Disclosure of Invention
The embodiment of the application provides an invoice authentication method and device, which solve the problems existing in the prior art and improve the invoice authentication processing efficiency.
In a first aspect, an invoice authentication method is provided, which may include:
Acquiring invoice information of at least one invoice to be authenticated of a tax payment object and a current tax period of the tax payment object; the invoice information comprises an invoicing date;
For each invoice to be authenticated, if the invoicing date belongs to the current tax period, performing invoice authentication on the invoice to be authenticated according to the configured current invoice authentication mode; the current invoice authentication mode is a decryption authentication mode or a checking authentication mode;
And if the invoicing date belongs to the period of the next tax, adopting a decryption authentication mode to authenticate the invoice to be authenticated.
In an alternative implementation, the method further comprises:
If the invoicing date belongs to the current tax period and the current invoice authentication mode is not configured, determining the checking authentication mode as the current invoice authentication mode;
and adopting the checking authentication mode to authenticate the invoice to be authenticated.
In an alternative implementation, the method further comprises:
If the abnormal condition of the checking authentication mode is detected, outputting prompt information whether the decryption authentication mode is determined to be the current invoice authentication mode;
And according to the received indication of determining the decryption authentication mode as the current invoice authentication mode, adopting the decryption authentication mode to perform invoice authentication on the invoice to be authenticated.
In an optional implementation, before performing invoice authentication on the invoice to be authenticated by adopting the decryption authentication mode, the method further includes:
outputting prompt information for executing invoice authentication of the period of the next tax;
and according to the decryption authentication mode, performing invoice authentication on the invoice to be authenticated, including:
and according to the received invoice authentication instruction for executing the period of the next tax, adopting a decryption authentication mode to authenticate the invoice to be authenticated.
In an optional implementation, the invoice information further includes an invoice code, an invoice number, an invoice amount, a ticket face ciphertext, a purchasing party tax number, a selling party tax number, and a tax amount;
and adopting a decryption authentication mode to authenticate the invoice to be authenticated, wherein the invoice authentication method comprises the following steps:
encrypting the invoice information to generate ciphertext information;
sending a decryption authentication request to a tax office unified acceptance platform, wherein the decryption authentication request comprises the ciphertext information;
Receiving a decryption authentication response sent by the tax office end unified acceptance platform, wherein the decryption authentication response comprises an invoice authentication result;
if the authentication result is authentication failure, the invoice information is indicated to be modified, the modified invoice information is determined to be new invoice information, and execution is returned: and encrypting the invoice information to generate ciphertext information.
In an optional implementation, the invoice information further includes an invoice code, an invoice number, an invoice amount, and a purchasing tax number;
adopting the checking authentication mode to perform invoice authentication on the invoice to be authenticated, including:
Matching the invoice information with invoice information in an invoice library of the current tax period;
if the matching is successful, determining that the invoice to be authenticated is successfully authenticated;
if the matching fails, the invoice information is indicated to be modified, the modified invoice information is determined to be new invoice information, and execution is returned: and matching the invoice information with the invoice information in the invoice library of the current tax period.
In an optional implementation, after performing invoice authentication on the invoice to be authenticated, the method further includes:
And outputting invoice authentication information, wherein the invoice authentication information comprises an authenticated invoice amount summary in the current tax belonging period, an authenticated invoice detail link and an invoice detail link with authentication failure, and an authenticated invoice amount summary in the next tax belonging period, an authenticated invoice detail link and an invoice detail link with authentication failure.
In a second aspect, an invoice authentication device is provided, which may include: the system comprises an acquisition unit and an invoice authentication unit;
the acquiring unit is used for acquiring invoice information of at least one invoice to be authenticated of the tax payment object and the current period of tax of the tax payment object; the invoice information comprises an invoicing date;
The invoice authentication unit is used for authenticating each invoice to be authenticated according to the configured current invoice authentication mode if the invoicing date belongs to the current tax period; the current invoice authentication mode is a decryption authentication mode or a checking authentication mode;
And if the invoicing date belongs to the period of the next tax, adopting a decryption authentication mode to authenticate the invoice to be authenticated.
