Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for authenticating identity of insured person, server of insurance institution and user terminal

An identity authentication and user terminal technology, applied in the medical field, can solve the problems of unfavorable physical recovery of the wounded, low authentication efficiency, waste of the insured's time, etc., to prevent someone from falsely claiming insurance money, improve efficiency, and save time.

Pending Publication Date: 2019-03-26
深圳平安医疗健康科技服务有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In order to prevent people from falsely claiming pensions, industrial injury compensation and other insurance benefits, the insured person needs to go to the insurance agency for identity verification in person, which makes the verification efficiency extremely low
The specific performance is as follows: on the one hand, the insured person needs to suffer from hard work to successfully receive insurance benefits, while the retirees who receive pensions are all elderly people, and it is not conducive to retirement to go to the insurance institution for unified identity verification every year The health of the personnel, or the employees who receive work-related compensation are all injured. Going to the insurance agency for identity verification in person is not conducive to the physical recovery of the wounded; on the other hand, waiting in line for identity verification one by one will also waste a lot of time for the insured

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating identity of insured person, server of insurance institution and user terminal
  • Method for authenticating identity of insured person, server of insurance institution and user terminal
  • Method for authenticating identity of insured person, server of insurance institution and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0052] see first figure 1 , figure 1 It is a schematic flowchart of an identity authentication method for an insured person provided in the embodiment of this application. Such as figure 1 Indicated methods of identifying the enrollee may include:

[0053] S11. The user terminal generates an identity authentication request according to an operation of the second user.

[0054] Specifically, the operation of the above-mentioned second user may open a client installed in the user terminal for the second user, and input an identity authentication instruction in the client. Wherein, the identity authentication instruction includes the identity information of the first user, the type identification of the insurance money that the first user needs to receive, and the identification of an insurance institution, and the insurance...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present application discloses an identity authentication method of an insured person, The method comprises the following steps: receiving an identity authentication request from auser terminal, wherein the identity authentication request includes identity information of a first user and a type identification of insurance money to be collected by the first user; the identity authentication request is generated by the user terminal according to an operation of a second user; and a user terminal. Obtaining qualification authentication information corresponding to the type identification of the first user according to the identity information, if the qualification authentication information indicates that the first user is eligible for the insurance premium identified bythe type identification, then obtaining a face image of a second user, performing identity authentication on the second user according to the face image to obtain an identity authentication result, and sending the identity authentication result to the user terminal, wherein the identity authentication result is used for indicating whether the second user and the first user are the same user or not. Embodiments of the present application can improve the efficiency of identity authentication for insured persons.

Description

technical field [0001] The invention relates to the field of medical technology, in particular to an identity authentication method of an insured person, an insurance institution server and a user terminal. Background technique [0002] In order to prevent people from fraudulently claiming pensions, work injury compensation and other insurance benefits, the insured person needs to go to the insurance agency for identity verification in person, which makes the verification efficiency extremely low. The specific performance is as follows: on the one hand, the insured person needs to suffer from hard work to successfully receive insurance benefits, while the retirees who receive pensions are all elderly people, and it is not conducive to retirement to go to the insurance institution for unified identity verification every year The health of the personnel, or the employees who receive work-related compensation are all injured. Going to the insurance agency for identity verificat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/08G06F21/32
CPCG06F21/32G06Q40/08
Inventor 陈国华刘洋
Owner 深圳平安医疗健康科技服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products