Font Size: a A A

Design And Implementation Of Insurance Company Policy Management System Based On Chaotic Encryption

Posted on:2014-10-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2268330401465858Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the economy and the development of information technology, due to the rapiddevelopment of social productive forces and scientific and technological advances, it isthe exchange of information increased the depth and breadth, the amount of informationmanagement needs of rapid growth. In recent years, the insurance industry maintainedrapid development, but the application of IT investments and IT services has not keptpace with the pace of development. The insurance industry, information technology willtrigger a wave of new wave.The system in accordance with the life insurance company management needs todesign, front using JAVA development, back-end database using DB2. The System usedChaotic encryption to maintain the confidentiality of information policies,to preventleakage.Through the customer information table, policy table, policy approval form,claim forms, claims information query, the query features such as setting reminders,insurance salesman and insurance to meet the different needs of customers. Insurancesalesman based on the customer’s specific needs and make the appropriate policymanagement, the use of customer information table, policy table, table and other claimsinformation system to complete the overall policy process, in the case of the customer’sclaims, not only to automatically generate some data, You can also statisticalinformation on claims, and ultimately, generate report information.The system design process, more emphasis on the accuracy of billing system andoperation efficiency. Policy Management System has reached a sharing of resources,rapid transmission of information, process standardization, etc., to improve theefficiency played a significant role.
Keywords/Search Tags:Insurance Policy, Chaotic encryption, JAVA, JSP, DB2
PDF Full Text Request
Related items