In an alternative implementation, the apparatus further includes: a determination unit;
The determining unit is configured to determine the checking authentication mode as a current invoice authentication mode if the invoicing date belongs to the period of the current tax and the current invoice authentication mode is not configured;
and the invoice authentication unit is also used for performing invoice authentication on the invoice to be authenticated by adopting the checking authentication mode.
In an alternative implementation, the apparatus further includes: a first output unit;
the first output unit is used for outputting prompt information whether the decryption authentication mode is determined to be the current invoice authentication mode or not if the abnormality of the checking authentication mode is detected;
And the invoice authentication unit is also used for performing invoice authentication on the invoice to be authenticated by adopting the decryption authentication mode according to the received indication of determining the decryption authentication mode as the current invoice authentication mode.
In an alternative implementation, the apparatus further includes: a second output unit;
The second output unit is used for outputting prompt information for executing invoice authentication of the period of the next tax;
and the invoice authentication unit is also used for performing invoice authentication on the invoice to be authenticated by adopting a decryption authentication mode according to the received invoice authentication instruction for executing the period of the next tax.
In an optional implementation, the invoice information further includes an invoice code, an invoice number, an invoice amount, a ticket face ciphertext, a purchasing party tax number, a selling party tax number, and a tax amount;
The invoice authentication unit is specifically configured to perform the following steps:
encrypting the invoice information to generate ciphertext information;
sending a decryption authentication request to a tax office unified acceptance platform, wherein the decryption authentication request comprises the ciphertext information;
Receiving a decryption authentication response sent by the tax office end unified acceptance platform, wherein the decryption authentication response comprises an invoice authentication result;
if the authentication result is authentication failure, the invoice information is indicated to be modified, the modified invoice information is determined to be new invoice information, and execution is returned: and encrypting the invoice information to generate ciphertext information.
In an optional implementation, the invoice information further includes an invoice code, an invoice number, an invoice amount, and a purchasing tax number;
The invoice authentication unit is further specifically configured to perform the following steps:
Matching the invoice information with invoice information in an invoice library of the current tax period;
if the matching is successful, determining that the invoice to be authenticated is successfully authenticated;
if the matching fails, the invoice information is indicated to be modified, the modified invoice information is determined to be new invoice information, and execution is returned: and matching the invoice information with the invoice information in the invoice library of the current tax period.
In an alternative implementation, the apparatus further includes: a third output unit;
The third output unit is configured to output invoice authentication information, where the invoice authentication information includes an authenticated invoice amount summary in the current tax belonging period, the authenticated invoice detail link and an invoice detail link with authentication failure, and the authenticated invoice amount summary in the next tax belonging period, the authenticated invoice detail link and the invoice detail link with authentication failure.
In a third aspect, an electronic device is provided, the electronic device comprising a processor, a communication interface, a memory, and a communication bus, wherein the processor, the communication interface, and the memory are in communication with each other via the communication bus;
A memory for storing a computer program;
A processor for implementing the method steps of any one of the above first aspects when executing a program stored on a memory.
In a fourth aspect, a computer-readable storage medium is provided, in which a computer program is stored which, when being executed by a processor, carries out the method steps of any of the first aspects.
After invoice information of at least one invoice to be authenticated of a tax-paying object and a period of a current tax of the tax-paying object are obtained, according to each invoice to be authenticated, if a invoicing date belongs to the period of the current tax, performing invoice authentication on the invoice to be authenticated according to a configured current invoice authentication mode; the current invoice authentication mode is a decryption authentication mode or a checking authentication mode; and if the invoicing date belongs to the period of the next tax, adopting a decryption authentication mode to authenticate the invoice to be authenticated. The method supports two invoice authentication modes, and automatically selects a proper authentication mode for a tax payment object on the premise of not increasing the invoice authentication complexity, thereby improving the invoice authentication processing efficiency.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The invoice authentication method is applied to an invoice authentication system, and the system comprises a terminal, a unified acceptance platform of a tax office side and an invoice library for storing invoice information. The invoice information may include an invoice code, an invoice number, an invoicing date, and an invoice amount.
