CN117273962A - Insurance security processing method, apparatus, equipment and medium - Google Patents

Insurance security processing method, apparatus, equipment and medium Download PDF

Info

Publication number
CN117273962A
CN117273962A CN202311315313.1A CN202311315313A CN117273962A CN 117273962 A CN117273962 A CN 117273962A CN 202311315313 A CN202311315313 A CN 202311315313A CN 117273962 A CN117273962 A CN 117273962A
Authority
CN
China
Prior art keywords
security
insurance
factor
product
trial calculation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311315313.1A
Other languages
Chinese (zh)
Inventor
李彬彬
杨永攀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Health Insurance Company of China Ltd
Original Assignee
Ping An Health Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Health Insurance Company of China Ltd filed Critical Ping An Health Insurance Company of China Ltd
Priority to CN202311315313.1A priority Critical patent/CN117273962A/en
Publication of CN117273962A publication Critical patent/CN117273962A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9027Trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/01Customer relationship services
    • G06Q30/015Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk
    • G06Q30/016After-sales

Abstract

The embodiment of the application belongs to the field of data analysis, and relates to an insurance security processing method, which comprises the steps of configuring a security factor library of an insurance product information set; inquiring a corresponding first insurance product from a security factor library based on a security policy number, and performing first security Fei Shisuan on the first insurance product to obtain a first trial calculation result; traversing the security binary tree based on the security insurance single number to obtain a second security product; performing a second guarantee Fei Shisuan on the second insurance product to obtain a second trial calculation result; comparing the first trial calculation result with the second trial calculation result; if the comparison is consistent, acquiring a target security policy, and performing security treatment on the security product corresponding to the security policy number based on the target security policy; if the comparison is inconsistent, outputting a trial-and-error signal. In addition, the present application relates to blockchain technology in which insurance product information sets may be stored. The method and the device improve the efficiency and the accuracy of security treatment.

Description

Insurance security processing method, apparatus, equipment and medium
Technical Field
The present disclosure relates to the field of data analysis, and in particular, to a method, an apparatus, a device, and a medium for insurance security processing.
Background
With the development of internet technology, insurance business is rapidly developed, and on the premise that insurance products, product attributes, sales channels and business scenes are diversified, the security processing requirements of the insurance products are greatly increased, and how to improve the security processing efficiency of the insurance products becomes a problem to be solved, wherein the security refers to after-sales service work performed by an insurance company around the items such as contract change, annuity or expiration date payment.
The traditional security treatment method is to conduct security treatment on the security product based on manual experience by security personnel.
However, this method involves a very large amount of security data due to the expansion of security service scenarios, and the efficiency of security processing performed manually cannot meet the requirements; furthermore, since the security data involves a large number of calculation scenarios, the data calculation is performed only manually based on human experience, and the data omission or calculation errors are easy to occur, which results in lower accuracy of the security process.
Disclosure of Invention
An objective of the embodiments of the present application is to provide a method, an apparatus, a device, and a medium for security processing, which are mainly aimed at improving efficiency and accuracy of security processing.
In order to solve the above technical problems, the embodiments of the present application provide an insurance security processing method, which adopts the following technical schemes:
acquiring an insurance product information set and configuring a security factor library of the insurance product information set;
acquiring a security policy number to be processed and a security item corresponding to the security policy number, inquiring a corresponding first security product from the security factor library based on the security policy number, and performing first security Fei Shisuan on the first security product to obtain a first trial calculation result;
traversing a pre-constructed security binary tree based on the security policy number to obtain a second security product corresponding to the security policy number;
performing a second guarantee Fei Shisuan on the second insurance product to obtain a second trial calculation result;
comparing the first trial calculation result with the second trial calculation result to obtain a comparison result;
if the comparison result is consistent, acquiring a target security policy corresponding to the security project from a preset security policy database, and performing security treatment on the security product corresponding to the security policy number based on the target security policy;
and if the comparison result is inconsistent, outputting a trial-and-error signal.
Further, the performing first protection Fei Shisuan on the first protection product to obtain a first trial calculation result includes:
extracting a first security factor corresponding to the first security product from the security factor library;
extracting a premium formula corresponding to the first security factor from a preset security factor formula table;
and performing first protection Fei Shisuan on the first protection factor according to the premium formula to obtain the first trial calculation result.
Further, the configuring the security factor library of the insurance product information set includes:
acquiring an insurance product identifier in the insurance product information set, and determining a security factor set to be configured according to the insurance product identifier;
extracting a security factor entity set of the security factor set;
identifying a security entity relationship between the security factor sets;
and generating the security factor library according to the security factor entity set and the security entity relationship.
Further, the traversing the pre-constructed security binary tree based on the security policy number to obtain a second security product corresponding to the security policy number includes:
acquiring traversal logic, and performing deep traversal on the security binary tree according to the traversal logic and the security policy number to obtain a plurality of nodes;
Acquiring a root node path in the plurality of nodes, and inquiring and storing a target node corresponding to the second insurance product based on the root node path;
and executing a pop operation on the target node to obtain the second insurance product.
Further, the performing a second guarantee Fei Shisuan on the second insurance product to obtain a second trial calculation result includes:
extracting a second security factor corresponding to the second security product from the security binary tree;
extracting a premium formula corresponding to the second security factor from a preset security factor formula table;
and carrying out second premium trial calculation on the second security factor according to the premium formula to obtain a second trial calculation result.
Further, after the configuring the security factor library of the insurance product information set, before traversing the pre-built security binary tree based on the security policy number, the method further includes:
acquiring the hierarchical relation and the left pointer and the right pointer of the security factor library;
determining a root node, a left branch node and a right branch node of a security factor library based on the hierarchical relationship;
and connecting the security factors in the security factor library according to a tree structure by utilizing the left pointer and the right pointer according to the root node, the left branch node and the right branch node to obtain a security binary tree of the security factor library.
In order to solve the above technical problems, the embodiment of the present application further provides an insurance security processing apparatus, which adopts the following technical scheme:
the configuration module is used for acquiring an insurance product information set and configuring a security factor library of the insurance product information set;
the first trial calculation module is used for acquiring a security policy number to be processed and a security item corresponding to the security policy number, inquiring a corresponding first security product from the security factor library based on the security policy number, and performing first security Fei Shisuan on the first security product to obtain a first trial calculation result;
the traversing module is used for traversing the pre-constructed security binary tree based on the security policy number to obtain a second security product corresponding to the security policy number;
the second trial calculation module is used for carrying out second insurance Fei Shisuan on the second insurance product to obtain a second trial calculation result;
the comparison module is used for comparing the first trial calculation result with the second trial calculation result to obtain a comparison result; a kind of electronic device with high-pressure air-conditioning system
The security processing module is used for acquiring a target security policy corresponding to the security project from a preset security policy database if the comparison result is consistent, and performing security processing on the security product corresponding to the security policy number based on the target security policy; and if the comparison result is inconsistent, outputting a trial-and-error signal.
In order to solve the above technical problems, the embodiments of the present application further provide an apparatus, which adopts the following technical schemes:
a memory storing at least one computer program; a kind of electronic device with high-pressure air-conditioning system
And the processor executes the computer program stored in the memory to realize the insurance security processing method.
In order to solve the above technical problems, the embodiments of the present application further provide a computer readable medium, which adopts the following technical schemes:
the computer readable medium has stored therein at least one computer program that is executed by a processor in an electronic device to implement the insurance security processing method described above.
Compared with the prior art, the embodiment of the application has the following main beneficial effects:
in the embodiment of the application, firstly, the data integration of the insurance product information is realized by configuring the security factor library of the obtained insurance product information set, and the efficiency of subsequent security processing is improved; acquiring a security policy number and a corresponding security item thereof, inquiring a corresponding first security product from a security factor library according to the security policy number, and performing first security Fei Shisuan on the first security product to obtain a first trial calculation result, so that automatic trial calculation can be performed before security treatment, and the accuracy rate of subsequent security treatment can be improved conveniently; secondly, searching a second insurance product corresponding to the security policy number through a security binary tree, and performing second security Fei Shisuan on the second insurance product to obtain a second trial calculation result, and performing secondary trial calculation on the security product searched through the security binary tree to further improve the accuracy of subsequent security treatment; finally, comparing the first trial calculation result with the second trial calculation result to obtain a comparison result, if the comparison is consistent, acquiring a target security policy corresponding to the security project from a preset security policy database, performing security treatment on a security product corresponding to the security policy number based on the target security policy, and if the comparison is inconsistent, outputting a trial calculation error signal, so that the security treatment can be performed according to the two trial calculation results, the security treatment is not required to be performed manually, the situation that data is omitted or errors occur in calculation are avoided through manual experience, and the efficiency and accuracy of the security treatment are improved. Therefore, the security processing method, the security processing device, the security processing equipment and the security processing medium can improve the security processing efficiency and the security processing accuracy.
Drawings
For a clearer description of the solution in the present application, a brief description will be given below of the drawings that are needed in the description of the embodiments of the present application, it being obvious that the drawings in the following description are some embodiments of the present application, and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow chart of one embodiment of an insurance security processing method according to the present application;
FIG. 3 is a flow chart of one embodiment of step S202 of FIG. 2;
FIG. 4 is a schematic diagram of an embodiment of a security treatment apparatus according to the present application;
fig. 5 is a schematic structural view of an embodiment of the device according to the present application.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the applications herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "comprising" and "having" and any variations thereof in the description and claims of the present application and in the description of the figures above are intended to cover non-exclusive inclusions. The terms first, second and the like in the description and in the claims or in the above-described figures, are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
In order to better understand the technical solutions of the present application, the following description will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the accompanying drawings.
As shown in fig. 1, a system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as a web browser application, a shopping class application, a search class application, an instant messaging tool, a mailbox client, social platform software, etc., may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, electronic book readers, MP3 players (Moving Picture E security process perts Group Audio Layer III, moving Picture expert compression standard audio plane 3), MP4 players (Moving Picture E security process perts Group Audio Layer IV, moving Picture expert compression standard audio plane 4), laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background server providing support for pages displayed on the terminal devices 101, 102, 103.
It should be noted that, the security processing method provided in the embodiments of the present application is generally executed by a server/terminal device, and accordingly, the security processing apparatus is generally disposed in the server/terminal device.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to FIG. 2, a flow chart of one embodiment of a method of insurance security processing according to the present application is shown. The insurance security processing method comprises the following steps:
S201, acquiring an insurance product information set and configuring a security factor library of the insurance product information set.
In this embodiment of the present application, the insurance product information set includes an insurance product category, an insurance contract, an insurance policy, and insurance clauses. The security factor library is a knowledge base for storing a plurality of security factors, wherein the security factor library comprises security factors such as an applicant, a beneficiary, social security, age, gender, contract validity period, contract hesitation period, waiting period, whether to refund, continuous security, refund expense, continuous security expense and the like.
As one embodiment of the present application, the configuring the security factor library of the insurance product information set includes:
acquiring an insurance product identifier in the insurance product information set, and determining a security factor set to be configured according to the insurance product identifier;
extracting a security factor entity set of the security factor set;
identifying a security entity relationship between the security factor sets;
and generating the security factor library according to the security factor entity set and the security entity relationship.
The insurance product identifier may be a product name of an insurance product, and a specific insurance product may be determined through the insurance product identifier.
In an embodiment of the present application, a target insurance product may be determined based on an insurance product identifier, and insurance factors such as an insurance product, an applicant, a social security, an age, a sex, an application contract, a contract validation period, a contract validity period, a contract hesitation period, and a waiting period of the target insurance product are obtained, and the insurance factors are used as a security factor set to be configured.
In this embodiment of the present application, the entity set of security factors is an entity set of all security factors, including a social security entity, an age entity, a contract validity period entity, and the like; the security entity relationship refers to a relationship between security factor entities, such as a relationship between an insurance product entity and a corresponding insurance contract entity. Further, the security factor of the ternary structure can be generated based on the security factor entity set and the security entity relationship, and the security factor of the ternary structure can be stored through the security factor library.
In the embodiment of the application, the security factor library is generated according to the security factor entity set and the security entity relationship, so that a plurality of related security factors can be associated and stored, and the efficiency of security factor inquiry is improved.
S202, acquiring a security policy number to be processed and a security item corresponding to the security policy number, inquiring a corresponding first security product from the security factor library based on the security policy number, and performing first security Fei Shisuan on the first security product to obtain a first trial calculation result.
In the embodiment of the application, the security policy number refers to a policy number to be subjected to security processing, which is input by a user on a front-end page; the security items are security processing items corresponding to the policy numbers, such as insurance refunds, insurance renewals and the like; the first insurance product refers to an insurance product to be subjected to security treatment corresponding to the security policy number.
In this embodiment of the present application, the first trial calculation result refers to a security fee calculation result of the security product, including an applied fee, an refund fee, a renewal fee, and the like.
As an embodiment of the present application, referring to fig. 3, the first protection Fei Shisuan is performed on the first protection product to obtain a first calculation result, which includes the following steps S2021 to S2023:
s2021, extracting a first security factor corresponding to the first security product from the security factor library;
s2022, extracting a premium formula corresponding to the first security factor from a preset security factor formula table;
s2023, performing first security Fei Shisuan on the first security factor according to the premium formula to obtain the first trial calculation result.
The first security factor is a security factor corresponding to the first security product. For example, the first insurance product D is an endowment insurance, and the corresponding security factors are an endowment insurance contract hesitation period, a refund commission fee, a commission fee, and the like.
In this embodiment of the present application, the security factor formula table is a preset policy calculation formula table for calculating the security factor cost, and the formula in the security factor formula table is determined based on the actual situation of each security factor. For example, there is a guarantee product B, and the corresponding first security factor includes the applied payment fee, the guarantee refund commission, the contract hesitation period of the guarantee product B, etc., and the guarantee refund formula of the corresponding first security factor is: m=a or m=a (1-refund commission), where M is the first trial result and a is the applied payment fee; if the insurance product B contract of the insurance product B is not effective or the insurance product B contract hesitation period is carried out for the insurance product B, calculating according to the premium formula M=A; if the refund is performed outside the contract hesitation period of the insurance product B, the calculation is performed by the premium formula m=a (1-refund commission).
In this embodiment of the present application, according to the premium formula, the first security factor is subjected to first security Fei Shisuan, so as to obtain the first calculation result, so that the premium can be calculated before the security treatment, and the accuracy of the security treatment is improved without performing data calculation based on manual experience.
And S203, traversing the pre-constructed security binary tree based on the security policy number to obtain a second security product corresponding to the security policy number.
In this embodiment of the present application, the security binary tree is composed of a root node, a left branch node and a right branch node, where each node stores corresponding security factor information; the second insurance product is an insurance product to be subjected to security treatment corresponding to the security policy number, is generally consistent with the first insurance product, and is directly obtained from a security factor library only if the obtaining channel is different; the second insurance product is obtained from the secured binary tree.
In an optional embodiment of the present application, after the configuring the security factor library of the insurance product information set, before traversing the pre-constructed security binary tree based on the security insurance policy number, the method further includes:
acquiring the hierarchical relation and the left pointer and the right pointer of the security factor library;
determining a root node, a left branch node and a right branch node of a security factor library based on the hierarchical relationship;
and connecting the security factors in the security factor library according to a tree structure by utilizing the left pointer and the right pointer according to the root node, the left branch node and the right branch node to obtain a security binary tree of the security factor library.
The hierarchical relationship refers to a hierarchical relationship between each insurance product and a corresponding security factor library. The left pointer and the right pointer act as a left branch node or a right branch node for marking the node to which the security factor belongs, wherein the left pointer can be represented by BinTreTNode-left; the right pointer may be represented by bintreetnodode-right.
For example, the security factor library has 3 layers, each layer has 1 root node, the values 1, 3, 5 are root nodes from top to bottom, 2, 4, 6 are left branch nodes, 7, 8, 9 are right branch nodes, and the security factors in the security factor library are connected according to a tree structure through BinTreTNode-left, binTreTNode-right to obtain a security binary tree.
In this embodiment of the present application, according to the root node, the left branch node, and the right branch node utilize the left and right pointers to connect the security factors in the security factor library according to a tree structure, so as to obtain a security binary tree of the security factor library, which can realize hierarchical storage of the security factors, realize functions of adding, deleting and searching the security factors, and facilitate subsequent improvement of utilization efficiency of the security factors.
As an embodiment of the present application, the traversing the pre-constructed security binary tree based on the security policy number to obtain a second security product corresponding to the security policy number includes:
Acquiring traversal logic, and performing deep traversal on the security binary tree according to the traversal logic and the security policy number to obtain a plurality of nodes;
acquiring a root node path in the plurality of nodes, and inquiring and storing a target node corresponding to the second insurance product based on the root node path;
and executing a pop operation on the target node to obtain the second insurance product.
The traversal logic refers to a preamble traversal sequence, and the specific traversal sequence is the sequence from the root node, the left branch node to the right branch node.
In an embodiment of the present application, the root node represents a node storing information related to the second product, and the target node corresponding to the second insurance product can be found based on the path of the root node.
Further, in the embodiment of the present application, since the information stored in each node is stored by stacking, when the information stored in the node is acquired, the stack corresponding to the node is first set top, and the stack on the opposite top is popped, so that the second insurance product stored in the target node is obtained.
S204, performing second insurance Fei Shisuan on the second insurance product to obtain a second trial calculation result.
In this embodiment of the present application, the second trial calculation result refers to a security fee calculation result of the second security product, and also includes an applied fee, an refund fee, a renewal fee, and the like.
As an embodiment of the present application, the performing a second guarantee Fei Shisuan on the second insurance product to obtain a second trial calculation result includes:
extracting a second security factor corresponding to the second security product from the security binary tree;
extracting a premium formula corresponding to the second security factor from a preset security factor formula table;
and carrying out second premium trial calculation on the second security factor according to the premium formula to obtain a second trial calculation result.
The second security factor is a security factor corresponding to the second security product, and is mainly obtained from each node of the security binary tree, the obtained second security factor is stored in the dictionary, the stored keys and the values are in one-to-one correspondence, the keys can be the names of the security products, the corresponding values can be searched according to the keys, and the searching efficiency of the security factor is improved. For example, the second insurance product D is an endowment insurance, the corresponding security factors are also the hesitation period, the refund fee, the continuous fee, and the like of the endowment insurance contract, and the security factors are all stored in the dictionary.
Taking the refund insurance as an example, the embodiment of the application needs to compare the difference between the date of refund application (default day) and the effective date of the endowment insurance contract with the hesitation period of the endowment insurance contract in the dictionary, and if the difference is smaller than the hesitation period of the endowment insurance contract, calculating according to the premium formula m=a; if the difference is not less than the maintenance risk contract hesitation period, calculating according to the premium formula m=a (1-refund commission).
Specifically, the method for performing the second premium trial calculation on the second security factor according to the premium formula to obtain the second trial calculation result is consistent with the method for performing the first protection Fei Shisuan on the first security factor according to the premium formula in S202 to obtain the first trial calculation result, which is not described herein.
S205, comparing the first trial calculation result with the second trial calculation result to obtain a comparison result.
In this embodiment of the present application, the comparison result refers to whether the first trial result is consistent with the second trial result, and includes two results that are consistent with each other and inconsistent with each other.
As an embodiment of the present application, comparing the first trial result with the second trial result to obtain a comparison result includes:
Judging whether the first trial calculation result is consistent with the second trial calculation result; if the first trial calculation result is consistent with the second trial calculation result, determining that the comparison result is consistent; and if the first trial calculation result is inconsistent with the second trial calculation result, determining that the comparison result is inconsistent.
For example, if the applied fee of the insurance product B is 3000 and the applied fee of the insurance transaction is 20%, the first trial calculation result is 3000 x (1-20%) =2400; if the second trial calculation result is 2400, determining that the comparison result is consistent; if the second trial calculation result is not 2400, the comparison result is determined to be inconsistent.
In this embodiment of the application, through judging whether first trial calculation result with second trial calculation result is unanimous, can further improve the rate of accuracy of trial calculation, be convenient for follow-up when carrying out security treatment, only through the policy number of user input, carry out security treatment to the policy number according to the result of trial calculation voluntarily, improved security treatment's efficiency.
S206, if the comparison result is consistent, acquiring a target security policy corresponding to the security item from a preset security policy database, and performing security treatment on the security product corresponding to the security policy number based on the target security policy.
In this embodiment of the present application, the security policy database stores after-sales service data of all the insurance on the insurance platform, such as insurance refund, insurance restoration, annuity calculation service, and the like. The target security policy is a final security policy determined based on the security items, for example, if a security item is a refund security item, the target security policy may be a policy that refunds refund fees to the applicant account according to a trial result of the security product.
In an optional embodiment of the present application, the whole process of security processing is recorded in real time by calling an interface log in the process of security processing, and a security processing task table is generated, so that the progress of security processing is queried in real time, so that the security processing task is responded in time, and the timeliness of the security processing is ensured. The security processing task list comprises a security policy number, a security task state, a fee-related amount and the like.
S207, if the comparison result is inconsistent, outputting a trial-and-error signal.
In this embodiment of the present application, if the comparison result is inconsistent, the result of trial calculation is inaccurate, a trial calculation error signal is output, and the result of trial calculation is checked through the background of the insurance platform until the comparison result of trial calculation is consistent, a target security policy corresponding to the security project is obtained in the security policy database, and security processing is performed on the security product corresponding to the security policy number based on the target security policy.
Compared with the prior art, the embodiment of the application has the following main beneficial effects:
in the embodiment of the application, firstly, the data integration of the insurance product information is realized by configuring the security factor library of the obtained insurance product information set, and the efficiency of subsequent security processing is improved; acquiring a security policy number and a corresponding security item thereof, inquiring a corresponding first security product from a security factor library according to the security policy number, and performing first security Fei Shisuan on the first security product to obtain a first trial calculation result, so that automatic trial calculation can be performed before security treatment, and the accuracy rate of subsequent security treatment can be improved conveniently; secondly, searching a second insurance product corresponding to the security policy number through a security binary tree, and performing second security Fei Shisuan on the second insurance product to obtain a second trial calculation result, and performing secondary trial calculation on the security product searched through the security binary tree to further improve the accuracy of subsequent security treatment; finally, comparing the first trial calculation result with the second trial calculation result to obtain a comparison result, if the comparison is consistent, acquiring a target security policy corresponding to the security project from a preset security policy database, performing security treatment on a security product corresponding to the security policy number based on the target security policy, and if the comparison is inconsistent, outputting a trial calculation error signal, so that the security treatment can be performed according to the two trial calculation results, the security treatment is not required to be performed manually, the situation that data is omitted or errors occur in calculation are avoided through manual experience, and the efficiency and accuracy of the security treatment are improved. Therefore, the safety treatment method can improve the efficiency and accuracy of safety treatment.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by computer readable instructions stored in a computer readable medium that, when executed, may comprise the steps of the embodiments of the methods described above. The medium may be a nonvolatile medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a random access Memory (Random Access Memory, RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
With further reference to fig. 4, as an implementation of the method shown in fig. 2, the present application provides an embodiment of an insurance security processing apparatus, where an embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be specifically applied in various electronic devices.
As shown in fig. 4, the insurance security processing apparatus 400 according to the present embodiment includes: a configuration module 401, a first trial calculation module 402, a traversing module 403, a second trial calculation module 404, a comparison module 405 and a security processing module 406. Wherein:
the configuration module 401 is configured to obtain an insurance product information set, and configure a security factor library of the insurance product information set;
the first trial calculation module 402 is configured to obtain a security policy number to be processed and a security item corresponding to the security policy number, query a corresponding first security product from the security factor library based on the security policy number, and perform a first security Fei Shisuan on the first security product to obtain a first trial calculation result;
the traversing module 403 is configured to traverse the pre-constructed security binary tree based on the security policy number to obtain a second security product corresponding to the security policy number;
the second trial calculation module 404 is configured to perform a second guarantee Fei Shisuan on the second insurance product to obtain a second trial calculation result;
The comparison module 405 is configured to compare the first trial calculation result with the second trial calculation result to obtain a comparison result; a kind of electronic device with high-pressure air-conditioning system
The security processing module 406 is configured to obtain a target security policy corresponding to the security item from a preset security policy database if the comparison result is consistent, and perform security processing on the security product corresponding to the security policy number based on the target security policy; and if the comparison result is inconsistent, outputting a trial-and-error signal.
In the present embodiment, the functions concerning the respective modules/units are as follows:
the configuration module comprises:
the acquisition sub-module is used for acquiring the insurance product identifiers in the insurance product information set and determining a security factor set to be configured according to the insurance product identifiers;
an extraction sub-module, configured to extract a security factor entity set of the security factor set;
the identification sub-module is used for identifying the security entity relationship among the security factor sets;
and the generation sub-module is used for generating the security factor library according to the security factor entity set and the security entity relationship.
The first trial calculation module includes:
the first extraction submodule is used for extracting a first security factor corresponding to the first security product from the security factor library;
The second extraction submodule is used for extracting the premium formula corresponding to the first security factor from a preset security factor formula table;
and the third extraction submodule is used for carrying out first preservation Fei Shisuan on the first preservation factor according to the premium formula to obtain the first trial calculation result.
The traversing module comprises:
the traversal sub-module is used for acquiring traversal logic, and performing deep traversal on the security binary tree according to the traversal logic and the security policy number to obtain a plurality of nodes;
the storage sub-module is used for acquiring a root node path in the plurality of nodes and inquiring and storing a target node corresponding to the second insurance product based on the root node path;
the pop sub-module is used for executing the pop operation on the target node to obtain the second insurance product;
the traversal module is further to:
the relation acquisition sub-module is used for acquiring the hierarchical relation and the left pointer and the right pointer of the security factor library;
the node acquisition sub-module is used for determining a root node, a left branch node and a right branch node of the security factor library based on the hierarchical relationship;
and the connection sub-module is used for connecting the security factors in the security factor library according to a tree structure by utilizing the left pointer and the right pointer according to the root node, the left branch node and the right branch node to obtain a security binary tree of the security factor library.
The second trial calculation module includes:
a second security factor extraction sub-module, configured to extract a second security factor corresponding to the second security product from the security binary tree;
the premium formula extraction submodule is used for extracting a premium formula corresponding to the second security factor from a preset security factor formula table;
and the second premium test operator module is used for carrying out second premium test calculation on the second security factor according to the premium formula to obtain a second test calculation result.
In the embodiment of the application, firstly, the data integration of the insurance product information is realized by configuring the security factor library of the obtained insurance product information set, and the efficiency of subsequent security processing is improved; acquiring a security policy number and a corresponding security item thereof, inquiring a corresponding first security product from a security factor library according to the security policy number, and performing first security Fei Shisuan on the first security product to obtain a first trial calculation result, so that automatic trial calculation can be performed before security treatment, and the accuracy rate of subsequent security treatment can be improved conveniently; secondly, searching a second insurance product corresponding to the security policy number through a security binary tree, and performing second security Fei Shisuan on the second insurance product to obtain a second trial calculation result, and performing secondary trial calculation on the security product searched through the security binary tree to further improve the accuracy of subsequent security treatment; finally, comparing the first trial calculation result with the second trial calculation result to obtain a comparison result, if the comparison is consistent, acquiring a target security policy corresponding to the security project from a preset security policy database, performing security treatment on a security product corresponding to the security policy number based on the target security policy, and if the comparison is inconsistent, outputting a trial calculation error signal, so that the security treatment can be performed according to the two trial calculation results, the security treatment is not required to be performed manually, the situation that data is omitted or errors occur in calculation are avoided through manual experience, and the efficiency and accuracy of the security treatment are improved. Therefore, the safety treatment device can improve the efficiency and accuracy of safety treatment.
The device 5 comprises a memory 51, a processor 52, a network interface 53 which are communicatively connected to each other via a system bus. It should be noted that only the device 5 with components 51-53 is shown in the figures, but it should be understood that not all of the illustrated components are required to be implemented and that more or fewer components may be implemented instead. It will be appreciated by those skilled in the art that the device herein is a device capable of automatically performing numerical calculations and/or information processing in accordance with predetermined or stored instructions, the hardware of which includes, but is not limited to, microprocessors, application specific integrated circuits (Application Specific Integrated Circuit, ASICs), programmable gate arrays (fields-Programmable Gate Array, FPGAs), digital processors (Digital Signal Processor, DSPs), embedded devices, etc.
The device can be a computing device such as a desktop computer, a notebook computer, a palm computer, a cloud server and the like. The device can perform man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch pad or voice control equipment and the like.
The memory 51 includes at least one type of readable medium including flash memory, hard disk, multimedia card, card memory (e.g., SD or D-security processing memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), programmable Read Only Memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the storage 51 may be an internal storage unit of the device 5, such as a hard disk or a memory of the device 5. In other embodiments, the memory 51 may also be an external storage device of the device 5, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the device 5. Of course, the memory 51 may also comprise both an internal memory unit of the device 5 and an external memory device. In this embodiment, the memory 51 is typically used to store an operating system and various application software installed on the device 5, such as computer readable instructions of an insurance security processing method. Further, the memory 51 may be used to temporarily store various types of data that have been output or are to be output.
The processor 52 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 52 is typically used to control the overall operation of the device 5. In this embodiment, the processor 52 is configured to execute computer readable instructions stored in the memory 51 or process data, such as computer readable instructions for executing the insurance security processing method.
The network interface 53 may comprise a wireless network interface or a wired network interface, which network interface 53 is typically used for establishing a communication connection between the device 5 and other electronic devices.
In the embodiment of the application, firstly, the data integration of the insurance product information is realized by configuring the security factor library of the obtained insurance product information set, and the efficiency of subsequent security processing is improved; acquiring a security policy number and a corresponding security item thereof, inquiring a corresponding first security product from a security factor library according to the security policy number, and performing first security Fei Shisuan on the first security product to obtain a first trial calculation result, so that automatic trial calculation can be performed before security treatment, and the accuracy rate of subsequent security treatment can be improved conveniently; secondly, searching a second insurance product corresponding to the security policy number through a security binary tree, and performing second security Fei Shisuan on the second insurance product to obtain a second trial calculation result, and performing secondary trial calculation on the security product searched through the security binary tree to further improve the accuracy of subsequent security treatment; finally, comparing the first trial calculation result with the second trial calculation result to obtain a comparison result, if the comparison is consistent, acquiring a target security policy corresponding to the security project from a preset security policy database, performing security treatment on a security product corresponding to the security policy number based on the target security policy, and if the comparison is inconsistent, outputting a trial calculation error signal, so that the security treatment can be performed according to the two trial calculation results, the security treatment is not required to be performed manually, the situation that data is omitted or errors occur in calculation are avoided through manual experience, and the efficiency and accuracy of the security treatment are improved. Therefore, the safety treatment medium can improve the efficiency and accuracy of safety treatment.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a medium (such as ROM/RAM, magnetic disk, optical disk) comprising several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the embodiments of the present application.
It is apparent that the embodiments described above are only some embodiments of the present application, but not all embodiments, the preferred embodiments of the present application are given in the drawings, but not limiting the patent scope of the present application. This application may be embodied in many different forms, but rather, embodiments are provided in order to provide a more thorough understanding of the present disclosure. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described in the foregoing, or equivalents may be substituted for elements thereof. All equivalent structures made by the specification and the drawings of the application are directly or indirectly applied to other related technical fields, and are also within the protection scope of the application.

Claims (10)

1. The insurance security processing method is characterized by comprising the following steps:
acquiring an insurance product information set and configuring a security factor library of the insurance product information set;
acquiring a security policy number to be processed and a security item corresponding to the security policy number, inquiring a corresponding first security product from the security factor library based on the security policy number, and performing first security Fei Shisuan on the first security product to obtain a first trial calculation result;
traversing a pre-constructed security binary tree based on the security policy number to obtain a second security product corresponding to the security policy number;
performing a second guarantee Fei Shisuan on the second insurance product to obtain a second trial calculation result;
comparing the first trial calculation result with the second trial calculation result to obtain a comparison result;
if the comparison result is consistent, acquiring a target security policy corresponding to the security project from a preset security policy database, and performing security treatment on the security product corresponding to the security policy number based on the target security policy;
and if the comparison result is inconsistent, outputting a trial-and-error signal.
2. The method of claim 1, wherein performing a first security on the first security product Fei Shisuan to obtain a first trial result comprises:
extracting a first security factor corresponding to the first security product from the security factor library;
extracting a premium formula corresponding to the first security factor from a preset security factor formula table;
and performing first protection Fei Shisuan on the first protection factor according to the premium formula to obtain the first trial calculation result.
3. The insurance security processing method according to claim 1, wherein said configuring a security factor bank of said insurance product information set includes:
acquiring an insurance product identifier in the insurance product information set, and determining a security factor set to be configured according to the insurance product identifier;
extracting a security factor entity set of the security factor set;
identifying a security entity relationship between the security factor sets;
and generating the security factor library according to the security factor entity set and the security entity relationship.
4. The method for processing insurance security according to claim 1, wherein traversing the pre-constructed security binary tree based on the security policy number to obtain the second insurance product corresponding to the security policy number includes:
Acquiring traversal logic, and performing deep traversal on the security binary tree according to the traversal logic and the security policy number to obtain a plurality of nodes;
acquiring a root node path in the plurality of nodes, and inquiring and storing a target node corresponding to the second insurance product based on the root node path;
and executing a pop operation on the target node to obtain the second insurance product.
5. The method for protecting a security according to any one of claims 1 to 4, wherein the performing a second protection Fei Shisuan on the second security product to obtain a second trial result includes:
extracting a second security factor corresponding to the second security product from the security binary tree;
extracting a premium formula corresponding to the second security factor from a preset security factor formula table;
and carrying out second premium trial calculation on the second security factor according to the premium formula to obtain a second trial calculation result.
6. The insurance security processing method according to claim 1, wherein after said configuring of the security factor base of the insurance product information set, before traversing the pre-built security binary tree based on the security insurance policy number, the method further comprises:
Acquiring the hierarchical relation and the left pointer and the right pointer of the security factor library;
determining a root node, a left branch node and a right branch node of a security factor library based on the hierarchical relationship;
and connecting the security factors in the security factor library according to a tree structure by utilizing the left pointer and the right pointer according to the root node, the left branch node and the right branch node to obtain a security binary tree of the security factor library.
7. A security treatment device, comprising:
the configuration module is used for acquiring an insurance product information set and configuring a security factor library of the insurance product information set;
the first trial calculation module is used for acquiring a security policy number to be processed and a security item corresponding to the security policy number, inquiring a corresponding first security product from the security factor library based on the security policy number, and performing first security Fei Shisuan on the first security product to obtain a first trial calculation result;
the traversing module is used for traversing the pre-constructed security binary tree based on the security policy number to obtain a second security product corresponding to the security policy number;
the second trial calculation module is used for carrying out second insurance Fei Shisuan on the second insurance product to obtain a second trial calculation result;
The comparison module is used for comparing the first trial calculation result with the second trial calculation result to obtain a comparison result; a kind of electronic device with high-pressure air-conditioning system
The security processing module is used for acquiring a target security policy corresponding to the security project from a preset security policy database if the comparison result is consistent, and performing security processing on the security product corresponding to the security policy number based on the target security policy; and if the comparison result is inconsistent, outputting a trial-and-error signal.
8. The insurance security processing apparatus according to claim 7, wherein the first trial calculation module includes:
the first extraction submodule is used for extracting a first security factor corresponding to the first security product from the security factor library;
the second extraction submodule is used for extracting the premium formula corresponding to the first security factor from a preset security factor formula table;
and the test operator module is used for carrying out first preservation on the first preservation factor Fei Shisuan according to the premium formula to obtain the first test calculation result.
9. An apparatus comprising a memory having stored therein computer readable instructions, and a processor which when executed implements the steps of the insurance security processing method of any of claims 1 to 6.
10. A computer readable medium having stored thereon computer readable instructions which when executed by a processor implement the steps of the insurance security processing method according to any of claims 1 to 6.
CN202311315313.1A 2023-10-11 2023-10-11 Insurance security processing method, apparatus, equipment and medium Pending CN117273962A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311315313.1A CN117273962A (en) 2023-10-11 2023-10-11 Insurance security processing method, apparatus, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311315313.1A CN117273962A (en) 2023-10-11 2023-10-11 Insurance security processing method, apparatus, equipment and medium

Publications (1)

Publication Number Publication Date
CN117273962A true CN117273962A (en) 2023-12-22

Family

ID=89212207

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311315313.1A Pending CN117273962A (en) 2023-10-11 2023-10-11 Insurance security processing method, apparatus, equipment and medium

Country Status (1)

Country Link
CN (1) CN117273962A (en)

Similar Documents

Publication Publication Date Title
CN113326991B (en) Automatic authorization method, device, computer equipment and storage medium
CN113836131A (en) Big data cleaning method and device, computer equipment and storage medium
CN114398477A (en) Policy recommendation method based on knowledge graph and related equipment thereof
CN113010542B (en) Service data processing method, device, computer equipment and storage medium
CN116860856A (en) Financial data processing method and device, computer equipment and storage medium
CN115578170A (en) Financial batch certificate making method, device, equipment and storage medium
CN114637672A (en) Automatic data testing method and device, computer equipment and storage medium
CN117273962A (en) Insurance security processing method, apparatus, equipment and medium
CN114398562A (en) Shop data management method, device, equipment and storage medium
CN113779198A (en) Electronic business card generating method, device, equipment and medium based on artificial intelligence
CN110544165A (en) credit risk score card creating method and device and electronic equipment
CN113806372B (en) New data information construction method, device, computer equipment and storage medium
CN116932697A (en) Service data processing method based on rule engine optimization and related equipment
CN117273958A (en) Method, device, equipment and medium for processing kernel protection data based on rule engine
CN117407420A (en) Data construction method, device, computer equipment and storage medium
CN117389607A (en) Signboard configuration method and device, computer equipment and storage medium
CN117113400A (en) Data leakage tracing method, device, equipment and storage medium thereof
CN117273848A (en) Product recommendation method, device, equipment and storage medium based on artificial intelligence
CN114219664A (en) Product recommendation method and device, computer equipment and storage medium
CN117033601A (en) Intelligent question-answering method, device, equipment and medium based on network system
CN117422523A (en) Product online method and device, computer equipment and storage medium
CN116933290A (en) Data query method, device, computer equipment and storage medium
CN116862698A (en) Accounting document processing method and device, computer equipment and storage medium
CN116842011A (en) Blood relationship analysis method, device, computer equipment and storage medium
CN115795160A (en) Premium trial calculation engine inquiry management method and related equipment thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination