Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
The embodiment of the disclosure provides a manual examination and approval monitoring method and device, a computer system and a computer readable storage medium. According to the method, the approval process is added, the approval personnel is prompted before approval, secondary inspection is carried out after approval, and one approval of the application to be approved is completed after supervision and approval, so that the accuracy and the effectiveness of approval are improved, and the risk of approval errors is reduced.
Fig. 1 schematically illustrates an exemplary system architecture 100 to which a manual approval supervision method, apparatus, according to an embodiment of the present disclosure, may be applied. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the system architecture 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104 and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired and/or wireless communication links, and so forth.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as a shopping-like application, a web browser application, a search-like application, an instant messaging tool, a mailbox client, and/or social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the manual approval supervision method provided by the embodiment of the present disclosure may be generally executed by the server 105. Accordingly, the manual approval supervisory devices provided by the embodiments of the present disclosure may be generally disposed in the server 105. The manual approval supervision method provided by the embodiment of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the manual approval supervising means provided by the embodiment of the present disclosure may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Alternatively, the manual approval monitoring method provided by the embodiment of the present disclosure may also be executed by the terminal device 101, 102, or 103, or may also be executed by another terminal device different from the terminal device 101, 102, or 103. Correspondingly, the manual approval supervising device provided by the embodiment of the present disclosure may also be disposed in the terminal device 101, 102, or 103, or in another terminal device different from the terminal device 101, 102, or 103.
For example, the co-pending application may be originally stored in any of the terminal devices 101, 102, or 103 (e.g., but not limited to terminal device 101), or stored on an external storage device and may be imported into terminal device 101. Then, the terminal device 101 may locally perform the manual approval monitoring method provided by the embodiment of the present disclosure, or send the pending application to another terminal device, a server, or a server cluster, and perform the manual approval monitoring method provided by the embodiment of the present disclosure by another terminal device, a server, or a server cluster that receives the pending application.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
FIG. 2 schematically shows a flow chart of a manual approval supervision method according to an embodiment of the present disclosure.
As shown in fig. 2, the method includes operations S201 to S205.
In operation S201, a pending application is acquired.
In operation S202, the pending application is input into a business rule base, and the business information included in the pending application is preliminarily examined.
In operation S203, the sensitive information found in the preliminary examination is fed back to the approver for the approver to refer to and perform manual approval.
In operation S204, after the manual approval is completed, the approval is input to the business rule base for secondary review through an application.
In operation S205, when violation information is found in the secondary review, a supervisor is prompted to check the approval-passing application.
Compared with a common manual approval mode, the method increases an approval process, automatically pre-inspects the application to be approved before manual approval, prompts the approver before approval according to an approval result, enables the approver to carefully inspect according to information particularly pointed out in the prompt, avoids errors, automatically performs secondary inspection after approval, further prevents careless mistakes in manual approval, determines whether the manual approval is true or not through manual supervision and inspection if errors are found, and completes one approval of the application to be approved after the errors are confirmed, so that the approval accuracy and validity are improved, and the risk of approval errors is reduced. The method can be applied to the audit process of bank business handling, can realize the high-efficiency supervision of the intensive operation of the audit and approval business, realize the quality supervision full coverage, the risk deep excavation, the risk timely blocking and the reasonable assessment and evaluation of an approver, adapt to the deepening of the centralized audit and approval process of the credit card business, improve the intelligent and intensive management capability and effectively control the operation risk.
According to the manual approval and supervision method provided by the embodiment of the disclosure, the service rule base may include a plurality of service rules, each of the service rules defines an effective range and a sensitive range of one type of service information, and the effective range and the sensitive range are disjoint; each business rule is provided with a business label and used for associating the business rule with at least one type of business application.
For example, for business information of the name class, the corresponding business rule may specify a word count range and a surname range of the input name information; for the business information related to the amount, the corresponding business rule may specify an allowed amount range and an amount range to be noticed when the allowed amount range is exceeded, specifically, for example, for the amount of money for which the user applies for transfer, the allowed amount range is the balance on the account, and if the amount of money for which the user applies for transfer is higher than the rest amount, even if a partial debit is applied, the approving person should pay attention.
Each business rule carries at least one business label, for example, a business rule related to age, which can be associated with a loan transaction, a repayment transaction, and a public fund payment transaction.
Fig. 3 schematically shows a flowchart of step S202 according to an embodiment of the present disclosure.
As shown in FIG. 3, performing a preliminary review according to operation S202 includes operations S301-303.
In operation S301, the service category of the pending application is obtained.
In operation S302, the service labels of the service rules in the service rule base are all matched with the service categories, and a plurality of service rules associated with the pending application are obtained.
In operation S303, according to the obtained service rules, whether the corresponding service information in the pending application exceeds the effective range or belongs to the sensitive range is checked one by one, and a corresponding checking result is generated.
According to the embodiment of the disclosure, each pending application should have a service class label of the application service, and according to the label, the pending application is matched with each service rule in the service rule base one by one, so as to obtain the service rule corresponding to each service information in the pending application, and the corresponding service information is respectively matched through the service rule to judge whether the service information meets the specification or touches sensitive information, so as to generate corresponding prompt information, so as to promote the scrutiny of the related information by the approver, and avoid omission or errors in the approval.
Further, the business rule base also comprises a plurality of business categories, and the business categories are divided into sensitive business categories and conventional business categories. For example, a general banking operation application belongs to a general business class, such as applying for an account, logging off an account, and the like, and a business data sensitive business class related to a large amount of money transfer needs to be carefully approved.
Fig. 4 schematically shows another flowchart of step S202 according to an embodiment of the present disclosure.
As shown in fig. 4, the preliminary examination according to operation S202 further includes operations S401 to 402.
In operation S401, it is determined whether the service class of the pending application is a sensitive service class.
In operation S402, when the service class of the pending application is a sensitive service class, sensitive service audit information is generated.
According to embodiments of the present disclosure, this process is used to identify sensitive business categories, which should be handled with caution when processing applications such as large withdrawals, large deposit slips, or loans for senior users, low income users, etc., and the business is identified and prompted for strict approval by an approver.
Fig. 5 schematically shows a flowchart of step S203 according to an embodiment of the present disclosure.
As shown in FIG. 5, the steps of presenting the human approver according to step S203 include S501 to S502.
S501, generating a corresponding first prompt code and prompt information according to the sensitive information, wherein the first prompt information comprises the sensitive risk category and specific sensitive information of the application to be examined and approved.
And S502, displaying the first prompt code and the prompt information to an approver for viewing through a page.
For example, the current pending application relates to a high amount of money and includes, for example, the problem that the identity information is not completely filled or is wrongly filled, the service code corresponding to the high amount of money and the service code corresponding to the wrong information can be obtained, and the code, the information with the large amount of money and the wrong information are output together on a page for an approver to check so as to play a role of prompting in advance.
Fig. 6 schematically shows a flowchart of step S204 according to an embodiment of the present disclosure.
As shown in fig. 6, after the manual approval is completed, inputting the approval into the business rule base for secondary examination includes operations S601 to S603.
In operation S601, a plurality of business rules associated with the pending application are obtained from a business rule base.
In operation S602, according to the obtained service rule, whether the service information corresponding to the pending application belongs to an effective range is checked one by one.
In operation S603, when the service information is out of the valid range, violation service audit information is generated.
According to the embodiment of the disclosure, for the application whose approval has passed, in order to avoid the careless mistakes that are not found by manual examination, the second automatic examination is performed, the examination process is the same as the examination content of the first examination, or may be different from the examination process, for example, the application whose first examination found the problems of hard indexes such as name, gender, and age-out, even if the approval passed, the second examination may perform local examination again on the problems, and may perform global examination, or even return to the application.
It should be noted that the violation information and the sensitive information may be the same or different, and the sensitive information may include violation information, for example, for age information, if the age information is out of the normal range, the information is the sensitive information in the initial review, and if the application passes, the information is the violation information in the secondary review; for the large-amount fund transfer service, although the amount is within the allowable range in the primary examination, the large amount is carefully examined and approved, so that the large amount is classified as sensitive information, and the information does not exceed the allowable range in the secondary examination, so that violation information is not calculated; for name information, whether the word number or the surname of the name is correct or not is prompted in the primary examination, if the word number of the name is out of limit, the application is approved and approved in the manual examination and approval link, and if the information is found to be out of compliance with the specification in the secondary examination, the information belongs to violation information.
Fig. 7 schematically shows a flowchart of step S205 according to an embodiment of the present disclosure.
As shown in fig. 7, according to operation S205, when violation information is found in the secondary inspection, prompting the supervisor to check the approval-passing application includes operations S701 to S702.
In operation S701, the violation information is provided to a supervisor, so that the supervisor confirms whether the violation information is in compliance.
In operation S702, when the supervisor confirms that the violation information is not in compliance, the approval is returned to the approver for re-approval by an application.
In the embodiment of the disclosure, on one hand, the effect of the supervisor can improve the flexibility of approval, avoid some applications that can pass due to excessively strict approval from being considered as violations, on the other hand, the supervisor can confirm violation information and supervise and urge the approval personnel to strictly examine the applications.
Fig. 8 schematically shows a schematic diagram of an approval evaluation method according to an embodiment of the present disclosure.
As shown in FIG. 8, according to an embodiment of the present disclosure, in addition to performing the approval process according to the methods shown in FIGS. 1 to 7, operation S801 may be further included.
In operation S801, the approval accuracy of the approvers is counted, and the approvers are evaluated.
Therefore, the examination and approval personnel can be further supervised and urged to carry out strict examination and approval through the examination and evaluation result, and the work of the examination and approval personnel can be performed based on the examination and evaluation result.
FIG. 9 schematically illustrates a block diagram of a manual approval monitor, according to an embodiment of the present disclosure.
As shown in fig. 9, a manual approval supervisory device 900 includes: an application acquisition module 910, a preliminary examination module 920, a prompt manual module 930, a secondary examination module 940 and a supervision examination module 950.
An application obtaining module 910, configured to obtain the pending application.
And a preliminary review module 920, configured to input the pending application into a business rule base, and perform preliminary review on the business information included in the pending application.
And a prompt manual module 930, configured to feed back the sensitive information found in the preliminary examination to the approver for the approver to refer to and perform manual approval.
And a secondary examination module 940, configured to input the approval pass application into the service rule base for secondary examination after the manual approval is completed.
And a supervision and inspection module 950, configured to prompt a supervisor to check the approval passing application when violation information is found in the secondary inspection.
In the embodiment of the present disclosure, the service rule base includes a plurality of service rules, each of the service rules defines an effective range and a sensitive range of one type of service information, and the effective range and the sensitive range are disjoint; each business rule is provided with a business label and used for associating the business rule with at least one type of business application.
FIG. 10 schematically illustrates a block diagram of a preliminary review module according to an embodiment of the disclosure.
As shown in fig. 10, the preliminary review module 920 in embodiments of the present disclosure: category acquisition section 1001, first rule acquisition section 1002, and preliminary review determination section 1003.
A category obtaining unit 1001, configured to obtain a service category of the pending application.
A first rule obtaining unit 1002, configured to match the service label of each service rule in the service rule base with the service category, and obtain multiple service rules associated with the pending application.
A preliminary review determining unit 1003, configured to review, according to the obtained service rules, whether the corresponding service information in the pending application exceeds the effective range or belongs to a sensitive range one by one, and generate a corresponding review result.
In the embodiment of the present disclosure, the business rule base further includes a plurality of business categories, and the business categories are classified into sensitive business categories and normal business categories.
Fig. 11 schematically shows another structural block diagram of the preliminary examination module according to an embodiment of the present disclosure.
As shown in fig. 11, the preliminary examination module 920 includes, in addition to the category acquisition unit 1001, the first rule acquisition unit 1002, and the preliminary examination determination unit 1003: traffic class determination section 1101.
And the service type judging unit is used for judging whether the service type of the application to be examined and approved is a sensitive service type.
And when the service type of the application to be examined and approved is a sensitive service type, the service type judging unit generates sensitive service examination information.
FIG. 12 schematically illustrates a block diagram of a secondary review module in accordance with an embodiment of the disclosure.
As shown in fig. 12, according to an embodiment of the disclosure, the secondary review module 940 includes: a second rule obtaining unit 1201 and a second trial judgment unit 1202.
A second rule obtaining unit 1201, configured to obtain, from a business rule base, a plurality of business rules associated with the pending application.
A review determining unit 1202, configured to review, according to the obtained service rules, whether the service information corresponding to the pending application belongs to an effective range one by one.
When the service information exceeds the valid range, the review determination unit 1202 generates violation service review information.
Fig. 13 schematically illustrates a block diagram of a supervised review module in accordance with an embodiment of the present disclosure.
As shown in fig. 13, in accordance with the practice of the present disclosure, the supervised review module 950 includes: a supervision prompting unit 1301 and a return approval unit 1302.
A supervision prompting unit 1301, configured to provide the violation information to a supervisor, so that the supervisor confirms whether the violation information is in compliance;
and a returning and approving unit 1302, configured to, when the supervisor confirms that the violation information is not in compliance, return the approval to the approver through an application for re-approval.
FIG. 14 schematically illustrates a block diagram of a prompt artifact module according to an embodiment of the disclosure.
As shown in fig. 14, according to an embodiment of the present disclosure, the prompt artifact module 920 includes: presentation information generating section 1401 and presentation information presenting section 1402.
And a prompt information generating unit 1401, configured to generate a corresponding first prompt code and prompt information according to the sensitive information, where the first prompt information includes the sensitive risk category and specific sensitive information of the application to be approved.
And the prompt information display unit 1402 is configured to display the first prompt code and the prompt information to an approver for viewing through a page.
FIG. 15 schematically illustrates a block diagram of an evaluation module according to an embodiment of the disclosure.
As shown in fig. 15, the manual approval supervising device 900 in the embodiment of the present disclosure includes, in addition to an application acquiring module 910, a preliminary examining module 920, a prompting manual module 930, a secondary examining module 940, and a supervising examining module 950: an evaluation module 960.
And the evaluation module 960 is used for counting the approval accuracy of the approval personnel and evaluating the approval personnel.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any number of the application acquisition module 910, the preliminary examination module 920, the prompt manual module 930, the secondary examination module 940, the supervision examination module 950, and the evaluation module 960 may be combined and implemented in one module/unit/sub-unit, or any one of the modules/units/sub-units may be divided into a plurality of modules/units/sub-units. Alternatively, at least part of the functionality of one or more of these modules/units/sub-units may be combined with at least part of the functionality of other modules/units/sub-units and implemented in one module/unit/sub-unit. According to an embodiment of the present disclosure, at least one of the application acquisition module 910, the preliminary examination module 920, the prompt manual module 930, the secondary examination module 940, the supervision examination module 950, and the evaluation module 960 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or implemented by any one of three implementations of software, hardware, and firmware, or by a suitable combination of any several of them. Alternatively, at least one of the application acquisition module 910, the preliminary review module 920, the prompt human module 930, the secondary review module 940, the supervised review module 950, and the appraisal module 960 may be implemented at least in part as a computer program module that, when executed, may perform corresponding functions.
It should be noted that, the manual examination and approval monitoring apparatus part in the embodiment of the present disclosure corresponds to the manual examination and approval monitoring method part in the embodiment of the present disclosure, and the description of the manual examination and approval monitoring apparatus part specifically refers to the manual examination and approval monitoring part, which is not described herein again.
FIG. 16 schematically illustrates a block diagram of a computer system suitable for implementing the above-described method, according to an embodiment of the present disclosure. The computer system illustrated in FIG. 16 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 16, a computer system 1600 according to an embodiment of the present disclosure includes a processor 1601 that can perform various suitable actions and processes according to a program stored in a Read Only Memory (ROM)1602 or a program loaded from a storage portion 1608 into a Random Access Memory (RAM) 1603. Processor 1601 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or related chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. Processor 1601 may also include on-board memory for caching purposes. Processor 1601 may include a single processing unit or multiple processing units for performing different actions of a method flow according to embodiments of the present disclosure.
In the RAM 1603, various programs and data necessary for the operation of the system 1600 are stored. The processor 1601, the ROM 1602, and the RAM 1603 are connected to each other via a bus 1604. Processor 1601 performs various operations of the method flow according to embodiments of the present disclosure by executing programs in ROM 1602 and/or RAM 1603. It is noted that the programs may also be stored in one or more memories other than ROM 1602 and RAM 1603. The processor 1601 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
In accordance with an embodiment of the present disclosure, the system 1600 may also include an input/output (I/O) interface 1605, the input/output (I/O) interface 1605 also being connected to the bus 1604. The system 1600 may also include one or more of the following components connected to the I/O interface 1605: an input portion 1606 including a keyboard, a mouse, and the like; an output portion 1607 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and a speaker; a storage portion 1608 including a hard disk and the like; and a communication section 1609 including a network interface card such as a LAN card, a modem, or the like. The communication section 1609 performs communication processing via a network such as the internet. The driver 1610 is also connected to the I/O interface 1605 as needed. A removable medium 1611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 1610 as necessary, so that a computer program read out therefrom is mounted in the storage portion 1608 as necessary.
According to embodiments of the present disclosure, method flows according to embodiments of the present disclosure may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program containing program code for performing the method illustrated by the flow chart. In such embodiments, the computer program may be downloaded and installed from a network via the communication portion 1609, and/or installed from the removable media 1611. The computer program, when executed by the processor 1601, performs the above-described functions defined in the system of the embodiments of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to an embodiment of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium. Examples may include, but are not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
For example, according to embodiments of the present disclosure, a computer-readable storage medium may include one or more memories other than ROM 1602 and/or RAM 1603 and/or ROM 1602 and RAM 1603 described above.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.