CN111179099B - Method, device, medium and electronic equipment for acquiring insurance contract - Google Patents

Method, device, medium and electronic equipment for acquiring insurance contract Download PDF

Info

Publication number
CN111179099B
CN111179099B CN201911213133.6A CN201911213133A CN111179099B CN 111179099 B CN111179099 B CN 111179099B CN 201911213133 A CN201911213133 A CN 201911213133A CN 111179099 B CN111179099 B CN 111179099B
Authority
CN
China
Prior art keywords
policy
server
contract
token
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911213133.6A
Other languages
Chinese (zh)
Other versions
CN111179099A (en
Inventor
刘卫华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taikang Insurance Group Co Ltd
Original Assignee
Taikang Insurance Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taikang Insurance Group Co Ltd filed Critical Taikang Insurance Group Co Ltd
Priority to CN201911213133.6A priority Critical patent/CN111179099B/en
Publication of CN111179099A publication Critical patent/CN111179099A/en
Application granted granted Critical
Publication of CN111179099B publication Critical patent/CN111179099B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Primary Health Care (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a method for acquiring an insurance contract, which can be applied to a verification server, a third party server and a policy server. The method applied to the verification server comprises the following steps: receiving a policy contract downloading request sent by a third-party server; verifying the identity of a user according to a policy contract downloading request, and sending the policy contract downloading request to a policy server when the user identity is successfully verified; receiving a policy contract downloading link sent by the policy server, wherein the policy contract downloading link is generated by the policy server based on an insurance contract determined by the policy contract downloading request; the policy contract downloading link is sent to the third party server, so that the information security defect caused by direct interaction between the third party server and the policy server can be avoided, and the client can obtain the policy contract of the client in the third party server, so that the trust degree between the client and the third party institution is improved.

Description

Method, device, medium and electronic equipment for acquiring insurance contract
Technical Field
The invention relates to the technical field of data interaction, in particular to a method, a device, a medium and electronic equipment for acquiring an insurance contract.
Background
With the rapid development of the internet, there are more and more insurance products in the insurance industry. Therefore, insurance companies face slow popularization of insurance products due to insufficient personnel, thereby affecting economic benefits of the insurance companies. For this case, the insurance company generally chooses to cooperate with a third party organization, and the third party organization promotes the insurance products of the insurance company, and underwrites the insurance products when the customer applies insurance. The insurance company then completes the operation work of the insurance policy. The insurance contract is important insurance information of the applicant, after the insurance company generates the insurance policy contract after the insurance policy contract, the insurance policy contract is sent to a client mailbox according to the contract type selected by the client if the electronic contract is selected, and if the paper contract is selected, the insurance company prints the paper contract and completes express delivery. In the above business process, the third party mechanism directly interacts with the core system of the insurance company, so that potential safety hazards on the network can exist. And the insurance contract information is not managed by the third party institution, and is easy to cause the dissatisfaction of the third party institution. In addition, because the insurance company sends the insurance company to the client, but the client is underwritten by a third party organization when the insurance is applied, the trust of the client to the third party organization is reduced.
It should be noted that the information disclosed in the above background section is only for enhancing understanding of the background of the invention and thus may include information that does not form the prior art that is already known to those of ordinary skill in the art.
Disclosure of Invention
The embodiment of the invention aims to provide a method, a device, a medium and electronic equipment for acquiring an insurance contract, so that the information security defect caused by direct interaction between a third party server and a policy server can be avoided at least to a certain extent, and a client can acquire the insurance contract of a policy in the third party server, thereby improving the trust degree between the client and a third party mechanism.
Other features and advantages of the invention will be apparent from the following detailed description, or may be learned by the practice of the invention.
According to a first aspect of an embodiment of the present invention, there is provided a method for acquiring an insurance contract, applied to a verification server, the method including: receiving a policy contract downloading request sent by a third-party server; verifying the user identity according to the policy contract downloading request, and sending the policy contract downloading request to a policy server when the user identity is successfully verified; receiving a policy contract downloading link sent by the policy server, wherein the policy contract downloading link is generated by the policy server based on an insurance contract determined by the policy contract downloading request; transmitting the policy contract download link to the third party server
In some embodiments of the present invention, before receiving the policy contract download request sent by the third party server, the method further comprises: receiving a login request sent by a third-party server, wherein the login request comprises a user account number, a user password and/or a preset secret key; and verifying the user identity according to the user account number, the user password and/or the preset secret key, and sending a token of successful verification to the third party server when the user identity verification is successful.
In some embodiments of the invention, the method further comprises: receiving a policy download code request sent by the third party server, wherein the policy download code request comprises a policy number and/or the token; verifying the token, and if the verification is successful, sending the policy number to the policy server; receiving a query result of the policy server based on the policy number, and if the query result is that the policy of the policy number is valid; and sending the encrypted character string of the policy number to the third party server.
In some embodiments of the invention, the policy contract download request includes the token and the encrypted string; verifying the user identity according to the policy contract downloading request, and when the user identity verification is successful, sending the policy contract downloading request to a policy server comprises: and verifying the token, decrypting the encrypted character string if the verification is successful, and sending the decrypted policy number to the policy server.
According to a second aspect of an embodiment of the present invention, there is provided a method of acquiring an insurance contract, applied to a third party server, the method including: a login request is sent to the verification server, wherein the login request comprises a user account number, a user password and/or a preset secret key, so that the verification server verifies the user identity according to the user account number, the user password and/or the preset secret key; when the authentication server successfully authenticates the user identity according to the user account number, the user password and/or the preset secret key, a token which is sent by the authentication server and is successfully authenticated is received; sending a policy contract downloading request to a verification server, so that the verification server verifies the identity of a user according to a token in the policy contract downloading request; and when the authentication server successfully authenticates the user identity according to the token in the policy contract downloading request, receiving a policy contract downloading link sent by the authentication server.
In some embodiments of the invention, the method further comprises: transmitting a policy download code request to the verification server, wherein the policy download code request comprises a policy number and/or the token, so that the verification server verifies the token, and if verification is successful, the policy number is transmitted to the policy server; and when the policy server is effective in the policy of the policy number based on the query result of the policy number, receiving the encrypted character string of the policy number sent by the verification server.
According to a third aspect of the embodiment of the present invention, there is provided a method for acquiring an insurance contract, applied to an insurance policy server, the method including: when the authentication server successfully authenticates the user identity in the policy contract downloading request, receiving the policy contract downloading request sent by the authentication server; determining a policy contract of the policy contract downloading request based on the policy contract downloading request; generating a policy contract downloading link based on the policy contract; and sending the policy contract downloading link to the verification server so that a third party server can download a policy contract based on the policy contract downloading link.
In some embodiments of the invention, the method further comprises: when the verification server successfully verifies the token in the policy download code request, receiving a policy number in the policy download code request sent by the verification server; and inquiring whether the policy corresponding to the policy number is valid or not based on the policy number, and sending an inquiry result to the verification server, wherein the inquiry result is that the policy corresponding to the policy number is valid.
According to a fourth aspect of an embodiment of the present invention, there is provided an apparatus for acquiring an insurance contract, applied to a verification server, the apparatus including: the first receiving module is used for receiving a policy contract downloading request sent by the third party server; the first verification module is used for verifying the identity of the user according to the policy contract downloading request, and sending the policy contract downloading request to a policy server when the user identity is successfully verified; the second receiving module is used for receiving a policy contract downloading link sent by the policy server, wherein the policy contract downloading link is generated by the policy server based on an insurance contract determined by the policy contract downloading request; and the first sending module is used for sending the policy contract downloading link to the third party server.
In some embodiments of the invention, the apparatus further comprises: the second receiving module is used for receiving a login request sent by the third party server, wherein the login request comprises a user account number, a user password and/or a preset secret key; and the second verification module is used for verifying the user identity according to the user account number, the user password and/or the preset secret key, and sending a token which is successfully verified to the third party server when the user identity verification is successful.
In some embodiments of the invention, the apparatus further comprises: the third receiving module is used for receiving a policy downloading code request sent by the third party server, wherein the policy downloading code request comprises a policy number and/or the token; the third verification module is used for verifying the token, and if verification is successful, the policy number is sent to the policy server; a fourth receiving module, configured to receive a query result of the policy server based on the policy number, and if the query result is that the policy of the policy number is valid; and the second sending module is used for sending the encrypted character string of the policy number to the third party server.
In some embodiments of the invention, the policy contract download request includes the token and the encrypted string; the first verification module is configured to: and verifying the token, decrypting the encrypted character string if the verification is successful, and sending the decrypted policy number to the policy server.
According to a fifth aspect of an embodiment of the present invention, there is provided a third party server, the apparatus comprising: the first sending module is used for sending a login request to the verification server, wherein the login request comprises a user account, a user password and/or a preset secret key, so that the verification server verifies the user identity according to the user account, the user password and/or the preset secret key; the first receiving module is used for receiving a token which is sent by the verification server and is successfully verified when the verification server successfully verifies the user identity according to the user account number, the user password and/or the preset secret key; the second sending module is used for sending a policy contract downloading request to the verification server so that the verification server verifies the identity of the user according to the token in the policy contract downloading request; and the second receiving module is used for receiving the policy contract downloading link sent by the verification server when the verification server successfully verifies the user identity according to the token in the policy contract downloading request.
In some embodiments of the invention, the apparatus further comprises: the third sending module is used for sending a policy download code request to the verification server, wherein the policy download code request comprises a policy number and/or the token, so that the verification server verifies the token, and if verification is successful, the policy number is sent to the policy server; and the third receiving module is used for receiving the encrypted character string of the policy number sent by the verification server when the policy server is effective based on the query result of the policy number.
According to a sixth aspect of the embodiment of the present invention, there is provided an apparatus for acquiring an insurance contract, applied to an insurance policy server, the apparatus including: the first receiving module is used for receiving the policy contract downloading request sent by the verification server when the user identity in the policy contract downloading request is successfully verified by the verification server; the determining module is used for determining the policy contract of the policy contract downloading request based on the policy contract downloading request; the generation module generates a policy contract downloading link based on the policy contract; and the first sending module is used for sending the policy contract downloading link to the verification server so that a third party server can download the policy contract based on the policy contract downloading link.
In some embodiments of the invention, the apparatus further comprises: the second receiving module is used for receiving the policy number in the policy download code request sent by the verification server when the verification server successfully verifies the token in the policy download code request; and the second sending module is used for inquiring whether the policy corresponding to the policy number is valid or not based on the policy number, and sending an inquiry result to the verification server, wherein the inquiry result is that the policy corresponding to the policy number is valid.
According to a seventh aspect of an embodiment of the present invention, there is provided an electronic apparatus including: one or more processors; storage means for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the method of acquiring an insurance contract as described in the first aspect or the second aspect or the third aspect of the embodiments described above.
According to an eighth aspect of embodiments of the present invention, there is provided a computer readable medium having stored thereon a computer program which when executed by a processor implements a method of acquiring an insurance contract as described in the first aspect or the second aspect or the third aspect of the above embodiments.
The technical scheme provided by the embodiment of the invention can have the following beneficial effects:
in the technical schemes provided by some embodiments of the present invention, the identity of a user is verified according to a policy contract download request, when the user identity verification is successful, the policy contract download request is sent to a policy server, a policy contract download link sent by the policy server is received, the policy contract download link is generated by the policy server based on an insurance contract determined by the policy contract download request, the policy contract download link is sent to a third party server, and in this way, the information security defect caused by direct interaction between the third party server and the policy server can be avoided by acquiring the insurance contract.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention. It is evident that the drawings in the following description are only some embodiments of the present invention and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art. In the drawings:
FIG. 1 illustrates a schematic diagram of an exemplary system architecture of a method of acquiring an insurance contract or an apparatus of acquiring an insurance contract to which embodiments of the present invention may be applied;
FIG. 2 schematically illustrates a flow chart of a method of acquiring an insurance contract applied to a verification server according to an embodiment of the invention;
FIG. 3 schematically illustrates a flow chart of a method of acquiring an insurance contract applied to a verification server according to another embodiment of the invention;
FIG. 4 schematically illustrates a flow chart of a method of acquiring an insurance contract applied to a verification server according to another embodiment of the invention;
FIG. 5 schematically illustrates a flow chart of a method of acquiring an insurance contract applied to a third party server according to an embodiment of the invention;
FIG. 6 schematically illustrates a flow chart of a method of acquiring an insurance contract applied to a third party server according to another embodiment of the invention;
FIG. 7 schematically illustrates a flow chart of a method of acquiring an insurance contract applied to an policy server in accordance with an embodiment of the invention;
FIG. 8 schematically illustrates a flow chart of a method of acquiring an insurance contract applied to an policy server in accordance with another embodiment of the invention;
FIG. 9 schematically illustrates interactions between a verification server, a third party server and a policy server according to an embodiment of the invention;
fig. 10 schematically shows a block diagram of an apparatus for acquiring an insurance contract applied to a verification server according to an embodiment of the present invention;
FIG. 11 schematically illustrates a block diagram of an apparatus for acquiring an insurance contract applied to a verification server according to another embodiment of the present invention;
fig. 12 schematically shows a block diagram of an apparatus for acquiring an insurance contract applied to a verification server according to another embodiment of the present invention;
FIG. 13 schematically illustrates a block diagram of an apparatus for acquiring an insurance contract applied to a third party server according to an embodiment of the present invention;
FIG. 14 schematically illustrates a block diagram of an apparatus for acquiring an insurance contract applied to a third party server according to another embodiment of the present invention;
fig. 15 schematically shows a block diagram of an apparatus for acquiring an insurance contract applied to an policy server according to an embodiment of the present invention;
fig. 16 schematically shows a block diagram of an apparatus for acquiring an insurance contract applied to an policy server according to another embodiment of the present invention;
fig. 17 shows a schematic diagram of a computer system suitable for use in implementing an embodiment of the invention.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific details, or with other methods, components, devices, steps, etc. In other instances, well-known methods, devices, implementations, or operations are not shown or described in detail to avoid obscuring aspects of the invention.
The block diagrams depicted in the figures are merely functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow diagrams depicted in the figures are exemplary only, and do not necessarily include all of the elements and operations/steps, nor must they be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the order of actual execution may be changed according to actual situations.
FIG. 1 illustrates a schematic diagram of an exemplary system architecture of a method of acquiring an insurance contract or an apparatus of acquiring an insurance contract to which embodiments of the present invention may be applied.
As shown in fig. 1, system architecture 100 may include server 101, network 102, server 103, network 104, server 105. Network 102 and network 104 are media used to provide communication links between server 101, server 103, and server 105. The networks 102 and 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
It should be understood that the number of networks and servers in fig. 1 is merely illustrative. There may be any number of networks and servers, as desired for implementation. For example, the server 101 or the server 103 or the server 105 may be a server cluster formed by a plurality of servers.
Server 103 may interact with server 101 and server 105 through network 102 and network 104 to receive or send messages, etc.
The server 103 may be a server providing various services. For example, the server 103 may receive a policy contract download request sent by the server 101, verify the identity of the user according to the policy contract download request, and when the user authentication is successful, send the policy contract download request to the server 105, then receive a policy contract download link sent by the server 105, where the policy contract download link is generated by the server 105 based on an insurance contract determined by the policy contract download request, and finally send the policy contract download link to the server 101.
In some embodiments, the method for acquiring insurance contracts provided by the embodiments of the present invention may be performed by the server 101, the server 103, or the server 105, and accordingly, the apparatus for acquiring insurance contracts may be provided in the server 101, the server 103, or the server 105.
Fig. 2 schematically shows a flow chart of a method of acquiring an insurance contract applied to a verification server according to an embodiment of the invention.
As shown in fig. 2, the method of acquiring an insurance contract applied to the authentication server may include steps S210 to S240.
In step S210, a policy contract download request sent by the third party server is received.
In step S220, the user identity is verified according to the policy contract download request, and when the user identity verification is successful, the policy contract download request is sent to a policy server.
In step S230, a policy contract download link sent by the policy server is received, where the policy contract download link is generated by the policy server based on an insurance contract determined by the policy contract download request.
In step S240, the policy contract download link is sent to the third party server.
In the method, the verification server can receive a policy contract downloading request sent by the third party server, verify the identity of the user according to the policy contract downloading request, send the policy contract downloading request to the policy server when the user identity verification is successful, then receive a policy contract downloading link sent by the policy server, wherein the policy contract downloading link is generated by the policy server based on an insurance contract determined by the policy contract downloading request, and finally send the policy contract downloading link to the third party server.
In one embodiment of the present invention, the third party server may be a server of a third party authority that cooperates with an insurance company. The third party server can interact with the verification server to acquire the insurance contract without interacting with the policy server, so that the network security problem existing in the related technology due to the direct interaction between the third party server and the policy server can be effectively avoided.
In one embodiment of the present invention, the insurance contract download request includes a token and an encrypted string. The token may be sent to the third party server by the verification server, and is used for verifying the identity of the user and verifying whether the token is valid, and since the token has timeliness, the validity period is generally set to 30 minutes, and may be specifically set according to practical situations. The encrypted character string may be a policy number of a policy signed by the client and the third party authority, and if verification is successful, the encrypted character string may be decrypted to obtain the policy number, and the policy number is sent to the policy server for querying a policy contract corresponding to the policy number.
In one embodiment of the invention, the identity of the user is verified according to the policy contract downloading request, and when the identity of the user is verified successfully, the policy contract downloading request is sent to the policy server. For example, the authentication server may set a uniform token for each third party authority, or may set a unique token for each user. When receiving the policy contract downloading request sent by the third party server, according to whether the token is the token sent by the verification server or not, so as to verify the identity of the user (for example, the identity of the user can be the identity of the applicant or the identity of the third party organization, because the applicant and the third party organization are both users for the insurance company), further verifying whether the token is in the validity period, if the token is the token sent by the verification server and the token is in the validity period, decrypting the encrypted character string to obtain the policy number, and sending the policy number to the policy server, so that the policy server can inquire the corresponding policy contract according to the policy number.
In one embodiment of the present invention, when the policy server queries the insurance contract of the policy number according to the policy number, a policy contract download link may be generated based on the policy contract, or binary stream information of the policy contract may be generated based on the policy contract, and the policy contract download link or the binary stream of the policy contract may be sent to the verification server, and then the verification server sends the policy contract download link or the binary stream of the policy contract to the third party server, in which case, the client may download the insurance contract according to the policy contract download link. Or converting binary stream of the policy contract into image content, and then downloading the image content, wherein the image content is the policy contract in PDF format, so that the information security defect caused by direct interaction between the third party server and the policy server can be avoided, and the client can obtain the policy contract of the client in the third party server, thereby improving the trust degree between the client and the third party mechanism.
Fig. 3 schematically shows a flow chart of a method of acquiring an insurance contract applied to a verification server according to another embodiment of the invention.
The method of acquiring an insurance contract applied to the authentication server may further include step S310 and step S320 before step S210, as shown in fig. 3.
In step S310, a login request sent by a third party server is received, where the login request includes a user account, a user password, and/or a preset key.
In step S320, the user identity is verified according to the user account, the user password, and/or the preset key, and when the user identity verification is successful, a token that the verification is successful is sent to the third party server.
In the method, the authentication server can authenticate the user identity according to the user account number, the user password and/or the preset secret key, and when the user identity authentication is successful, a token with successful authentication is sent to the third party server, so that the network security problem existing in the related technology can be avoided to a certain extent, and the token returned to the third party server can be used for subsequently authenticating the identification of the user identity, and further the network security problem existing in the related technology is avoided.
In one embodiment of the present invention, the login request may include a user account, a user password, and/or a preset key. In this example, the user account and the user password may be user information for logging in to the authentication server, and the preset key may be a key allocated to the third party mechanism by the policy service company, and is used to encrypt information when the user account and the user password interact with each other, so as to ensure data security.
In one embodiment of the invention, the identity of the user is verified according to the user account number, the user password and/or the preset secret key, and when the user identity verification is successful, a token which is successfully verified is sent to the third party server. For example, when the authentication server receives a login request sent by a user, the request can be decrypted based on the preset secret key, then the user identity is authenticated based on the user account and the user password, and when authentication is successful, a token generated when authentication is successful is sent to the third party server for subsequent authentication of the basis of the user identity.
Fig. 4 schematically shows a flow chart of a method of acquiring an insurance contract applied to a verification server according to another embodiment of the invention.
As shown in fig. 4, the method for acquiring the insurance contract applied to the verification server further includes steps S410 to S440.
In step S410, a policy download code request sent by the third party server is received, where the policy download code request includes a policy number and/or the token.
In step S420, the token is verified, and if verification is successful, the policy number is sent to the policy server.
In step S430, the policy server receives the query result based on the policy number, and if the query result is that the policy of the policy number is valid.
In step S440, the encrypted string of the policy number is sent to the third party server.
In the method, the verification server can receive the policy download code request sent by the third party server, the policy download code request contains the policy number and/or the token, and the token is verified, so that the network security problem existing in the related technology can be further avoided, the security of the policy contract in the policy server is ensured, if verification is successful, the policy number is sent to the policy server, the query result of the policy server based on the policy number is received, if the query result is that the policy of the policy number is valid, the encrypted character string of the policy number is sent to the third party server, the security of the policy number can be ensured, the occurrence of nausea and serial modification of people is avoided, and the security in data transmission is further improved.
In one embodiment of the present invention, the policy download code request includes a policy number and/or the token. The policy number may be a policy number of a policy contract that the user wants to acquire. The token may be a token generated when the authentication server successfully authenticates the user account and the user password, and in this example, the user identity may be authenticated according to the token to verify whether the user is the same person as the user in the login request, so that the network security problem existing in the related technology may be further avoided, and thus the security of the policy contract in the policy server is ensured.
In one embodiment of the present invention, when the authentication server successfully authenticates the user's identity, the policy number is sent to the policy server, so that the policy server can query a policy contract corresponding to the policy number according to the policy number, if the query result is that the policy of the policy number is valid, in this case, the authentication server can receive the query result, and if the authentication server determines that the query result is that the policy of the policy number is valid, the authentication server sends an encrypted character string of the policy number to the third party server.
In one embodiment of the present invention, verifying the user identity according to the policy contract download request, and when the user identity verification is successful, sending the policy contract download request to a policy server includes: and verifying the token, decrypting the encrypted character string if the verification is successful, and sending the decrypted policy number to the policy server. For example, the authentication server may set a uniform token for each third party authority, or may set a unique token for each user. When receiving the policy contract downloading request sent by the third party server, according to whether the token is the token sent by the verification server or not, the user identity or the identity of the third party organization can be verified, whether the token is in the validity period or not can be further verified, if the token is the token sent by the verification server and is in the validity period, the encryption character string is decrypted to obtain the policy number, the policy number is sent to the policy server, and the policy server can inquire the corresponding policy contract according to the policy number.
Fig. 5 schematically shows a flow chart of a method of acquiring an insurance contract applied to a third party server according to an embodiment of the invention.
As shown in fig. 5, the method for acquiring the insurance contract applied to the third party server may specifically include steps S510 to S540.
In step S510, a login request is sent to the authentication server, where the login request includes a user account, a user password, and/or a preset key, so that the authentication server authenticates the user identity according to the user account, the user password, and/or the preset key.
In step S520, when the authentication server successfully authenticates the user according to the user account, the user password, and/or the preset key, a token of successful authentication sent by the authentication server is received.
In step S530, a policy contract download request is sent to the authentication server, so that the authentication server authenticates the user identity according to the token in the policy contract download request.
In step S540, when the authentication server successfully authenticates the user according to the token in the policy contract download request, a policy contract download link sent by the authentication server is received.
In the method, the third party server can send a login request to the verification server, wherein the login request comprises a user account number, a user password and/or a preset secret key, so that the verification server verifies the user identity according to the user account number, the user password and/or the preset secret key, when the user identity is verified successfully, a token which is sent by the verification server and is successfully verified is received, so that the network security problem in the related technology can be avoided to a certain extent, the received token can be used for subsequently verifying the identification of the user identity, and the network security problem in the related technology is further avoided. For example, the third party server may send a policy contract downloading request to the verification server, so that the verification server verifies the identity of the user according to the token in the policy contract downloading request, and when the verification server successfully verifies the identity of the user according to the token, the verification server receives the policy contract downloading link sent by the verification server, so that the information security defect caused by direct interaction between the third party server and the policy server can be avoided, and the customer can obtain the policy contract of the customer in the third party server, thereby improving the trust degree between the customer and the third party mechanism.
In one embodiment of the present invention, the login request may include a user account, a user password, and/or a preset key. In this example, the user account and the user password may be user information for logging in to the authentication server, and the preset key may be a key allocated to the third party mechanism by the policy service company, and is used to encrypt information when the user account and the user password interact with each other, so as to ensure data security.
In one embodiment of the present invention, when the authentication server successfully authenticates the user's identity according to the user account, the user password, and/or the preset key, the third party server may receive a token generated when the authentication is successful. For example, when the authentication server receives a login request sent by a user, the request can be decrypted based on the preset secret key, then the user identity is authenticated based on the user account and the user password, and when authentication is successful, the third party server can receive a token generated when authentication of the authentication server is successful and used for subsequently verifying the basis of the user identity.
In one embodiment of the present invention, the insurance contract download request includes a token and an encrypted string. The token may be received from an authentication server, and is used for authenticating the identity of the user and verifying whether the token is valid, and the validity period is generally set to 30 minutes because the token has timeliness, and may be specifically set according to practical situations. The encrypted character string may be a policy number of a policy signed by the client and the third party authority, and when the authentication server successfully authenticates the user, the authentication server may decrypt the policy number to obtain the policy number, and send the policy number to the policy server for querying a policy contract corresponding to the policy number.
In one embodiment of the present invention, when the policy server queries the insurance contract of the policy number according to the policy number, a policy contract download link may be generated based on the policy contract, or binary stream information of the policy contract may be generated based on the policy contract, and the policy contract download link or the binary stream of the policy contract may be sent to the verification server, and then the verification server sends the policy contract download link or the binary stream of the policy contract to the third party server, in which case, the client may download the insurance contract according to the policy contract download link. Or converting binary stream of the policy contract into image content, and then downloading the image content, wherein the image content is the policy contract in PDF format, so that the information security defect caused by direct interaction between the third party server and the policy server can be avoided, and the client can obtain the policy contract of the client in the third party server, thereby improving the trust degree between the client and the third party mechanism.
Fig. 6 schematically shows a flow chart of a method of acquiring an insurance contract applied to a third party server according to another embodiment of the invention.
As shown in fig. 6, the method for acquiring an insurance contract applied to the third party server further includes step S610 and step S620.
In step S610, a policy download code request is sent to the verification server, where the policy download code request includes a policy number and/or the token, so that the verification server verifies the token, and if verification is successful, the policy number is sent to the policy server.
In step S620, when the policy server is valid for the policy of the policy number based on the query result of the policy number, the encrypted string of the policy number sent by the verification server is received.
In the method, the third party server can send a policy download code request to the verification server, wherein the policy download code request comprises a policy number and/or the token, so that the verification server verifies the token, and thus the network security problem existing in the related technology can be further avoided, and the security of a policy contract in the policy server is ensured. If verification is successful, the policy number is sent to the policy server, and when the policy server is effective in the policy of the policy number based on the query result of the policy number, the encrypted character string of the policy number sent by the verification server is received, so that the security of the policy number can be ensured, the occurrence of nausea and change of people is avoided, and the security in data transmission is further improved.
Fig. 7 schematically shows a flowchart of a method of acquiring an insurance contract applied to an insurance policy server according to an embodiment of the invention.
As shown in fig. 7, the method for acquiring the insurance contract applied to the policy server may specifically include steps S710 to S740.
In step S710, when the authentication server successfully authenticates the user' S identity in the policy contract download request, the policy contract download request sent by the authentication server is received.
In step S720, a policy contract for the policy contract download request is determined based on the policy contract download request.
In step S730, a policy contract download link is generated based on the policy contract.
In step S740, the policy contract download link is sent to the verification server to enable a third party server to download a policy contract based on the policy contract download link.
In the method, when the authentication server successfully authenticates the user identity in the policy contract downloading request, the policy contract downloading request sent by the authentication server is received, the policy contract of the policy contract downloading request is determined based on the policy contract downloading request, a policy contract downloading link is generated based on the policy contract, and the policy contract downloading link is sent to the authentication server, so that the third party server can download the policy contract based on the policy contract downloading link, the information security defect caused by direct interaction between the third party server and the policy server can be avoided by acquiring the policy contract in this way, and the client can acquire the policy contract of the client in the third party server, thereby improving the trust degree between the client and the third party institution.
Fig. 8 schematically shows a flowchart of a method of acquiring an insurance contract applied to an insurance policy server according to another embodiment of the invention.
As shown in fig. 8, the method for acquiring an insurance contract applied to the policy server further includes step S810 and step S820.
In step S810, when the authentication server successfully authenticates the token in the policy download code request, the policy number in the policy download code request sent by the authentication server is received.
In step S820, based on whether the policy number is valid or not, the policy corresponding to the policy number is queried, and a query result is sent to the verification server, where the query result is valid for the policy corresponding to the policy number.
In the method, when the verification server successfully verifies the token in the policy download code request, the policy number in the policy download code request sent by the verification server is received, whether the policy corresponding to the policy number is valid or not is queried based on the policy number, a query result is sent to the verification server, and the query result is that the policy corresponding to the policy number is valid, so that the subsequent acquisition of a policy contract based on the valid policy number is facilitated.
In one embodiment of the present invention, the policy download code request includes a policy number and/or the token. The policy number may be a policy number of a policy contract that the user wants to acquire. The token may be a token generated when the authentication server successfully authenticates the user account and the user password, and in this example, the user identity may be authenticated according to the token to verify whether the user is the same person as the user in the login request, so that the network security problem existing in the related technology may be further avoided, and thus the security of the policy contract in the policy server is ensured.
In one embodiment of the present invention, when the authentication server successfully authenticates the user's identity, the policy server receives the policy number, queries a policy contract corresponding to the policy number according to the policy number, and if the query result is that the policy of the policy number is valid, in this case, sends the query result to the authentication server, so that the authentication server determines that the query result is that the policy of the policy number is valid, and sends the encrypted string of the policy number to a third party server.
Fig. 9 schematically shows a schematic diagram of interactions between a verification server, a third party server and a policy server according to an embodiment of the invention.
As shown in fig. 9, the process of acquiring the policy contract through the interaction between the authentication server, the third party server, and the policy server includes the steps of:
s1: in the user insurance process, the third party server receives the user insurance policy information and then sends the user insurance policy information to the verification server;
s2: the verification server provides a data transmission channel for the third party server to perform data interaction, for example, the verification server receives policy information input by a user during insurance application and sent by the third party server, and then the policy information is sent to the policy server.
S3: the policy server can store policy information entered by the third party server when the user makes a policy, and after the policy server receives the policy information, the policy information entered by the third party server sent by the verification server can be processed, for example, the policy information entered by the third party server can be marked, so that misoperation can be avoided, and the policy information can be sent to the user in a mailbox or mailing mode. The policy server may specify a policy contract based on the policy information and store the policy contract in a PDF format in an image system in the policy server.
S4: after the third party mechanism and the user complete the application process, both the third party mechanism and the user can initiate a request to the authentication server to obtain the policy contract. For example, both the third party authority and the user may initiate a login request to the authentication server.
S5: the authentication server receives a login request sent by the third party server, and authenticates the user identity (the user identity can be the identity of the third party mechanism or the identity of the applicant) according to the login request, and when the user identity authentication is successful, a token for successful authentication is sent to the third party server.
S6: after the third party server receives the token, the policy download code request is continuously sent to the verification server.
S7: the verification server receives a policy download code request sent by the third party server, wherein the policy download code request comprises a policy number and/or the token, the token is verified, and if verification is successful, the policy number is sent to the policy server.
S8: when the verification server successfully verifies the token in the policy download code request, the policy server receives the policy number in the policy download code request sent by the verification server, queries whether the policy corresponding to the policy number is valid or not in the image system based on the policy number, and sends a query result to the verification server, wherein the query result is that the policy corresponding to the policy number is valid.
S9: and the verification server receives the query result of the policy server based on the policy number, and if the query result is that the policy of the policy number is valid, the verification server sends the encrypted character string of the policy number to the third party server.
S10: and after the third party server receives the encrypted character string of the policy number sent by the verification server, continuing to send a policy contract downloading request to the verification server, wherein the policy contract downloading request comprises a token returned by the verification server when logging in and the encrypted character string returned by the verification server when the policy is valid.
S11: and the verification server receives the policy contract downloading request sent by the third party server, verifies the token, decrypts the encrypted character string to obtain the policy number when the user authentication is successful, and sends the policy number to the policy server.
S12: the policy server receives the policy number, acquires a policy contract of the policy number from the image system based on the policy number, generates a policy contract download link or binary stream data of the policy contract based on the policy contract, and sends the policy contract download link or binary stream data of the policy contract to the verification server.
S13: the verification server receives the policy contract download link or the binary stream data of the policy contract sent by the policy server, and then sends the policy contract download link or the binary stream data of the policy contract to the third party server.
S14: the third party server receives the policy contract download link or the binary stream data of the policy contract sent by the verification server, so that the user can acquire the policy contract on the third party server without mailing by the insurance company.
The method for acquiring the insurance contract can avoid the information security defect caused by direct interaction between the third party server and the policy server, and further realize that the client can acquire the insurance contract of the policy in the third party server, thereby improving the trust degree between the client and the third party institution.
Fig. 10 schematically shows a block diagram of an apparatus for acquiring an insurance contract applied to a verification server according to an embodiment of the present invention.
As shown in fig. 10, the apparatus 200 for acquiring an insurance contract applied to a verification server includes a first receiving module 201, a first verifying module 202, a second receiving module 203, and a first transmitting module 204.
Specifically, the first receiving module 201 is configured to receive a policy contract downloading request sent by the third party server.
And the first verification module 202 is configured to verify the identity of the user according to the policy contract downloading request, and send the policy contract downloading request to a policy server when the user identity is successfully verified.
And the second receiving module 203 is configured to receive a policy contract download link sent by the policy server, where the policy contract download link is generated by the policy server based on an insurance contract determined by the policy contract download request.
And a first sending module 204, configured to send the policy contract downloading link to the third party server.
The apparatus 200 for acquiring an insurance contract applied to the authentication server may transmit the policy contract download link to the third party server.
In the method, the verification server can receive a policy contract downloading request sent by the third party server, verify the identity of the user according to the policy contract downloading request, send the policy contract downloading request to the policy server when the user identity verification is successful, then receive a policy contract downloading link sent by the policy server, wherein the policy contract downloading link is generated by the policy server based on an insurance contract determined by the policy contract downloading request, and finally send the policy contract downloading link to the third party server.
The apparatus 200 for acquiring an insurance contract applied to a verification server according to an embodiment of the present invention may be used to implement the method for acquiring an insurance contract applied to a verification server described in the embodiment of fig. 2.
Fig. 11 schematically shows a block diagram of an apparatus for acquiring an insurance contract applied to a verification server according to another embodiment of the present invention.
As shown in fig. 11, the apparatus 200 for acquiring an insurance contract applied to the verification server further includes a second receiving module 205 and a second verifying module 206.
Specifically, the second receiving module 205 is configured to receive a login request sent by the third party server, where the login request includes a user account, a user password, and/or a preset key.
And the second verification module 206 is configured to verify the identity of the user according to the user account, the user password, and/or the preset key, and send a token that the user authentication is successful to the third party server when the user authentication is successful.
The device 200 for acquiring insurance contract applied to the verification server can verify the user identity according to the user account number, the user password and/or the preset key, and when the user identity is verified successfully, a token for verifying the user identity is sent to the third party server, so that the network security problem existing in the related technology can be avoided to a certain extent, and the token returned to the third party server can be used for subsequently verifying the identification of the user identity, and further the network security problem existing in the related technology is avoided.
The apparatus 200 for acquiring an insurance contract applied to a verification server according to an embodiment of the present invention may be used to implement the method for acquiring an insurance contract applied to a verification server described in the embodiment of fig. 3.
Fig. 12 schematically shows a block diagram of an apparatus for acquiring an insurance contract applied to a verification server according to another embodiment of the present invention.
As shown in fig. 12, the apparatus 200 for acquiring an insurance contract applied to the verification server further includes a third receiving module 207, a third verifying module 208, a fourth receiving module 209, and a second transmitting module 210.
Specifically, the third receiving module 207 is configured to receive a policy download code request sent by the third party server, where the policy download code request includes a policy number and/or the token.
And a third verification module 208, configured to verify the token, and if the verification is successful, send the policy number to the policy server.
And a fourth receiving module 209, configured to receive a query result of the policy server based on the policy number, and if the query result is that the policy of the policy number is valid.
And the second sending module 210 is configured to send the encrypted string of the policy number to the third party server.
The processing device 200 applied to the verification server for acquiring the insurance contract can receive the policy download code request sent by the third party server, wherein the policy download code request comprises the policy number and/or the token, and verifies the token, so that the network security problem existing in the related technology can be further avoided, the security of the policy contract in the policy server is ensured, if the verification is successful, the policy number is sent to the policy server, the query result of the policy server based on the policy number is received, if the query result is that the policy of the policy number is valid, the encrypted character string of the policy number is sent to the third party server, the security of the policy number can be ensured, the occurrence of nausea and serial change of people is avoided, and the security in data transmission is further improved.
The apparatus 200 for acquiring an insurance contract applied to a verification server according to an embodiment of the present invention may be used to implement the method for acquiring an insurance contract applied to a verification server described in the embodiment of fig. 4.
In some embodiments of the invention, the policy contract download request includes the token and the encrypted string; the first verification module is configured to: and verifying the token, decrypting the encrypted character string if the verification is successful, and sending the decrypted policy number to the policy server.
Since each module of the apparatus for acquiring an insurance contract applied to the verification server according to the exemplary embodiment of the present invention may be used to implement the steps of the exemplary embodiments of the method for acquiring an insurance contract applied to the verification server described in the above-described 2 to 4, for details not disclosed in the apparatus embodiments of the present invention, please refer to the embodiments of the method for acquiring an insurance contract described in the above-described embodiments of the present invention.
It is understood that the first receiving module 201, the first verifying module 202, the second receiving module 203, the first transmitting module 204, the second receiving module 205, the second verifying module 206, the third receiving module 207, the third verifying module 208, the fourth receiving module 209, and the second transmitting module 210 may be combined in one module to be implemented, or any one of the modules may be split into a plurality of modules. Alternatively, at least some of the functionality of one or more of the modules may be combined with at least some of the functionality of other modules and implemented in one module. According to embodiments of the invention, at least one of the first receiving module 201, the first verifying module 202, the second receiving module 203, the first transmitting module 204, the second receiving module 205, the second verifying module 206, the third receiving module 207, the third verifying module 208, the fourth receiving module 209, and the second transmitting module 210 may be implemented at least partially as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or any other reasonable way of integrating or packaging the circuitry, or any other suitable combination of three implementations of software, hardware and firmware. Alternatively, at least one of the first receiving module 201, the first verifying module 202, the second receiving module 203, the first transmitting module 204, the second receiving module 205, the second verifying module 206, the third receiving module 207, the third verifying module 208, the fourth receiving module 209, and the second transmitting module 210 may be at least partially implemented as a computer program module, which may perform the functions of the respective modules when the program is run by a computer.
Fig. 13 schematically shows a block diagram of an apparatus for acquiring an insurance contract applied to a third party server according to an embodiment of the present invention.
As shown in fig. 13, an apparatus 300 for acquiring an insurance contract applied to a third party server includes a first transmitting module 301, a first receiving module 302, a second transmitting module 303, and a second receiving module 304.
Specifically, the first sending module 301 is configured to send a login request to the authentication server, where the login request includes a user account, a user password, and/or a preset key, so that the authentication server authenticates a user identity according to the user account, the user password, and/or the preset key.
A first receiving module 302, configured to receive a token of successful authentication sent by the authentication server when the authentication server is successful in authenticating the user according to the user account, the user password, and/or the preset key
And the first sending module 303 is configured to send a policy contract downloading request to the verification server, so that the verification server verifies the identity of the user according to the policy contract downloading request.
And the first receiving module 304 receives the policy contract downloading link sent by the verification server when the user authentication is successful.
In the device 300 for acquiring the insurance contract applied to the third party server, the third party server may send a login request to the verification server, where the login request includes a user account number, a user password, and/or a preset secret key, so that the verification server verifies the user identity according to the user account number, the user password, and/or the preset secret key, and when the user identity verification is successful, a token sent by the verification server and used for verification is received, so that a network security problem existing in the related art can be avoided to a certain extent, and the received token can be used for subsequently verifying the identity of the user, and further, the network security problem existing in the related art is avoided. For example, the third party server may send a policy contract downloading request to the verification server, so that the verification server verifies the identity of the user according to the policy contract downloading request, and when the user identity verification is successful, receives a policy contract downloading link sent by the verification server, so as to obtain the policy contract, avoid the information security defect caused by direct interaction between the third party server and the policy server, and further realize that the client may obtain the policy contract of the client in the third party server, thereby improving the trust degree between the client and the third party mechanism.
The apparatus 300 for acquiring an insurance contract applied to a third party server according to an embodiment of the present invention may be used to implement the method for acquiring an insurance contract applied to a third party server described in the embodiment of fig. 5.
Fig. 14 schematically shows a block diagram of an apparatus for acquiring an insurance contract applied to a third party server according to another embodiment of the present invention.
As shown in fig. 14, the apparatus 300 for acquiring an insurance contract applied to the third party server further includes a third transmitting module 305 and a third receiving module 306.
Specifically, the third sending module 305 is configured to send a policy download code request to the verification server, where the policy download code request includes a policy number and/or the token, so that the verification server verifies the token, and if verification is successful, sends the policy number to the policy server.
And a third receiving module 306, configured to receive the encrypted string of the policy number sent by the verification server when the policy server is valid based on the query result of the policy number.
The device 300 for acquiring the insurance contract applied to the third party server can send the policy download code request to the verification server, wherein the policy download code request comprises the policy number and/or the token, so that the verification server verifies the token, and thus the network security problem existing in the related technology can be further avoided, and the security of the policy contract in the policy server is ensured. If verification is successful, the policy number is sent to the policy server, and when the policy server is effective in the policy of the policy number based on the query result of the policy number, the encrypted character string of the policy number sent by the verification server is received, so that the security of the policy number can be ensured, the occurrence of nausea and change of people is avoided, and the security in data transmission is further improved.
The apparatus 300 for acquiring an insurance contract applied to a third party server according to an embodiment of the present invention may be used to implement the method for acquiring an insurance contract applied to a third party server described in the embodiment of fig. 6.
Since each module of the apparatus for acquiring an insurance contract applied to a third party server according to the exemplary embodiment of the present invention may be used to implement the steps of the exemplary embodiments of the method for acquiring an insurance contract applied to a third party server described in the above-mentioned fig. 5 to 6, for details not disclosed in the apparatus embodiments of the present invention, please refer to the embodiments of the method for acquiring an insurance contract described in the above-mentioned embodiments of the present invention.
It is understood that the first transmitting module 301, the first receiving module 302, the second transmitting module 303, the second receiving module 304, the third transmitting module 305, and the third receiving module 306 may be combined in one module to be implemented, or any one of the modules may be split into a plurality of modules. Alternatively, at least some of the functionality of one or more of the modules may be combined with at least some of the functionality of other modules and implemented in one module. According to embodiments of the present invention, at least one of the first transmitting module 301, the first receiving module 302, the second transmitting module 303, the second receiving module 304, the third transmitting module 305, and the third receiving module 306 may be implemented at least in part as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or any other reasonable way of integrating or packaging a circuit, or in any other suitable combination of three implementations of software, hardware, and firmware. Alternatively, at least one of the first transmitting module 301, the first receiving module 302, the second transmitting module 303, the second receiving module 304, the third transmitting module 305, and the third receiving module 306 may be at least partially implemented as computer program modules, which when executed by a computer, may perform the functions of the respective modules.
Fig. 15 schematically shows a block diagram of an apparatus for acquiring an insurance contract applied to an insurance policy server according to an embodiment of the present invention.
As shown in fig. 15, the apparatus 400 for acquiring an insurance contract applied to a policy server includes a first receiving module 401, a determining module 402, a generating module 403, and a first transmitting module 404.
Specifically, the first receiving module 401 receives the policy contract downloading request sent by the verification server when the user identity in the policy contract downloading request is verified successfully by the verification server.
The determining module 402 determines a policy contract of the policy contract download request based on the policy contract download request.
The generating module 403 generates a policy contract download link based on the policy contract.
The first sending module 404 sends the policy contract download link to the verification server, so that a third party server can download a policy contract based on the policy contract download link.
In the apparatus 400 for acquiring the insurance contract applied to the policy server, when the authentication server successfully authenticates the user identity in the policy contract downloading request, the policy contract downloading request sent by the authentication server is received, the policy contract of the policy contract downloading request is determined based on the policy contract downloading request, the policy contract downloading link is generated based on the policy contract, and the policy contract downloading link is sent to the authentication server, so that the third party server can download the policy contract based on the policy contract downloading link, the information security defect caused by direct interaction between the third party server and the policy server can be avoided by acquiring the insurance contract in this way, and the client can acquire the policy contract of the policy in the third party server, thereby improving the trust degree between the client and the third party institution.
The apparatus 400 for acquiring an insurance contract applied to an policy server according to an embodiment of the present invention may be used to implement the method for acquiring an insurance contract applied to an policy server described in the embodiment of fig. 7.
Fig. 16 schematically shows a block diagram of an apparatus for acquiring an insurance contract applied to an insurance policy server according to another embodiment of the present invention.
As shown in fig. 16, the apparatus 400 for acquiring an insurance contract applied to the policy server includes a second receiving module 405 and a second transmitting module 406.
Specifically, the second receiving module 405 receives the policy number in the policy download code request sent by the verification server when the verification server successfully verifies the token in the policy download code request.
The second sending module 406 queries whether the policy corresponding to the policy number is valid or not based on the policy number, and sends a query result to the verification server, where the query result is that the policy corresponding to the policy number is valid.
In the apparatus 400 for acquiring insurance contracts applied to a policy server, when a verification server successfully verifies a token in a policy download code request, a policy number in the policy download code request sent by the verification server is received, whether a policy corresponding to the policy number is valid or not is queried based on the policy number, a query result is sent to the verification server, and the query result is that the policy corresponding to the policy number is valid, so that the policy contract can be acquired based on the valid policy number conveniently.
The apparatus 400 for acquiring an insurance contract applied to an policy server according to an embodiment of the present invention may be used to implement the method for acquiring an insurance contract applied to an policy server described in the embodiment of fig. 8.
Since each module of the apparatus for acquiring an insurance contract applied to the policy server according to the exemplary embodiment of the present invention may be used to implement the steps of the exemplary embodiments of the method for acquiring an insurance contract described in the above-mentioned fig. 7 to 8, for details not disclosed in the apparatus embodiments of the present invention, please refer to the embodiments of the method for acquiring an insurance contract described in the above-mentioned embodiments of the present invention.
It is understood that the first receiving module 401, the determining module 402, the generating module 403, the first transmitting module 404, the second receiving module 405, and the second transmitting module 406 may be combined in one module to be implemented, or any one of the modules may be split into a plurality of modules. Alternatively, at least some of the functionality of one or more of the modules may be combined with at least some of the functionality of other modules and implemented in one module. According to embodiments of the invention, at least one of the first receiving module 401, the determining module 402, the generating module 403, the first transmitting module 404, the second receiving module 405, and the second transmitting module 406 may be implemented at least partially as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or in any other reasonable manner of integrating or packaging the circuitry, etc. hardware or firmware, or in any suitable combination of three implementations of software, hardware, and firmware. Alternatively, at least one of the first receiving module 401, the determining module 402, the generating module 403, the first transmitting module 404, the second receiving module 405, and the second transmitting module 406 may be at least partially implemented as computer program modules, which may perform the functions of the respective modules when the program is run by a computer.
Referring now to FIG. 17, there is illustrated a schematic diagram of a computer system 500 suitable for use in implementing an electronic device of an embodiment of the present invention. The computer system 500 of the electronic device shown in fig. 17 is only an example and should not be construed as limiting the functionality and scope of use of embodiments of the invention. The electronic device in this embodiment may be the authentication server, the third party server, or the policy server in the embodiments of fig. 2 to 8 described above.
As shown in fig. 17, the computer system 500 includes a Central Processing Unit (CPU) 501, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM503, various programs and data required for the system operation are also stored. The CPU 501, ROM 502, and RAM503 are connected to each other through a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input section 506 including a keyboard, a mouse, and the like; an output portion 507 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker, and the like; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The drive 510 is also connected to the I/O interface 505 as needed. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as needed so that a computer program read therefrom is mounted into the storage section 508 as needed.
In particular, according to embodiments of the present invention, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present invention include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 509, and/or installed from the removable media 511. The above-described functions defined in the system of the present application are performed when the computer program is executed by a Central Processing Unit (CPU) 501.
The computer readable medium shown in the present invention may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present invention may be implemented by software, or may be implemented by hardware, and the described units may also be provided in a processor. Wherein the names of the units do not constitute a limitation of the units themselves in some cases.
As another aspect, the present application also provides a computer-readable medium that may be contained in the electronic device described in the above embodiment; or may exist alone without being incorporated into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to implement the method of acquiring insurance contracts described in the embodiments of fig. 2-9.
For example, the electronic device may implement the method as shown in fig. 2: in step S210, a policy contract download request sent by the third party server is received. In step S220, the user identity is verified according to the policy contract download request, and when the user identity verification is successful, the policy contract download request is sent to a policy server. In step S230, a policy contract download link sent by the policy server is received, where the policy contract download link is generated by the policy server based on an insurance contract determined by the policy contract download request. In step S240, the policy contract download link is sent to the third party server.
It should be noted that although in the above detailed description several modules or units of a device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functions of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the invention. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, a touch terminal, or a network device, etc.) to perform the method according to the embodiments of the present invention.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It is to be understood that the invention is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (13)

1. A method for acquiring an insurance contract, applied to a verification server, the method comprising:
receiving a policy contract downloading request sent by a third-party server;
verifying the user identity according to the policy contract downloading request, and sending the policy contract downloading request to a policy server when the user identity is successfully verified;
receiving a policy contract downloading link sent by the policy server, wherein the policy contract downloading link is generated by the policy server based on an insurance contract determined by the policy contract downloading request;
Transmitting the policy contract download link to the third party server;
before receiving the policy contract downloading request sent by the third-party server, the method further comprises the following steps: the authentication server sets a unified token for each third party institution or sets a unique token for each user;
the policy contract download request includes a token;
verifying the identity of the user according to the policy contract downloading request comprises the following steps: verifying whether the token in the policy contract downloading request is a token sent by a verification server or not so as to verify the identity of a user or the identity of a third party mechanism;
wherein the third party server is a server of a third party authority that cooperates with the insurance company.
2. The method of claim 1, wherein prior to receiving the policy contract download request sent by the third party server, the method further comprises:
receiving a login request sent by a third-party server, wherein the login request comprises a user account number, a user password and/or a preset secret key;
and verifying the user identity according to the user account number, the user password and/or the preset secret key, and sending a token of successful verification to the third party server when the user identity verification is successful.
3. The method according to claim 2, characterized in that the method further comprises:
receiving a policy download code request sent by the third party server, wherein the policy download code request comprises a policy number;
verifying the token, and if the verification is successful, sending the policy number to the policy server;
receiving a query result of the policy server based on the policy number, and if the query result is that the policy of the policy number is valid;
and sending the encrypted character string of the policy number to the third party server.
4. A method according to claim 3, wherein the policy contract download request includes the token and the encrypted string;
verifying the user identity according to the policy contract downloading request, and when the user identity verification is successful, sending the policy contract downloading request to a policy server comprises:
and verifying the token, decrypting the encrypted character string if the verification is successful, and sending the decrypted policy number to the policy server.
5. A method for acquiring an insurance contract, applied to a third party server, the method comprising:
a login request is sent to an authentication server, wherein the login request comprises a user account number, a user password and/or a preset secret key, so that the authentication server authenticates a user identity according to the user account number, the user password and/or the preset secret key;
When the authentication server successfully authenticates the user identity according to the user account number, the user password and/or the preset secret key, a token which is sent by the authentication server and is successfully authenticated is received;
transmitting a policy contract downloading request to a verification server, so that the verification server verifies whether a token in the policy contract downloading request is a token transmitted by the verification server to verify the identity of a user or the identity of a third party institution, wherein the third party server is a server of the third party institution which cooperates with an insurance company;
when the authentication server successfully authenticates the user identity according to the token in the policy contract downloading request, receiving a policy contract downloading link sent by the authentication server;
before receiving the policy contract downloading request sent by the third-party server, the method further comprises the following steps: the authentication server sets a unified token for each third party authority or a unique token for each user.
6. The method of claim 5, further comprising:
transmitting a policy download code request to the verification server, wherein the policy download code request comprises a policy number and/or the token, so that the verification server verifies the token, and if verification is successful, the policy number is transmitted to the policy server;
And when the policy server is effective in the policy of the policy number based on the query result of the policy number, receiving the encrypted character string of the policy number sent by the verification server.
7. A method for acquiring insurance contracts, applied to an insurance policy server, the method comprising:
when the authentication server successfully authenticates the user identity in the policy contract downloading request, receiving the policy contract downloading request sent by the authentication server;
determining a policy contract of the policy contract downloading request based on the policy contract downloading request;
generating a policy contract downloading link based on the policy contract;
transmitting the policy contract download link to the verification server to enable a third party server to download a policy contract based on the policy contract download link;
wherein, before the authentication server successfully authenticates the user identity in the policy contract download request, the method further comprises:
the authentication server sets a unified token for each third party institution or sets a unique token for each user;
the verification server verifies whether the token in the policy contract downloading request is the token sent by the verification server so as to verify the identity of the user or the identity of a third party mechanism; the third party server is a server of a third party authority that cooperates with the insurance company.
8. The method of claim 7, wherein the method further comprises:
when the verification server successfully verifies the token in the policy download code request, receiving a policy number in the policy download code request sent by the verification server;
and inquiring whether the policy corresponding to the policy number is valid or not based on the policy number, and sending an inquiry result to the verification server, wherein the inquiry result is that the policy corresponding to the policy number is valid.
9. An apparatus for acquiring an insurance contract, applied to a verification server, the apparatus comprising:
the first receiving module is used for receiving a policy contract downloading request sent by the third party server;
the first verification module is used for verifying the identity of the user according to the policy contract downloading request, and sending the policy contract downloading request to a policy server when the user identity is successfully verified;
the second receiving module is used for receiving a policy contract downloading link sent by the policy server, wherein the policy contract downloading link is generated by the policy server based on an insurance contract determined by the policy contract downloading request;
the first sending module is used for sending the policy contract downloading link to the third party server;
The authentication server sets a unified token for each third party mechanism or sets a unique token for each user;
the policy contract download request includes a token;
the first verification module is further configured to verify whether the token in the policy contract downloading request is a token sent by the verification server, so as to verify the identity of the user or the identity of the third party mechanism;
wherein the third party server is a server of a third party authority that cooperates with the insurance company.
10. An apparatus for acquiring an insurance contract, applied to a third party server, the apparatus comprising:
the first sending module is used for sending a login request to the verification server, wherein the login request comprises a user account, a user password and/or a preset secret key, so that the verification server verifies the user identity according to the user account, the user password and/or the preset secret key;
the first receiving module is used for receiving a token which is sent by the verification server and is successfully verified when the verification server successfully verifies the user identity according to the user account number, the user password and/or the preset secret key;
the second sending module is used for sending a policy contract downloading request to the verification server so that the verification server verifies the identity of a user or the identity of a third party institution according to whether a token in the policy contract downloading request is the token sent by the verification server or not, and the third party server is a server of the third party institution which cooperates with an insurance company;
The second receiving module is used for receiving the policy contract downloading link sent by the verification server when the verification server successfully verifies the user identity according to the token in the policy contract downloading request;
wherein the authentication server sets a unified token for each third party authority or sets a unique token for each user.
11. An apparatus for acquiring insurance contracts, applied to an insurance policy server, the apparatus comprising:
the first receiving module is used for receiving the policy contract downloading request sent by the verification server when the user identity in the policy contract downloading request is successfully verified by the verification server;
the determining module is used for determining the policy contract of the policy contract downloading request based on the policy contract downloading request;
the generation module generates a policy contract downloading link based on the policy contract;
the first sending module sends the policy contract downloading link to the verification server so that a third party server can download a policy contract based on the policy contract downloading link;
the authentication server sets a unified token for each third party mechanism or sets a unique token for each user;
The verification server verifies whether the token in the policy contract downloading request is the token sent by the verification server so as to verify the identity of the user or the identity of a third party mechanism; the third party server is a server of a third party authority that cooperates with the insurance company.
12. An electronic device, comprising:
one or more processors; and
storage means for storing one or more programs which when executed by the one or more processors cause the one or more processors to perform the method of any of claims 1-4 or the method of claims 5-6 or the method of claims 7-8.
13. A computer readable medium on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method according to any one of claims 1-4 or the method according to claims 5-6 or the method according to claims 7-8.
CN201911213133.6A 2019-12-02 2019-12-02 Method, device, medium and electronic equipment for acquiring insurance contract Active CN111179099B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911213133.6A CN111179099B (en) 2019-12-02 2019-12-02 Method, device, medium and electronic equipment for acquiring insurance contract

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911213133.6A CN111179099B (en) 2019-12-02 2019-12-02 Method, device, medium and electronic equipment for acquiring insurance contract

Publications (2)

Publication Number Publication Date
CN111179099A CN111179099A (en) 2020-05-19
CN111179099B true CN111179099B (en) 2023-06-27

Family

ID=70651954

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911213133.6A Active CN111179099B (en) 2019-12-02 2019-12-02 Method, device, medium and electronic equipment for acquiring insurance contract

Country Status (1)

Country Link
CN (1) CN111179099B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685086A (en) * 2011-04-14 2012-09-19 天脉聚源(北京)传媒科技有限公司 File access method and system
WO2015079004A1 (en) * 2013-11-29 2015-06-04 Koninklijke Philips N.V. Method and apparatus for supporting verification of a contract
CN107679060A (en) * 2017-07-25 2018-02-09 平安科技(深圳)有限公司 Method for inquiring status, device, user terminal and the storage medium of electronic insurance policy
CN110362541A (en) * 2019-05-27 2019-10-22 平安银行股份有限公司 Document generating method, device, computer installation and storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160314550A1 (en) * 2015-04-23 2016-10-27 Adobe Systems Incorporated Limited user contract content sharing
US20180268488A1 (en) * 2017-03-16 2018-09-20 James Herbert Stevenot Virtual database for various insurance plans
CN108416683B (en) * 2018-02-27 2021-06-25 平安科技(深圳)有限公司 Policy confirmation method, device, equipment and storage medium for mobile terminal
CN109446840A (en) * 2018-10-19 2019-03-08 平安科技(深圳)有限公司 Check method, apparatus, electronic equipment and the storage medium of policy information
CN110083782B (en) * 2019-03-21 2024-05-28 中国平安财产保险股份有限公司 Electronic policy checking method and device, computer equipment and storage medium
CN110351269B (en) * 2019-07-05 2021-09-24 思必驰科技股份有限公司 Method for logging in open platform through third-party server
CN111160500B (en) * 2019-12-23 2023-10-20 望海康信(北京)科技股份公司 Method and device for generating two-dimension code of contract, and method and device for acquiring contract

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685086A (en) * 2011-04-14 2012-09-19 天脉聚源(北京)传媒科技有限公司 File access method and system
WO2015079004A1 (en) * 2013-11-29 2015-06-04 Koninklijke Philips N.V. Method and apparatus for supporting verification of a contract
CN107679060A (en) * 2017-07-25 2018-02-09 平安科技(深圳)有限公司 Method for inquiring status, device, user terminal and the storage medium of electronic insurance policy
CN110362541A (en) * 2019-05-27 2019-10-22 平安银行股份有限公司 Document generating method, device, computer installation and storage medium

Also Published As

Publication number Publication date
CN111179099A (en) 2020-05-19

Similar Documents

Publication Publication Date Title
EP3847565B1 (en) Methods and devices for managing user identity authentication data
CN108965230B (en) Secure communication method, system and terminal equipment
US20210367795A1 (en) Identity-Linked Authentication Through A User Certificate System
US11134071B2 (en) Data exchange during multi factor authentication
US8001588B2 (en) Secure single sign-on authentication between WSRP consumers and producers
CN110611657A (en) File stream processing method, device and system based on block chain
CN112039826B (en) Login method and device applied to applet end, electronic equipment and readable medium
CN108923925B (en) Data storage method and device applied to block chain
CN107920060B (en) Data access method and device based on account
CN111709752A (en) Virtual resource processing method and device, computer readable medium and electronic equipment
CN111600900A (en) Single sign-on method, server and system based on block chain
CN114584381A (en) Security authentication method and device based on gateway, electronic equipment and storage medium
CN112261002B (en) Data interface docking method and device
CN110602075A (en) File stream processing method, device and system for encryption access control
CN111371796A (en) Data transmission system, data transmission method, medium, and electronic device
CN111179099B (en) Method, device, medium and electronic equipment for acquiring insurance contract
KR102053993B1 (en) Method for Authenticating by using Certificate
CN115297137A (en) Shared bicycle using method, electronic equipment and storage medium
US11218329B2 (en) Certificate generation with fallback certificates
CN110619236A (en) File authorization access method, device and system based on file credential information
CN113381982B (en) Registration method, registration device, electronic equipment and storage medium
CN110602074B (en) Service identity using method, device and system based on master-slave association
CN114697137B (en) Application program login method, device, equipment and storage medium
CN114826616B (en) Data processing method, device, electronic equipment and medium
CN115514584B (en) Server and credible security authentication method of financial related server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant