CN111126935B - Method and device for processing security data, electronic equipment and storage medium - Google Patents

Method and device for processing security data, electronic equipment and storage medium Download PDF

Info

Publication number
CN111126935B
CN111126935B CN201911135060.3A CN201911135060A CN111126935B CN 111126935 B CN111126935 B CN 111126935B CN 201911135060 A CN201911135060 A CN 201911135060A CN 111126935 B CN111126935 B CN 111126935B
Authority
CN
China
Prior art keywords
policy
security
target
personal
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911135060.3A
Other languages
Chinese (zh)
Other versions
CN111126935A (en
Inventor
石士硕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taikang Insurance Group Co Ltd
Original Assignee
Taikang Insurance Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taikang Insurance Group Co Ltd filed Critical Taikang Insurance Group Co Ltd
Priority to CN201911135060.3A priority Critical patent/CN111126935B/en
Publication of CN111126935A publication Critical patent/CN111126935A/en
Application granted granted Critical
Publication of CN111126935B publication Critical patent/CN111126935B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/102Bill distribution or payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Data Mining & Analysis (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a device for processing security data, electronic equipment and a storage medium, and relates to the technical field of computers. One embodiment of the method comprises the following steps: traversing the security states of all the group policies in the group policy set, and screening out the security states as the target group policy with delayed security; judging whether a target personal policy with a security state of security delay exists in the target group policy; if yes, changing the security identification of the target personal policy from the first identification to the second identification so as to separate the target personal policy from the target group policy; and updating the security state of the target group policy according to the policy information of the personal policy with the first identifier in the target group policy. According to the embodiment, the problem that the security execution time of the group bill is prolonged because the security data of the whole group bill cannot be normally processed when the security data of the individual insurance bill cannot be sequentially executed due to the fact that each individual insurance bill in the group insurance bill uses the same security identifier can be avoided.

Description

Method and device for processing security data, electronic equipment and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and apparatus for processing security data, an electronic device, and a storage medium.
Background
With the development of computer technology, many jobs in various industries have been processed by computers, such as security procedures of policy. The security of the policy refers to the process of changing each information in the original policy after the user applies for insurance, and auditing, paying, deducting and the like on the changed policy.
When the security is secured, the security data is generally processed according to the security identifier, and the security process of the security with the same security identifier needs to be executed at the same time. When the group policy (abbreviated as group policy) is secured, since the group policy belongs to a whole, the same security identifier is usually generated for each personal policy in the group policy, so that each personal policy in the group policy executes the security process at the same time.
In the process of implementing the present invention, the inventor finds that at least the following problems exist in the prior art:
when each personal policy in the group policy uses the same security identifier and processes the security data of the group policy, the problems that part of the personal policies cannot pass the audit and payment fails may exist, which may cause the security data of the personal policies to be executed in sequence, and further cause the security data of the whole group policy to be processed abnormally, thereby prolonging the security execution time of the group policy and bringing inconvenience to the whole user of the group policy.
Disclosure of Invention
In view of the above, embodiments of the present invention provide a method, an apparatus, an electronic device, and a storage medium for processing security data, which can avoid the problem that when security data of a group policy cannot be sequentially executed, the security data of the entire group policy cannot be normally processed, and thus the security execution time of the group policy is prolonged, because each personal policy in the group policy uses the same security identifier.
In order to achieve the above object, according to an aspect of an embodiment of the present invention, there is provided a method for processing security data.
The method for processing the security data comprises the following steps: traversing the security states of all the group policies in the group policy set, and screening out the security states as the target group policy with delayed security; judging whether a target personal policy with a security state of security delay exists in the target group policy; if yes, changing the security identification of the target personal policy from a first identification to a second identification so as to separate the target personal policy from the target group policy; and updating the security state of the target group policy according to the policy information of the personal policy, which is identified as the first identifier, in the target group policy.
In one embodiment, after the changing the security identifier of the target personal policy from the first identifier to the second identifier, the method further includes: receiving policy update information of the target personal policy; updating the security state of the target personal policy based on the policy updating information; judging whether the security state of the target personal security policy is consistent with the security state of the target group security policy; if yes, changing the security identifier of the target personal policy from the second identifier to the first identifier so as to enable the target personal policy to be combined with the target group policy.
In yet another embodiment, before the determining whether the security state of the target personal policy is consistent with the security state of the group policy, the method further includes: inquiring a group policy with the same policy identifier as the target policy identifier based on the target policy identifier of the target personal policy; and determining the security state of the group policy with the same policy identifier as the target policy identifier as the security state of the target group policy.
In yet another embodiment, the security delay includes a payment failure; the policy updating information comprises payment information of the target personal policy; the updating the security state of the target personal policy based on the policy updating information includes: judging whether the target personal policy is successfully paid or not based on the payment information of the target personal policy; if yes, updating the security state of the target personal policy to be successful in payment.
In yet another embodiment, the security deferral includes a self-core failing; the policy updating information comprises content changing information of the target personal policy; the updating the security state of the target personal policy based on the policy updating information includes: updating the policy content of the target personal policy according to the content change information; judging whether the updated target personal policy meets the auditing conditions or not; if yes, updating the security state of the target personal policy to pass through the self-core.
In yet another embodiment, the security deferral includes a self-core failing; the policy update information includes revocation information;
the updating the security state of the target personal policy based on the policy updating information includes: and executing security revocation operation according to the content change information, and updating the security state of the target personal security policy to be revocation.
In yet another embodiment, the security delay includes a payment failure and a self-checking failure; the judging whether the target personal policy with the security state being the security delay exists in the target group policy comprises the following steps: if the security state of the target group policy is that the self-check does not pass, judging whether the target group policy has a target personal policy that the self-check does not pass; and if the security state of the target group policy is the payment failure, judging whether the target group policy has a target personal policy with the payment failure.
To achieve the above object, according to another aspect of the present invention, there is provided a processing apparatus for securing data.
The invention provides a processing device for security data, comprising: the screening unit is used for traversing the security states of all the group security forms in the group security form set and screening out the target group security form with the security state being the security delay; the judging unit is used for judging whether a target personal policy with a security state of security delay exists in the target group policy; a changing unit, configured to change, if yes, a security identifier of the target personal policy from a first identifier to a second identifier, so that the target personal policy is separated from the target group policy; and the updating unit is used for updating the security state of the target group policy according to the policy information of the personal policy which is identified as the first identifier in the target group policy.
In one embodiment, further comprising:
a receiving unit, configured to receive policy update information of the target personal policy;
the updating unit is further used for updating the security state of the target personal policy based on the policy updating information;
the judging unit is further used for judging whether the security state of the target personal security policy is consistent with the security state of the target group security policy;
And the changing unit is further configured to change the security identifier of the target personal policy from the second identifier to the first identifier if the target personal policy is the target personal policy, so that the target personal policy and the target group policy are combined.
In yet another embodiment, further comprising:
the inquiry unit is used for inquiring the group policy with the same policy identifier as the target policy identifier based on the target policy identifier of the target personal policy;
and the determining unit is used for determining the security state of the group policy with the same policy identifier as the target policy identifier as the security state of the target group policy.
In yet another embodiment, the security delay includes a payment failure; the policy updating information comprises payment information of the target personal policy;
the updating unit is specifically configured to: judging whether the target personal policy is successfully paid or not based on the payment information of the target personal policy; if yes, updating the security state of the target personal policy to be successful in payment.
In yet another embodiment, the security deferral includes a self-core failing; the policy updating information comprises content changing information of the target personal policy;
The updating unit is specifically configured to: updating the policy content of the target personal policy according to the content change information; judging whether the updated target personal policy meets the auditing conditions or not; if yes, updating the security state of the target personal policy to pass through the self-core.
In yet another embodiment, the security deferral includes a self-core failing; the policy update information includes revocation information;
the updating unit is specifically configured to: and executing security revocation operation according to the content change information, and updating the security state of the target personal security policy to be revocation.
In yet another embodiment, the security delay includes a payment failure and a self-checking failure; the judging unit is specifically configured to: if the security state of the target group policy is that the self-check does not pass, judging whether the target group policy has a target personal policy that the self-check does not pass; and if the security state of the target group policy is the payment failure, judging whether the target group policy has a target personal policy with the payment failure.
To achieve the above object, according to still another aspect of an embodiment of the present invention, there is provided an electronic apparatus.
An electronic device according to an embodiment of the present invention includes: one or more processors; and the storage device is used for storing one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors realize the processing method of the security data provided by the embodiment of the invention.
To achieve the above object, according to still another aspect of an embodiment of the present invention, a computer-readable medium is provided.
A computer readable medium of an embodiment of the present invention stores a computer program thereon, which when executed by a processor implements a method for processing security data provided by the embodiment of the present invention.
One embodiment of the above invention has the following advantages or benefits: in the embodiment of the invention, a target group policy with delayed security is selected from a group policy set according to a security state, and then a target personal policy with delayed security is changed from a first identifier to a second identifier in the target group policy, so that the target personal policy is separated from the target group policy; and updating the security state of the target group policy according to the policy information of the personal policy with the first identifier in the target group policy. Therefore, after the security identification of the target personal policy is changed from the first identification to the second identification, the target personal policy is separated from the target group policy, and the security procedure of the group policy, which is the security identification of the first identification, can be continuously executed, so that the security procedure of the whole group policy is prevented from being prolonged due to part of the personal policy.
Further effects of the above-described non-conventional alternatives are described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
FIG. 1 is a schematic diagram of a main flow of a method for processing security data according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of another main flow of a method for processing security data according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of another main flow of a method for processing security data according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of another main flow of a method for processing security data according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of main units of a data security processing apparatus according to an embodiment of the present invention;
FIG. 6 is a diagram of an exemplary system architecture in which embodiments of the present invention may be applied;
FIG. 7 is a schematic diagram of a computer system suitable for use in implementing embodiments of the present invention.
Detailed Description
Exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, in which various details of the embodiments of the present invention are included to facilitate understanding, and are to be considered merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
It is noted that embodiments of the invention and features of the embodiments may be combined with each other without conflict.
The embodiment of the invention is suitable for the scene of protecting the group policy. The whole process of the security includes a plurality of links, such as self-checking of the security policy, payment of the security policy, and the like. The security of the group policy is generally to perform corresponding operations on each individual policy in the group policy in each link. If each individual policy in the group policy meets the requirements of the link, the group policy may execute subsequent flows. If the personal policy does not meet the requirement of the link, the group policy stays in the link and cannot execute the subsequent flow, and the group policy can execute the subsequent flow only after waiting for each personal policy to meet the requirement of the link.
Each link of the security data processing has a corresponding security state, so that the security link where the security policy is located can be judged according to the security state of each security policy. In each security state of the security data processing, some security states are states which can meet the link requirement after the security policy is updated, and further execute the subsequent security flow, and the security states belong to security delay. The security delay refers to a security state in which the security requirement can be met after the security policy is updated, and the security process is continued. For example, the security delay may include that the self-core fails, and the self-core fails to indicate that there is a problem on the policy information in the link of the self-core of the policy, such as insufficient information, incorrect information, and the like, and at this time, it is necessary to wait until the policy is manually checked or the user updates the content of the policy, so as to solve the problem on the policy information, and further execute the subsequent security procedure. When the policy is in a security state with deferred security, if the policy fails to perform an update operation for a long time, the policy will be in such a state for a long time, and the subsequent security process cannot be performed, so that the security process is slow to perform. For the group policy, each personal policy included in the group policy has the same security identifier, and if the personal policy does not meet the requirement of the security link, the group policy stays in the link, so if the personal policy is in a security state of deferred security in the group policy, the group policy is also in the security state of deferred security until the personal policy in deferred security is updated to meet the requirement of the security link, and the group policy can continue to execute the subsequent security process, thus resulting in the prolongation of the execution time of the security process of the group policy.
The embodiment of the invention provides a method for processing security data, which can be used for terminal equipment to execute, as shown in fig. 1, and comprises the following steps.
S101: traversing the security states of all the group policies in the group policy set, and screening out the security states as the target group policy with delayed security.
In the embodiment of the invention, the group policy collection is each group policy for executing security, and each group policy has a security status to indicate a security stage of the group policy. Therefore, the target group policy with the delayed security state can be selected from the group policy set according to the security state of the group policy.
In the embodiment of the present invention, a single group policy is usually processed, so that the target group policy selected from the group policy set in this step is a group policy. If there are a plurality of group policies whose security status is security deferred in the group policy collection, one of the plurality of group policies may be taken as the target group policy.
When the group policy is secured, a security identifier, i.e. a security number, is generated for the group policy.
S102: and judging whether a target personal policy with a security state of security delay exists in the target group policy.
When the security data of the group policy is processed, if the security data is in a security state of security delay, it is generally indicated that the group policy includes the personal policy in the security delay. Therefore, after determining the target group policy in step S101, it may be determined whether there is a target personal policy with a security state of being a security delay in the target group policy, and if so, the target personal policy is subjected to subsequent processing.
The security delay may include security states such as payment failure and self-checking failed. When the group policy includes personal policies whose security states are deferred, the security states of the group policy are consistent with those of the personal policies. Therefore, if the security state of the target group policy is that the self-check does not pass, in the step, whether the target group policy has the target personal policy that the self-check does not pass or not needs to be judged; if the security state of the target group policy is to pay by the person to be paid, judging whether the target group policy has a target personal policy which is not passed by the self-check in the step.
S103: if yes, changing the security identification of the target personal security policy from the first identification to the second identification.
And when the group insurance policy is secured, the security identifications of the personal insurance policies included in the group insurance policy are the same. In the embodiment of the present invention, the first identifier is a security identifier of a target group policy, and if it is determined in step S102 that a target personal policy with a security status of being a security delay exists in the target group policy, the security identifier of the target personal policy is changed from the first identifier to the second identifier in this step. The second mark is a new security mark, and the security mark of the target personal security list is changed from the first mark to the second mark, so that the target personal security list is separated from the target group security list, and the influence of the target personal security list on the security flow of the target group security list is avoided. After the security identifier of the target personal policy is changed from a first identifier to a second identifier, the first identifier represents the personal policy with the security state of non-security deferred in the target group policy, and the second identifier represents the personal policy with the security state of security deferred in the target group policy.
After this step, the target personal policy in the target group policy that leads to the prolongation of the security flow of the target group policy is separated, and the security states of the remaining personal policies are non-security deferred, so that the subsequent security flows can be continuously executed.
S104: and updating the security state of the target group policy according to the policy information of the personal policy with the first identifier in the target group policy.
After the security identifier is changed by the target personal security policy, the personal security policy with the security identifier being the first identifier can be screened according to the security identifier of each security policy in the target group security policy, and the security states of the personal security policies with the security identifiers being the first identifier are non-security deferred, so that the subsequent security flow can be continuously executed, namely, the security flow is continuously executed according to the security information of the personal security policy with the security identifier being the first identifier, and the security state of the target group security policy is updated based on the subsequent security flow.
In addition, after the step, the target personal policy is separated from the target group policy, and since the security state of the target personal policy is a security delay, it is necessary to wait until the policy is updated, and therefore, after the step, the method may further include: receiving policy update information of a target personal policy; updating the security state of the target personal policy based on the policy updating information; judging whether the security state of the target personal policy is consistent with the security state of the group policy; if yes, changing the security identification of the target personal policy from the second identification to the first identification so as to combine the target personal policy with the target group policy.
After receiving the policy updating information of the target personal policy, the target personal policy can be updated based on the policy updating information before security confirmation, and after the target personal policy is updated, if the target personal policy meets the requirement of the current security link, a subsequent security flow can be executed, so that the copyright state is updated. After the security state of the target personal policy is updated, the target personal policy may be added back to the target group policy to make the effective time of each policy in the group policy consistent. When the security state of the target personal policy is updated, the security state of the target group policy may be updated, so that the security states of the target personal policy and the group policy are not necessarily identical, and if the security states of the target personal policy and the group policy are not identical, the target personal policy cannot be added back to the target group policy, so that it is required to determine whether the security state of the target personal policy and the security state of the group policy are identical. If the personal policies are consistent, the security identification of the target personal policy can be changed from the second identification to the first identification, namely, the target personal policy is added into the target group policy. If the personal policies are inconsistent, the personal policies with the first identifiers are respectively executed by the target personal policy and the target group policy.
Before judging whether the security state of the target personal policy is consistent with the security state of the group policy, the target group policy can be queried based on the target policy identifier of the target personal policy, such as a policy number, so as to determine the security state of the target group policy.
In the embodiment of the invention, a target group policy with delayed security is selected from a group policy set according to a security state, and then a target personal policy with delayed security is changed from a first identifier to a second identifier in the target group policy, so that the target personal policy is separated from the target group policy; and updating the security state of the target group policy according to the policy information of the personal policy with the first identifier in the target group policy. Therefore, after the security identification of the target personal policy is changed from the first identification to the second identification, the target personal policy is separated from the target group policy, and the security procedure of the group policy, which is the security identification of the first identification, can be continuously executed, so that the security procedure of the whole group policy is prevented from being prolonged due to part of the personal policy.
When the group policy performs the security procedure, if the personal policy is returned during the security procedure, the original first identifier of the personal policy to be returned may be changed to the second identifier, so that the personal policy to be returned may be separated from the group policy, so that other personal policies not to be returned may perform the security procedure, and the personal policy to be returned may perform the security revocation procedure.
If the group policy is a group policy of enterprise staff, the payment mode is mixed payment, and the personal payment is carried out, in the process of waiting for enterprise payment, the situation of danger, job departure and the like occurs to part of staff, and the security needs to be removed, the policy of the staff can be changed to a security identifier, and the policy is stripped from the group policy to carry out security withdrawal operation.
In the embodiment of the present invention, the flow of processing the security data is illustrated as a flow shown in fig. 2. As shown in fig. 2, the process flow of the security data mainly includes several flows of S201, S202, S203, and S204. The process S201 refers to a process of self-checking the group policy, the process S202 refers to a payment process of the group policy requiring payment, the process S202 refers to a deduction process of the group policy for personal payment, and the process S202 refers to a deduction process of the group policy for non-personal payment.
The group insurance policy can convert each personal insurance policy in the group insurance policy into an electronic insurance policy in a scanning mode and the like when the group insurance policy is ensured, each electronic insurance policy comprises information of the corresponding insurance policy, and marks whether the insurance policy needs to be paid or charged. Payment refers to the need to refund premium to the group policy user, e.g., refund, etc. the scenario requires refund premium. Charging refers to the scenario that a group policy user is required to pay, such as policy security, etc. that an enterprise carries out the increased risk for all employees of its company. The charging scene also comprises personal payment and non-personal payment, wherein the personal payment refers to that each personal policy in the group policy is paid by a person, and the non-personal payment refers to that the personal policy in the group policy is paid by an enterprise or the enterprise and the person together. The security procedure is divided into the above-described procedures based on the different situations of the above-described different group policy.
The process S201 refers to a process of executing self-checking after the electronic policy of the group policy is obtained at the beginning of the security. The self-checking process is used for judging whether the policy information in the group policy meets the requirements of policy checking, for example, whether the policy information is accurate and comprehensive, whether the policy information meets the requirements of the insurance type corresponding to the user, and the like. And after the self-checking, a result of whether the policy passes through the self-checking is obtained, if each personal policy in the group policy passes through the self-checking, the security state of the group policy is self-checking, and if the personal policy in the group policy does not pass through the self-checking, the security state of the group policy is self-checking not. The personal policy that the security state is not passed by the self-check is included in the group policy that the self-check is not passed, and then the manual check is needed or the user is needed to update the content of the policy (only the manual check step is shown in fig. 2), and after the above operation, the security state of the group policy can be updated to be passed by the self-check.
After the group policy passes through the self-check, the group policy enters a policy confirmation pool, and then the corresponding processing flow is determined through the judgment of charging or paying and whether personal payment is carried out.
If the group policy is to pay, flow S202 is performed. In flow S202, it is determined that the community policy requires payment, financial payment may be performed. Financial payment typically involves refunding the account corresponding to each individual policy in the group policy, and if each individual policy refunds successfully, the security status of the group policy is that payment was successful; if the refund failure exists in each personal policy, the security state of the group policy is a payment failure, and financial payment is required to be executed after operations such as account updating in the refund failure policy information are waited until the refund is successful, and the security state of the group policy is updated to be a payment success.
Because the group policy has personal policy of refund failure, the security state of the group policy is that payment fails, and financial payment is executed after waiting for operations such as account updating in the refund failure policy information until refund is successful, so that payment failure is a security state of security delay. In combination with the method of the embodiment shown in fig. 1, if the security state of the group policy is a payment failure, it can be determined that the group policy is a security state of deferred security, it can be determined that the group policy is a target group policy, then it is determined whether a target personal policy with a payment failure exists, if so, the policy number of the target personal policy is changed from the original first identifier to the second identifier.
If the group policy is charged and the person pays the fee, the flow S203 is executed. In the process S203, if it is determined that the group policy requires personal payment, the payment may be performed, where the payment mode is usually to pay the account corresponding to each personal policy in the group policy, and if each personal policy is successfully paid, the security state of the group policy is successful; if the policy of the deduction failure exists in the policy of each person, the security state of the group policy is a payment failure, and the deduction is executed after waiting for operations such as account updating in the policy information of the deduction failure until the deduction is successful, and the security state of the group policy is updated to be a payment success.
If the group policy is charged and not personal, flow S203 is performed. In the process S203, if it is determined that the group policy needs to be paid by a non-person, the payment may be performed, and the payment manner includes enterprise payment, payment by withholding, and mixed payment, and then the group policy may be divided into enterprise payment group policy, payment by withholding group policy, and mixed payment group policy, and the payment may be performed on the group policy. If the payment of each personal policy in the group policy is successful, the security state of the group policy is successful; if the policy of the deduction failure exists in the policy of each person, the security state of the group policy is a payment failure, and the deduction is executed after waiting for operations such as account updating in the policy information of the deduction failure until the deduction is successful, and the security state of the group policy is updated to be a payment success.
The following describes the method for processing the security data in the embodiment shown in fig. 1 with reference to the flow of S201 in the security method shown in fig. 2, taking the security deferral as an example of self-core failure. The embodiment of the invention provides a method for processing security data, as shown in fig. 3, comprising the following steps.
S301: traversing the security states of all the group policies in the group policy collection, and screening out the security states as target group policies which are not passed by the self-check.
In the embodiment of the invention, taking the self-core non-passing as an example, the group policy with the self-core non-passing security state is taken as the target group policy. The security identifier of each personal policy in the target group policy is the first identifier.
The execution principle of this step is the same as that of step S101, and will not be described here again.
S302: and judging whether a target personal policy with a self-checking failed security state exists in the target group policy.
Wherein, for a group policy, if it is in a security state where the self-core fails, it is generally stated that the group policy includes a personal policy that the self-core fails. Therefore, after the target group policy is determined, whether the target personal policy with the security state of no self-check passing exists in the target group policy can be judged, if so, the target personal policy can be determined, and the target personal policy is subsequently processed.
The execution principle of this step is the same as that of step S102, and will not be described here again.
S303: if yes, changing the security identification of the target personal security policy from the first identification to the second identification.
The security identification of the target personal policy is changed from the first identification to the second identification, so that the target personal policy is separated from the target group policy.
The execution principle of this step is the same as that of step S103, and will not be described here again. After the present step is performed, steps S304 and S305 may be performed, respectively.
S304: and screening personal insurance policies with the insurance policies as the first identifiers according to the insurance policies of the target group insurance policies, and updating the insurance states of the target group insurance policies according to the insurance policy information of the personal insurance policies with the insurance policies as the first identifiers.
After the security identifier is changed by the target personal security policy, the personal security policy with the security identifier being the first identifier can be screened according to the security identifier of each security policy in the target group security policy, and the security states of the personal security policies with the security identifiers being the first identifier are self-checking passing, so that the subsequent security processes can be continuously executed, namely, the security processes of the target group security policy can be continuously executed according to the security information of the personal security policy with the security identifier being the first identifier, and the security states of the target group security policy can be updated based on the execution result of the subsequent security processes.
S305: and receiving content change information of the target personal policy, and updating the security state of the target personal policy to pass by the self-check based on the content change information.
After the target personal policy changes the security identifier, the target personal policy can be used as a separate policy to execute a security procedure. For a target personal policy that the self-core does not pass, a manual audit is typically performed to determine whether it is a target. If the manual auditing target personal policy is a target, changing the security state into self-checking passing; if the target personal policy is manually checked to be a non-standard body, a decision notice is sent to a user of the target personal policy, and the user is notified to change the policy contents of the target personal policy in a refused or delayed mode, a fee adding mode, a derate mode, an exclusionary mode and the like. After the user of the target personal policy changes the policy content of the target personal policy, the content change information of the target personal policy may be received, and then the policy content of the target personal policy may be updated according to the content change information, and the target personal policy may be self-checked based on the content change information, to determine whether the updated target personal policy satisfies the audit condition. If the self-core passes, the security state of the target personal policy can be updated to pass the self-core, and if the self-core does not pass the self-core, the policy revocation or reduction and other processes can be executed on the target personal policy.
The content change information of the target personal policy may be revocation information, and when the content change information indicates that the security of the target personal policy is revoked, the security revocation operation may be performed on the target personal policy, and the security state of the target personal policy may be updated to be revoked.
In the embodiment of the invention, taking the self-checking passing when the target personal policy is self-checked based on the content change information as an example, the security state of the target personal policy is updated by the updated information as the self-checking passing.
S306: judging whether the security state of the target personal policy is consistent with the security state of the target group policy, if so, executing step S307; if not, step S308 is performed.
After the security state of the target personal policy is updated, before the security confirmation, the target personal policy may be considered to be added back to the target group policy, so as to simplify the security operation and make the effective time of each policy in the group policy consistent. When the security state of the target personal policy is updated, the security state of the target group policy may be updated, so that the security states of the target personal policy and the group policy are not necessarily identical, and if the security states of the target personal policy and the group policy are not identical, the target personal policy cannot be added back to the target group policy, so that it is required to determine whether the security state of the target personal policy and the security state of the group policy are identical. If so, the security identifier of the target personal policy may be changed from the second identifier to the first identifier, that is, the target personal policy is added to the target group policy, and step S307 is performed. If not, the target personal policy and the target group policy are secured as the personal policy of the first identifier, and the security procedure is executed respectively, and step S308 is executed.
Before executing this step, the security state of the target group policy needs to be determined, which may be: based on the target policy identifier of the target personal policy, such as the policy number, inquiring the group policy with the same policy identifier as the target policy identifier, wherein the group policy with the same policy identifier as the target policy identifier is the target group policy, so that the security state of the group policy with the same policy identifier as the target policy identifier can be determined as the security state of the target group policy.
S307: if so, changing the security identifier of the target personal security form from the second identifier to the first identifier, and updating the security state of the target group security form according to the security information of the personal security form with the security identifier being the first identifier.
Changing the security identifier of the target personal policy from the second identifier to the first identifier, which means that the target personal policy is added back to the target group policy, and then the security process can be executed together, that is, the security state of the target group policy is updated according to the policy information of the personal policy with the security identifier being the first identifier.
S308: updating the security state of the target group security according to the security information of the personal security identified as the first identification, and updating the security state of the target group security according to the security information of the target personal security.
The security state of the target personal policy is inconsistent with the security state of the group policy, and the target personal policy cannot be added back to the target group policy, so that the personal policies with the first identifier in the target personal policy and the target group policy execute security processes respectively, that is, the security state of the target group policy is updated according to the security information of the personal policy with the first identifier in the security identifier, and the security state of the target group policy is updated according to the security information of the target personal policy.
In the embodiment of the invention, after the security mark of the target personal policy is changed from the first mark to the second mark, the target personal policy is separated from the target group policy, and the security process can be continuously executed when the security mark of the target group policy is the first mark, so that the security process of the group policy is prevented from being prolonged due to part of the personal policies.
The following specifically describes a method for processing security data in the embodiment of the present invention, taking a scenario in which security delay is a payment failure as an example, in combination with the flows of S203 and S204 in the method for processing security data shown in fig. 2. The embodiment of the invention provides a method for processing security data, as shown in fig. 4, which comprises the following steps.
S401: traversing the security states of all the group insurance policies in the group insurance policy collection, and screening out the security states as target group insurance policies failing to pay.
The execution principle of this step is the same as that of step S301, and will not be described here again.
S402: and judging whether a target personal policy with a security state of payment failure exists in the target group policy.
The execution principle of this step is the same as that of step S302, and will not be described here again.
S403: if yes, changing the security identification of the target personal security policy from the first identification to the second identification.
The execution principle of this step is the same as that of step S303, and will not be described here again.
S404: and screening personal insurance policies with the insurance policies as the first identifiers according to the insurance policies of the target group insurance policies, and updating the insurance states of the target group insurance policies according to the insurance policy information of the personal insurance policies with the insurance policies as the first identifiers.
The execution principle of this step is the same as that of step S304, and will not be described here again.
If the target group policy belongs to mixed payment in non-personal payment, after the target personal policy is separated from the target group policy, the personal policy with the first mark in the target group policy can execute deduction, at this time, the enterprise can pay the premium of all staff once, and the personal policy with the first mark is successfully deducted after executing the deduction process, and the security is confirmed. And the remaining premium paid by the enterprise is settled, and when the target personal policy self-checking passes through the execution of the deduction flow, the settlement amount can be preferentially selected for payment.
S405: and receiving content change information of the target personal policy, and updating the security state of the target personal policy based on the content change information to be successful in payment.
After the target personal policy changes the security identifier, the target personal policy may execute the security procedure as a separate policy. For the target personal policy with failed payment, account information of the target personal policy may need to be changed, and then the deduction operation is performed until the payment is successful, so that the process can receive the payment information of the target personal policy, and thus, whether the target personal policy is successful in payment or not can be judged based on the payment information of the target personal policy. If the payment is successful, updating the security state of the target personal policy to be successful; if the payment fails, the security state of the target personal policy is maintained. The embodiment of the invention is explained by taking successful payment as an example, and updating the security state of the target personal policy based on the content change information is successful payment.
S406: judging whether the security state of the target personal policy is consistent with the security state of the target group policy, if so, executing step S407; if not, step S408 is performed.
The execution principle of this step is the same as that of step S306, and will not be described here again.
S407: if so, changing the security identifier of the target personal security form from the second identifier to the first identifier, and updating the security state of the target group security form according to the security information of the personal security form with the security identifier being the first identifier.
The execution principle of this step is the same as that of step S307, and will not be described here again.
S408: updating the security state of the target group security according to the security information of the personal security identified as the first identification, and updating the security state of the target group security according to the security information of the target personal security.
The execution principle of this step is the same as that of step S308, and will not be described here again.
In the embodiment of the invention, after the security mark of the target personal policy is changed from the first mark to the second mark, the target personal policy is separated from the target group policy, and the security process can be continuously executed when the security mark of the target group policy is the first mark, so that the security process of the group policy is prevented from being prolonged due to part of the personal policies.
In order to solve the problems in the prior art, an embodiment of the present invention provides a data processing apparatus 500, as shown in fig. 5, the apparatus 500 includes:
a screening unit 501, configured to traverse the security states of the group policies in the group policy set, and screen out a target group policy with a delayed security state;
A judging unit 502, configured to judge whether a target personal policy with a security state being a security delay exists in the target group policy;
a changing unit 503, configured to change, if yes, a security identifier of the target personal policy from a first identifier to a second identifier, so that the target personal policy is separated from the target group policy;
an updating unit 504, including updating the security status of the target group policy according to the policy information of the personal policy identified as the first identification in the target group policy.
It should be understood that the manner of implementing the embodiment of the present invention is the same as that of implementing the embodiment shown in fig. 1, and will not be described herein.
In one implementation of the embodiment of the present invention, the apparatus 500 further includes:
a receiving unit, configured to receive policy update information of the target personal policy;
the updating unit 504 is further configured to update a security state of the target personal policy based on the policy update information;
the judging unit 502 is further configured to judge whether the security state of the target personal policy is consistent with the security state of the target group policy;
the changing unit 503 is further configured to change, if yes, the security identifier of the target personal policy from the second identifier to the first identifier, so that the target personal policy is combined with the target group policy.
In yet another implementation manner of the embodiment of the present invention, the apparatus 500 further includes:
the inquiry unit is used for inquiring the group policy with the same policy identifier as the target policy identifier based on the target policy identifier of the target personal policy;
and the determining unit is used for determining the security state of the group policy with the same policy identifier as the target policy identifier as the security state of the target group policy.
In yet another implementation of the embodiment of the present invention, the security delay includes a payment failure; the policy updating information comprises payment information of the target personal policy;
the updating unit 504 is specifically configured to:
judging whether the target personal policy is successfully paid or not based on the payment information of the target personal policy; if yes, updating the security state of the target personal policy to be successful in payment.
In yet another implementation of an embodiment of the present invention, the security deferral includes a self-core failing; the policy updating information comprises content changing information of the target personal policy;
the updating unit 504 is specifically configured to:
updating the policy content of the target personal policy according to the content change information; judging whether the updated target personal policy meets the auditing conditions or not; if yes, updating the security state of the target personal policy to pass through the self-core.
In yet another implementation of an embodiment of the present invention, the security deferral includes a self-core failing; the policy update information includes revocation information;
the updating unit 504 is specifically configured to:
and executing security revocation operation according to the content change information, and updating the security state of the target personal security policy to be revocation.
In yet another implementation manner of the embodiment of the present invention, the security delay includes payment failure and self-checking failure;
the judging unit 502 is specifically configured to:
if the security state of the target group policy is that the self-check does not pass, judging whether the target group policy has a target personal policy that the self-check does not pass; and if the security state of the target group policy is the payment failure, judging whether the target group policy has a target personal policy with the payment failure.
It should be understood that the manner of implementing the embodiments of the present invention is the same as that of implementing the embodiments shown in fig. 1 to 4, and will not be described herein.
In the embodiment of the invention, a target group policy with delayed security is selected from a group policy set according to a security state, and then a target personal policy with delayed security is changed from a first identifier to a second identifier in the target group policy, so that the target personal policy is separated from the target group policy; and updating the security state of the target group policy according to the policy information of the personal policy with the first identifier in the target group policy. Therefore, after the security identification of the target personal policy is changed from the first identification to the second identification, the target personal policy is separated from the target group policy, and the security procedure of the group policy, which is the security identification of the first identification, can be continuously executed, so that the security procedure of the whole group policy is prevented from being prolonged due to part of the personal policy.
According to an embodiment of the present invention, the present invention also provides an electronic device and a readable storage medium.
The electronic device of the present invention includes: at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the one processor, and the instructions are executed by the at least one processor, so that the at least one processor performs the method for processing the security data provided by the embodiment of the invention.
Fig. 6 illustrates an exemplary system architecture 600 of a secure data processing method or a secure data processing apparatus to which embodiments of the present invention may be applied.
As shown in fig. 6, the system architecture 600 may include terminal devices 601, 602, 603, a network 604, and a server 605. The network 604 is used as a medium to provide communication links between the terminal devices 601, 602, 603 and the server 605. The network 604 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
A user may interact with the server 605 via the network 604 using the terminal devices 601, 602, 603 to receive or send messages, etc. Various communication client applications such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only) may be installed on the terminal devices 601, 602, 603.
The terminal devices 601, 602, 603 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 605 may be a server providing various services, such as a background management server (by way of example only) providing support for shopping-type websites browsed by users using terminal devices 601, 602, 603. The background management server may analyze and process the received data such as the product information query request, and feed back the processing result (e.g., product information—only an example) to the terminal device.
Note that, the method for processing security data provided in the embodiment of the present invention is generally executed by the server 605, and accordingly, the device for processing security data is generally disposed in the server 605.
It should be understood that the number of terminal devices, networks and servers in fig. 6 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 7, there is illustrated a schematic diagram of a computer system 700 suitable for use in implementing embodiments of the present invention. The computer system shown in fig. 7 is only an example, and should not be construed as limiting the functionality and scope of use of the embodiments of the invention.
As shown in fig. 7, the computer system 700 includes a Central Processing Unit (CPU) 701, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data required for the operation of the system 700 are also stored. The CPU 701, ROM 702, and RAM 703 are connected to each other through a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input section 706 including a keyboard, a mouse, and the like; an output portion 707 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 708 including a hard disk or the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. The drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read therefrom is mounted into the storage section 708 as necessary.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 709, and/or installed from the removable medium 711. The above-described functions defined in the system of the present invention are performed when the computer program is executed by a Central Processing Unit (CPU) 701.
The computer readable medium shown in the present invention may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a unit, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present invention may be implemented in software or in hardware. The described units may also be provided in a processor, for example, described as: a processor includes a screening unit, a judging unit, and a changing unit. Wherein the names of these units do not constitute a limitation of the unit itself in some cases, for example, a screening unit may also be described as a "unit of the function of the screening unit".
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be present alone without being fitted into the device. The computer readable medium carries one or more programs which, when executed by one of the devices, cause the device to perform the method of processing security data provided by the present invention.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives can occur depending upon design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.

Claims (10)

1. A method of processing secured data, comprising:
traversing the security states of all the group policies in the group policy set, and screening out the security states as the target group policy with delayed security;
judging whether a target personal policy with a security state of security delay exists in the target group policy;
If yes, changing the security identification of the target personal policy from a first identification to a second identification so as to separate the target personal policy from the target group policy;
and updating the security state of the target group policy according to the policy information of the personal policy, which is identified as the first identifier, in the target group policy.
2. The method of claim 1, further comprising, after said changing the security identifier of the target personal policy from the first identifier to the second identifier:
receiving policy update information of the target personal policy;
updating the security state of the target personal policy based on the policy updating information;
judging whether the security state of the target personal security policy is consistent with the security state of the target group security policy;
if yes, changing the security identifier of the target personal policy from the second identifier to the first identifier so as to enable the target personal policy to be combined with the target group policy.
3. The method of claim 2, further comprising, prior to said determining whether the security status of the target personal policy is consistent with the security status of the group policy:
Inquiring a group policy with the same policy identifier as the target personal policy based on the target policy identifier of the target personal policy;
and determining the security state of the group policy with the same policy identifier as the target policy identifier as the security state of the target group policy.
4. The method of claim 2, wherein the security delay comprises a payment failure; the policy updating information comprises payment information of the target personal policy;
the updating the security state of the target personal policy based on the policy updating information includes:
judging whether the target personal policy is paid successfully or not based on the payment information of the target personal policy;
if yes, updating the security state of the target personal policy to be successful in payment.
5. The method of claim 2, wherein the security deferral comprises a self-core failing; the policy updating information comprises content changing information of the target personal policy;
the updating the security state of the target personal policy based on the policy updating information includes:
updating the policy content of the target personal policy according to the content change information;
Judging whether the updated target personal policy meets the auditing conditions or not;
if yes, updating the security state of the target personal policy to pass through the self-core.
6. The method of claim 2, wherein the security deferral comprises a self-core failing; the policy update information includes revocation information;
the updating the security state of the target personal policy based on the policy updating information includes:
and executing security revocation operation according to the revocation information, and updating the security state of the target personal policy to be revocation.
7. The method of claim 1, wherein the security delay includes payment failure and self-verification failure;
the judging whether the target personal policy with the security state being the security delay exists in the target group policy comprises the following steps:
if the security state of the target group policy is that the self-check does not pass, judging whether the target group policy has a target personal policy that the self-check does not pass;
and if the security state of the target group policy is the payment failure, judging whether the target group policy has a target personal policy with the payment failure.
8. A processing apparatus for securing data, comprising:
The screening unit is used for traversing the security states of all the group security forms in the group security form set and screening out the target group security form with the security state being the security delay;
the judging unit is used for judging whether a target personal policy with a security state of security delay exists in the target group policy;
a changing unit, configured to change, if yes, a security identifier of the target personal policy from a first identifier to a second identifier, so that the target personal policy is separated from the target group policy;
and the updating unit is used for updating the security state of the target group policy according to the policy information of the personal policy which is identified as the first identifier in the target group policy.
9. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs,
when executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-7.
10. A computer readable medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method according to any of claims 1-7.
CN201911135060.3A 2019-11-19 2019-11-19 Method and device for processing security data, electronic equipment and storage medium Active CN111126935B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911135060.3A CN111126935B (en) 2019-11-19 2019-11-19 Method and device for processing security data, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911135060.3A CN111126935B (en) 2019-11-19 2019-11-19 Method and device for processing security data, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111126935A CN111126935A (en) 2020-05-08
CN111126935B true CN111126935B (en) 2023-07-21

Family

ID=70495794

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911135060.3A Active CN111126935B (en) 2019-11-19 2019-11-19 Method and device for processing security data, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111126935B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111507853B (en) * 2020-06-02 2023-04-07 泰康保险集团股份有限公司 Group insurance policy and insurance data processing method and device
CN112132694B (en) * 2020-09-28 2024-04-09 平安养老保险股份有限公司 Method, device, equipment and storage medium for confirming and checking policy and security case

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460884A (en) * 2018-09-03 2019-03-12 中国平安人寿保险股份有限公司 Orphan's list distribution method, electronic device and readable storage medium storing program for executing
CN109544389A (en) * 2018-11-29 2019-03-29 爱保科技(横琴)有限公司 Intelligent analysis system based on declaration form
KR20190105921A (en) * 2018-03-07 2019-09-18 김형종 Refundable insurance service system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8463625B1 (en) * 2005-01-20 2013-06-11 Daniel L. Owen System, method and computer program product for facilitating informed decisions relating to the fair sharing of the costs of insurance between a group and a third party
US20130006673A1 (en) * 2011-06-29 2013-01-03 Continental Casualty Company Consolidating Billing Statements in an Agency Business Model
US20130282406A1 (en) * 2012-04-19 2013-10-24 Eric William Snyder Apparatus, method and article to automate and manage electronic documents in a networked environment
CN106022710A (en) * 2016-05-09 2016-10-12 平安科技(深圳)有限公司 Insurance check method and apparatus
CN107527099A (en) * 2016-06-21 2017-12-29 平安科技(深圳)有限公司 Save reservation processing method and device from damage
CN106980636B (en) * 2016-07-22 2020-04-03 平安科技(深圳)有限公司 Policy data processing method and device
CN108074069A (en) * 2016-11-15 2018-05-25 平安科技(深圳)有限公司 Information processing method and device are saved in insurance from damage
CN106779924A (en) * 2016-12-01 2017-05-31 国云科技股份有限公司 A kind of cloud platform request for product form processing method under Multistage Proxy pattern
CN107689010B (en) * 2017-07-25 2022-04-29 平安科技(深圳)有限公司 Method and device for batch processing policy tasks, computer equipment and storage medium
CN107704529B (en) * 2017-09-20 2020-04-10 平安科技(深圳)有限公司 Information uniqueness identification method, application server, system and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190105921A (en) * 2018-03-07 2019-09-18 김형종 Refundable insurance service system
CN109460884A (en) * 2018-09-03 2019-03-12 中国平安人寿保险股份有限公司 Orphan's list distribution method, electronic device and readable storage medium storing program for executing
CN109544389A (en) * 2018-11-29 2019-03-29 爱保科技(横琴)有限公司 Intelligent analysis system based on declaration form

Also Published As

Publication number Publication date
CN111126935A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
CN111127181A (en) Voucher bookkeeping method and device
CN111126935B (en) Method and device for processing security data, electronic equipment and storage medium
CN113361838A (en) Business wind control method and device, electronic equipment and storage medium
CN112348326A (en) Bank business processing method and system
CN113010238A (en) Permission determination method, device and system for micro application call interface
CN109683942B (en) Script management method, script management device, script management medium and electronic equipment
CN111179054A (en) Request information processing method, server, client and system
CN116049099A (en) Data processing method, device, electronic equipment and computer readable medium
CN114648012A (en) Bill processing method and device, electronic equipment and computer readable medium
CN111210349B (en) Method and device for transferring and supporting virtual asset, electronic equipment and storage medium
CN111127221B (en) Method, device, medium and electronic equipment for policy claim settlement
CN111526184B (en) Business auditing method and device
CN111429092B (en) Method, apparatus, device and computer readable medium for paying an accumulation fund
CN111179097B (en) Method, device, electronic equipment and storage medium for modifying warranty
CN112927066A (en) Batch deduction method and device
CN111897822A (en) Account state information processing method and device, electronic equipment and storage medium
CN111047277B (en) Nuclear protection system, method, device and computer readable medium
CN114612249A (en) Method and device for processing service message
CN111242576A (en) Method and device for processing request
CN110889771A (en) Account processing method and device, electronic equipment and computer readable medium
CN112215592B (en) Data processing method and system
JP7000549B1 (en) Information processing equipment, methods and programs
CN113034257A (en) Method and device for batch processing of tasks, electronic equipment and storage medium
CN116258556A (en) Method, device, electronic equipment and storage medium for processing business data
CN117649196A (en) Method, apparatus, device and computer readable medium for approving business

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant