CN114998038A - Abnormal policy processing method and system - Google Patents

Abnormal policy processing method and system Download PDF

Info

Publication number
CN114998038A
CN114998038A CN202210723978.5A CN202210723978A CN114998038A CN 114998038 A CN114998038 A CN 114998038A CN 202210723978 A CN202210723978 A CN 202210723978A CN 114998038 A CN114998038 A CN 114998038A
Authority
CN
China
Prior art keywords
policy
abnormal
template
data
policy data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210723978.5A
Other languages
Chinese (zh)
Inventor
赵鹏达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN202210723978.5A priority Critical patent/CN114998038A/en
Publication of CN114998038A publication Critical patent/CN114998038A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/253Grammatical analysis; Style critique

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Artificial Intelligence (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Stored Programmes (AREA)

Abstract

The application belongs to the technical field of computers and communication, and relates to an abnormal policy handling method, which comprises the following steps: when detecting the abnormal form, obtaining abnormal form keeping data; performing syntax analysis on the abnormal policy data based on JAVAPARSER tool library to obtain an abstract syntax tree of the abnormal policy data, wherein the abstract syntax tree comprises policy total information, and the policy total information comprises basic information, risk species and insurance application limit of an insured person; acquiring a target policy keeping template corresponding to the policy keeping total amount information in the abstract syntax tree from a preset template library; and correcting the target policy template based on a preset dynamic template technology to obtain corrected policy data. The application also provides an abnormal policy processing system, a computer device and a storage medium thereof. In addition, the application also relates to a block chain technology, and the JAVAPARSER tool library and the template library can be stored in the block chain.

Description

Abnormal policy processing method and system
Technical Field
The present application relates to the field of computer and communication technologies, and in particular, to a method and a system for processing an exception policy, a computer device, and a storage medium thereof.
Background
And the order output system is used for realizing the digitization of the policy. In the traditional technical scheme, because of numerous products and rapid service change, the version frequency and the density are relatively high, the research and development period is indirectly prolonged, the research and development process is difficult to fully test, and the problem that the order cannot be normally issued due to certain system bugs after the system is on line may exist. The problem that the policy can not be issued is often solved by reasonably adjusting the policy due to data loss and data abnormity in the electronic policy, but the problem is solved by the traditional scheme mode, only the system can be relied on for upgrading and issuing the policy, the efficiency is very low, and the continuity of the system function before issuing the policy is unavailable.
Disclosure of Invention
The application aims to provide an exception policy handling method, an exception policy handling system, computer equipment and a storage medium, so that when an exception is made, the efficiency of a solution mode of upgrading and publishing a version through a system is low, and the system function before publishing the version is unavailable continuously.
In order to solve the above technical problem, an embodiment of the present application provides an exception policy handling method, which adopts the following technical solutions:
the method comprises the following steps:
when detecting that the order is abnormal, acquiring abnormal order keeping data;
performing syntax analysis on the abnormal policy data based on a JAVAPARSER tool library to obtain an abstract syntax tree of the abnormal policy data, wherein the abstract syntax tree comprises policy total information, and the policy total information comprises basic information of an insured person, risk seeds and an insurable amount;
acquiring a target policy keeping template corresponding to the policy keeping total amount information in the abstract syntax tree from a preset template library;
based on a preset dynamic template technology, correcting the target policy template to obtain corrected policy data;
and outputting the corrected policy data.
Further, the step of performing syntax parsing on the abnormal policy data based on the javaperser tool library to obtain an abstract syntax tree of the abnormal policy data includes:
matching and converting the abnormal policy data based on preset policy item information in the JAVAPARSER tool library, wherein the tool library can comprise one or more preset policy item information;
performing type marking on each token in the abnormal policy data according to a conversion result, and obtaining the analyzed abnormal policy data;
and resolving the analyzed abnormal policy data into corresponding tokens, and constructing an abstract syntax tree of the abnormal policy data.
Further, the step of parsing the parsed abnormal policy data into corresponding tokens and constructing an abstract syntax tree of the abnormal policy data includes:
based on the context-free grammar, the symbol priority and the symbol relevance, disassembling the analyzed abnormal policy data to obtain a token corresponding to the analyzed abnormal policy data;
and constructing an abstract syntax tree of the abnormal policy data according to the obtained token.
Further, the step of obtaining a target policy template corresponding to the policy total amount information in the abstract syntax tree from a preset template library includes:
acquiring a mapping file corresponding to the policy-preserving total quantity information in the abstract syntax tree, wherein the mapping file comprises at least one mapping object, and the mapping object comprises a mapping name;
and acquiring a mapping template corresponding to the mapping name from a preset template library, and taking the mapping template as the target policy template.
Further, the step of modifying the target policy making template based on a preset dynamic template technology to obtain modified policy making data includes:
rendering data and generating a code file for the target policy template based on a preset dynamic template technology;
submitting the code file to a program library for execution to obtain target policy data;
and taking the target policy data as the modified policy data.
Further, the preset dynamic template technology is a Beetl template.
Further, when detecting that the policy is abnormal, the step of obtaining abnormal policy data includes:
responding to the occurrence of an abnormality in the process of policy maintenance, the process of policy underwriting or the process of policy information change, and taking the abnormal policy as a target policy;
and acquiring policy data corresponding to the target policy as the abnormal policy data.
In order to solve the above technical problem, an embodiment of the present application further provides an exception policy handling system, including:
the first acquisition module is used for acquiring abnormal policy data when detecting the exception of the policy;
the analysis module is used for carrying out syntactic analysis on the abnormal policy data based on a JAVAPARSER tool library to obtain an abstract syntactic tree of the abnormal policy data, wherein the abstract syntactic tree comprises policy total information, and the policy total information comprises basic information, risk species and insurance application amount of an insured person;
the second acquisition module is used for acquiring a target policy keeping template corresponding to the policy keeping total amount information in the abstract syntax tree from a preset template library;
the correction module is used for correcting the target policy making template based on a preset dynamic template technology to obtain corrected policy making data;
and the output module is used for outputting the corrected policy data.
In order to solve the above technical problem, an embodiment of the present application further provides a computer device, which adopts the following technical solutions: comprising a memory having computer readable instructions stored therein and a processor that when executed implements the steps of the method of exception policy handling as described above.
In order to solve the above technical problem, an embodiment of the present application further provides a computer-readable storage medium, which adopts the following technical solutions: the computer readable storage medium has stored thereon computer readable instructions which, when executed by a processor, implement the steps of the exception warranty handling method as described above.
Compared with the prior art, the embodiment of the application mainly has the following beneficial effects: when the form is detected to be abnormal, acquiring abnormal form keeping data; performing syntax analysis on the abnormal policy data based on a JAVAPARSER tool library to obtain an abstract syntax tree of the abnormal policy data, wherein the abstract syntax tree comprises policy total information, and the policy total information comprises basic information of an insured person, risk seeds and an insurable amount; acquiring a target policy keeping template corresponding to the policy keeping total amount information in the abstract syntax tree from a preset template library; based on a preset dynamic template technology, correcting the target policy template to obtain corrected policy data; and outputting the corrected policy data. The method and the device realize the disassembly through the JAVAPARSER tool library and the recombination and correction through the preset dynamic template technology on the premise of not upgrading the system, thereby outputting the abnormal policy data after the abnormal policy data are corrected, improving the processing efficiency of the abnormal policy data and further ensuring that the whole service of the policy can still be normally carried out.
Drawings
In order to more clearly illustrate the solution of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below, and it is obvious that the drawings in the description below are some embodiments of the present application, and that other drawings may be obtained by those skilled in the art without inventive effort.
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of an exception policy handling method of the present application;
FIG. 3 is a block diagram illustrating an embodiment of an exception policy handling system according to the present application;
FIG. 4 is a schematic block diagram of one embodiment of a computer device according to the present application.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "including" and "having," and any variations thereof, in the description and claims of this application and the description of the above figures are intended to cover non-exclusive inclusions. The terms "first," "second," and the like in the description and claims of this application or in the foregoing drawings are used for distinguishing between different objects and not for describing a particular sequential order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. Various communication client applications, such as a web browser application, a shopping application, a search application, an instant messaging tool, a mailbox client, social platform software, etc., may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, mpeg compression standard Audio Layer 3), MP4 players (Moving Picture Experts Group Audio Layer IV, mpeg compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background server providing support for pages displayed on the terminal devices 101, 102, 103.
It should be noted that, the exception policy handling method provided in the embodiment of the present application is generally executed by a server, and accordingly, the exception policy handling system is generally disposed in the server.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to FIG. 2, a flow diagram of one embodiment of an exception policy handling method according to the present application is shown. The abnormal policy processing method comprises the following steps:
step S201, when detecting the abnormal form, obtaining abnormal form keeping data.
In this step, the system list output condition is detected within a preset time period, for example, the system list output condition is detected every other hour. Thus, when the form abnormality is detected, the abnormal form data is obtained.
Because various types of insurance products can be sold through various sales modes and sales channels such as telephone sales, network sales, counter sales and the like, furthermore, each sales channel is subdivided into a plurality of sub-sales channels according to different sales platforms and agency mechanisms, and customers can purchase insurance in different sales channels according to specific conditions of the customers. When the intention of the insurance order is achieved, the seat salesperson or the customer can record insurance policy data into the terminal of each sales channel. When the order output abnormity is detected, the corresponding order output abnormity point can be obtained, and the policy data corresponding to the order output abnormity point is obtained from the terminal of each sales channel and is used as the abnormal policy data.
Or, in another embodiment, when the insurance order intention is reached, the seat salesperson or the customer can record the policy data into the cloud, and at this time, the policy data corresponding to the policy-taking abnormal point can be acquired from the cloud and used as the abnormal policy data.
Furthermore, when the system is detected to be out of order, the abnormal insurance policy can be used as the target insurance policy in response to the abnormality in the insurance policy preservation process, the insurance policy underwriting process or the insurance policy information changing process. For example, in the policy preservation process, one or a messy code (and other data are normal and correct data) is missing from the task number of the policy, so that the policy cannot be issued, that is, it is determined that the policy is issued abnormally, at this time, the policy with the abnormality is taken as a target policy, and policy data corresponding to the target policy is obtained as the abnormal policy data (including correct policy data and incorrect policy data, where the incorrect policy data is data in which one or a messy code is missing from the task number of the policy).
Step S202, grammar analysis is carried out on the abnormal policy data based on a JAVAPARSER tool library to obtain an abstract grammar tree of the abnormal policy data, wherein the abstract grammar tree comprises policy total quantity information, and the policy total quantity information comprises basic information, risk seeds and insurance application limit of an insured person.
Optionally, the insurance policy total amount information includes basic information of the insured person, the type of insurance risk of the purchased insurance and the application amount. In addition, the total information of the insurance policy also includes the task number of the insurance policy, the basic information of the applicant, the insurance channel of the order and the like. The basic information of the insured person or the insurant comprises the name, the sex, the age, the certificate type, the certificate number, the city code, the province code and the like of the insured person or the insurant. Types of risks include major risks, accident risks, disability risks, and the like.
In this step, syntax analysis is performed on the abnormal policy data based on the javaperser tool library to obtain an abstract syntax tree of the abnormal policy data. The javaperser tool library is pre-configured by the end user or developer.
Optionally, matching and transforming the abnormal policy data based on preset policy item information in the javaperser tool library, wherein the tool library may include one or more preset policy item information. The logic units in the policy item information are preset as Token types (Token types) and/or knowledge points. Token type refers to the type of token, such as numbers, assignment operators, addition operators, and the like. Knowledge points can represent a combination of multiple operators in an alias way, such as macros (Macro), but also simple functions, such as recursive functions. Knowledge points can be executed directly by the rules engine. Knowledge points are pre-configured by the end user or developer. A predetermined policy item information may be composed of a plurality of sub-item information, wherein each sub-item information may correspond to a knowledge point and/or a logic unit. By pre-configuring the preset policy item information, the terminal user can use the knowledge points when writing the preset policy item information, so that the terminal user can read and understand the business logic more easily, can read and write the rules without learning a programming language, and the learning cost and difficulty of using the rule engine by the terminal user are greatly reduced. Optionally, when the number of the preset policy item information is multiple, the system may define the multiple preset policy item information according to one or more of the following items: customers, products, organizations, projects, and business scenarios. The system can perform isolation of the use range based on five dimensions of customers, products, organizations, projects and business scenes. Scenes in the same range or in the range of the parent-child set can share preset policy item information.
Optionally, the parsing of the abnormal policy data may be performed by first matching the abnormal policy data according to a knowledge point in preset policy item information. After the abnormal policy data is matched with the knowledge points, the system converts the content corresponding to a single knowledge point in the abnormal policy data into one or more tokens according to the matching result, so that the tokens in the whole context character string all meet the standard Java grammar specification. After the conversion is completed, the system marks the token type of each token in the abnormal policy data, namely, marks the type of each token in the abnormal policy data according to the conversion result, obtains the analyzed abnormal policy data and obtains the analyzed abnormal policy data.
In one example, the type tokenization process may be defined using a regular expression. The parser reads the input character stream (i.e., string) and then identifies the morphemes from it, and finally performs type tagging. Once an invalid mark is found during the tokenization process, the system may report an error.
The following is given by the string "instrumentation policy ═ (a, B); "the labeling process is explained for the example:
"Insurance policy ═ (A, B); "is the initialization variable" Insurance policy ", which is assigned to" (A, B) ". In this assignment statement, "instrumentation policy", "═ a", "()", "B", and "; "these 6 tokens. By presetting policy item information, the token-tokenization type correspondence as shown in the following table can be obtained:
token Type of marking
Insurancepolicy Identifier symbol
Assignment operators
A Insurance policy for dangerous species
() Operational operator
B Policy unit
Statement ending
Then, the system type-marks the 6 tokens in the string according to the above correspondence.
In one example, the tokenized types of tokens may be classified into the following four categories:
1. Single-Character tokens (Single-Character Token), such as ">", "-", "(" etc.;
2. single or double Character tokens (One or Two Character Token), e.g., "═ or" and the like;
3. text (Literal) tokens, which are typically specific to a particular language and require interpretation into its corresponding character type;
4. keyword (Keyword) tokens, such as "and", "class", and the like.
Further, the parsed abnormal policy data is disassembled into corresponding tokens, and an Abstract Syntax Tree (AST) of the abnormal policy data is constructed.
Optionally, the parsed character string may be parsed based on the context-free grammar, the symbol priority, and the symbol association. The context-free grammar contains four components: a set of terminal symbols, a set of non-terminal symbols, a start symbol, and a set of production equations. Symbol priority means that each symbol is given a corresponding priority, e.g. the priority of "-" is set higher than ". Symbol association refers to setting a symbol to be left associated or right associated.
In one example, it may be set to just "! "and" - "are right associations and the other symbols are left associations. For example, "-" in "-A" modifies A to its right. The symbol priority and symbol relevance determine that the context-free grammar is a nonsense grammar, so that the abstract syntax tree can be constructed simply and conveniently by scanning the tokens.
Step S203, obtaining a target policy keeping template corresponding to the policy keeping total amount information in the abstract syntax tree from a preset template library.
In this step, a mapping file corresponding to the policy-preserving total amount information in the abstract syntax tree is obtained, wherein the mapping file comprises at least one mapping object, and the mapping object comprises a mapping name; and acquiring a mapping template corresponding to the mapping name from a preset template library, and taking the mapping template as the target policy template.
And step S204, based on a preset dynamic template technology, correcting the target policy making template to obtain corrected policy making data.
Further, based on a preset dynamic template technology, rendering data is carried out on the target policy template, and a code file is generated. Wherein, the preset dynamic template technology is Beetl dynamic template technology.
The Beetl dynamic template technology is realized based on a Beetl-Java template engine. The Beetl-Java template engine is a file template similar to JS grammar and ending in using habit. btl, and the Beetl-Java template engine has the advantages of high performance, high reliability, high usability and the like, so the Beetl-Java template engine is adopted in the invention. In addition, in this embodiment, the preset dynamic template technology is Thymeleaf dynamic template technology, which is not limited herein.
The Beetl-Java template engine is based on the existing codes and template information adjusted according to the code style and the structure of a frame, is provided with four resource template loaders and supports a self-defined resource template loader, wherein the WebAppResourceLoader resource template loader is selected, Java code calling functions are simple, variables can be defined in a template file, assignment of the variables only needs to be put into a Map set of binding data, the rules are similar to JSTL expression use rules, the cost for re-learning new grammar rules is reduced, the template engine is hardly used by the existing code generation tool, so that the consumption of system resources is high when the codes are generated, the templates cannot be flexibly changed, the efficiency and the universality of code generation are greatly reduced, and the Beetl-Java template engine is selected as the template file of the codes to solve the problem, no matter what technical architecture is used by your project, the template file can be easily written as long as a complete sample exists, almost all entity types of table related information are packaged by data inquired at the bottom layer, and variable assignment in the template file is easy to achieve, so that the working efficiency of developers is greatly improved.
The pre-customized Beetl-Java template engine is a code template under an SSI framework and comprises a control layer template (templ _ controller.btl), a database mapping relation configuration layer template (templ _ ibstis.btl), an entity class template (templ _ entry.btl), a service layer template (templ _ service.btl/templ _ serviceImpl.btl), and a front-end page layer template (templ _ select.btl/templ _ inst.btl/templ _ update.btl/templ _ view.btl). The package name, class name, page path, field description, etc. in the template file all require the use of variables for the template engine to load the template rendering data.
The front-end page layer templates include an add function template (templ _ insert.btl), a list function template (templ _ select.btl), a modify function template (templ _ update.btl), and a view function template (templ _ view.btl). The service layer template includes an interface class template (templ _ service.btl) and an interface implementation class template (templ _ service _ impl.btl).
And further, submitting a code file generated based on a preset dynamic template technology to a program library for execution to obtain target policy data, and taking the target policy data as the modified policy data.
And step S205, outputting the corrected policy data, thereby completing a normal output flow.
The embodiment of the application mainly has the following beneficial effects: when the form is detected to be abnormal, acquiring abnormal form keeping data; performing syntax analysis on the abnormal policy data based on a JAVAPARSER tool library to obtain an abstract syntax tree of the abnormal policy data, wherein the abstract syntax tree comprises policy total information, and the policy total information comprises basic information of an insured person, risk seeds and an insurable amount; acquiring a target policy keeping template corresponding to the policy keeping total amount information in the abstract syntax tree from a preset template library; based on a preset dynamic template technology, correcting the target policy template to obtain corrected policy data; and outputting the corrected policy data. The method and the device realize the disassembly through the JAVAPARSER tool library and the recombination and correction through the preset dynamic template technology on the premise of not upgrading the system, thereby outputting the abnormal policy data after the abnormal policy data are corrected, improving the processing efficiency of the abnormal policy data and further ensuring that the whole service of the policy can still be normally carried out.
It should be emphasized that, in order to further ensure the privacy and security of the javapiser tool library and the template library, the extended javapiser tool library and the template library may also be stored in a node of a block chain.
The block chain referred by the application is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
The embodiment of the application can acquire and process related data based on an artificial intelligence technology. Among them, Artificial Intelligence (AI) is a theory, method, technique and application system that simulates, extends and expands human Intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, acquires knowledge and uses the knowledge to obtain the best result.
The artificial intelligence base technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and the like.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware associated with computer readable instructions, which can be stored in a computer readable storage medium, and when executed, the processes of the embodiments of the methods described above can be included. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random Access Memory (RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of execution is not necessarily sequential, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
With further reference to fig. 3, as an implementation of the method shown in fig. 2, the present application provides an embodiment of an exception policy handling system, where the embodiment of the system corresponds to the embodiment of the method shown in fig. 2, and the system may be applied to various electronic devices.
As shown in fig. 3, the system 400 for detecting upgrade package compatibility according to this embodiment includes: a first obtaining module 401, an analyzing module 402, a second obtaining module 403, a modifying module 404 and an output module 405. Wherein:
a first obtaining module 401, configured to obtain abnormal policy-keeping data when a policy exception is detected;
the analysis module 402 is used for carrying out syntax analysis on the abnormal policy data based on a JAVAPARSER tool library to obtain an abstract syntax tree of the abnormal policy data, wherein the abstract syntax tree contains policy total information, and the policy total information comprises basic information, risk seeds and an insurance application limit of an insured person;
a second obtaining module 403, configured to obtain, from a preset template library, a target policy template corresponding to the policy total amount information in the abstract syntax tree;
a modification module 404, configured to modify the target policy template based on a preset dynamic template technology, so as to obtain modified policy data;
an output module 405, configured to output the modified policy data.
The embodiment mainly has the following beneficial effects: when the form is detected to be abnormal, the abnormal form preserving data is obtained through the first obtaining module 401; carrying out syntax analysis on the abnormal policy data based on a JAVAPARSER tool library to obtain an abstract syntax tree of the abnormal policy data, wherein the abstract syntax tree comprises policy total information, and the policy total information comprises basic information of an insured person, risk seeds and an insurance application limit; acquiring a target policy template corresponding to the policy total amount information in the abstract syntax tree from a preset template library through a second acquisition module 403; based on a preset dynamic template technology, the target policy template is corrected through a correction module 404 to obtain corrected policy data; such that the modified policy data is output via output module 405. The method and the device realize the disassembly through the JAVAPARSER tool library and the recombination and correction through the preset dynamic template technology on the premise of not upgrading the system, thereby outputting the abnormal policy data after the correction, improving the processing efficiency of the abnormal policy data and further ensuring that the whole service of the policy can still be normally carried out.
In some optional implementations of this embodiment, the parsing module 402 includes:
a matching conversion unit 4021, configured to match and convert the abnormal policy data based on preset policy item information in the javaperser tool library, where the tool library may include one or more preset policy item information;
the parsing unit 4022 is configured to perform type marking on each token in the abnormal policy data according to the conversion result, and obtain the parsed abnormal policy data;
the constructing unit 4023 is configured to disassemble the analyzed abnormal policy data into corresponding tokens, and construct an abstract syntax tree of the abnormal policy data.
In some optional implementations of this embodiment, the constructing unit 4023 is further configured to:
based on the context-free grammar, the symbol priority and the symbol relevance, disassembling the analyzed abnormal policy data to obtain a token corresponding to the analyzed abnormal policy data; and constructing an abstract syntax tree of the abnormal policy data according to the obtained token.
In some optional implementation manners of this embodiment, the second obtaining module 403 includes:
a first obtaining unit 4031, configured to obtain a mapping file corresponding to policy insurance policy total amount information in the abstract syntax tree, where the mapping file includes at least one mapping object, and the mapping object includes a mapping name;
a mapping unit 4032, configured to obtain a mapping template corresponding to the mapping name from a preset template library, and use the mapping template as the target policy template.
In some optional implementations of this embodiment, the modifying module 404 includes:
the rendering unit 4041 is configured to render data and generate a code file for the target policy template based on a preset dynamic template technology;
the execution unit 4042 is configured to submit the code file to a program library for execution, so as to obtain target policy data;
a correcting unit 4041, configured to use the target policy data as the corrected policy data.
In some optional implementations of this embodiment, the first obtaining module 406 includes:
a response unit 4061, configured to respond to an exception occurring in the policy preservation process, the policy underwriting process, or the policy information change process, and use the exception occurring policy as a target policy;
a second obtaining unit 4061, configured to obtain policy data corresponding to the target policy as the abnormal policy data.
In order to solve the technical problem, an embodiment of the present application further provides a computer device. Referring to fig. 4, fig. 4 is a block diagram of a basic structure of a computer device according to the present embodiment.
The computer device 4 includes a memory 41, a processor 42, and a network interface 43 communicatively connected to each other via a system bus. It is noted that only computer device 4 having components 41-43 is shown in FIG. 4, but it is understood that not all of the shown components are required to be implemented, and that more or fewer components may alternatively be implemented. As will be understood by those skilled in the art, the computer device is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The computer device can be a desktop computer, a notebook, a palm computer, a cloud server and other computing devices. The computer equipment can carry out man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch panel or voice control equipment and the like.
The memory 41 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the memory 41 may be an internal storage unit of the computer device 4, such as a hard disk or a memory of the computer device 4. In other embodiments, the memory 41 may also be a storage device external to the computer device 4, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), or the like provided on the computer device 4. Of course, the memory 41 may also include both internal and external storage devices of the computer device 4. In this embodiment, the memory 41 is generally used for storing an operating system and various application software installed in the computer device 4, such as computer readable instructions of an abnormal policy handling method. Further, the memory 41 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 42 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 42 is typically used to control the overall operation of the computer device 4. In this embodiment, the processor 42 is configured to execute computer readable instructions or processing data stored in the memory 41, for example, computer readable instructions for executing the abnormal policy handling method.
The network interface 43 may comprise a wireless network interface or a wired network interface, and the network interface 43 is generally used for establishing a communication connection between the computer device 4 and other electronic devices.
The embodiment of the application mainly has the following beneficial effects: when the form is detected to be abnormal, acquiring abnormal form keeping data; performing syntax analysis on the abnormal policy data based on a JAVAPARSER tool library to obtain an abstract syntax tree of the abnormal policy data, wherein the abstract syntax tree comprises policy total information, and the policy total information comprises basic information of an insured person, risk seeds and an insurable amount; acquiring a target policy keeping template corresponding to the policy keeping total amount information in the abstract syntax tree from a preset template library; based on a preset dynamic template technology, correcting the target policy template to obtain corrected policy data; and outputting the corrected policy data. The method and the device realize the disassembly through the JAVAPARSER tool library and the recombination and correction through the preset dynamic template technology on the premise of not upgrading the system, thereby outputting the abnormal policy data after the abnormal policy data are corrected, improving the processing efficiency of the abnormal policy data and further ensuring that the whole service of the policy can still be normally carried out.
The present application further provides another embodiment, which is to provide a computer-readable storage medium storing computer-readable instructions executable by at least one processor to cause the at least one processor to perform the steps of the above-mentioned method of exception policy handling.
The embodiment of the application mainly has the following beneficial effects: when the form is detected to be abnormal, acquiring abnormal form keeping data; performing syntax analysis on the abnormal policy data based on a JAVAPARSER tool library to obtain an abstract syntax tree of the abnormal policy data, wherein the abstract syntax tree comprises policy total information, and the policy total information comprises basic information of an insured person, risk seeds and an insurable amount; acquiring a target policy template corresponding to the policy total amount information in the abstract syntax tree from a preset template library; based on a preset dynamic template technology, correcting the target policy template to obtain corrected policy data; and outputting the corrected policy data. The method and the device realize the disassembly through the JAVAPARSER tool library and the recombination and correction through the preset dynamic template technology on the premise of not upgrading the system, thereby outputting the abnormal policy data after the abnormal policy data are corrected, improving the processing efficiency of the abnormal policy data and further ensuring that the whole service of the policy can still be normally carried out.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the method of the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but in many cases, the former is a better implementation. Based on such understanding, the technical solutions of the present application or portions thereof that contribute to the prior art may be embodied in the form of a software product, where the computer software product is stored in a storage medium (such as a ROM/RAM, a magnetic disk, and an optical disk), and includes several instructions for enabling a terminal device (which may be a mobile phone, a computer, a server, or a network device) to execute the method described in the embodiments of the present application.
It is to be understood that the above-described embodiments are merely illustrative of some, but not restrictive, of the broad invention, and that the appended drawings illustrate preferred embodiments of the invention and do not limit the scope of the invention. This application is capable of embodiments in many different forms and the embodiments are provided so that this disclosure will be thorough and complete. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to one skilled in the art that modifications can be made to the embodiments described in the foregoing detailed description, or equivalents can be substituted for some of the features described therein. All equivalent structures made by using the contents of the specification and the drawings of the present application are directly or indirectly applied to other related technical fields and are within the protection scope of the present application.

Claims (10)

1. An exception policy handling method, comprising the steps of:
when detecting that the order is abnormal, acquiring abnormal order keeping data;
performing syntax analysis on the abnormal policy data based on a JAVAPARSER tool library to obtain an abstract syntax tree of the abnormal policy data, wherein the abstract syntax tree comprises policy total information, and the policy total information comprises basic information of an insured person, risk seeds and an insurable amount;
acquiring a target policy keeping template corresponding to the policy keeping total amount information in the abstract syntax tree from a preset template library;
based on a preset dynamic template technology, correcting the target policy template to obtain corrected policy data;
and outputting the corrected policy data.
2. The abnormal policy handling method according to claim 1, wherein said step of parsing said abnormal policy data based on javapiser tool library to obtain an abstract syntax tree of said abnormal policy data comprises:
matching and converting the abnormal policy data based on preset policy item information in the JAVAPARSER tool library, wherein the tool library can comprise one or more preset policy item information;
marking the type of each token in the abnormal policy data according to the conversion result, and obtaining the analyzed abnormal policy data;
and resolving the analyzed abnormal policy data into corresponding tokens, and constructing an abstract syntax tree of the abnormal policy data.
3. The abnormal policy handling method according to claim 2, wherein the step of parsing the parsed abnormal policy data into corresponding tokens and constructing an abstract syntax tree of the abnormal policy data comprises:
based on the context-free grammar, the symbol priority and the symbol relevance, disassembling the analyzed abnormal policy data to obtain a token corresponding to the analyzed abnormal policy data;
and constructing an abstract syntax tree of the abnormal policy data according to the obtained token.
4. The abnormal policy handling method according to claim 1, wherein the step of obtaining the target policy template corresponding to the policy amount information in the abstract syntax tree from a preset template library comprises:
acquiring a mapping file corresponding to the policy-preserving total quantity information in the abstract syntax tree, wherein the mapping file comprises at least one mapping object, and the mapping object comprises a mapping name;
and acquiring a mapping template corresponding to the mapping name from a preset template library, and taking the mapping template as the target policy template.
5. The abnormal policy handling method according to claim 1 wherein said step of modifying said target policy template based on a preset dynamic template technique to obtain modified policy data comprises:
rendering data and generating a code file for the target policy template based on a preset dynamic template technology;
submitting the code file to a program library for execution to obtain target policy data;
and taking the target policy data as the modified policy data.
6. The method of claim 5, wherein the predetermined dynamic template technique is a Beetl dynamic template technique.
7. The exception policy handling method according to claim 1 wherein said step of obtaining exception policy data when a policy exception is detected comprises:
responding to the occurrence of an abnormality in the process of policy maintenance, the process of policy underwriting or the process of policy information change, and taking the abnormal policy as a target policy;
and acquiring policy data corresponding to the target policy as the abnormal policy data.
8. An exception warranty handling system comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring abnormal policy keeping data when detecting that a policy is abnormal;
the analysis module is used for carrying out syntax analysis on the abnormal policy data based on a JAVAPARSER tool library to obtain an abstract syntax tree of the abnormal policy data, wherein the abstract syntax tree contains policy total information which comprises basic information, dangerous seeds and an insurance application limit of an insured person;
the second acquisition module is used for acquiring a target policy keeping template corresponding to the policy keeping total amount information in the abstract syntax tree from a preset template library;
the correction module is used for correcting the target policy template based on a preset dynamic template technology to obtain corrected policy data;
and the output module is used for outputting the corrected policy data.
9. A computer device comprising a memory having computer readable instructions stored therein and a processor that when executed implements the steps of the method of exception policy handling according to any one of claims 1 to 7.
10. A computer readable storage medium having computer readable instructions stored thereon which, when executed by a processor, implement the steps of the method of exception policy handling according to any one of claims 1 to 7.
CN202210723978.5A 2022-06-24 2022-06-24 Abnormal policy processing method and system Pending CN114998038A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210723978.5A CN114998038A (en) 2022-06-24 2022-06-24 Abnormal policy processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210723978.5A CN114998038A (en) 2022-06-24 2022-06-24 Abnormal policy processing method and system

Publications (1)

Publication Number Publication Date
CN114998038A true CN114998038A (en) 2022-09-02

Family

ID=83037781

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210723978.5A Pending CN114998038A (en) 2022-06-24 2022-06-24 Abnormal policy processing method and system

Country Status (1)

Country Link
CN (1) CN114998038A (en)

Similar Documents

Publication Publication Date Title
CA2684822C (en) Data transformation based on a technical design document
Pandita et al. {WHYPER}: Towards automating risk assessment of mobile applications
CN112015430A (en) JavaScript code translation method and device, computer equipment and storage medium
He et al. Model approach to grammatical evolution: deep-structured analyzing of model and representation
CN110795697A (en) Logic expression obtaining method and device, storage medium and electronic device
CN112817935A (en) Data processing method, device and equipment based on field type and storage medium
US20140282123A1 (en) Executable guidance experiences based on implicitly generated guidance models
CN114398138A (en) Interface generation method and device, computer equipment and storage medium
CN112231197A (en) Page testing method and device and storage medium
CN113869789A (en) Risk monitoring method and device, computer equipment and storage medium
CN117033249A (en) Test case generation method and device, computer equipment and storage medium
KR100762712B1 (en) Method for transforming of electronic document based on mapping rule and system thereof
CN113687827B (en) Data list generation method, device and equipment based on widget and storage medium
CN116450723A (en) Data extraction method, device, computer equipment and storage medium
CN114998038A (en) Abnormal policy processing method and system
CN114625372A (en) Automatic component compiling method and device, computer equipment and storage medium
CN114356379A (en) Backup-based service upgrading method, device, equipment and storage medium
CN114385155A (en) vue project visualization tool generation method, device, equipment and storage medium
CN110502483B (en) Data processing method, data processing device, computer equipment and storage medium
CN114089980A (en) Programming processing method, device, interpreter and nonvolatile storage medium
CN110737431B (en) Software development method, development platform, terminal device and storage medium
US20150324333A1 (en) Systems and methods for automatically generating hyperlinks
CN111273913A (en) Method and device for outputting application program interface data represented by specifications
CN111046636A (en) Method and device for screening PDF file information, computer equipment and storage medium
CN117391868A (en) Policy processing method, policy processing device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination