Skip to main content

Human Insurance Administration

                    Human Insurance  Administration


ABSTRACT

The objective of the project is to automate the management of insurance activities of an insurance company. The purpose is to design a system using which users can perform all activities related to insurance company.    


MODULE DESCRIPTION


Number of Modules

After careful analysis the system has been identified to have the following modules:

1.     CEO
2.     Manager
3.     Agent
4.     Customer

1. CEO module:
The CEO is the Super user of the System. The CEO is responsible for defining the policies, policy terms and conditions, policy amounts, establishing the different branches, registration of the branch managers. CEO will also get information about policy details, branch details, manager details, agents details, customers details, customers policy details
2. Manager module:
Manager is responsible for all activities at a specific branch. A manager appoints agents and interacts with customers. A manager can get data about customer policies, dues and payment details. A manager can also get agent details and commission information. A manager can generate various reports.

3. Agent module:
Agents are employees of the insurance company who interact with potential customers and offer the necessary details, agents typically act as a liaison between customers and company. Agents are entitled for commission for each policy they sell. Using the system an agent can find customer’s policies details, customer’s personal details, commission collected, reports, available policy details, concerned manager details and agent personal details.
4. Customer module:
Each customer must register with the system before one can avail the services. Customers can seek information regarding policies, register new policies, make online payments etc.

Hardware Required:

v System                       :           Pentium IV 2.4 GHz
v Hard Disk                 :           40 GB
v Floppy Drive            :           1.44 MB
v Monitor                     :           15 VGA colour
v Mouse                        :           Logitech.
v Keyboard                  :           110 keys enhanced.
v RAM                          :           256 MB


 

S/W System Configuration

v   Operating System               :   Windows 95/98/2000/NT4.0.
v   Application  Server  :   Wamp2.2e

v   Front End                               :   HTML, PHP.
v   Scripts                                   :   JavaScript.
v   Server side Script                :   PHP.
v   Database                               :   Mysql.
v   Database Connectivity       :   PhpMyAdmin.


Comments

Popular posts from this blog

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD report

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD ABSTRACT More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and se...

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM ABSTRACT Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as”the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either short or meaningful for easy memorization. With web applications and mobile apps piling up, people can access these applications anytime and anywhere with various devices. This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, we proposed a novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and ...

garbage monitoring using arduino code with gsm

#include <SoftwareSerial.h> #include <LiquidCrystal.h> //LiquidCrystal lcd(7, 6, 5, 4, 3, 2); LiquidCrystal lcd(13, 12, 11, 10, 9, 8); SoftwareSerial mySerial(0,1); #define trigPin 2 #define echoPin 3 #define PIR_sensor 4 #define m11 5 #define m12 6 void setup() {    lcd.begin(16, 2);    lcd.print("    Garbage    ");    Serial.println("garbage ");   lcd.setCursor(0,1);   lcd.print("   Open Close    ");   Serial.println(" open close");   delay(3000);   lcd.clear();   //lcd.print(" ");   delay(2000); mySerial.begin(9600); // Setting the baud rate of GSM Module Serial.begin (9600); pinMode(trigPin, OUTPUT); pinMode(echoPin, INPUT);  pinMode(m11, OUTPUT);   pinMode(m12, OUTPUT);   } void loop() {  readPIR();  pingDist();  SendMessage(); } void pingDist ()   {     long duration, distance;...