Method for evaluating security risk and terminal device

A big data and risk technology, applied in the field of big data processing, can solve the problems of inaccurate evaluation results, low evaluation efficiency, large labor costs, etc., to eliminate the influence of subjective factors, improve accuracy, and save labor costs.

Pending Publication Date: 2019-01-18
CHINA PING AN LIFE INSURANCE CO LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a method and terminal equipment for assessing preservation risks based on big data, so as to solve the problem of manual assessment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for evaluating security risk and terminal device
  • Method for evaluating security risk and terminal device
  • Method for evaluating security risk and terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0027] In order to illustrate the technical solutions of the present invention, specific examples are used below to illustrate.

[0028] see figure 1 , figure 1 It is a schematic flowchart of a method for assessing preservation risks based on big data provided by an embodiment of the present invention. In this embodiment, the server side is used as an example for illustration. Here, there may be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the technical field of big data processing. A method for evaluating security risk based on big data and terminal device are provided. The method comprises: receiving a security request sent by a client, the security request containing the customer's identity and policy change information, obtaining the customer history transaction information corresponding to the customer identity, and determining the customer 's reputation index according to the historical transaction information, identifying the policy change items in the policy change information, obtaining the project category of the policy change items, obtaining the risk value of each project category, importing the risk value into the preset risk model to obtain the risk index, and analyzing and evaluating the preservation request based on the reputation index and the risk index. The manual audit is not required, the embodiment of the invention can save the human cost of evaluating the preservationrisk, improve the evaluation efficiency, eliminate the influence of the subjective factors of the manual evaluation, and improve the accuracy of the evaluation.

Description

technical field [0001] The invention belongs to the technical field of big data processing, and in particular relates to a method and terminal equipment for assessing preservation risks based on big data. Background technique [0002] An insurance policy is a written proof that an insurance company has entered into an insurance contract with the insured. The insured is the customer of the insurance company. During the validity period of the policy, the insurance company can provide the customer with the service of changing the relevant information of the policy according to the request of the insurer, which is called policy preservation service. The relevant information of insurance policy preservation to changes in the policy includes adding additional insurance, reducing insurance, adding insurance, or changing the beneficiary or policyholder, etc. In order to control the risk of the customer in handling the policy preservation business, the insurance company needs to rev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/06G06Q40/08
CPCG06Q10/0635G06Q40/08
Inventor 吴国超
Owner CHINA PING AN LIFE INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products