3. Project Description
⢠Insurance Envoy system is designed by Insurance
companies to make their application work on insurance
policies and claims process easier and flexible.
⢠Its an intranet based private web application, this web
based application is used within their organization under
the distributed accessibility to check the status of the
customers who have taken new policies and their proper
track and reminding of policy premium payments and
claim conditions.
⢠This system is actually developed to cater to the process
speed up in their business process such that the
customer satisfaction rates increase and the generic flow
of customers into this domain follows a smooth and
steady fashion.
WiCoReWireless & communication research
4. Limitations of existing system
⢠Time Delay
⢠Redundancy
⢠Low Accuracy
⢠Information retrieval is tedious process
⢠No security
Necessity is the mother of invention
WiCoReWireless & communication research
5. Advantages of the proposed system
⢠Speed of the task
⢠High Accuracy
⢠Systematized
⢠Reliable
⢠Secure
WiCoReWireless & communication research
6. Modules
WiCoReWireless & communication research
The total project consists of 7 modules:
ď§ Administrative module
ď§ Brokers information module
ď§ Customers information module
ď§ Policies information module
ď§ Policy payment module
ď§ Policy claims module
ď§ Insurance company information module
ď§ Security information module
7. Actors
WiCoReWireless & communication research
ď§ Broker
ď§ Policy holder
ď§ System administrator
The actors who have been recognized within the system
are:
8. Use Case Diagram For Administrator
WiCoReWireless & communication research
SEND MESSAGE
ADMIN
LOGIN REQUEST
ADD &
REMOVE
EMPLYOEEADD&
REMOVE
POLICIES
CHANGE
PROFILE
READ
MESSAGES
CHANGE EMPLOYEE
TYPE (DESIGNATION)
VIEW
EMPLOYEES
REMOVE EMPLOYEE
LOGIN
LOG OUT
ADD & REMOVE
CUSTOMER
VERIFICATION
SERVER
LOGIN
9. Elaborated Diagram of System Administrator
WiCoReWireless & communication research
Enter the
required data
as per the
standards
Raise request for
new company
information
Authenticate
login nameLogin
Authenticate
password
Enable
privileged
access
Check the
authentic of
information
Store
Raise request for
new customer
registration
Enter the required
data as per the
standards
Check the
authenticity of
information
Raise request for
new broker
registration
Enter the
required data
as per the
standards
Check for
due
payments
Store
Raise request for
new policy
registration
Check the
authenticity of
information
Enter the
required data
along with
standards
Store
Raise request for
new user login
creation
Enter the
required data as
per the
standards
Check the
authenticity of
information
Store
ďAdministrator
13. Testing
WiCoReWireless & communication research
TESTING TECHNIQUES
ď§ Black Box Testing.
ď§ White Box Testing.
LEVELS OF TESTING
ď§ Unit Testing.
ď§ Integration Testing.
ď§ System Testing.
ď§ User Acceptance Testing.
14. SYSTEM REQUIREMENTS
⢠Server
â Machine : Pentium IV Server
â Memory : 256 MB DDRAM
â Hard Drive : 80 GB HDD
â Display : 800x600 17" SVGA
Color Monitor
â UPS : 5 KVA
⢠Client
â Machine : Pentium III Client
â Memory : 128 MB DDRAM
â Hard Drive : 6 GB HDD
â Display : 800x600 17" SVGA
Color Monitor
â UPS : 2 KVA
â Operating System : WINDOWS 9X 2000
â Software : Tomcat 4.1
â Front-end Tool : JSP
â Back-end Tool : Oracle-9i
HARDWARE REQUIREMENTS
SOFTWARE REQUIREMENTS
WiCoReWireless & communication research
15. SCOPE FOR FUTURE WORK
This system is ever ready to attend the following needs of future:
⢠Interaction with external software.
⢠Facility to send any report by E-mail.
⢠Facility for Unicode generation.
⢠Facility for any advertisement publication.
⢠Any other feature that client needs.
WiCoReWireless & communication research