CN112132694B - Method, device, equipment and storage medium for confirming and checking policy and security case - Google Patents

Method, device, equipment and storage medium for confirming and checking policy and security case Download PDF

Info

Publication number
CN112132694B
CN112132694B CN202011039653.2A CN202011039653A CN112132694B CN 112132694 B CN112132694 B CN 112132694B CN 202011039653 A CN202011039653 A CN 202011039653A CN 112132694 B CN112132694 B CN 112132694B
Authority
CN
China
Prior art keywords
security
data
policy
trial calculation
confirmed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011039653.2A
Other languages
Chinese (zh)
Other versions
CN112132694A (en
Inventor
曹达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Pension Insurance Corp
Original Assignee
Ping An Pension Insurance Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Pension Insurance Corp filed Critical Ping An Pension Insurance Corp
Priority to CN202011039653.2A priority Critical patent/CN112132694B/en
Publication of CN112132694A publication Critical patent/CN112132694A/en
Application granted granted Critical
Publication of CN112132694B publication Critical patent/CN112132694B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Abstract

The invention provides a method for confirming and checking a security case of a security order, which comprises the steps of executing first trial calculation on security data of the security order to be confirmed according to a security order request instruction to obtain first trial calculation data; performing first verification on the to-be-confirmed policy security data based on the first trial calculation data to obtain first verification conclusion data; when the first check conclusion data is failed in check, the second trial calculation data is called back, and the second trial calculation data is obtained by executing trial calculation after user change operation; and executing a second check on the to-be-confirmed security data based on the second trial calculation data to obtain changed to-be-confirmed security data, and executing security confirmation on the changed to-be-confirmed security data. The invention executes the bidirectional verification in the verification process of the security case, can avoid the operation of executing the security verification in the background caused by not finding out the operation of re-changing after submitting the security verification in time, and improves the working efficiency of the security case verification of the security case.

Description

Method, device, equipment and storage medium for confirming and checking policy and security case
Technical Field
The embodiment of the invention relates to the technical field of big data, in particular to a method, a device, equipment and a storage medium for confirming and checking a policy and a security case.
Background
At present, in the insurance industry, in order to ensure the accuracy of the final amount, the amount calculated by trial calculation and the amount calculated by security confirmation are logically separated to realize collision verification, and if the amounts are not equal, the security confirmation cannot be carried out.
However, in the confirmation operation of the policy security case, after the operation trial calculation is submitted, when the policy security case is submitted to the security confirmation stage, the user may still find that the original related information needs to be modified, and after the user modifies the related information of the policy security case, the condition that the trial calculation amount is inconsistent with the confirmation amount in the security confirmation stage may occur, so that the security confirmation process cannot be carried out, and only rollback or undo can be performed, thereby greatly affecting the working efficiency.
In the actual operation process, when the security confirmation operation is executed by adopting the method, the problem that the security confirmation amount is inconsistent with the trial account amount occurs once every day on average, and the security confirmation method greatly influences the working efficiency of security case confirmation and influences the experience of users to a great extent.
Disclosure of Invention
In view of this, the embodiments of the present invention provide a method, an apparatus, a device, and a storage medium for validating and checking a policy and security case, which are used to solve the problem that when the policy and security case is submitted to the security validation stage, after the user modifies the original related information, the user cannot validate the security and can only rollback or remove the security case to validate the policy and security case, and the working efficiency is low.
The embodiment of the invention solves the technical problems through the following technical scheme:
a method for confirming and checking a policy and a security case comprises the following steps:
receiving a security request instruction sent by a client, wherein the security request instruction carries security data of a security policy to be confirmed;
executing first trial calculation on the to-be-confirmed policy security data according to the policy security request instruction so as to obtain first trial calculation data;
performing first verification on the to-be-confirmed policy security data based on the first trial calculation data to obtain first verification conclusion data;
when the first check conclusion data is failed in check, second trial calculation data is called back, wherein the second trial calculation data is obtained by executing trial calculation after user change operation;
and executing a second check on the to-be-confirmed policy security data based on the second trial calculation data to obtain changed to-be-confirmed policy security data, and executing security confirmation on the changed to-be-confirmed policy security data.
Further, the executing a first trial calculation on the to-be-confirmed policy security data according to the policy security request instruction to obtain first trial calculation data, and further includes:
acquiring the security type of the security policy from the security data of the security policy to be confirmed;
determining a target trial calculation rule based on the policy security type;
and executing first trial calculation on the to-be-confirmed policy security data based on the target trial calculation rule to obtain first trial calculation data.
Further, the performing a first check on the policy to be confirmed and the security data based on the first trial calculation data to obtain first check conclusion data includes:
acquiring a first trial calculation data submitting time of the to-be-confirmed policy security data;
traversing the trial calculation data associated with the to-be-confirmed policy security data to determine the latest submission time of the trial calculation data;
and when the latest submitting time of the trial calculation data is later than the submitting time of the first trial calculation data, generating first check conclusion data, wherein the first check conclusion data is failed in check.
Further, after performing the first verification on the policy to be confirmed and the security data based on the first calculation data to obtain first verification conclusion data, the method further includes:
and acquiring first confidence degrees corresponding to a plurality of indexes of the security data to be confirmed when the first trial calculation is executed.
Further, the executing the second check on the to-be-confirmed policy security data based on the second trial calculation data to obtain the changed to-be-confirmed policy security data, and the executing the security confirmation on the changed to-be-confirmed policy security data includes:
acquiring second confidence coefficients corresponding to a plurality of indexes of the policy security data to be confirmed when the second trial calculation is executed based on the second trial calculation data;
comparing the first confidence degrees and the second confidence degrees corresponding to the indexes to determine the index to be changed;
and replacing the corresponding index in the to-be-confirmed security data by the to-be-changed index to obtain the changed to-be-confirmed security data, and executing security confirmation on the changed to-be-confirmed security data.
Further, when the first check conclusion data is that the check fails, the callback of the second trial calculation data further includes:
generating a bidirectional verification instruction based on the first verification conclusion data;
and calling back second trial calculation data based on the bidirectional verification instruction, and creating a temporary form based on the second trial calculation data.
Further, the executing the security confirmation on the changed security data to be confirmed further includes:
extracting user data from the policy security request instruction;
determining a risk level based on the policy security data to be confirmed and the user data;
generating a policy security confirmation task based on the risk level and the policy security data to be confirmed, and pushing the policy security confirmation to the client;
receiving a policy security confirmation instruction generated by the client based on the policy security confirmation task;
and executing security confirmation on the changed security data to be confirmed based on the security confirmation instruction.
In order to achieve the above object, an embodiment of the present invention further provides a policy and security case verification apparatus, including:
the receiving module is used for receiving a security request instruction sent by the client, wherein the security request instruction carries security data of a security policy to be confirmed;
the trial calculation module is used for executing first trial calculation on the to-be-confirmed policy security data according to the policy security request instruction so as to obtain first trial calculation data;
the first verification module is used for executing first verification on the to-be-confirmed policy security data based on the first trial calculation data to obtain first verification conclusion data;
the callback module is used for callback second trial calculation data when the first check conclusion data is failed in check, wherein the second trial calculation data is obtained by executing trial calculation after user change operation;
and the second checking module is used for executing a second check on the to-be-confirmed security data based on the second trial calculation data so as to obtain changed to-be-confirmed security data, and executing security confirmation on the changed to-be-confirmed security data.
In order to achieve the above object, an embodiment of the present invention further provides an apparatus, where the apparatus includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the steps of the policy and security case verification method described above are implemented when the processor executes the computer program.
To achieve the above object, an embodiment of the present invention also provides a computer-readable storage medium having stored therein a computer program executable by at least one processor to cause the at least one processor to perform the steps of the policy security case validation checking method as described above.
The method, the device, the equipment and the storage medium for confirming and checking the security cases of the security cases judge whether a user changes the security data of the security cases to be confirmed after submitting trial calculation data through first checking of the security data of the security cases to be confirmed; when the first check conclusion data is failed in check, the second trial calculation data is called back, the second check is executed, the two-way check is executed in the check process of confirming the security cases of the policy, the security confirmation can be timely carried out on the changed security data of the policy, the problem that the background operation of executing the security confirmation is caused by the fact that the user is not found out in time to submit the operation of re-changing after the security confirmation is checked is avoided, and the work efficiency of confirming the security cases of the policy is improved.
The invention will now be described in more detail with reference to the drawings and specific examples, which are not intended to limit the invention thereto.
Drawings
FIG. 1 is a flowchart illustrating a method for verifying a policy and security case according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating steps for performing a first trial run in a policy and security case verification method according to a first embodiment of the present invention;
FIG. 3 is a flowchart illustrating steps for performing a first check in a policy and security case verification method according to a first embodiment of the present invention;
FIG. 4 is a flowchart illustrating steps for recalling second trial data in a policy and security case verification method according to a first embodiment of the present invention;
FIG. 5 is a flowchart illustrating steps for performing a second check in the policy and security case verification method according to the first embodiment of the present invention;
FIG. 6 is a flowchart illustrating steps for performing security verification in a policy security case verification method according to a first embodiment of the present invention;
FIG. 7 is a schematic diagram of a program module of a policy and security case verification device according to a second embodiment of the present invention;
fig. 8 is a schematic hardware structure of a device according to a third embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The technical solutions between the embodiments may be combined with each other, but it is necessary to base the implementation on the basis of those skilled in the art that when the combination of technical solutions contradicts or cannot be implemented, it should be considered that the combination of technical solutions does not exist and is not within the scope of protection claimed by the present invention.
Example 1
Referring to fig. 1, a flowchart of steps of a policy and security case verification method according to an embodiment of the invention is shown. It will be appreciated that the flow charts in the method embodiments are not intended to limit the order in which the steps are performed. The following description is exemplary with a computer device as an execution subject, and specifically follows:
as shown in fig. 1, the policy and security case confirmation verification method may include steps S100 to S500, in which:
step S100, a security request instruction sent by a client is received, wherein the security request instruction carries security data of a security policy to be confirmed.
Specifically, the security refers to a precondition service, a core service, a basic service, an additional service, and other non-public services that are developed around the items such as contract change, annuity or expiration payment, etc. according to contract term agreements and customer applications after the insurance contract is established, so as to ensure the accuracy and effectiveness of the insurance contract, and is a service provided by the insurance company for a specific guarantee object. It is understood that, after the insurance contract is established, the insurance company performs insurance payment responsibility of contract agreement through core service (claim settlement and payment); maintaining the accuracy of the insurance contract through basic services (change class, refund class, management service class); the validity of the insurance contract is maintained by the precondition service and the additional service. Wherein, the change service in the basic service refers to: the applicant accords with the specification of the company in the valid period of the contract, applies for change to the same content, agrees with the company and takes effect after annotating the contract; the policy of the customer is enabled to be effective according to the contract, and the policy is changed under the requirement of the customer, so that the customer is served.
The policy security request instruction is used for requesting the computer device to perform security confirmation on the policy security data to be confirmed.
Step S200, executing a first trial calculation on the to-be-confirmed policy security data according to the policy security request instruction to obtain first trial calculation data.
Specifically, the first trial calculation data is first trial calculation amount data after the computer equipment performs trial calculation in response to the application item in the policy security request instruction sent by the client.
In an exemplary embodiment, referring to fig. 2, step S200 may further include:
step S201, the security type of the security is obtained from the security data of the security to be confirmed;
step S202, determining a target trial calculation rule based on the policy security type;
step S203, executing a first trial calculation on the to-be-confirmed policy security data based on the target trial calculation rule, so as to obtain first trial calculation data.
In an exemplary embodiment, before performing the trial calculation, the security type needs to be obtained from the security confirmation request instruction, so that the computer device can quickly identify the security type of the policy requested by the user. Among them, the security types include, but are not limited to, a security service of a subject, a security service of contract contents, a security service of contract form, and the like.
Wherein, the main body of insurance refers to the object participating in insurance business, the main body of insurance includes: insurers (insurers), insured, and also include insurers and beneficiaries; the security services content of the principal includes, but is not limited to: policy migration for insurers, applicant changes (information changes and identity card changes), insured information changes (identity card, gender, age, occupation changes, etc.), beneficiary changes.
The contract content security services are divided into core content security and non-core content security. Core content preservation refers to claims, payouts and the like; the non-core content security refers to precondition services, basic services (change class (modifying personal information) such as security plus or minus, refund class, management service class such as renewal, return, policy mortgage loan, bonus issuing, etc.), and additional services.
The contract type security service refers to security of a policy, such as policy loss reimbursement, insurance contract reimbursement, etc. And step S300, executing first verification on the to-be-confirmed security data based on the first trial calculation data to obtain first verification conclusion data.
In an exemplary embodiment, when the background receives a policy security request instruction sent by the client, the computer device automatically performs a first verification operation on the policy security data to be confirmed. The computer device automatically executing the first verification operation on the to-be-confirmed policy security data may be understood as automatically identifying whether the client has a change operation before performing a subsequent security confirmation operation.
In an exemplary embodiment, referring to fig. 3, step S300 may further include:
step S301, acquiring a first trial calculation data submitting time of the to-be-confirmed policy security data;
step S302, traversing the trial calculation data associated with the to-be-confirmed policy security data to determine the latest submission time of the trial calculation data;
step S303, when the latest submitting time of the trial calculation data is later than the submitting time of the first trial calculation data, generating first check conclusion data, wherein the first check conclusion data is failed in check.
In an exemplary embodiment, after receiving a policy security request instruction sent by a client, a computer device performs a first trial calculation on to-be-confirmed policy security data to obtain first trial calculation data, and then sends the first trial calculation data and the to-be-confirmed policy security data to a background, at this time, the computer device automatically identifies whether a user has a change operation on the client through the background, if the user finds that the original operation information is wrong, the user changes the operation information of the to-be-confirmed policy security data, and then performs a second trial calculation operation according to the changed to-be-confirmed policy security data to obtain second trial calculation data. If the user still finds that the operation information is wrong after the second trial operation, the user can continuously change the operation information of the to-be-confirmed security data, and then execute the latest trial operation according to the to-be-confirmed security data after the latest change so as to obtain the latest trial data.
And the trial calculation data of each trial calculation of the security data of the to-be-confirmed security list is associated with the security data of the to-be-confirmed security list. When the first verification is executed on the security data of the security policy to be confirmed, the trial calculation data associated with the security data of the security policy to be confirmed is traversed, the submitting time corresponding to each trial calculation data is obtained, the first trial calculation data corresponds to the first trial calculation data submitting time, the second trial calculation data corresponds to the second trial calculation data submitting time, and the latest submitting time of the trial calculation data is determined in the similar way. And analyzing the to-be-confirmed security data to obtain the submitting time of the to-be-confirmed security data. If the first trial calculation data submitting time is equal to the latest trial calculation data submitting time, the fact that no change exists is considered, first check conclusion data which are successfully checked are generated, and security confirmation is directly carried out on the security data to be confirmed based on the first check conclusion data. If the first trial calculation data submitting time is later than the first trial calculation data submitting time, generating first check conclusion data with failed check, wherein the first check conclusion data can be understood that operation information change exists.
In an exemplary embodiment, after performing the first verification on the policy security data to be confirmed based on the first trial calculation data to obtain first verification conclusion data, the method further includes: and acquiring first confidence degrees corresponding to a plurality of indexes of the security data to be confirmed when the first trial calculation is executed.
And step S400, when the first check conclusion data is failed in check, second trial calculation data is called back, wherein the second trial calculation data is obtained by executing trial calculation after the user is changed.
In an exemplary embodiment, referring to fig. 4, when the first check conclusion data is a check failure, the step S400 of recalling the second trial calculation data further includes the steps of:
step S401, generating a bidirectional verification instruction based on the first verification conclusion data;
step S402, callback of second trial calculation data is conducted based on the two-way verification instruction, and a temporary form is created based on the second trial calculation data.
In an exemplary embodiment, if the first check conclusion data is that the check fails, it may be understood that there is an operation information change, and the method may generate a bidirectional verification instruction based on the first check conclusion data, and call back second trial calculation data based on the bidirectional verification instruction.
Step S500, executing a second check on the to-be-confirmed security data based on the second trial calculation data to obtain changed to-be-confirmed security data, and executing security confirmation on the changed to-be-confirmed security data.
In an exemplary embodiment, referring to fig. 5, step S500 may further include:
step S501, based on the second trial calculation data, obtaining second confidence degrees corresponding to a plurality of indexes of the policy security data to be confirmed when the second trial calculation is performed;
step S502, comparing the first confidence coefficient and the second confidence coefficient corresponding to the indexes to determine the index to be changed;
step S503, replacing the corresponding index in the to-be-confirmed policy security data with the to-be-changed index to obtain the changed to-be-confirmed policy security data, and executing security confirmation on the changed to-be-confirmed policy security data.
In an exemplary embodiment, the confidence levels for the plurality of indicators may be calculated by comparing the change models. The plurality of indicators (R) includes: age, occupation, date of effectiveness, gender, security level, date of security application, discounts, risk, etc.
Exemplary model parameters of the comparative change model include, but are not limited to: the weight corresponding to the age is W1, the dynamic distribution factor (L) corresponding to the age is 0.5, the weight corresponding to the occupation is W2, the dynamic distribution factor corresponding to the occupation is 0.1, the weight corresponding to the effective date is W3, the dynamic distribution factor corresponding to the effective date is 0.005, the weight corresponding to the gender is W4, the dynamic distribution factor corresponding to the gender is 0.005, the weight corresponding to the guarantee level is W5, the dynamic distribution factor corresponding to the guarantee level is 0.3, the weight corresponding to the security application date is W6, the dynamic distribution factor corresponding to the security application date is 0, the weight corresponding to the discount is W7, the dynamic distribution factor corresponding to the discount is 0, the weight corresponding to the dangerous seed is W8, the dynamic distribution factor corresponding to the dangerous seed is 0, and the like.
The comparison and change model specifically comprises the following steps: k= (H (R (i))+di) MOD m×w; where K represents the confidence level corresponding to the index, H represents a hash function, m represents a hash number, di represents an increment sequence, MOD represents a remainder function, R represents an index, and R (i) represents an ith index. The index mark is an influence factor on the premium, and the confidence coefficient represents the influence degree of each index attribute corresponding to the premium result. And determining the factors influencing the premium through data modeling, then giving out the influence degree of the index attribute on the premium result through a comparison change model, and distributing the comparison scattering along with the influence degree through the comparison change model, so that the time complexity is changed from O (n) to O (log).
In an exemplary embodiment, when the to-be-confirmed policy-preserving data is submitted to the background, a first confidence coefficient K1 corresponding to a plurality of indexes of the to-be-confirmed policy-preserving data at this time may be calculated through a comparison change model, when the first verification result is that the verification fails, a second trial calculation data is recalled, and calculation logic when the second trial calculation data is executed, a temporary form is created, a second confidence coefficient K2 corresponding to a plurality of indexes of the to-be-confirmed policy-preserving data at this time is calculated through a comparison change model, indexes corresponding to K1 not equal to K2 are determined as to-be-changed indexes, and the to-be-confirmed policy-preserving data is replaced based on the to-be-changed indexes, so as to obtain the changed to-be-confirmed policy-preserving data. In an exemplary embodiment, referring to fig. 6, the method further includes the specific step of performing security verification on the modified policy to be verified security data:
step S601, extracting user data from the policy security request instruction;
step S602, determining a risk level based on the to-be-confirmed policy security data and user data;
step S603, generating a policy security confirmation task based on the risk level and the policy security data to be confirmed, and pushing the policy security confirmation to the client;
step S604, receiving a policy security confirmation instruction generated by the client based on the policy security confirmation task;
step S605, executing security confirmation on the changed security data to be confirmed based on the security confirmation instruction.
For example, after obtaining the modified security data of the to-be-confirmed policy, the computer device may re-trigger the receipt and payment summarization function after receiving the security confirmation instruction of the policy, and modify the relevant information such as receipt invoice, so as to ensure the subsequent advancement of the security confirmation process.
The method comprises the steps of judging whether a user changes the security data of the security to be confirmed after submitting trial calculation data through first verification of the security data of the security to be confirmed; when the first check conclusion data is failed in check, the second trial calculation data is called back, the second check is executed, the two-way check is executed in the check and verification process of the security cases, the security verification can be timely carried out on the changed security data, the occurrence of the background security verification executing operation caused by the fact that the user is not found out in time after submitting the security verification is avoided, and the productivity of cabinet personnel, operation maintenance personnel and development personnel is liberated; the working efficiency of confirming the policy and the security case is improved; the timeliness is improved, meanwhile, the user experience is benign, and the image of a company is improved in a certain program.
Example two
Referring to fig. 7, a schematic program module of the policy and security case verification device of the present invention is shown. In this embodiment, the policy security case verification device 20 may include or be divided into one or more program modules, where one or more program modules are stored in a storage medium and executed by one or more processors, so as to implement the policy security case verification method according to the present invention. Program modules in accordance with the embodiments of the present invention refer to a series of computer program instruction segments capable of performing particular functions, and are more suitable than programs themselves for describing the execution of the policy and security case verification device 20 in a storage medium. The following description will specifically describe functions of each program module of the present embodiment:
the receiving module 700 is configured to receive a security request instruction sent by a client, where the security request instruction carries security data of a security policy to be confirmed.
And the trial calculation module 710 is configured to execute a first trial calculation on the policy security data to be confirmed according to the policy security request instruction, so as to obtain first trial calculation data.
The first verification module 720 is configured to perform a first verification on the policy to be confirmed and the security data based on the first calculation data, so as to obtain first verification conclusion data.
And a callback module 730, configured to callback second trial calculation data when the first check conclusion data is that the check fails, where the second trial calculation data is the trial calculation data obtained by executing the trial calculation after the user change operation.
And a second checking module 740, configured to perform a second check on the policy to be confirmed security data based on the second calculation data, so as to obtain modified policy to be confirmed security data, and perform security confirmation on the modified policy to be confirmed security data.
In an exemplary embodiment, the trial calculation module 710 is further configured to: acquiring the security type of the security policy from the security data of the security policy to be confirmed; determining a target trial calculation rule based on the policy security type; and executing first trial calculation on the to-be-confirmed policy security data based on the target trial calculation rule to obtain first trial calculation data.
In an exemplary embodiment, the first verification module 720 is further configured to: acquiring a first trial calculation data submitting time of the to-be-confirmed policy security data; traversing the trial calculation data associated with the to-be-confirmed policy security data to determine the latest submission time of the trial calculation data; and when the latest submitting time of the trial calculation data is later than the submitting time of the first trial calculation data, generating first check conclusion data, wherein the first check conclusion data is failed in check.
In an exemplary embodiment, the first verification module 720 is further configured to: and acquiring first confidence degrees corresponding to a plurality of indexes of the security data to be confirmed when the first trial calculation is executed.
In an exemplary embodiment, the second checking module 740 is further configured to: acquiring second confidence coefficients corresponding to a plurality of indexes of the policy security data to be confirmed when the second trial calculation is executed based on the second trial calculation data; comparing the first confidence degrees and the second confidence degrees corresponding to the indexes to determine the index to be changed; and replacing the corresponding index in the to-be-confirmed security data by the to-be-changed index to obtain the changed to-be-confirmed security data, and executing security confirmation on the changed to-be-confirmed security data.
In an exemplary embodiment, the callback module 730 is further configured to: generating a bidirectional verification instruction based on the first verification conclusion data; and calling back second trial calculation data based on the bidirectional verification instruction, and creating a temporary form based on the second trial calculation data.
In an exemplary embodiment, the policy and security case confirmation verification method further includes: extracting user data from the policy security request instruction; determining a risk level based on the policy security data to be confirmed and the user data; generating a policy security confirmation task based on the risk level and the policy security data to be confirmed, and pushing the policy security confirmation to the client; receiving a policy security confirmation instruction generated by the client based on the policy security confirmation task; and executing security confirmation on the changed security data to be confirmed based on the security confirmation instruction.
Example III
Referring to fig. 8, a hardware architecture of a device according to a third embodiment of the present invention is shown. In this embodiment, the apparatus 2 is a computer apparatus capable of automatically performing numerical calculation and/or information processing according to an instruction set or stored in advance. The device 2 may be a rack server, a blade server, a tower server, or a rack server (including a stand-alone server, or a server cluster made up of multiple servers), or the like. As shown in fig. 8, the device 2 includes, but is not limited to, at least a memory 21, a processor 22, a network interface 23, and a policy and security case verification device 20, which are communicatively connected to each other via a system bus. Wherein:
in this embodiment, the memory 21 includes at least one type of computer-readable storage medium including flash memory, a hard disk, a multimedia card, a card memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the memory 21 may be an internal storage unit of the device 2, such as a hard disk or a memory of the device 2. In other embodiments, the memory 21 may also be an external storage device of the device 2, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the computer device 2. Of course, the memory 21 may also comprise both the internal memory unit of the device 2 and its external memory device. In this embodiment, the memory 21 is generally used to store the operating system and various application software installed in the device 2, such as the program code of the policy and security case verification apparatus 20 in the above embodiment. Further, the memory 21 may be used to temporarily store various types of data that have been output or are to be output.
The processor 22 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 22 is typically used to control the overall operation of the computer device 2. In this embodiment, the processor 22 is configured to execute the program code stored in the memory 21 or process data, for example, execute the policy security case verification device 20, so as to implement the policy security case verification method of the foregoing embodiment.
The network interface 23 may comprise a wireless network interface or a wired network interface, which network interface 23 is typically used for establishing a communication connection between the apparatus 2 and other electronic devices. For example, the network interface 23 is used to connect the device 2 to an external terminal through a network, establish a data transmission channel and a communication connection between the device 2 and the external terminal, and the like. The network may be an Intranet (Intranet), the Internet (Internet), a global system for mobile communications (Global System of Mobile communication, GSM), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), a 4G network, a 5G network, bluetooth (Bluetooth), wi-Fi, or other wireless or wired network.
It should be noted that fig. 8 only shows the device 2 with the components 20-23, but it should be understood that not all shown components are required to be implemented, and that more or fewer components may be implemented instead.
In this embodiment, the policy and security case verification device 20 stored in the memory 21 may be further divided into one or more program modules, and the one or more program modules are stored in the memory 21 and executed by one or more processors (the processor 22 in this embodiment) to complete the present invention.
For example, fig. 7 shows a schematic diagram of a program module of the second embodiment of the policy-based security case verification device 20, where the policy-based security case verification device 20 may be divided into a receiving module 700, a trial and error module 710, a first verification module 720, a callback module 730, and a second verification module 740. The program modules referred to herein are a series of computer program instruction segments capable of performing a specific function, and are more suitable than programs for describing the execution of the policy and security case verification device 20 in the apparatus 2. The specific functions of the program modules 700-740 are described in detail in the second embodiment, and are not described herein.
Example IV
The present embodiment also provides a storage medium such as a flash memory, a hard disk, a multimedia card, a card memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, a server, an App application mall, etc., on which a computer program is stored, which when executed by a processor, performs the corresponding functions. The storage medium of the present embodiment is used for storing the policy and security case verification device 20, and when executed by the processor, implements the policy and security case verification method of the above embodiment.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (10)

1. The method for confirming and checking the policy and the security case is characterized by comprising the following steps of:
receiving a security request instruction sent by a client, wherein the security request instruction carries security data of a security policy to be confirmed;
executing first trial calculation on the to-be-confirmed policy security data according to the policy security request instruction so as to obtain first trial calculation data;
performing first verification on the to-be-confirmed policy security data based on the first trial calculation data to obtain first verification conclusion data;
when the first check conclusion data is failed in check, second trial calculation data is called back, wherein the second trial calculation data is obtained by executing trial calculation after user change operation;
and executing a second check on the to-be-confirmed policy security data based on the second trial calculation data to obtain changed to-be-confirmed policy security data, and executing security confirmation on the changed to-be-confirmed policy security data.
2. The method for validating a policy security case according to claim 1, wherein the executing a first trial calculation on the policy security data to be validated according to the policy security request instruction to obtain first trial calculation data further comprises:
acquiring the security type of the security policy from the security data of the security policy to be confirmed;
determining a target trial calculation rule based on the policy security type;
and executing first trial calculation on the to-be-confirmed policy security data based on the target trial calculation rule to obtain first trial calculation data.
3. The policy security case verification method according to claim 2, wherein the performing a first verification on the policy security data to be verified based on the first trial calculation data to obtain first verification conclusion data includes:
acquiring a first trial calculation data submitting time of the to-be-confirmed policy security data;
traversing the trial calculation data associated with the to-be-confirmed policy security data to determine the latest submission time of the trial calculation data;
and when the latest submitting time of the trial calculation data is later than the submitting time of the first trial calculation data, generating first check conclusion data, wherein the first check conclusion data is failed in check.
4. The policy security case verification method according to claim 3, wherein after performing a first verification on the policy security data to be verified based on the first trial calculation data to obtain first verification conclusion data, further comprising:
and acquiring first confidence degrees corresponding to a plurality of indexes of the security data to be confirmed when the first trial calculation is executed.
5. The policy security case verification method according to claim 4, wherein the performing, based on the second trial calculation data, a second verification on the policy security data to be verified to obtain modified policy security data to be verified, and performing security verification on the modified policy security data to be verified includes:
acquiring second confidence coefficients corresponding to a plurality of indexes of the policy security data to be confirmed when the second trial calculation is executed based on the second trial calculation data;
comparing the first confidence degrees and the second confidence degrees corresponding to the indexes to determine the index to be changed;
and replacing the corresponding index in the to-be-confirmed security data by the to-be-changed index to obtain the changed to-be-confirmed security data, and executing security confirmation on the changed to-be-confirmed security data.
6. The policy security case verification method according to claim 1, wherein when the first verification conclusion data is verification failure, the callback of the second trial calculation data further includes:
generating a bidirectional verification instruction based on the first verification conclusion data;
and calling back second trial calculation data based on the bidirectional verification instruction, and creating a temporary form based on the second trial calculation data.
7. The policy security case verification method according to claim 1, wherein the performing security verification on the changed policy security data to be verified further comprises:
extracting user data from the policy security request instruction;
determining a risk level based on the policy security data to be confirmed and the user data;
generating a policy security confirmation task based on the risk level and the policy security data to be confirmed, and pushing the policy security confirmation to the client;
receiving a policy security confirmation instruction generated by the client based on the policy security confirmation task;
and executing security confirmation on the changed security data to be confirmed based on the security confirmation instruction.
8. A policy-preserving case validation and verification device, comprising:
the receiving module is used for receiving a security request instruction sent by the client, wherein the security request instruction carries security data of a security policy to be confirmed;
the trial calculation module is used for executing first trial calculation on the to-be-confirmed policy security data according to the policy security request instruction so as to obtain first trial calculation data;
the first verification module is used for executing first verification on the to-be-confirmed policy security data based on the first trial calculation data to obtain first verification conclusion data;
the callback module is used for callback second trial calculation data when the first check conclusion data is failed in check, wherein the second trial calculation data is obtained by executing trial calculation after user change operation;
and the second checking module is used for executing a second check on the to-be-confirmed security data based on the second trial calculation data so as to obtain changed to-be-confirmed security data, and executing security confirmation on the changed to-be-confirmed security data.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the policy security case validation checking method according to any of claims 1 to 7 when the computer program is executed by the processor.
10. A computer-readable storage medium, wherein a computer program is stored in the computer-readable storage medium, the computer program being executable by at least one processor to cause the at least one processor to perform the steps of the policy security case validation checking method according to any one of claims 1 to 7.
CN202011039653.2A 2020-09-28 2020-09-28 Method, device, equipment and storage medium for confirming and checking policy and security case Active CN112132694B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011039653.2A CN112132694B (en) 2020-09-28 2020-09-28 Method, device, equipment and storage medium for confirming and checking policy and security case

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011039653.2A CN112132694B (en) 2020-09-28 2020-09-28 Method, device, equipment and storage medium for confirming and checking policy and security case

Publications (2)

Publication Number Publication Date
CN112132694A CN112132694A (en) 2020-12-25
CN112132694B true CN112132694B (en) 2024-04-09

Family

ID=73843113

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011039653.2A Active CN112132694B (en) 2020-09-28 2020-09-28 Method, device, equipment and storage medium for confirming and checking policy and security case

Country Status (1)

Country Link
CN (1) CN112132694B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4642768A (en) * 1984-03-08 1987-02-10 Roberts Peter A Methods and apparatus for funding future liability of uncertain cost
EP0278132A1 (en) * 1987-02-09 1988-08-17 College Savings Bank Methods and apparatus for funding future liability of uncertain cost
CN106056348A (en) * 2016-05-18 2016-10-26 平安科技(深圳)有限公司 Maintenance information change method and device
CN107316176A (en) * 2016-04-27 2017-11-03 平安科技(深圳)有限公司 The control method and device of declaration form processing
CN107527099A (en) * 2016-06-21 2017-12-29 平安科技(深圳)有限公司 Save reservation processing method and device from damage
US10121207B1 (en) * 2013-10-04 2018-11-06 United Services Automobile Association Insurance policy alterations using informatic sensor data
CN108765175A (en) * 2018-06-01 2018-11-06 中国平安人寿保险股份有限公司 Declaration form saves information processing method, device, computer equipment and storage medium from damage
CN109242261A (en) * 2018-08-14 2019-01-18 中国平安人寿保险股份有限公司 Save the method and terminal device of risk from damage based on big data assessment
CN109345193A (en) * 2018-09-06 2019-02-15 平安科技(深圳)有限公司 Declaration form based on information security saves checking method and terminal device from damage
CN109670968A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 Processing method, device, equipment and the computer storage medium of insurance data
CN109685669A (en) * 2018-12-11 2019-04-26 北京量子保科技有限公司 A kind of policy information data processing method and system
CN109801174A (en) * 2018-12-26 2019-05-24 平安科技(深圳)有限公司 Claims Resolution data processing method, device, equipment and computer readable storage medium
CN109902095A (en) * 2019-01-25 2019-06-18 平安科技(深圳)有限公司 Policy information update method, device, terminal and computer readable storage medium
CN111080390A (en) * 2019-11-06 2020-04-28 泰康保险集团股份有限公司 Order information modification method, system, equipment and storage medium
CN111126935A (en) * 2019-11-19 2020-05-08 泰康保险集团股份有限公司 Processing method and device of security data, electronic equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8571897B2 (en) * 2009-11-23 2013-10-29 The Prudential Insurance Company Of America System and method for administering insurance policies issued before comprehensive underwriting

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4642768A (en) * 1984-03-08 1987-02-10 Roberts Peter A Methods and apparatus for funding future liability of uncertain cost
EP0278132A1 (en) * 1987-02-09 1988-08-17 College Savings Bank Methods and apparatus for funding future liability of uncertain cost
US10121207B1 (en) * 2013-10-04 2018-11-06 United Services Automobile Association Insurance policy alterations using informatic sensor data
CN107316176A (en) * 2016-04-27 2017-11-03 平安科技(深圳)有限公司 The control method and device of declaration form processing
CN106056348A (en) * 2016-05-18 2016-10-26 平安科技(深圳)有限公司 Maintenance information change method and device
CN107527099A (en) * 2016-06-21 2017-12-29 平安科技(深圳)有限公司 Save reservation processing method and device from damage
CN108765175A (en) * 2018-06-01 2018-11-06 中国平安人寿保险股份有限公司 Declaration form saves information processing method, device, computer equipment and storage medium from damage
CN109242261A (en) * 2018-08-14 2019-01-18 中国平安人寿保险股份有限公司 Save the method and terminal device of risk from damage based on big data assessment
CN109345193A (en) * 2018-09-06 2019-02-15 平安科技(深圳)有限公司 Declaration form based on information security saves checking method and terminal device from damage
CN109670968A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 Processing method, device, equipment and the computer storage medium of insurance data
CN109685669A (en) * 2018-12-11 2019-04-26 北京量子保科技有限公司 A kind of policy information data processing method and system
CN109801174A (en) * 2018-12-26 2019-05-24 平安科技(深圳)有限公司 Claims Resolution data processing method, device, equipment and computer readable storage medium
CN109902095A (en) * 2019-01-25 2019-06-18 平安科技(深圳)有限公司 Policy information update method, device, terminal and computer readable storage medium
CN111080390A (en) * 2019-11-06 2020-04-28 泰康保险集团股份有限公司 Order information modification method, system, equipment and storage medium
CN111126935A (en) * 2019-11-19 2020-05-08 泰康保险集团股份有限公司 Processing method and device of security data, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN112132694A (en) 2020-12-25

Similar Documents

Publication Publication Date Title
US10942918B2 (en) Self-cleaning token vault
WO2020057016A1 (en) Blockchain-based insurance claim settlement method, electronic apparatus and storage medium
US20150317739A1 (en) System and method for vehicle repair cost estimate verification
CN109359277B (en) Data monitoring method, device and computer storage medium
WO2019019636A1 (en) User identification method, electronic device, and computer readable storage medium
CN112330471B (en) Service data processing method, device, computer equipment and storage medium
CN111340402B (en) Group insurance service management method, system, device and storage medium
CN110851298B (en) Abnormality analysis and processing method, electronic device and storage medium
CN111124917B (en) Method, device, equipment and storage medium for managing and controlling public test cases
US11921575B1 (en) Systems and methods for verifying vehicle identification number (VIN)
CN111340584A (en) Method, device, equipment and storage medium for determining fund side
KR102009336B1 (en) Apparatus, method and computer program for cloud scrapping using pre-scrapped bigdata
WO2019169763A1 (en) Electronic apparatus, service system risk control method, and storage medium
CN111258832A (en) Interface parameter checking method, device, equipment and medium
CN112132694B (en) Method, device, equipment and storage medium for confirming and checking policy and security case
CN112148880A (en) Customer service dialogue corpus clustering method, system, equipment and storage medium
US20210065079A1 (en) Methods and systems for implementing risk assessment models
CN112001707A (en) Business workflow generation method and system based on business data
CN115578170A (en) Financial batch certificate making method, device, equipment and storage medium
CN111815272B (en) Application auditing method and device, electronic equipment and storage medium
CN114066644A (en) Annuity data tail difference processing method and device and electronic equipment
RU2691830C1 (en) System and method of operation of checking online user data and creating a scoring model using non-personal user data
WO2013009604A2 (en) System and method for risk validation
CN111901299A (en) Application authentication method and device, electronic equipment and storage medium
CN111311102A (en) Resource ratio adjusting method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant