CN119599776A - Method, device, equipment, storage medium and product for fidelity verification of fidelity - Google Patents
Method, device, equipment, storage medium and product for fidelity verification of fidelity Download PDFInfo
- Publication number
- CN119599776A CN119599776A CN202411583868.9A CN202411583868A CN119599776A CN 119599776 A CN119599776 A CN 119599776A CN 202411583868 A CN202411583868 A CN 202411583868A CN 119599776 A CN119599776 A CN 119599776A
- Authority
- CN
- China
- Prior art keywords
- fidelity
- verified
- verification
- feedback information
- result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Medical Informatics (AREA)
- Computing Systems (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a fidelity verification method, a device, equipment, a storage medium and a product, and relates to the technical field of computers, wherein the fidelity verification method comprises the steps of determining a fidelity to be verified and an establishment mechanism according to a request verification signal after receiving the request verification signal; and if the establishment mechanism is other lines, sending a fidelity inquiry message to the other lines based on the to-be-tested fidelity element, receiving the feedback information of the to-be-tested fidelity returned by the other lines, and associating the feedback information of the to-be-tested fidelity element with the to-be-tested fidelity element to determine a fidelity result of the to-be-tested fidelity. According to the method, the device and the system, the other line is used for sending the fidelity inquiry message, the feedback information is analyzed after the feedback information is received, and the feedback information and the fidelity elements to be verified are associated, so that the cross-line fidelity verification is realized, and the fidelity efficiency of the fidelity verification is further improved.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, a storage medium, and a product for fidelity verification.
Background
Under the current push of internet technology, most of the flow of domestic policy service has been converted into online processing by a digital system. In view of the consideration of business security, it becomes particularly critical to perform authenticity verification on each of the incumbents, so that the incumbent verification link cannot be ignored.
However, since the policy information is not common between different banking institutions, online fidelity of the policy cannot be performed across different banking institutions. When the bank receives the warrant, the client can only perform online verification on the warrant issued by the bank. In the face of a large number of established insuring functions from different banking institutions, the existing scheme requires operators to manually input relevant business elements to each bank respectively so as to perform independent verification operation of each bank, and has high error risk and low insuring verification efficiency.
The foregoing is provided merely for the purpose of facilitating understanding of the technical solutions of the present application and is not intended to represent an admission that the foregoing is prior art.
Disclosure of Invention
The application mainly aims to provide a method, a device, equipment, a storage medium and a product for verifying a fidelity of a fidelity, and aims to solve the technical problem of low verification efficiency of the fidelity in the prior art.
In order to achieve the above object, the present application provides a method for fidelity, which comprises:
after receiving a request verification signal, determining a to-be-verified fidelity and an opening mechanism according to the request verification signal;
identifying the to-be-verified fidelity letter is a to-be-verified fidelity element;
if the establishment mechanism is the other line, based on the to-be-verified fidelity factor, sending a fidelity inquiry message to the other line, receiving the verification feedback information returned by the other line, associating the verification feedback information with the to-be-verified fidelity factor, and determining a fidelity result.
In an embodiment, the step of receiving the feedback information of the verification returned by the other line, associating the feedback information of the verification with the element of the to-be-verified fidelity, and determining the fidelity result of the fidelity comprises:
receiving the verification feedback information returned by the other line, and judging the type of the verification feedback information;
if the verification feedback information is direct feedback information, reading the direct feedback information and determining a fidelity verification result;
And if the verification feedback information is a free message, carrying out the identification of the fidelity number of the free message through a large model, associating the to-be-verified fidelity elements of the free message corresponding to the fidelity number, and determining a fidelity verification result.
In an embodiment, the step of identifying the free message by using the large model and associating the free message with the to-be-verified element corresponding to the free message with the corresponding to-be-verified element includes:
The free message is sent to a large model, and a warranty number identification result and a message element identification result returned by the large model are received;
Based on the identification result of the guaranty number, determining the corresponding to-be-verified guaranty and the to-be-verified guaranty element;
If the message element identification result contains a fidelity element, associating the message element identification result with the fidelity element to be verified, and determining a fidelity verification result;
and if the message element identification result comprises the other line verification result, determining the other line verification result as a fidelity verification result.
In an embodiment, after the step of determining the to-be-verified fidelity and the opening mechanism according to the request verification signal after receiving the request verification signal, the method further includes:
if the establishment mechanism is the line, judging whether the to-be-verified fidelity exists or not;
If the to-be-verified fidelity is present, obtaining an open-form fidelity element of the to-be-verified fidelity, comparing the to-be-verified fidelity element with the open-form fidelity element, and determining a fidelity result.
In one embodiment, the step of identifying the to-be-verified-fidelity element of the to-be-verified-fidelity-comprises:
Judging the kind of the to-be-verified fidelity function;
If the to-be-verified fidelity is the fidelity of the picture format or the file format, the character recognition result is matched into to-be-verified fidelity elements by carrying out character recognition on the to-be-verified fidelity;
And if the to-be-verified fidelity is the manually-input fidelity, matching the manually-input information to be the to-be-verified fidelity element.
In an embodiment, the step of sending a policy query message to the other line and receiving verification feedback information returned by the other line includes:
generating a fidelity inquiry message according to the request verification signal and the fidelity and fidelity factor to be verified;
carrying out encryption signature on the warranty inquiry message through a preset encryption protocol and a private key of an issuing mechanism to obtain an encryption inquiry message;
Sending the encrypted query message to the issuing mechanism;
And receiving the encryption feedback information returned by the issuing mechanism, and decrypting the encryption feedback information according to the encryption protocol and a preset issuing mechanism public key to obtain verification feedback information.
In addition, in order to achieve the above object, the present application also provides a fidelity device, which includes:
The determining module is used for determining a to-be-verified fidelity and an opening mechanism according to the request verification signal after receiving the request verification signal;
the identification module is used for identifying the to-be-verified fidelity factor of the to-be-verified fidelity;
And the verification module is used for sending a fidelity inquiry message to the other line based on the to-be-verified fidelity factor if the establishment mechanism is the other line, receiving verification feedback information returned by the other line, associating the verification feedback information with the to-be-verified fidelity factor and determining a fidelity result.
In addition, in order to achieve the above object, the application also proposes a fidelity verification device, the device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program being configured to implement the steps of the fidelity verification method as described above.
In addition, to achieve the above object, the present application also proposes a storage medium, which is a computer-readable storage medium, on which a computer program is stored, which when being executed by a processor, implements the steps of the fidelity method as described above.
Furthermore, to achieve the above object, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the steps of the fidelity method as described above.
One or more technical schemes provided by the application have at least the following technical effects:
Compared with the prior art, the method has the advantages that after a request verification signal is received, the to-be-verified fidelity function and an opening mechanism are determined according to the request verification signal, to-be-verified fidelity function elements of the to-be-verified fidelity function are identified, if the opening mechanism is a line, a fidelity function query message is sent to the line based on the to-be-verified fidelity function elements, and verification feedback information returned by the line is received, and the to-be-verified fidelity function elements and the to-be-verified fidelity feedback information are associated to determine a fidelity result. It can be understood that the application adopts the method of transmitting the fidelity inquiry message to other lines to perform cross-line fidelity, when receiving the request verification signal, the application transmits the fidelity inquiry message through other lines, analyzes the feedback information after receiving the feedback information, and associates the feedback information with the fidelity element to be verified, thereby realizing the cross-line fidelity, so that the cross-line fidelity can be realized by associating the feedback information with the fidelity element to be verified based on the transmission of the fidelity inquiry message to other lines, and further the improvement of the fidelity efficiency of the cross-line fidelity can be realized.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the application or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a schematic flow chart of a method for fidelity according to an embodiment of the present application;
FIG. 2 is a flow chart of a second embodiment of the method for fidelity verification according to the present application;
FIG. 3 is a schematic diagram of elements provided in a first embodiment of the present application;
FIG. 4 is a schematic block diagram of a fidelity device according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a device structure of a hardware operating environment involved in a verification method according to an embodiment of the present application.
The achievement of the objects, functional features and advantages of the present application will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the technical solution of the present application and are not intended to limit the present application.
For a better understanding of the technical solution of the present application, the following detailed description will be given with reference to the drawings and the specific embodiments.
The main solutions of the embodiments of the present application are:
after receiving a request verification signal, determining a to-be-verified fidelity and an opening mechanism according to the request verification signal;
identifying the to-be-verified fidelity letter is a to-be-verified fidelity element;
if the establishment mechanism is the other line, based on the to-be-verified fidelity factor, sending a fidelity inquiry message to the other line, receiving the verification feedback information returned by the other line, associating the verification feedback information with the to-be-verified fidelity factor, and determining a fidelity result.
In this embodiment, the present application uses a fidelity device as an execution subject, and is described in detail below as a device for convenience of description.
In the prior art, after the bank receives the warrant, only the warrant issued by the bank can be subjected to online verification. In the face of a large number of incumbents open from different banking institutions, existing solutions require operators to physically go to each bank to manually enter relevant business elements for separate verification operations. Due to the intervention of manual operation, when the quantity of the incumbent is large, the risk of mistakes is increased, and the efficiency of the incumbent verification is obviously affected.
The application provides a solution, which comprises the steps of receiving a to-be-verified fidelity letter, identifying to-be-verified fidelity letter elements of the to-be-verified fidelity letter, determining an opening mechanism of the to-be-verified fidelity letter after receiving a request verification signal, sending a fidelity letter inquiry message to the other row if the opening mechanism is the other row, receiving feedback information of the other row, and associating the feedback information with the to-be-verified fidelity letter elements to determine a fidelity result of the to-be-verified fidelity letter. It can be understood that the application adopts the method of transmitting the fidelity inquiry message to other lines to perform cross-line fidelity, when receiving the request verification signal, the application transmits the fidelity inquiry message through other lines, analyzes the feedback information after receiving the feedback information, and associates the feedback information with the fidelity element to be verified, thereby realizing the cross-line fidelity, so that the cross-line fidelity can be realized by associating the feedback information with the fidelity element to be verified based on the transmission of the fidelity inquiry message to other lines, and the remarkable improvement of the fidelity efficiency can be realized.
Based on this, an embodiment of the present application provides a method for performing fidelity, and referring to fig. 1, fig. 1 is a schematic flow chart of a first embodiment of the method for performing fidelity according to the present application.
In this embodiment, the method for fidelity verification includes steps S10 to S30:
step S10, after receiving a request verification signal, determining a to-be-verified fidelity and an open-standing mechanism according to the request verification signal;
It should be noted that, the to-be-verified fidelity document refers to a document of a fidelity which has not been subjected to a verification process, and is submitted to a bank or other financial institution by the applicant to request for confirmation of the authenticity and validity of the fidelity document. The request verification signal refers to an explicit indication or command that a warranty verification process is required to be initiated, typically by the user or system, to trigger a subsequent verification step. The issuing institution refers to a bank or a financial institution for creating and issuing the warranty, is an original issuer of the warranty, and is responsible for the authenticity and accuracy of the contents of the warranty.
Step S20, identifying the element of the to-be-verified fidelity;
The to-be-verified fidelity element refers to key information and details which form the fidelity and need to be verified, including but not limited to the fidelity number, the money amount, the beneficiary information, the validity period, the establishment information and the like.
In one possible embodiment, step S20 may include:
receiving a to-be-verified fidelity function, and judging the type of the to-be-verified fidelity function;
If the to-be-verified fidelity is the fidelity of the picture format or the file format, the character recognition result is matched into to-be-verified fidelity elements by carrying out character recognition on the to-be-verified fidelity;
And if the to-be-verified fidelity is the manually-input fidelity, matching the manually-input information to be the to-be-verified fidelity element.
It should be noted that, the to-be-verified fidelity is a fidelity document which needs to be verified in authenticity, and the applicant submits the fidelity document to a bank or other financial institutions to request to confirm the authenticity and validity of the fidelity document. The types of the warranty refer to different formats or types of the warranty, such as a picture format, a file format, a manual input format and the like. Different types of warranties may require different methods for processing and verification. Character recognition refers to the process of converting text information in an image or file into machine-readable character data using Optical Character Recognition (OCR) or other automatic recognition technology. The picture format warranty refers to a warranty in the form of an image file, such as JPEG, PNG, and the like. The warranty of this format requires text information to be extracted from it by character recognition techniques. The file format warranty refers to a warranty in the form of an editable document, such as PDF, word, etc., and the warranty in such a format may contain structured text data that can be directly extracted and processed. The manual entry of the security document refers to the manual entry of the security document information, rather than direct extraction from the image or document, possibly from manual entry of the paper document or other non-automated data entry means. The to-be-verified fidelity letter element refers to key information and details which form a fidelity letter and need to be verified. This may include, but is not limited to, a guaranty number, an amount, beneficiary information, expiration date, institutional information, and the like. The matching operation is a process of comparing the extracted or entered warranty information with known warranty elements to be verified, and in order to verify the authenticity and effectiveness of the warranty, the extracted information is ensured to be consistent with the original warranty content.
For example, referring to fig. 3, fig. 3 provides an example of identifying, when a letter is manually entered, as a to-be-verified-letter element according to entered letter basic information, the to-be-verified-letter element including, but not limited to, a letter number, an amount of money, beneficiary information, a validity period, establishment information, and the like.
It can be appreciated that the present embodiment provides a method for verifying the authenticity and validity of a proof. The method comprises the following steps:
First, the device receives a warranty document that requires authenticity verification. The security document may be in an electronic format, such as a picture, document or database record, or in a paper format, requiring manual scanning or entry. The device automatically judges the type of the file according to the input file format of the file. If the warranty file is in a picture format (e.g., JPEG, PNG) or a file format (e.g., PDF, word), then the intelligent recognition step is entered. If the warranty file is manually entered text information, a manual entry step is entered.
And intelligent recognition, namely for the warranty in the picture format or the file format, automatically recognizing and extracting the text in the warranty by using an Optical Character Recognition (OCR) technology. OCR technology can accurately convert characters in an image into machine-readable text data. The device matches the OCR recognition result with a predefined warranty element template to extract key warranty elements such as warranty numbers, amounts, beneficiary information, validity periods, establishment information and the like. The device verifies the extracted warranty elements and checks the integrity and consistency of the extracted warranty elements. If missing or inconsistent elements are found, the device may prompt the user to make corrections or supplements.
And a step of manual input, in which, for the manually input warranty information, the device provides a user interface to allow the user to input or upload key elements of the warranty. The user inputs or selects corresponding policy elements in the interface, such as policy numbers, amounts, beneficiary information, etc. The device may provide drop down menus, text boxes, etc. input controls to simplify the data entry process. The device matches and verifies the warranty element input by the user with the predefined element template, and ensures the accuracy and the integrity of the input data.
Whichever method is used to extract and verify the element of the warrant, the device will ultimately generate a result of the warrant verification. The results indicate whether the policy passed the authenticity verification, as well as any found problems or anomalies. If the policy is verified, the device may generate a report or certificate of the verification passed for the user to download or print. If the warranty is not verified, the device may provide detailed reasons for the failure and prompt the user for the necessary correction or replenishment. For warranty requiring further review, the device may mark the relevant information as pending and notify the relevant personnel to conduct a manual review.
In this embodiment, the present application provides an automated and efficient method for verifying a file, which is suitable for a file with different formats and sources. The method utilizes advanced character recognition technology and user-friendly interface design, and improves accuracy and convenience of fidelity of the fidelity.
And step S30, if the establishment mechanism is the other line, sending a fidelity inquiry message to the other line based on the to-be-tested fidelity factor, receiving the fidelity feedback information returned by the other line, and associating the fidelity feedback information with the to-be-tested fidelity factor to determine a fidelity result.
In one possible embodiment, step S30 may include:
receiving the verification feedback information returned by the other line, and judging the type of the verification feedback information;
if the verification feedback information is direct feedback information, reading the direct feedback information and determining a fidelity verification result;
And if the verification feedback information is a free message, carrying out the identification of the fidelity number of the free message through a large model, associating the to-be-verified fidelity elements of the free message corresponding to the fidelity number, and determining a fidelity verification result.
It should be noted that, the verification feedback information of the other line refers to a response or information about the fidelity process of the fidelity provided by another bank or financial institution, including a result of the fidelity verification, a status update, or other relevant information. The variety of the authentication feedback information involves classifying the received information to determine its nature and the processing steps that should be taken, the feedback information being classified as either direct feedback information or free message. The direct feedback information refers to information which is directly provided by other lines and is clear and correct about the fidelity result of the fidelity. Such information is typically used directly to determine the verification result without further processing or parsing. The free message refers to text information provided by the other line and having a non-fixed or non-standardized format, and additional processing or analysis is needed to extract useful data. The large model refers to a complex and highly developed algorithm model based on machine learning or artificial intelligence technology, and is used for identifying and analyzing specific information in a free message, such as a policy number. The to-be-verified fidelity letter element refers to key information and details which form a fidelity letter and need to be verified. This may include, but is not limited to, a guaranty number, an amount, beneficiary information, expiration date, institutional information, and the like. The association operation refers to a process of matching the identified guaranty number with the corresponding to-be-verified guaranty element in the database, so as to ensure that the information in the free message is associated with the correct guaranty. The fidelity result of the fidelity is a conclusion obtained according to direct feedback information or through the associated free message, and whether the fidelity passes the authenticity verification is indicated. This result may be positive (warranty valid), negative (warranty invalid or problematic), or other conditions requiring further review.
In another possible implementation manner, the step of identifying the free message by using the large model and associating the free message with the to-be-verified element corresponding to the free message with the free message number, and determining the fidelity result includes:
The free message is sent to a large model, and a warranty number identification result and a message element identification result returned by the large model are received;
Based on the identification result of the guaranty number, determining the corresponding to-be-verified guaranty and the to-be-verified guaranty element;
If the message element identification result contains a fidelity element, associating the message element identification result with the fidelity element to be verified, and determining a fidelity verification result;
and if the message element identification result comprises the other line verification result, determining the other line verification result as a fidelity verification result.
Illustratively, the device first receives a free message from his row. The free message refers to text information with a non-fixed format and non-standardized, and may include a guaranty number, a guaranty element or a verification result of other lines. And sending the received free message to a large model, wherein the large model is a mature complex algorithm model based on machine learning or artificial intelligence technology and is used for identifying and analyzing key information in the free message. The device receives the recognition results returned by the large model, wherein the recognition results comprise a warranty number recognition result and a message element recognition result. The warranty number recognition result refers to the warranty number extracted from the free message, and the message element recognition result refers to other warranty elements or verification results extracted from the free message. Based on the identification result of the guaranty number, the device searches the corresponding to-be-verified guaranty record and its elements in the database. This step is to correlate the information extracted from the free message with the correct warranty. If the message element identification result contains the warranty elements (such as the amount of money, beneficiary information and the like), the device correlates and matches the elements with the to-be-verified warranty elements in the database. By comparing these elements, the device can determine the authenticity of the warranty. If the message element identification result contains the fidelity element, the device determines the fidelity verification result by comparing the element with the to-be-verified fidelity element. If all elements are completely matched, the verification passes, otherwise, the verification fails. If the message element identification result contains the verification result (such as verification pass, verification fail, etc.) of the other line, the device directly takes the result as the fidelity verification result. Whichever way the fidelity result of the fidelity is determined, the device will output the final result to the user. The verification result may be in the form of an electronic report detailing whether the policy is verified, and any found problems or anomalies.
In another possible implementation manner, the step of sending the warranty query message to the other row and receiving the feedback information of the other row includes:
generating a fidelity inquiry message according to the request verification signal and the fidelity and fidelity factor to be verified;
carrying out encryption signature on the warranty inquiry message through a preset encryption protocol and a private key of an issuing mechanism to obtain an encryption inquiry message;
Sending the encrypted query message to the issuing mechanism;
And receiving the encryption feedback information returned by the issuing mechanism, and decrypting the encryption feedback information according to the encryption protocol and a preset issuing mechanism public key to obtain verification feedback information.
It should be noted that the request verification signal refers to an electronic signal initiated by a user or a system to request verification of authenticity of a certain warranty. This signal may contain basic information about the policy, such as the policy number, the establishment, etc., to facilitate subsequent inquiry and verification processes. The warranty inquiry message is an electronic document, and contains all necessary information for inquiring the detailed information of a specific warranty in the financial network. The encryption protocol refers to a standardized set of rules and algorithms for encrypting and decrypting data in the communication process so as to ensure the safety and the integrity of the data and ensure that the security inquiry message is not read or tampered by an unauthorized third party in the transmission process. The private key of the establishment refers to a key held by the warranty establishment and used for digitally signing the electronic document. The cryptographic signature is a process of encrypting data by using a private key of a sender to prove the origin and integrity of the data. The encrypted query message refers to a warranty query message after encryption signature processing. The issuing institution refers to a financial institution that initially creates or issues an warranty. In the invention, the establishment mechanism is responsible for receiving the inquiry message, verifying the authenticity of the guaranty function and returning the verification feedback information. The encryption feedback information is electronic information which is returned by the establishment mechanism and contains the warranty verification result. This information is also encrypted by an encryption protocol to ensure its security and integrity on the way back. The preset public key of the public institution is a public key for decrypting the encrypted feedback information. The verification feedback information is plaintext information which is returned by the establishment mechanism and contains a verification result of the fidelity. This information is obtained after decrypting the encrypted feedback information, providing the authenticity verification result of the warranty.
The embodiment provides a method for realizing cross-line fidelity verification by sending a fidelity inquiry message to other lines, wherein when a request verification signal is received, the fidelity inquiry message is sent through the other lines, the feedback information is analyzed after the feedback information is received, and the feedback information and the fidelity elements to be verified are associated, so that the cross-line fidelity verification is realized, and the cross-line fidelity verification can be realized by associating the feedback information and the fidelity elements to be verified based on the fidelity inquiry message sent to the other lines, so that the remarkable improvement of the fidelity verification efficiency of the cross-line fidelity is realized.
In a possible embodiment, step S20 may be followed by:
if the establishment mechanism is the line, judging whether the to-be-verified fidelity exists or not;
If the to-be-verified fidelity is present, obtaining an open-form fidelity element of the to-be-verified fidelity, comparing the to-be-verified fidelity element with the open-form fidelity element, and determining a fidelity result.
The issuing institution refers to a bank or a financial institution responsible for issuing an insurance policy. In the present invention, the establishment may be the present bank (i.e., the bank performing the authentication operation) or other banks. Determination of the establishment is critical to the subsequent fidelity process. The present line refers to a bank or financial institution performing a fidelity operation. In contrast to other lines, this line usually has the original data and records of the fidelity to be verified, and can be used for comparison with the fidelity to be verified. The to-be-verified fidelity document refers to a fidelity document which needs to be subjected to authenticity verification. This document may be submitted by the applicant to a bank or other financial institution requesting confirmation of the authenticity and validity of the warranty. The open policy element refers to key information and details generated in the policy opening process, such as policy number, amount, beneficiary information, validity period, open institution information, and the like. These elements are recorded in the database of the line for comparison with the fidelity of the test. The to-be-verified fidelity letter element refers to key information and details extracted from the to-be-verified fidelity letter file. These elements may be obtained by character recognition, manual entry, or other methods and used for comparison with the element of creating an warranty. The result of the fidelity test of the fidelity is a conclusion obtained according to the comparison operation, and shows whether the fidelity passes the authenticity test. This result may be positive (warranty valid), negative (warranty invalid or problematic), or other conditions requiring further review.
Illustratively, the device receives a copy of the to-be-verified-fidelity-document, which may be submitted in electronic form, such as a PDF document sent via an online platform of a bank or via email. The device automatically detects the establishment information on the warranty, or receives the signal that the establishment information is the line, and confirms that the warranty is established by the line, which can be realized by checking the information such as a bank identifier, a signature or a seal on the warranty. The device queries an internal database, judges whether the to-be-verified fidelity is present, and matches the fidelity number on the fidelity with the record in the database. If the device confirms that the fidelity of the product to be verified does exist, the device will then retrieve from the database the element of the product to be verified that is associated with the product. These elements may include, but are not limited to, a guaranty number, an amount, beneficiary information, expiration date, and any specific terms and conditions. Meanwhile, the device extracts corresponding elements from the submitted to-be-verified fidelity document. The device compares the extracted to-be-verified fidelity function elements with the open fidelity function elements in the database one by one. And finally determining the verification result of the guaranty according to the comparison result. If all the key elements are completely matched, a report of passing of the verification is generated, and if the unmatched elements exist, the verification is reported to fail and the specific difference is pointed out. The device outputs the verification result to the user in the form of an electronic report and provides further processing advice as required. For example, if the verification fails, the device recommends the user to contact the establishment for verification or to provide additional proof material.
For an example, in order to facilitate understanding of the implementation flow of the method of fidelity by combining the first embodiment with the second embodiment, please refer to fig. 2, fig. 2 provides a schematic flow chart of a method of fidelity, specifically:
And the client uploads the warranty text in PDF or picture format by clicking an intelligent identification button on the user interface. After receiving the uploaded file, the device automatically recognizes and extracts the warranty elements in the text, such as the warranty number, the warranty amount, the beneficiary, and the like, by utilizing an Optical Character Recognition (OCR) technology. The identified elements are automatically filled into corresponding fields preset by the system so as to facilitate subsequent processing.
After the customer confirms that the identification result is correct, the user clicks the confirm button, and the device records the warranty data, including the warranty number, the amount, the beneficiary and other information, and stores the data in the database for subsequent examination.
The client clicks on the fidelity details again and chooses to initiate the verification operation. The device establishes a bank according to the security function selected by the customer, and automatically judges whether to initiate the true check of the line or the true check of the line crossing.
If the present line of verification is selected, the device will query the database for the presence of a record of the pen's holder. If so, the device further compares the relevant elements of the collection of the preservation function filled in by the client with the preservation function elements recorded when the line is opened. If all the elements match, the verification is successful and the device will mark the fidelity as true and valid.
If the cross-line authentication is selected, the device sends a warrant information inquiry message to the opposite bank through the message system. After receiving the inquiry message, the opposite bank can choose to directly feed back the inquiry result or feed back the inquiry result through a free message system.
If the opposite bank directly feeds back the inquiry, the client can inquire the relevant verification result in the system in real time. If the other bank feeds back through the free message, the device receives the feedback messages with different formats. Because feedback formats of the banks are different, and the warranty numbers may contain Chinese and English characters and symbols, the accuracy of the traditional regular expression recognition method is low. Therefore, the large model is adopted to identify the warranty number, so that the identification accuracy is improved. After the device identifies the fidelity number of the message, the information is used to correlate with the data initiated by the user to verify, and the result is reflected to the verification result. Thus, the client can inquire the accurate verification result in the system. After the device completes the above-mentioned verification operation, the verification result is processed, the state of the fidelity is marked, and the final verification result is displayed on the user interface. So far, the verification process is finished.
It should be noted that the foregoing examples are only for understanding the present application, and are not meant to limit the method of the present application, and more forms of simple transformation based on the technical concept are all within the scope of the present application.
The application further provides a device for verifying a fidelity, referring to fig. 4, the device for verifying a fidelity comprises:
The determining module 10 is used for determining a to-be-verified fidelity and an open-standing mechanism according to the request verification signal after receiving the request verification signal;
the identification module 20 is configured to identify a to-be-verified-fidelity element of the to-be-verified-fidelity;
And the verification module 30 is configured to send a fidelity inquiry message to the other line based on the to-be-verified fidelity factor if the establishment is the other line, receive verification feedback information returned by the other line, and associate the verification feedback information with the to-be-verified fidelity factor to determine a fidelity result.
And/or the verification module 30 comprises:
The first receiving module is used for receiving the verification feedback information returned by the other line and judging the type of the verification feedback information;
The first determining module is used for reading the direct feedback information if the verification feedback information is the direct feedback information and determining a fidelity result;
And the second determining module is used for identifying the free message by a large model if the verification feedback information is a free message, associating the free message with the to-be-verified fidelity factor corresponding to the fidelity number, and determining a fidelity verification result.
And/or the second determining module comprises:
the first receiving module is used for sending the free message to a large model and receiving a warranty number identification result and a message element identification result returned by the large model;
The third determining module is used for determining the corresponding to-be-verified fidelity function and the to-be-verified fidelity function element based on the identification result of the fidelity function number;
A fourth determining module, configured to associate the message element identification result with the to-be-verified fidelity element if the message element identification result includes a fidelity element, and determine a fidelity verification result;
And a fifth determining module, configured to determine the other line verification result as a fidelity verification result if the message element identification result includes the other line verification result.
And/or the fidelity device comprises:
the first judging module is used for judging whether the to-be-verified fidelity exists or not if the opening mechanism is the line;
And the sixth determining module is used for obtaining the element of the to-be-verified fidelity and the element of the to-be-verified fidelity if the to-be-verified fidelity exists, and comparing the element of the to-be-verified fidelity and determining the fidelity result of the fidelity.
And/or the identification module 20 comprises:
The second judging module is used for judging the type of the to-be-verified fidelity function;
The first recognition module is used for matching the character recognition result into a to-be-verified fidelity letter element by carrying out character recognition on the to-be-verified fidelity letter if the to-be-verified fidelity letter is a picture format or a file format;
the first input module is used for matching the manually input information to be the element of the to-be-verified fidelity function if the to-be-verified fidelity function is the manually input fidelity function.
And/or the verification module 30 comprises:
the first generation module is used for generating a fidelity inquiry message according to the request verification signal and the fidelity and fidelity factor to be verified;
the first encryption module is used for carrying out encryption signature on the warrant inquiry message through a preset encryption protocol and a private key of an issuing mechanism to obtain an encryption inquiry message;
the first sending module is used for sending the encrypted query message to the issuing mechanism;
the first decryption module is used for receiving the encryption feedback information returned by the issuing mechanism, decrypting the encryption feedback information according to the encryption protocol and a preset issuing mechanism public key, and obtaining the verification feedback information.
The fidelity device provided by the application adopts the fidelity method of the fidelity in the embodiment, and can solve the technical problem of low fidelity efficiency of the fidelity. Compared with the prior art, the beneficial effects of the fidelity device provided by the application are the same as those of the fidelity method provided by the embodiment, and other technical features in the fidelity device are the same as those disclosed by the embodiment method, so that the description is omitted herein.
The application provides a fidelity verification device, which comprises at least one processor and a memory in communication connection with the at least one processor, wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor so that the at least one processor can execute the fidelity verification method in the first embodiment.
Referring now to fig. 5, a schematic diagram of a fidelity device suitable for use in implementing embodiments of the present application is shown. The fidelity verification device in the embodiment of the present application may include, but is not limited to, mobile terminals such as mobile phones, tablet computers, notebook computers, digital broadcast receivers, PDAs (Personal DIGITAL ASSISTANT: personal digital assistants), PMPs (Portable MEDIA PLAYER: portable multimedia players), vehicle terminals (e.g., vehicle navigation terminals), and the like, and stationary terminals such as digital TVs, desktop computers, and the like. The fidelity device shown in fig. 5 is only an example, and should not be construed as limiting the functionality and scope of use of the embodiments of the present application.
As shown in fig. 5, the fidelity device may include a processing means 1001 (e.g., a central processing unit, a graphics processor, etc.), which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 1002 or a program loaded from a storage means 1003 into a random access Memory (RAM: random Access Memory) 1004. In the RAM1004, various programs and data required for the operation of the fidelity device are also stored. The processing device 1001, the ROM1002, and the RAM1004 are connected to each other by a bus 1005. An input/output (I/O) interface 1006 is also connected to the bus. In general, a system including an input device 1007 such as a touch screen, a touch pad, a keyboard, a mouse, an image sensor, a microphone, an accelerometer, a gyroscope, etc., an output device 1008 including a Liquid crystal display (LCD: liquid CRYSTAL DISPLAY), a speaker, a vibrator, etc., a storage device 1003 including a magnetic tape, a hard disk, etc., and a communication device 1009 may be connected to the I/O interface 1006. The communication means 1009 may allow the fidelity device to communicate wirelessly or by wire with other devices to exchange data. While the figures illustrate a fidelity device having various systems, it is understood that not all illustrated systems are required to be implemented or provided. More or fewer systems may alternatively be implemented or provided.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through a communication device, or installed from the storage device 1003, or installed from the ROM 1002. The above-described functions defined in the method of the disclosed embodiment of the application are performed when the computer program is executed by the processing device 1001.
The fidelity equipment provided by the application adopts the fidelity method of the fidelity in the embodiment, so that the technical problem of low fidelity efficiency of the fidelity can be solved. Compared with the prior art, the beneficial effects of the fidelity equipment provided by the application are the same as those of the fidelity method provided by the embodiment, and other technical features in the fidelity equipment are the same as those disclosed by the method of the embodiment, so that the description is omitted.
It is to be understood that portions of the present disclosure may be implemented in hardware, software, firmware, or a combination thereof. In the description of the above embodiments, particular features, structures, materials, or characteristics may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
The present application provides a computer-readable storage medium having computer-readable program instructions (i.e., a computer program) stored thereon for performing the fidelity method of the above-described embodiments.
The computer readable storage medium provided by the present application may be, for example, a U disk, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, or device, or a combination of any of the foregoing. More specific examples of a computer-readable storage medium may include, but are not limited to, an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access Memory (RAM: random Access Memory), a Read-Only Memory (ROM), an erasable programmable Read-Only Memory (EPROM: erasable Programmable Read Only Memory or flash Memory), an optical fiber, a portable compact disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In this embodiment, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, or device. Program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to electrical wiring, fiber optic cable, RF (Radio Frequency) and the like, or any suitable combination of the foregoing.
The computer-readable storage medium may be included in the fidelity device or may exist alone without being incorporated in the fidelity device.
The computer-readable storage medium carries one or more programs that, when executed by the fidelity device, cause the fidelity device to receive a fidelity to be verified, identify a fidelity to be verified element of the fidelity to be verified;
after receiving the request verification signal, determining an opening mechanism of the to-be-verified fidelity function;
if the establishment mechanism is the other line, sending a fidelity inquiry message to the other line, receiving feedback information of the other line, associating the feedback information with the to-be-verified fidelity element, and determining a fidelity verification result.
Computer program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of remote computers, the remote computer may be connected to the user's computer through any kind of network, including a local area network (LAN: local Area Network) or a wide area network (WAN: wide Area Network), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules involved in the embodiments of the present application may be implemented in software or in hardware. Wherein the name of the module does not constitute a limitation of the unit itself in some cases.
The readable storage medium provided by the application is a computer readable storage medium, and the computer readable storage medium stores computer readable program instructions (namely computer program) for executing the above-mentioned fidelity method of the fidelity, so that the technical problem of low fidelity efficiency of the fidelity can be solved. Compared with the prior art, the beneficial effects of the computer readable storage medium provided by the application are the same as those of the fidelity method provided by the embodiment, and are not repeated here.
The application also provides a computer program product comprising a computer program which, when executed by a processor, implements the steps of the fidelity method as described above.
The computer program product provided by the application can solve the technical problem of low verification efficiency of the guaranty. Compared with the prior art, the beneficial effects of the computer program product provided by the application are the same as those of the fidelity method provided by the embodiment, and are not repeated here.
The foregoing description is only a partial embodiment of the present application, and is not intended to limit the scope of the present application, and all the equivalent structural changes made by the description and the accompanying drawings under the technical concept of the present application, or the direct/indirect application in other related technical fields are included in the scope of the present application.
Claims (10)
1. A method of fidelity, said method comprising:
after receiving a request verification signal, determining a to-be-verified fidelity and an opening mechanism according to the request verification signal;
identifying the to-be-verified fidelity letter is a to-be-verified fidelity element;
if the establishment mechanism is the other line, based on the to-be-verified fidelity factor, sending a fidelity inquiry message to the other line, receiving the verification feedback information returned by the other line, associating the verification feedback information with the to-be-verified fidelity factor, and determining a fidelity result.
2. The method of claim 1, wherein the step of receiving the feedback information of the verification returned by the other line, associating the feedback information of the verification with the element of the to-be-verified fidelity, and determining the result of the fidelity verification comprises:
receiving the verification feedback information returned by the other line, and judging the type of the verification feedback information;
if the verification feedback information is direct feedback information, reading the direct feedback information and determining a fidelity verification result;
And if the verification feedback information is a free message, carrying out the identification of the fidelity number of the free message through a large model, associating the to-be-verified fidelity elements of the free message corresponding to the fidelity number, and determining a fidelity verification result.
3. The method of claim 2, wherein the step of identifying the free message by a large model by performing a fidelity number identification, associating the free message with a to-be-verified fidelity element corresponding to the fidelity number, and determining a fidelity verification result comprises:
The free message is sent to a large model, and a warranty number identification result and a message element identification result returned by the large model are received;
Based on the identification result of the guaranty number, determining the corresponding to-be-verified guaranty and the to-be-verified guaranty element;
If the message element identification result contains a fidelity element, associating the message element identification result with the fidelity element to be verified, and determining a fidelity verification result;
and if the message element identification result comprises the other line verification result, determining the other line verification result as a fidelity verification result.
4. The method of claim 1, wherein after the step of determining the to-be-verified-fidelity-and-open-mechanism based on the request-for-verification signal after receiving the request-for-verification signal, further comprises:
if the establishment mechanism is the line, judging whether the to-be-verified fidelity exists or not;
If the to-be-verified fidelity is present, obtaining an open-form fidelity element of the to-be-verified fidelity, comparing the to-be-verified fidelity element with the open-form fidelity element, and determining a fidelity result.
5. The method of claim 1, wherein the step of identifying a to-be-verified-fidelity-letter element of the to-be-verified-fidelity-letter comprises:
Judging the kind of the to-be-verified fidelity function;
If the to-be-verified fidelity is the fidelity of the picture format or the file format, the character recognition result is matched into to-be-verified fidelity elements by carrying out character recognition on the to-be-verified fidelity;
And if the to-be-verified fidelity is the manually-input fidelity, matching the manually-input information to be the to-be-verified fidelity element.
6. The method of claim 1, wherein the step of sending a policy query message to the other row and receiving verification feedback information returned by the other row comprises:
generating a fidelity inquiry message according to the request verification signal and the fidelity and fidelity factor to be verified;
carrying out encryption signature on the warranty inquiry message through a preset encryption protocol and a private key of an issuing mechanism to obtain an encryption inquiry message;
Sending the encrypted query message to the issuing mechanism;
And receiving the encryption feedback information returned by the issuing mechanism, and decrypting the encryption feedback information according to the encryption protocol and a preset issuing mechanism public key to obtain verification feedback information.
7. A fidelity device, said device comprising:
The determining module is used for determining a to-be-verified fidelity and an opening mechanism according to the request verification signal after receiving the request verification signal;
the identification module is used for identifying the to-be-verified fidelity factor of the to-be-verified fidelity;
And the verification module is used for sending a fidelity inquiry message to the other line based on the to-be-verified fidelity factor if the establishment mechanism is the other line, receiving verification feedback information returned by the other line, associating the verification feedback information with the to-be-verified fidelity factor and determining a fidelity result.
8. A fidelity verification apparatus, characterized in that it comprises a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program being configured to implement the steps of the fidelity verification method according to any one of claims 1 to 6.
9. A storage medium, characterized in that the storage medium is a computer-readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, carries out the steps of the fidelity method according to any one of claims 1 to 6.
10. A computer program product, characterized in that it comprises a computer program which, when executed by a processor, implements the steps of the fidelity method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202411583868.9A CN119599776A (en) | 2024-11-07 | 2024-11-07 | Method, device, equipment, storage medium and product for fidelity verification of fidelity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202411583868.9A CN119599776A (en) | 2024-11-07 | 2024-11-07 | Method, device, equipment, storage medium and product for fidelity verification of fidelity |
Publications (1)
Publication Number | Publication Date |
---|---|
CN119599776A true CN119599776A (en) | 2025-03-11 |
Family
ID=94841722
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202411583868.9A Withdrawn CN119599776A (en) | 2024-11-07 | 2024-11-07 | Method, device, equipment, storage medium and product for fidelity verification of fidelity |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN119599776A (en) |
-
2024
- 2024-11-07 CN CN202411583868.9A patent/CN119599776A/en not_active Withdrawn
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11038677B2 (en) | Systems and methods for encryption and authentication | |
US8572388B2 (en) | Electronic document management system | |
US20050231738A1 (en) | Electronic document management system | |
EP1177517A1 (en) | Collaborative creation, editing, reviewing, and signing of electronic documents | |
KR20000069550A (en) | Method and system for processing electronic documents | |
JPH10505175A (en) | Method and system for collecting, storing, transmitting and authenticating a handwritten signature | |
US20230274373A1 (en) | Decentralized will management apparatus, systems and related methods of use | |
US10178248B2 (en) | Computing device for generating a document by combining content data with form data | |
US12210635B2 (en) | Systems and methods for electronic document execution, authentication, and forensic review | |
US20240265147A1 (en) | Systems and methods for data and identity validation and integrity-check based on artificial intelligence and/or blockchain systems | |
US20110185180A1 (en) | Method and device for creating digital signature | |
US20230325210A1 (en) | Coordinating and synchronizing data entry between client computing devices | |
JP2013025571A (en) | Card issue system and card issue method | |
US12346533B2 (en) | Dual-view graphical user interface for coordinating and synchronizing data entry | |
CN119599776A (en) | Method, device, equipment, storage medium and product for fidelity verification of fidelity | |
CN117195319A (en) | Verification method and device for electronic part of file, electronic equipment and medium | |
US12282483B2 (en) | Systems and methods for using a structured data database and for exchanging electronic files containing unstructured or partially structured data | |
CN117275024A (en) | Service processing method, device, electronic equipment and storage medium | |
CN115660878A (en) | Method and system for realizing electronic invoice | |
US20080001959A1 (en) | System, Method and Computer Program Product for Performing Information Transfer Using a Virtual Operator | |
CN113792570A (en) | Claims data processing method and device, electronic equipment and readable medium | |
KR100908405B1 (en) | Form image quality inspection method and system and recording medium therefor | |
CN114820211B (en) | Method, device, computer equipment and storage medium for checking and verifying quality of claim data | |
US20240265103A1 (en) | Systems and Methods for Detecting, Localizing, and Visualizing Manipulations of Portable Document Format Files | |
US20250039004A1 (en) | Advanced AI and Blockchain-Driven Social Digital Platform for Communication and Educational Management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20250311 |