Fig. 1 is a schematic flow chart of an invoice authentication method according to an embodiment of the present invention. As shown in fig. 1, the method may include:
and 110, acquiring invoice information of at least one invoice to be authenticated of the tax payment object and the current period of tax of the tax payment object.
Invoking a scanner to scan at least one invoice to be authenticated, obtaining an invoice image of the corresponding invoice to be authenticated, and identifying the obtained invoice image according to an optical character recognition (Optical Character Recognition, OCR) identification technology to obtain at least one invoice face ciphertext of the invoice to be authenticated, such as a two-dimensional code or ciphertext number, and invoice element information: invoice codes, invoice dates, invoice numbers, purchasing tax numbers, selling tax numbers, tax amounts and other information.
The term of tax refers to the time when tax liabilities are generated when tax-paying objects, such as individuals or enterprises, acquire tax-paying results.
And 120, performing invoice authentication on at least one invoice to be authenticated according to whether the invoicing date of the at least one invoice to be authenticated belongs to the current tax period.
And aiming at each invoice to be authenticated, if the invoicing date belongs to the current tax period, performing invoice authentication on the invoice to be authenticated according to the configured current invoice authentication mode.
The current invoice authentication mode is decryption authentication service of the tax office system, namely decryption authentication mode or checking authentication service of the value-added tax invoice comprehensive service platform, namely checking authentication mode;
And if the invoicing date belongs to the period of the next tax, adopting a decryption authentication mode to authenticate the invoice to be authenticated.
Specifically, if the invoicing date belongs to the period of the next tax, outputting prompt information for executing invoice authentication of the period of the next tax, so that the tax-paying object determines whether to continuously perform invoice authentication on the invoice to be authenticated belonging to the period of the next tax;
Since the decryption authentication mode can be used for authentication without pre-reporting the invoice, in order to improve the tax processing efficiency, when the tax-paying object inputs and executes the invoice authentication instruction of the next tax belonging period, namely the tax-paying object still selects the authentication operation, and the decryption authentication mode is used for authenticating the invoice to be authenticated according to the received invoice authentication instruction.
It should be noted that, the current invoice authentication mode may be an invoice authentication mode that is set by the tax administration object according to the usage habit and is preferably selected, that is, if the current invoice authentication mode is preset, the invoice to be authenticated is authenticated according to the current invoice authentication mode.
If the invoicing date belongs to the current tax period and the current invoice authentication mode is not configured, determining the checking authentication mode as the current invoice authentication mode, and adopting the checking authentication mode to authenticate the invoice to be authenticated.
In one possible embodiment, if the current invoice authentication mode is the checking authentication mode and an abnormality of the checking authentication mode is detected, if an abnormality occurs in a processor executing the checking authentication mode, a prompt message indicating whether to determine the decryption authentication mode as the current invoice authentication mode is output; and according to the received indication of determining the decryption authentication mode as the current invoice authentication mode, adopting the decryption authentication mode to authenticate the invoice to be authenticated.
If the current invoice authentication mode is a decryption authentication mode and the decryption authentication mode is detected to be abnormal, if the processor executing the decryption authentication mode is abnormal, outputting prompt information whether to determine the checking authentication mode as the current invoice authentication mode, and adopting the checking authentication mode to perform invoice authentication on the invoice to be authenticated according to the received indication of determining the checking authentication mode as the current invoice authentication mode.
That is, when one of the invoice authentication services is unstable, the other invoice authentication service can be switched, so that the condition that the invoice authentication is terminated is avoided, and the processing efficiency of the invoice authentication is improved.
Optionally, adopting a decryption authentication mode to authenticate the invoice to be authenticated, the method can comprise the following steps:
encrypting invoice information of an invoice code, an invoice number, an invoice amount, a ticket face ciphertext, a purchasing party tax number, a selling party tax number and a tax amount to generate ciphertext information;
sending a decryption authentication request to a tax office unified acceptance platform, wherein the decryption authentication request comprises ciphertext information;
Receiving a decryption authentication response sent by the unified acceptance platform of the tax bureau side, wherein the decryption authentication response comprises an invoice authentication result;
If the authentication result is authentication failure, manual checking is indicated, and invoice information is modified; and determining the modified invoice information as new invoice information, and re-executing: and encrypting the invoice information to generate ciphertext information, thereby re-authenticating the invoice to be authenticated.
Optionally, adopting a checking authentication mode to authenticate the invoice to be authenticated, the method can comprise the following steps:
matching the invoice code, the invoice number, the invoice amount and the invoice information of the purchasing party tax number with the invoice information in the invoice library of the current tax period;
If the matching is successful, determining that the invoice to be authenticated is successfully authenticated;
If the matching fails, the invoice information is manually modified, the invoice information is re-matched after the modification, and the checking authentication is carried out after the invoice information is matched to the unique invoice information, specifically:
And determining the modified invoice information as new invoice information, and re-executing: and matching the invoice information with the invoice information in the invoice library of the current tax period, thereby re-authenticating the invoice to be authenticated.
And if the modified invoice information still cannot be successfully matched, outputting prompt information for authenticating that the invoice has problems.
Further, after invoice authentication is performed on the invoice to be authenticated, invoice authentication information may be output, and the invoice authentication information may include an authenticated invoice amount summary, an authenticated invoice detail link and an invoice detail link with authentication failure in the current tax belonging period, and an authenticated invoice amount summary, an authenticated invoice detail link and an invoice detail link with authentication failure in the next tax belonging period.
The invoice authentication information can summarize and display all the invoice information authenticated at the present time, is convenient for tax administration objects to execute summarizing and counting work, and can find out the invoice with abnormal authentication in time.
After invoice information of at least one invoice to be authenticated of a tax-paying object and a period of a current tax of the tax-paying object are acquired, performing invoice authentication on the invoice to be authenticated according to a configured current invoice authentication mode if a invoicing date belongs to the period of the current tax aiming at each invoice to be authenticated; the current invoice authentication mode is a decryption authentication mode or a checking authentication mode; and if the invoicing date belongs to the period of the next tax, adopting a decryption authentication mode to authenticate the invoice to be authenticated. The method supports two invoice authentication modes, and automatically selects a proper authentication mode for a tax payment object on the premise of not increasing the invoice authentication complexity, thereby improving the invoice authentication processing efficiency.
Corresponding to the above method, the embodiment of the present invention further provides an invoice authentication device, as shown in fig. 2, where the invoice authentication device includes: an acquisition unit 210 and an invoice authentication unit 220;
An obtaining unit 210, configured to obtain invoice information of at least one invoice to be authenticated of a tax payment object, and a period to which a current tax of the tax payment object belongs; the invoice information comprises an invoicing date;
The invoice authentication unit 220 is configured to authenticate each invoice to be authenticated according to a configured current invoice authentication mode if the invoicing date belongs to the period of the current tax; the current invoice authentication mode is a decryption authentication mode or a checking authentication mode;
And if the invoicing date belongs to the period of the next tax, adopting a decryption authentication mode to authenticate the invoice to be authenticated.
In an alternative implementation, the apparatus further includes: a determination unit 230;
a determining unit 230, configured to determine the checking authentication mode as a current invoice authentication mode if the invoicing date belongs to the period to which the current tax belongs and the current invoice authentication mode is not configured;
the invoice authentication unit 220 is further configured to perform invoice authentication on the invoice to be authenticated by adopting the checking authentication mode.
In an alternative implementation, the apparatus further includes: a first output unit 240;
A first output unit 240, configured to output a prompt message indicating whether the decrypted authentication mode is determined to be the current invoice authentication mode if it is detected that the checked authentication mode is abnormal;
The invoice authentication unit 220 is further configured to perform invoice authentication on the invoice to be authenticated by adopting the decryption authentication mode according to the received indication that the decryption authentication mode is determined to be the current invoice authentication mode.
In an alternative implementation, the apparatus further includes: a second output unit 250;
A second output unit 250, configured to output a prompt message for performing invoice authentication of the period to which the next tax belongs;
The invoice authentication unit 220 is further configured to perform invoice authentication on the invoice to be authenticated by adopting a decryption authentication mode according to the received invoice authentication instruction for executing the period of the next tax.
In an optional implementation, the invoice information further includes an invoice code, an invoice number, an invoice amount, a ticket face ciphertext, a purchasing party tax number, a selling party tax number, and a tax amount;
the invoice authentication unit 220 is specifically configured to perform the following steps:
encrypting the invoice information to generate ciphertext information;
sending a decryption authentication request to a tax office unified acceptance platform, wherein the decryption authentication request comprises the ciphertext information;
Receiving a decryption authentication response sent by the tax office end unified acceptance platform, wherein the decryption authentication response comprises an invoice authentication result;
if the authentication result is authentication failure, the invoice information is indicated to be modified, the modified invoice information is determined to be new invoice information, and execution is returned: and encrypting the invoice information to generate ciphertext information.
In an optional implementation, the invoice information further includes an invoice code, an invoice number, an invoice amount, and a purchasing tax number;
the invoice authentication unit 220 is further specifically configured to perform the following steps:
Matching the invoice information with invoice information in an invoice library of the current tax period;
if the matching is successful, determining that the invoice to be authenticated is successfully authenticated;
if the matching fails, the invoice information is indicated to be modified, the modified invoice information is determined to be new invoice information, and execution is returned: and matching the invoice information with the invoice information in the invoice library of the current tax period.
In an alternative implementation, the apparatus further includes: a third output unit 260;
and a third output unit 260 for outputting invoice authentication information including an authenticated invoice amount summary in the current tax belonging period, the authenticated invoice detail link and an invoice detail link with authentication failure, and an authenticated invoice amount summary in the next tax belonging period, an authenticated invoice detail link and an invoice detail link with authentication failure.
The functions of each functional unit of the invoice authentication device provided by the embodiment of the invention can be realized through the steps of each method, so that the specific working process and beneficial effects of each unit in the invoice authentication device provided by the embodiment of the invention are not repeated here.
The embodiment of the invention also provides an electronic device, as shown in fig. 3, which includes a processor 310, a communication interface 320, a memory 330 and a communication bus 340, wherein the processor 310, the communication interface 320 and the memory 330 complete communication with each other through the communication bus 340.
A memory 330 for storing a computer program;
The processor 310 is configured to execute the program stored in the memory 330, and implement the following steps:
Acquiring invoice information of at least one invoice to be authenticated of a tax payment object and a current tax period of the tax payment object; the invoice information comprises an invoicing date;
For each invoice to be authenticated, if the invoicing date belongs to the current tax period, performing invoice authentication on the invoice to be authenticated according to the configured current invoice authentication mode; the current invoice authentication mode is a decryption authentication mode or a checking authentication mode;
And if the invoicing date belongs to the period of the next tax, adopting a decryption authentication mode to authenticate the invoice to be authenticated.
In an alternative implementation, the method further comprises:
If the invoicing date belongs to the current tax period and the current invoice authentication mode is not configured, determining the checking authentication mode as the current invoice authentication mode;
and adopting the checking authentication mode to authenticate the invoice to be authenticated.
In an alternative implementation, the method further comprises:
If the abnormal condition of the checking authentication mode is detected, outputting prompt information whether the decryption authentication mode is determined to be the current invoice authentication mode;
And according to the received indication of determining the decryption authentication mode as the current invoice authentication mode, adopting the decryption authentication mode to perform invoice authentication on the invoice to be authenticated.
In an optional implementation, before performing invoice authentication on the invoice to be authenticated by adopting the decryption authentication mode, the method further includes:
outputting prompt information for executing invoice authentication of the period of the next tax;
and according to the decryption authentication mode, performing invoice authentication on the invoice to be authenticated, including:
and according to the received invoice authentication instruction for executing the period of the next tax, adopting a decryption authentication mode to authenticate the invoice to be authenticated.
In an optional implementation, the invoice information further includes an invoice code, an invoice number, an invoice amount, a ticket face ciphertext, a purchasing party tax number, a selling party tax number, and a tax amount;
and adopting a decryption authentication mode to authenticate the invoice to be authenticated, wherein the invoice authentication method comprises the following steps:
encrypting the invoice information to generate ciphertext information;
sending a decryption authentication request to a tax office unified acceptance platform, wherein the decryption authentication request comprises the ciphertext information;
Receiving a decryption authentication response sent by the tax office end unified acceptance platform, wherein the decryption authentication response comprises an invoice authentication result;
if the authentication result is authentication failure, the invoice information is indicated to be modified, the modified invoice information is determined to be new invoice information, and execution is returned: and encrypting the invoice information to generate ciphertext information.
In an optional implementation, the invoice information further includes an invoice code, an invoice number, an invoice amount, and a purchasing tax number;
adopting the checking authentication mode to perform invoice authentication on the invoice to be authenticated, including:
Matching the invoice information with invoice information in an invoice library of the current tax period;
if the matching is successful, determining that the invoice to be authenticated is successfully authenticated;
if the matching fails, the invoice information is indicated to be modified, the modified invoice information is determined to be new invoice information, and execution is returned: and matching the invoice information with the invoice information in the invoice library of the current tax period.
In an optional implementation, after performing invoice authentication on the invoice to be authenticated, the method further includes:
And outputting invoice authentication information, wherein the invoice authentication information comprises an authenticated invoice amount summary in the current tax belonging period, an authenticated invoice detail link and an invoice detail link with authentication failure, and an authenticated invoice amount summary in the next tax belonging period, an authenticated invoice detail link and an invoice detail link with authentication failure.
The communication bus mentioned above may be a peripheral component interconnect standard (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, or the like. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the electronic device and other devices.
The Memory may include random access Memory (Random Access Memory, RAM) or may include Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but may also be a digital signal processor (DIGITAL SIGNAL Processing, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components.
Since the implementation manner and the beneficial effects of the solution to the problem of each device of the electronic apparatus in the foregoing embodiment may be implemented by referring to each step in the embodiment shown in fig. 1, the specific working process and the beneficial effects of the electronic apparatus provided by the embodiment of the present invention are not repeated herein.
In yet another embodiment of the present invention, a computer readable storage medium is provided, in which instructions are stored, which when run on a computer, cause the computer to perform the invoice authentication method described in any one of the above embodiments.
In yet another embodiment of the present invention, there is also provided a computer program product containing instructions that, when run on a computer, cause the computer to perform the invoice authentication method as described in any one of the above embodiments.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as methods, systems, or computer program products. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the scope of the embodiments of the application.
It will be apparent to those skilled in the art that various modifications and variations can be made in the embodiments of the present application without departing from the spirit or scope of the embodiments of the application. Thus, if such modifications and variations of the embodiments of the present application fall within the scope of the claims and the equivalents thereof, it is intended that such modifications and variations be included in the embodiments of the present application.