SlideShare a Scribd company logo
1 of 17
Project Report
on
Insurance Envoy
WiCoReWireless & communication research
Project
Started on:20/12/2006
Ended on:28/3/2007
Project done at
WiCoRe Pvt. Ltd. Hyderabad
WiCoReWireless & communication research
Project Description
• Insurance Envoy system is designed by Insurance
companies to make their application work on insurance
policies and claims process easier and flexible.
• Its an intranet based private web application, this web
based application is used within their organization under
the distributed accessibility to check the status of the
customers who have taken new policies and their proper
track and reminding of policy premium payments and
claim conditions.
• This system is actually developed to cater to the process
speed up in their business process such that the
customer satisfaction rates increase and the generic flow
of customers into this domain follows a smooth and
steady fashion.
WiCoReWireless & communication research
Limitations of existing system
• Time Delay
• Redundancy
• Low Accuracy
• Information retrieval is tedious process
• No security
Necessity is the mother of invention
WiCoReWireless & communication research
Advantages of the proposed system
• Speed of the task
• High Accuracy
• Systematized
• Reliable
• Secure
WiCoReWireless & communication research
Modules
WiCoReWireless & communication research
The total project consists of 7 modules:
 Administrative module
 Brokers information module
 Customers information module
 Policies information module
 Policy payment module
 Policy claims module
 Insurance company information module
 Security information module
Actors
WiCoReWireless & communication research
 Broker
 Policy holder
 System administrator
The actors who have been recognized within the system
are:
Use Case Diagram For Administrator
WiCoReWireless & communication research
SEND MESSAGE
ADMIN
LOGIN REQUEST
ADD &
REMOVE
EMPLYOEEADD&
REMOVE
POLICIES
CHANGE
PROFILE
READ
MESSAGES
CHANGE EMPLOYEE
TYPE (DESIGNATION)
VIEW
EMPLOYEES
REMOVE EMPLOYEE
LOGIN
LOG OUT
ADD & REMOVE
CUSTOMER
VERIFICATION
SERVER
LOGIN
Elaborated Diagram of System Administrator
WiCoReWireless & communication research
Enter the
required data
as per the
standards
Raise request for
new company
information
Authenticate
login nameLogin
Authenticate
password
Enable
privileged
access
Check the
authentic of
information
Store
Raise request for
new customer
registration
Enter the required
data as per the
standards
Check the
authenticity of
information
Raise request for
new broker
registration
Enter the
required data
as per the
standards
Check for
due
payments
Store
Raise request for
new policy
registration
Check the
authenticity of
information
Enter the
required data
along with
standards
Store
Raise request for
new user login
creation
Enter the
required data as
per the
standards
Check the
authenticity of
information
Store
Administrator
Home Page
WiCoReWireless & communication research
Home Page For Administrator
WiCoReWireless & communication research
Administrator Zone
WiCoReWireless & communication research
Testing
WiCoReWireless & communication research
TESTING TECHNIQUES
 Black Box Testing.
 White Box Testing.
LEVELS OF TESTING
 Unit Testing.
 Integration Testing.
 System Testing.
 User Acceptance Testing.
SYSTEM REQUIREMENTS
• Server
– Machine : Pentium IV Server
– Memory : 256 MB DDRAM
– Hard Drive : 80 GB HDD
– Display : 800x600 17" SVGA
Color Monitor
– UPS : 5 KVA
• Client
– Machine : Pentium III Client
– Memory : 128 MB DDRAM
– Hard Drive : 6 GB HDD
– Display : 800x600 17" SVGA
Color Monitor
– UPS : 2 KVA
– Operating System : WINDOWS 9X 2000
– Software : Tomcat 4.1
– Front-end Tool : JSP
– Back-end Tool : Oracle-9i
HARDWARE REQUIREMENTS
SOFTWARE REQUIREMENTS
WiCoReWireless & communication research
SCOPE FOR FUTURE WORK
This system is ever ready to attend the following needs of future:
• Interaction with external software.
• Facility to send any report by E-mail.
• Facility for Unicode generation.
• Facility for any advertisement publication.
• Any other feature that client needs.
WiCoReWireless & communication research
Conclusion
WiCoReWireless & communication research
WiCoReWireless & communication research

More Related Content

Viewers also liked (7)

Nanotechnology and its impact on modern computer
Nanotechnology and its impact on modern computerNanotechnology and its impact on modern computer
Nanotechnology and its impact on modern computer
 
Ppt of nanocomputing
Ppt of nanocomputingPpt of nanocomputing
Ppt of nanocomputing
 
Dna computing
Dna computingDna computing
Dna computing
 
DNA computing
DNA computingDNA computing
DNA computing
 
Cse ppt
Cse pptCse ppt
Cse ppt
 
Nanotechnology ppt
Nanotechnology pptNanotechnology ppt
Nanotechnology ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Insurance envoy

Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
Steven Cahill
 
Cp Team Caffeine Hosting Provider
Cp Team Caffeine Hosting ProviderCp Team Caffeine Hosting Provider
Cp Team Caffeine Hosting Provider
guestfd062
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
WSO2
 
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
ClubHack
 

Similar to Insurance envoy (20)

Vendesk- Vendor Management Solution
Vendesk- Vendor Management SolutionVendesk- Vendor Management Solution
Vendesk- Vendor Management Solution
 
Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
 
Chainyard BITA TYS presentation v0.1.11042019
Chainyard BITA TYS  presentation v0.1.11042019Chainyard BITA TYS  presentation v0.1.11042019
Chainyard BITA TYS presentation v0.1.11042019
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91
 
PlanetVerify for Realtors.pptx
PlanetVerify for Realtors.pptxPlanetVerify for Realtors.pptx
PlanetVerify for Realtors.pptx
 
OIL and Gas - Sales and Distribution System
OIL and Gas -  Sales and Distribution SystemOIL and Gas -  Sales and Distribution System
OIL and Gas - Sales and Distribution System
 
SAS 70 Type II Certification
SAS 70 Type II CertificationSAS 70 Type II Certification
SAS 70 Type II Certification
 
Cp Team Caffeine Hosting Provider
Cp Team Caffeine Hosting ProviderCp Team Caffeine Hosting Provider
Cp Team Caffeine Hosting Provider
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the Cloud
 
LifeOffice.net - Insurance Systems Built for Cloud
LifeOffice.net - Insurance Systems Built for CloudLifeOffice.net - Insurance Systems Built for Cloud
LifeOffice.net - Insurance Systems Built for Cloud
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
 
E Commerce: Its role and development
E Commerce: Its role and developmentE Commerce: Its role and development
E Commerce: Its role and development
 
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
 
PCI 3.0 Compliance and Security for Retailers
PCI 3.0 Compliance and Security for RetailersPCI 3.0 Compliance and Security for Retailers
PCI 3.0 Compliance and Security for Retailers
 
Outpost24 Webinar - To agent or not to agent
Outpost24 Webinar - To agent or not to agent Outpost24 Webinar - To agent or not to agent
Outpost24 Webinar - To agent or not to agent
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud Service
 

More from Sajan Sahu (20)

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middleware
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memory
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraft
 
Data compretion
Data compretionData compretion
Data compretion
 
Deadlock
DeadlockDeadlock
Deadlock
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseing
 
Information system
Information systemInformation system
Information system
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisat
 
Database system
Database systemDatabase system
Database system
 
GPRS
GPRSGPRS
GPRS
 
Bios
BiosBios
Bios
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
802.11
802.11802.11
802.11
 
Erp
ErpErp
Erp
 
Internet telephony
Internet telephonyInternet telephony
Internet telephony
 
Wcdma
WcdmaWcdma
Wcdma
 
Criptography
CriptographyCriptography
Criptography
 
Implimating counter
Implimating counterImplimating counter
Implimating counter
 
Honeypot
HoneypotHoneypot
Honeypot
 

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 

Insurance envoy

  • 2. Project Started on:20/12/2006 Ended on:28/3/2007 Project done at WiCoRe Pvt. Ltd. Hyderabad WiCoReWireless & communication research
  • 3. Project Description • Insurance Envoy system is designed by Insurance companies to make their application work on insurance policies and claims process easier and flexible. • Its an intranet based private web application, this web based application is used within their organization under the distributed accessibility to check the status of the customers who have taken new policies and their proper track and reminding of policy premium payments and claim conditions. • This system is actually developed to cater to the process speed up in their business process such that the customer satisfaction rates increase and the generic flow of customers into this domain follows a smooth and steady fashion. WiCoReWireless & communication research
  • 4. Limitations of existing system • Time Delay • Redundancy • Low Accuracy • Information retrieval is tedious process • No security Necessity is the mother of invention WiCoReWireless & communication research
  • 5. Advantages of the proposed system • Speed of the task • High Accuracy • Systematized • Reliable • Secure WiCoReWireless & communication research
  • 6. Modules WiCoReWireless & communication research The total project consists of 7 modules:  Administrative module  Brokers information module  Customers information module  Policies information module  Policy payment module  Policy claims module  Insurance company information module  Security information module
  • 7. Actors WiCoReWireless & communication research  Broker  Policy holder  System administrator The actors who have been recognized within the system are:
  • 8. Use Case Diagram For Administrator WiCoReWireless & communication research SEND MESSAGE ADMIN LOGIN REQUEST ADD & REMOVE EMPLYOEEADD& REMOVE POLICIES CHANGE PROFILE READ MESSAGES CHANGE EMPLOYEE TYPE (DESIGNATION) VIEW EMPLOYEES REMOVE EMPLOYEE LOGIN LOG OUT ADD & REMOVE CUSTOMER VERIFICATION SERVER LOGIN
  • 9. Elaborated Diagram of System Administrator WiCoReWireless & communication research Enter the required data as per the standards Raise request for new company information Authenticate login nameLogin Authenticate password Enable privileged access Check the authentic of information Store Raise request for new customer registration Enter the required data as per the standards Check the authenticity of information Raise request for new broker registration Enter the required data as per the standards Check for due payments Store Raise request for new policy registration Check the authenticity of information Enter the required data along with standards Store Raise request for new user login creation Enter the required data as per the standards Check the authenticity of information Store Administrator
  • 10. Home Page WiCoReWireless & communication research
  • 11. Home Page For Administrator WiCoReWireless & communication research
  • 12. Administrator Zone WiCoReWireless & communication research
  • 13. Testing WiCoReWireless & communication research TESTING TECHNIQUES  Black Box Testing.  White Box Testing. LEVELS OF TESTING  Unit Testing.  Integration Testing.  System Testing.  User Acceptance Testing.
  • 14. SYSTEM REQUIREMENTS • Server – Machine : Pentium IV Server – Memory : 256 MB DDRAM – Hard Drive : 80 GB HDD – Display : 800x600 17" SVGA Color Monitor – UPS : 5 KVA • Client – Machine : Pentium III Client – Memory : 128 MB DDRAM – Hard Drive : 6 GB HDD – Display : 800x600 17" SVGA Color Monitor – UPS : 2 KVA – Operating System : WINDOWS 9X 2000 – Software : Tomcat 4.1 – Front-end Tool : JSP – Back-end Tool : Oracle-9i HARDWARE REQUIREMENTS SOFTWARE REQUIREMENTS WiCoReWireless & communication research
  • 15. SCOPE FOR FUTURE WORK This system is ever ready to attend the following needs of future: • Interaction with external software. • Facility to send any report by E-mail. • Facility for Unicode generation. • Facility for any advertisement publication. • Any other feature that client needs. WiCoReWireless & communication research