Method and terminal device for security audit of security policy based on information security

A technology of information security and insurance policy, applied in the field of information security, can solve problems such as inaccurate audit results, low audit efficiency, and high labor costs, and achieve the effect of eliminating the influence of manual audit supervisor factors, improving audit efficiency, and improving accuracy

Pending Publication Date: 2019-02-15
PING AN TECH (SHENZHEN) CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides an information security-based insurance policy preservation review method and terminal equipment to solve the problem of manually reviewing the customer's policy preservation information in the prior art. inaccurate question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and terminal device for security audit of security policy based on information security
  • Method and terminal device for security audit of security policy based on information security
  • Method and terminal device for security audit of security policy based on information security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0027] In order to illustrate the technical solutions of the present invention, specific examples are used below to illustrate.

[0028] see figure 1 , figure 1 It is a schematic flowchart of an information security-based insurance policy preservation review method provided by an embodiment of the present invention. In this embodiment, the server side is used as an example for illustration. Here...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the technical field of information security, Provided are a method and a terminal device for protecting and auditing a policy based on information security, The method comprises: receiving a security request sent by a client, the preservation request includes customer identification and policy change information. If the policy change factor includes an insurance information change factor, extracting the underwriting factor from the insurance information change factor, the underwriting factor coefficients for each underwriting factor are obtained, based on the underwriting factor coefficient and the customer 's importance rating, Determining the customer's risk index, obtaining customer information according to customer identity, extracting multiple risk keywords from customer information, According to the underwriting scores corresponding to a plurality of risk keywords and according to the underwriting scores, acquiring the underwriting index of the customer, and based on the comparison result of the risk index and the underwriting index, adding the preservation request with the corresponding approval mark, which can save the human cost of the preservation review of the preservation policy, improve the review efficiency, and improve the accuracy of the review.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an information security-based policy preservation review method and terminal equipment. Background technique [0002] An insurance policy (referred to as a policy) is a written proof that an insurance company has concluded an insurance contract with the insured. The insured is the customer of the insurance company. During the validity period of the policy, the insurance company can provide the customer with the service of changing the relevant information of the policy according to the request of the insurer, which is called policy preservation service. The relevant information of insurance policy preservation to changes in the policy includes adding additional insurance, reducing insurance, adding insurance, or changing the beneficiary or policyholder, etc. In order to control the risks of customers in handling policy preservation business, the insuranc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/10G06Q40/08
CPCG06Q10/10G06Q40/08
Inventor 唐红俊
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products