insurance slip tasks, computer device and storage medium
CN107704529A (en) * 2017-09-20 2018-02-16 平安科技(深圳)有限公司 The recognition methods of information uniqueness, application server, system and storage medium
KR20190105921A (en) * 2018-03-07 2019-09-18 김형종 Refundable insurance service system
CN109460884A (en) * 2018-09-03 2019-03-12 中国平安人寿保险股份有限公司 Orphan's list distribution method, electronic device and readable storage medium storing program for executing
CN109544389A (en) * 2018-11-29 2019-03-29 爱保科技(横琴)有限公司 Intelligent analysis system based on declaration form

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111507853A (en) * 2020-06-02 2020-08-07 泰康保险集团股份有限公司 Group insurance policy and insurance data processing method and device
CN111507853B (en) * 2020-06-02 2023-04-07 泰康保险集团股份有限公司 Group insurance policy and insurance data processing method and device
CN112132694A (en) * 2020-09-28 2020-12-25 平安养老保险股份有限公司 Policy and security case confirmation and verification method, device, equipment and storage medium
CN112132694B (en) * 2020-09-28 2024-04-09 平安养老保险股份有限公司 Method, device, equipment and storage medium for confirming and checking policy and security case

Also Published As

Publication number Publication date
CN111126935B (en) 2023-07-21

Similar Documents

Publication Publication Date Title
US20200050599A1 (en) Self-cleaning token vault
CN111460129A (en) Method and device for generating identification, electronic equipment and storage medium
CN112132674A (en) Transaction processing method and device
CN113361838A (en) Business wind control method and device, electronic equipment and storage medium
CN110895603A (en) Multi-system account information integration method and device
CN111126935B (en) Method and device for processing security data, electronic equipment and storage medium
CN112348326A (en) Bank business processing method and system
CN113010238A (en) Permission determination method, device and system for micro application call interface
CN111259032A (en) Service processing method and device
CN113765871B (en) Method and device for managing fort machine
CN111210349A (en) Virtual asset transfer hosting method and device, electronic equipment and storage medium
CN111897822A (en) Account state information processing method and device, electronic equipment and storage medium
CN112927066A (en) Batch deduction method and device
CN111526184A (en) Business auditing method and device
CN111179097B (en) Method, device, electronic equipment and storage medium for modifying warranty
CN113704222A (en) Method and device for processing service request
CN111242576A (en) Method and device for processing request
CN111047277B (en) Nuclear protection system, method, device and computer readable medium
CN112581179B (en) Electronic coupon generation method and generation device
CN110661792B (en) Service ordered calling method and device, electronic equipment and storage medium
CN116258556A (en) Method, device, electronic equipment and storage medium for processing business data
CN115984016A (en) Data processing method and device, electronic equipment and storage medium
CN114065164A (en) Identity verification method and device, electronic equipment and storage medium
CN113269605A (en) Order processing method, device, equipment and computer readable medium
CN115718660A (en) Task processing method and device, electronic equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant