SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Project Report
on
Insurance Envoy
WiCoReWireless & communication research
Project
Started on:20/12/2006
Ended on:28/3/2007
Project done at
WiCoRe Pvt. Ltd. Hyderabad
WiCoReWireless & communication research
Project Description
• Insurance Envoy system is designed by Insurance
companies to make their application work on insurance
policies and claims process easier and flexible.
• Its an intranet based private web application, this web
based application is used within their organization under
the distributed accessibility to check the status of the
customers who have taken new policies and their proper
track and reminding of policy premium payments and
claim conditions.
• This system is actually developed to cater to the process
speed up in their business process such that the
customer satisfaction rates increase and the generic flow
of customers into this domain follows a smooth and
steady fashion.
WiCoReWireless & communication research
Limitations of existing system
• Time Delay
• Redundancy
• Low Accuracy
• Information retrieval is tedious process
• No security
Necessity is the mother of invention
WiCoReWireless & communication research
Advantages of the proposed system
• Speed of the task
• High Accuracy
• Systematized
• Reliable
• Secure
WiCoReWireless & communication research
Modules
WiCoReWireless & communication research
The total project consists of 7 modules:
 Administrative module
 Brokers information module
 Customers information module
 Policies information module
 Policy payment module
 Policy claims module
 Insurance company information module
 Security information module
Actors
WiCoReWireless & communication research
 Broker
 Policy holder
 System administrator
The actors who have been recognized within the system
are:
Use Case Diagram For Administrator
WiCoReWireless & communication research
SEND MESSAGE
ADMIN
LOGIN REQUEST
ADD &
REMOVE
EMPLYOEEADD&
REMOVE
POLICIES
CHANGE
PROFILE
READ
MESSAGES
CHANGE EMPLOYEE
TYPE (DESIGNATION)
VIEW
EMPLOYEES
REMOVE EMPLOYEE
LOGIN
LOG OUT
ADD & REMOVE
CUSTOMER
VERIFICATION
SERVER
LOGIN
Elaborated Diagram of System Administrator
WiCoReWireless & communication research
Enter the
required data
as per the
standards
Raise request for
new company
information
Authenticate
login nameLogin
Authenticate
password
Enable
privileged
access
Check the
authentic of
information
Store
Raise request for
new customer
registration
Enter the required
data as per the
standards
Check the
authenticity of
information
Raise request for
new broker
registration
Enter the
required data
as per the
standards
Check for
due
payments
Store
Raise request for
new policy
registration
Check the
authenticity of
information
Enter the
required data
along with
standards
Store
Raise request for
new user login
creation
Enter the
required data as
per the
standards
Check the
authenticity of
information
Store
Administrator
Home Page
WiCoReWireless & communication research
Home Page For Administrator
WiCoReWireless & communication research
Administrator Zone
WiCoReWireless & communication research
Testing
WiCoReWireless & communication research
TESTING TECHNIQUES
 Black Box Testing.
 White Box Testing.
LEVELS OF TESTING
 Unit Testing.
 Integration Testing.
 System Testing.
 User Acceptance Testing.
SYSTEM REQUIREMENTS
• Server
– Machine : Pentium IV Server
– Memory : 256 MB DDRAM
– Hard Drive : 80 GB HDD
– Display : 800x600 17" SVGA
Color Monitor
– UPS : 5 KVA
• Client
– Machine : Pentium III Client
– Memory : 128 MB DDRAM
– Hard Drive : 6 GB HDD
– Display : 800x600 17" SVGA
Color Monitor
– UPS : 2 KVA
– Operating System : WINDOWS 9X 2000
– Software : Tomcat 4.1
– Front-end Tool : JSP
– Back-end Tool : Oracle-9i
HARDWARE REQUIREMENTS
SOFTWARE REQUIREMENTS
WiCoReWireless & communication research
SCOPE FOR FUTURE WORK
This system is ever ready to attend the following needs of future:
• Interaction with external software.
• Facility to send any report by E-mail.
• Facility for Unicode generation.
• Facility for any advertisement publication.
• Any other feature that client needs.
WiCoReWireless & communication research
Conclusion
WiCoReWireless & communication research
WiCoReWireless & communication research

Weitere ähnliche Inhalte

Andere mochten auch

Nanotechnology and its impact on modern computer
Nanotechnology and its impact on modern computerNanotechnology and its impact on modern computer
Nanotechnology and its impact on modern computerFarah M. Altufaili
 
Dna computing
Dna computingDna computing
Dna computingsathish3
 
DNA computing
DNA computingDNA computing
DNA computingashish dixit
 
Nanotechnology ppt
Nanotechnology pptNanotechnology ppt
Nanotechnology pptkirtisingh2011
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Andere mochten auch (7)

Nanotechnology and its impact on modern computer
Nanotechnology and its impact on modern computerNanotechnology and its impact on modern computer
Nanotechnology and its impact on modern computer
 
Ppt of nanocomputing
Ppt of nanocomputingPpt of nanocomputing
Ppt of nanocomputing
 
Dna computing
Dna computingDna computing
Dna computing
 
DNA computing
DNA computingDNA computing
DNA computing
 
Cse ppt
Cse pptCse ppt
Cse ppt
 
Nanotechnology ppt
Nanotechnology pptNanotechnology ppt
Nanotechnology ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Ähnlich wie Insurance envoy

Vendesk- Vendor Management Solution
Vendesk- Vendor Management SolutionVendesk- Vendor Management Solution
Vendesk- Vendor Management SolutionHighbar Technocrat
 
Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client RequirementsSteven Cahill
 
Chainyard BITA TYS presentation v0.1.11042019
Chainyard BITA TYS  presentation v0.1.11042019Chainyard BITA TYS  presentation v0.1.11042019
Chainyard BITA TYS presentation v0.1.11042019Mohan Venkataraman
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Risk Crew
 
FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91Shanmugavel Sankaran
 
PlanetVerify for Realtors.pptx
PlanetVerify for Realtors.pptxPlanetVerify for Realtors.pptx
PlanetVerify for Realtors.pptxRoisinRussell1
 
SAS 70 Type II Certification
SAS 70 Type II CertificationSAS 70 Type II Certification
SAS 70 Type II CertificationVirtacore Systems
 
Cp Team Caffeine Hosting Provider
Cp Team Caffeine Hosting ProviderCp Team Caffeine Hosting Provider
Cp Team Caffeine Hosting Providerguestfd062
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peteritnewsafrica
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns WSO2
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)Priyanka Aash
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudCryptzone
 
LifeOffice.net - Insurance Systems Built for Cloud
LifeOffice.net - Insurance Systems Built for CloudLifeOffice.net - Insurance Systems Built for Cloud
LifeOffice.net - Insurance Systems Built for CloudEdward Kuo
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...Sutedjo Tjahjadi
 
E Commerce: Its role and development
E Commerce: Its role and developmentE Commerce: Its role and development
E Commerce: Its role and developmentAnubha Rastogi
 
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009ClubHack
 
PCI 3.0 Compliance and Security for Retailers
PCI 3.0 Compliance and Security for RetailersPCI 3.0 Compliance and Security for Retailers
PCI 3.0 Compliance and Security for RetailersAerohive Networks
 
Outpost24 Webinar - To agent or not to agent
Outpost24 Webinar - To agent or not to agent Outpost24 Webinar - To agent or not to agent
Outpost24 Webinar - To agent or not to agent Outpost24
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud ServiceForgeRock
 

Ähnlich wie Insurance envoy (20)

Vendesk- Vendor Management Solution
Vendesk- Vendor Management SolutionVendesk- Vendor Management Solution
Vendesk- Vendor Management Solution
 
Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
 
Chainyard BITA TYS presentation v0.1.11042019
Chainyard BITA TYS  presentation v0.1.11042019Chainyard BITA TYS  presentation v0.1.11042019
Chainyard BITA TYS presentation v0.1.11042019
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91
 
PlanetVerify for Realtors.pptx
PlanetVerify for Realtors.pptxPlanetVerify for Realtors.pptx
PlanetVerify for Realtors.pptx
 
OIL and Gas - Sales and Distribution System
OIL and Gas -  Sales and Distribution SystemOIL and Gas -  Sales and Distribution System
OIL and Gas - Sales and Distribution System
 
SAS 70 Type II Certification
SAS 70 Type II CertificationSAS 70 Type II Certification
SAS 70 Type II Certification
 
Cp Team Caffeine Hosting Provider
Cp Team Caffeine Hosting ProviderCp Team Caffeine Hosting Provider
Cp Team Caffeine Hosting Provider
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the Cloud
 
LifeOffice.net - Insurance Systems Built for Cloud
LifeOffice.net - Insurance Systems Built for CloudLifeOffice.net - Insurance Systems Built for Cloud
LifeOffice.net - Insurance Systems Built for Cloud
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
 
E Commerce: Its role and development
E Commerce: Its role and developmentE Commerce: Its role and development
E Commerce: Its role and development
 
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
 
PCI 3.0 Compliance and Security for Retailers
PCI 3.0 Compliance and Security for RetailersPCI 3.0 Compliance and Security for Retailers
PCI 3.0 Compliance and Security for Retailers
 
Outpost24 Webinar - To agent or not to agent
Outpost24 Webinar - To agent or not to agent Outpost24 Webinar - To agent or not to agent
Outpost24 Webinar - To agent or not to agent
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud Service
 

Mehr von Sajan Sahu

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middlewareSajan Sahu
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memorySajan Sahu
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraftSajan Sahu
 
Data compretion
Data compretionData compretion
Data compretionSajan Sahu
 
Deadlock
DeadlockDeadlock
DeadlockSajan Sahu
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseingSajan Sahu
 
Information system
Information systemInformation system
Information systemSajan Sahu
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)Sajan Sahu
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatSajan Sahu
 
Database system
Database systemDatabase system
Database systemSajan Sahu
 
Bluetooth
Bluetooth Bluetooth
Bluetooth Sajan Sahu
 
Internet telephony
Internet telephonyInternet telephony
Internet telephonySajan Sahu
 
Criptography
CriptographyCriptography
CriptographySajan Sahu
 
Implimating counter
Implimating counterImplimating counter
Implimating counterSajan Sahu
 
Honeypot
HoneypotHoneypot
HoneypotSajan Sahu
 

Mehr von Sajan Sahu (20)

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middleware
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memory
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraft
 
Data compretion
Data compretionData compretion
Data compretion
 
Deadlock
DeadlockDeadlock
Deadlock
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseing
 
Information system
Information systemInformation system
Information system
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisat
 
Database system
Database systemDatabase system
Database system
 
GPRS
GPRSGPRS
GPRS
 
Bios
BiosBios
Bios
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
802.11
802.11802.11
802.11
 
Erp
ErpErp
Erp
 
Internet telephony
Internet telephonyInternet telephony
Internet telephony
 
Wcdma
WcdmaWcdma
Wcdma
 
Criptography
CriptographyCriptography
Criptography
 
Implimating counter
Implimating counterImplimating counter
Implimating counter
 
Honeypot
HoneypotHoneypot
Honeypot
 

KĂźrzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

KĂźrzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Insurance envoy

  • 2. Project Started on:20/12/2006 Ended on:28/3/2007 Project done at WiCoRe Pvt. Ltd. Hyderabad WiCoReWireless & communication research
  • 3. Project Description • Insurance Envoy system is designed by Insurance companies to make their application work on insurance policies and claims process easier and flexible. • Its an intranet based private web application, this web based application is used within their organization under the distributed accessibility to check the status of the customers who have taken new policies and their proper track and reminding of policy premium payments and claim conditions. • This system is actually developed to cater to the process speed up in their business process such that the customer satisfaction rates increase and the generic flow of customers into this domain follows a smooth and steady fashion. WiCoReWireless & communication research
  • 4. Limitations of existing system • Time Delay • Redundancy • Low Accuracy • Information retrieval is tedious process • No security Necessity is the mother of invention WiCoReWireless & communication research
  • 5. Advantages of the proposed system • Speed of the task • High Accuracy • Systematized • Reliable • Secure WiCoReWireless & communication research
  • 6. Modules WiCoReWireless & communication research The total project consists of 7 modules:  Administrative module  Brokers information module  Customers information module  Policies information module  Policy payment module  Policy claims module  Insurance company information module  Security information module
  • 7. Actors WiCoReWireless & communication research  Broker  Policy holder  System administrator The actors who have been recognized within the system are:
  • 8. Use Case Diagram For Administrator WiCoReWireless & communication research SEND MESSAGE ADMIN LOGIN REQUEST ADD & REMOVE EMPLYOEEADD& REMOVE POLICIES CHANGE PROFILE READ MESSAGES CHANGE EMPLOYEE TYPE (DESIGNATION) VIEW EMPLOYEES REMOVE EMPLOYEE LOGIN LOG OUT ADD & REMOVE CUSTOMER VERIFICATION SERVER LOGIN
  • 9. Elaborated Diagram of System Administrator WiCoReWireless & communication research Enter the required data as per the standards Raise request for new company information Authenticate login nameLogin Authenticate password Enable privileged access Check the authentic of information Store Raise request for new customer registration Enter the required data as per the standards Check the authenticity of information Raise request for new broker registration Enter the required data as per the standards Check for due payments Store Raise request for new policy registration Check the authenticity of information Enter the required data along with standards Store Raise request for new user login creation Enter the required data as per the standards Check the authenticity of information Store Administrator
  • 10. Home Page WiCoReWireless & communication research
  • 11. Home Page For Administrator WiCoReWireless & communication research
  • 12. Administrator Zone WiCoReWireless & communication research
  • 13. Testing WiCoReWireless & communication research TESTING TECHNIQUES  Black Box Testing.  White Box Testing. LEVELS OF TESTING  Unit Testing.  Integration Testing.  System Testing.  User Acceptance Testing.
  • 14. SYSTEM REQUIREMENTS • Server – Machine : Pentium IV Server – Memory : 256 MB DDRAM – Hard Drive : 80 GB HDD – Display : 800x600 17" SVGA Color Monitor – UPS : 5 KVA • Client – Machine : Pentium III Client – Memory : 128 MB DDRAM – Hard Drive : 6 GB HDD – Display : 800x600 17" SVGA Color Monitor – UPS : 2 KVA – Operating System : WINDOWS 9X 2000 – Software : Tomcat 4.1 – Front-end Tool : JSP – Back-end Tool : Oracle-9i HARDWARE REQUIREMENTS SOFTWARE REQUIREMENTS WiCoReWireless & communication research
  • 15. SCOPE FOR FUTURE WORK This system is ever ready to attend the following needs of future: • Interaction with external software. • Facility to send any report by E-mail. • Facility for Unicode generation. • Facility for any advertisement publication. • Any other feature that client needs. WiCoReWireless & communication research