CN110135179A - A kind of accounting voucher encryption method and decryption method - Google Patents

A kind of accounting voucher encryption method and decryption method Download PDF

Info

Publication number
CN110135179A
CN110135179A CN201910395031.4A CN201910395031A CN110135179A CN 110135179 A CN110135179 A CN 110135179A CN 201910395031 A CN201910395031 A CN 201910395031A CN 110135179 A CN110135179 A CN 110135179A
Authority
CN
China
Prior art keywords
original document
document image
image file
user
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910395031.4A
Other languages
Chinese (zh)
Inventor
周星妤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910395031.4A priority Critical patent/CN110135179A/en
Publication of CN110135179A publication Critical patent/CN110135179A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of accounting voucher encryption method and decryption methods, it is related to a kind of accounting voucher technical field, it solves existing original document image file to be generally stored directly in computer, once having stranger using the computer or invading the problem of computer can obtain the original document information or even destroy original document image file comprising following steps: S100: scanning original document forms original document image file;S200: original document image file is encrypted;S300: the original document image file for completing encryption is stored.One aspect of the present invention can facilitate encrypted personnel to carry out effective convenient encryption of original document image file, obtain a possibility that original document information even destroys original document image file when being on the other hand greatly reduced stranger using the computer or invasion computer.

Description

A kind of accounting voucher encryption method and decryption method
Technical field
The present invention relates to a kind of accounting voucher technical fields, more particularly, to a kind of accounting voucher encryption method and decryption Method.
Background technique
Accounting voucher is to record economic work, clear financial responsibility, the registration book of accounts accordingly worked out by certain format Written document.The legitimacy and reasonability for recording economic work, ensure that the authenticity of accounting record, strengthen financial responsibility System.The difference that accounting voucher programs by it with purposes, is divided into original certificate and bookkeeping voucher, the former be also known as original document or Person's document is the original written document filled and presented at once when economic work initially occurs, such as invoice for sale, fund receipt, difference Trip's invoice etc..The latter's also known as book keeping operation voucher, is to audit errorless original document as foundation, according in the item of economic work Appearance is sorted out, and determines the accounting voucher filled and presented after accounting classification accordingly.
Accounting voucher should periodically bind into book form, prevent from scattering and disappearing.Accounting voucher cover should indicate organization, voucher type, Relevant issues, accountant in charge and the Bao such as voucher number, start-stop number, year, month, accountant in charge, bookbinding personnel Pipe personnel should on cover stamped signature.Accounting voucher takes care of the time limit: original certificate, accounting voucher 30 years.Wherein: being related to external and right The accounting voucher of private transformation is permanent, and bank account balance is adjusted table 10 years.
Currently, financial management software and office automation software are gradually universal in enterprise.Enterprise generally in expense reimbursement, General to fill in expenses claim sheer by office automation software, expenses claim sheer passes through after the approval, by expense reimbursement singles It prints off to give financial staff with original document and keep accounts, pay the bill.Currently, financial management software and office automation software are not It can be in communication with each other, be unable to data sharing.Financial staff is to be audited using manpower in audit expenses expense report, financial staff's work Work amount is big.Financial staff not only needs to audit each original document one by one, but also need to be kept accounts according to original document, Classification, production bookkeeping voucher, printing bookkeeping voucher cover, and bookkeeping voucher is bound.Currently, due to heavy workload, wealth Business personnel will not generally inquire the original document true and false, cause very big security risk.
A kind of existing publication No. is the patent of invention of 106815924A and a kind of entitled accounting voucher processing system, Including financial management system and original document storage cabinet, financial management system includes reimbursement module, checks module, papers knowledge Other module;Be equipped in original document storage cabinet paper-bill conveying device, Code of Account printer, scanning machine, printer, Electronic accounting voucher storage device, papery accounting voucher storage device.
Foregoing invention patent can be automatically finished expense reimbursement, expense reimbursement audit, original document check, papers Identification, original document coding, original document scanning, the storage of original document image file, the automatic classified storage of accounting voucher, accounting The functions such as voucher inquiry, alleviate financial staff's labor intensity, improve economic benefit, but existing original document image file Generally it is stored directly in computer, once the original document information can be obtained even by having stranger to use the computer or invade the computer Original document image file is destroyed, there is room for improvement.
Summary of the invention
The purpose of the present invention one is to provide a kind of accounting voucher encryption method, and encrypted personnel can be facilitated to carry out original document Effective encryption of image file.
Foregoing invention purpose of the invention has the technical scheme that
A kind of accounting voucher encryption method, comprising the following steps:
A100: scanning original document forms original document image file;
A200: original document image file is encrypted;
A300: the original document image file for completing encryption is stored.
By using above-mentioned technical proposal, by step A100, step A200, step A300 setting can be by original ticket Original document image file mode stores accordingly, and by effectively avoiding before storage to the encryption of original document image file Original document is checked or broken words by stranger, ensure that the privacy of original document information.
The present invention is further arranged to: A200 the following steps are included:
A210: selection institute original document image file to be encrypted simultaneously triggers cryptographic operation;
A220: the Crypted password of user's input is received;
A230: an original document image file to be encrypted is encrypted according to Crypted password.
By using above-mentioned technical proposal, tool is effectively disclosed by the setting of step A210, step A220, step A220 In the ciphering process of body original document image file, the corresponding cryptographic operation of user's input is under the premise of triggering cryptographic operation The encryption to original document image file can be achieved.
The present invention is further arranged to: wherein step A210 is specifically included:
A211: judge whether the number of user's adopting consecutive click chemical reaction original document image reaches preset number;
A212: if the number of user's adopting consecutive click chemical reaction original document image reaches preset number, further judge that user connects herein Whether the time that continuous point hits last time long click reaches the preset time;
A213: it if the time of user's last time long click in this adopting consecutive click chemical reaction reaches the preset time, transfers out several Specific amount of money picture involved in original document image is selected for user, chooses original document image to be encrypted and if only if user Involved specific amount of money picture triggers cryptographic operation.
It is effectively open by the combination setting of step A211, step A212, step A213 by using above-mentioned technical proposal The actual conditions for how triggering decryption effectively avoid stranger from also capable of arbitrarily carrying out to original document file in unwitting situation Encryption.
The present invention is further arranged to: wherein step A220 is specifically included:
A221: while presenting several for encryption condition options set by user and to each encryption condition options progress title mark Note;
A222: the information that user is inputted in each encryption condition options is received, and carries out real-time storage;
A223: the information that each encryption condition options are input into before user is emptied;
A224: receiving user in each information for inputting again of encryption condition options, and with each encryption condition for storing before The information that option is inserted is compared, and completes to encrypt if comparison is completely the same.
By using above-mentioned technical proposal, set by the combination of step A221, step A222, step A223, step A224 It is set effective and discloses the input password for specifically how receiving user and sufficiently confirm the password that user is inputted, user is avoided to input The case where password malfunctions.
The present invention is further arranged to: the encryption condition options that A221 is previously mentioned in sequence successively include numerical ciphers, The exact date that birthday date, the current original document image file of encryption user is encrypted.
By using above-mentioned technical proposal, the encryption condition options that above-mentioned steps A221 is previously mentioned be followed successively by numerical ciphers, It at the exact date that birthday date, the current original document image file of encryption user is encrypted, is made of different data, into One step increases the difficulty of stranger's decryption.
The purpose of the present invention two is to provide a kind of accounting voucher decryption method, can greatly reduce stranger and use the computer Or a possibility that original document information even destroys original document image file is obtained when invasion computer.
The present invention is further arranged to: a kind of accounting voucher decryption method, comprising the following steps:
B100: the position that the original bill image file of decryption is stored needed for searching out;
B200: input clear crytpographic key completes the decryption of original document image file;
B300: original document image file is opened.
It is effectively open by the combination setting of step B100, step B200, step B300 by using above-mentioned technical proposal Specifically how to complete the specific works of original document image file decryption.
The present invention is further arranged to: step B200 specifically includes the following steps:
B210: determining all passwords needed for completing to decrypt, wherein all passwords needed for decrypting include the date for decrypting the same day, encryption The age at the age of personnel, numerical ciphers, encrypted personnel is determined by the birthday of understood encrypted personnel;
B220: using in the date for decrypt the same day the sum of all numbers as the first data and, with all numbers of numerical ciphers With as the second data and, using the data at encrypted personnel age and as third data and, sort with data and from large to small by A high position is successively ranked up as completely new password date, numerical ciphers, the encrypted personnel age on the decryption same day to low level;
B230: decryption system is limited with the highest digit of completely new password provides a long number, every number of long number at random Word corresponds to the specific digit of completely new password;
B240: decryption is completed using specific number corresponding to completely new password each specific digit as actually required Password Input.
By using above-mentioned technical proposal, it is provided with by step B210, step B220, step B230, step B240 Effect discloses the process specifically how being decrypted, and determines completely new password, Er Qieyou with the case where the sum of each group of data sequence In addition the long number that system provides at random, the user for facilitating understanding clear crytpographic key mode is decrypted in time, and can be effective It avoids stranger from invading computer and arbitrarily cracks acquisition original document image file.
The present invention is further arranged to: if there is the case where not decrypting three times in step B240, being there is step B250, is walked Rapid B250 is specifically included: all numbers of completely new password are added obtain overall datas and, using overall data and as dividend, Determine that specific number corresponding to each specific digit successively as divisor, obtains corresponding quotient and the remainder using B240, with The sum of quotient and the remainder are as specific number corresponding to each specific digit, and using corresponding specific number as actually required Password Input.
By using above-mentioned technical proposal, can exist three times not in there is step B240 by the setting of step B250 When the case where decryption, using completely new decryption method, stranger is avoided to obtain specific decryption method by way of test.
In conclusion advantageous effects of the invention are as follows: pass through step A100, step A200 and step A300 Setting facilitates user and carries out effectively easily encryption as needed, guarantees the privacy of original document image file.
Detailed description of the invention
Fig. 1 is the specific steps schematic diagram of accounting voucher encryption method of the present invention.
Fig. 2 is the specific steps schematic diagram of A200 in Fig. 1.
Fig. 3 is the specific steps schematic diagram of A210 in Fig. 2.
Fig. 4 is the specific steps schematic diagram of A220 in Fig. 2.
Fig. 5 is the specific steps schematic diagram of accounting voucher decryption method.
Fig. 6 is the specific steps schematic diagram of step B200 in Fig. 5.
Specific embodiment
Below in conjunction with attached drawing, invention is further described in detail.
Referring to Fig.1, be a kind of accounting voucher encryption method disclosed by the invention, comprising the following steps: A100: scanning is original Bill forms original document image file;A200: original document image file is encrypted;A300: to the original for completing encryption Beginning bill image file is stored, and original document formation original document image file is scanned in step A100 and mainly passes through scanning Machine is completed.
As shown in Fig. 2, further contemplating the privacy in specific ciphering process, stranger is avoided to open encryption easily, Based on considerations above, the specific encrypting step of step A200 is as follows: A210: selection institute original document image file to be encrypted is simultaneously Trigger cryptographic operation;A220: the Crypted password of user's input is received;A230: according to Crypted password to an original ticket to be encrypted It is encrypted according to image file.
As shown in figure 3, in addition the movement for triggering cryptographic operation has uniqueness, rather than stranger can obtain easily Take, be based on above-mentioned consideration, step A210 specifically includes: A211: judge user's adopting consecutive click chemical reaction original document image number whether Reach preset number;A212: if the number of user's adopting consecutive click chemical reaction original document image reaches preset number, further judge Whether the time of user's last time long click in this adopting consecutive click chemical reaction reaches the preset time;A213: if user is continuous herein The time that point hits last time long click reaches the preset time, then transfers out specific involved in several original document images Amount of money picture is selected for user, chooses specific amount of money picture involved by original document image to be encrypted and if only if user, Trigger cryptographic operation.
As shown in figure 4, can guarantee certain complexity when further contemplating user encryption and user is avoided to forget In summary encryption information considers that step A220 is specifically included: A221: while presenting several for encryption condition set by user Option simultaneously carries out title mark to each encryption condition options;A222: receive what user was inputted in each encryption condition options Information, and carry out real-time storage;A223: the information that each encryption condition options are input into before user is emptied;A224: it connects The information that user inputs again in each encryption condition options is received, and inserted with each encryption condition options stored before Information is compared, and completes to encrypt if comparison is completely the same, the encryption condition options that wherein step A221 is previously mentioned are according to suitable Sequence successively includes numerical ciphers, encrypts the exact date that birthday date, the current original document image file of user are encrypted.
The above are the specific introductions of accounting voucher encryption method, carry out below for accounting voucher decryption method specific public It opens.
As shown in figure 5, a kind of accounting voucher decryption method is the following steps are included: B100: the original ticket of decryption needed for searching out The position stored according to image file;B200: input clear crytpographic key completes the decryption of original document image file;B300: it opens Original document image file.
As shown in fig. 6, further considering that user decrypts the privacy of original bill image file processes, step B200 is specific The following steps are included: B210: all passwords needed for completing to decrypt are determined, wherein all passwords needed for decrypting include the decryption same day The age on date, the age of encrypted personnel, numerical ciphers, encrypted personnel is determined by the birthday of understood encrypted personnel;B220: with The sum of all numbers in the date on the same day are decrypted to be used as the first data and count using the sum of all numbers of numerical ciphers as second According to, using the data at encrypted personnel age and as third data and, sort with data and from large to small by a high position to low level according to Secondary date, numerical ciphers, the encrypted personnel age to the decryption same day is ranked up as completely new password;B230: decryption system It is limited with the highest digit of completely new password and provides a long number at random, the tool of the corresponding completely new password of each of long number number Position number;B240: solution is completed using specific number corresponding to completely new password each specific digit as actually required Password Input It is close.
Furthermore consider the case where souning out password there are nonnative personnel, i.e., there are the feelings that do not decrypt three times in step B240 Condition then has step B250, step B250 to specifically include: B251: by completely new password it is all number be added obtain overall datas and, Using overall data and as dividend, determine specific number corresponding to each specific digit successively as removing using B240 Number, obtains corresponding quotient and the remainder, using the sum of quotient and the remainder as each specifically specific number corresponding to digit, and with pair The specific number answered is as actually required Password Input.
The embodiment of present embodiment is presently preferred embodiments of the present invention, not limits protection of the invention according to this Range, therefore: the equivalence changes that all structures under this invention, shape, principle are done, should all be covered by protection scope of the present invention it It is interior.

Claims (8)

1. a kind of accounting voucher encryption method, which comprises the following steps:
A100: scanning original document forms original document image file;
A200: original document image file is encrypted;
A300: the original document image file for completing encryption is stored.
2. a kind of accounting voucher encryption method according to claim 1, which is characterized in that A200 the following steps are included:
A210: selection institute original document image file to be encrypted simultaneously triggers cryptographic operation;
A220: the Crypted password of user's input is received;
A230: an original document image file to be encrypted is encrypted according to Crypted password.
3. a kind of accounting voucher encryption method according to claim 2, it is characterised in that: wherein step A210 is specifically wrapped It includes:
A211: judge whether the number of user's adopting consecutive click chemical reaction original document image reaches preset number;
A212: if the number of user's adopting consecutive click chemical reaction original document image reaches preset number, further judge that user connects herein Whether the time that continuous point hits last time long click reaches the preset time;
A213: it if the time of user's last time long click in this adopting consecutive click chemical reaction reaches the preset time, transfers out several Specific amount of money picture involved in original document image is selected for user, chooses original document image to be encrypted and if only if user Involved specific amount of money picture triggers cryptographic operation.
4. a kind of accounting voucher encryption method according to claim 2, it is characterised in that: wherein step A220 is specifically wrapped It includes:
A221: while presenting several for encryption condition options set by user and to each encryption condition options progress title mark Note;
A222: the information that user is inputted in each encryption condition options is received, and carries out real-time storage;
A223: the information that each encryption condition options are input into before user is emptied;
A224: receiving user in each information for inputting again of encryption condition options, and with each encryption condition for storing before The information that option is inserted is compared, and completes to encrypt if comparison is completely the same.
5. a kind of accounting voucher encryption method according to claim 4, it is characterised in that: the encryption condition that A221 is previously mentioned Birthday date, current original document image file of the option in sequence successively including numerical ciphers, encryption user encrypt Exact date.
6. a kind of accounting voucher decryption method, which comprises the following steps:
B100: the position that the original bill image file of decryption is stored needed for searching out;
B200: input clear crytpographic key completes the decryption of original document image file;
B300: original document image file is opened.
7. a kind of accounting voucher processing method according to claim 6, which is characterized in that step B200 specifically includes following Step:
B210: determining all passwords needed for completing to decrypt, wherein all passwords needed for decrypting include the date for decrypting the same day, encryption The age at the age of personnel, numerical ciphers, encrypted personnel is determined by the birthday of understood encrypted personnel;
B220: using in the date for decrypt the same day the sum of all numbers as the first data and, with all numbers of numerical ciphers With as the second data and, using the data at encrypted personnel age and as third data and, sort with data and from large to small by A high position is successively ranked up as completely new password date, numerical ciphers, the encrypted personnel age on the decryption same day to low level;
B230: decryption system is limited with the highest digit of completely new password provides a long number, every number of long number at random Word corresponds to the specific digit of completely new password;
B240: decryption is completed using specific number corresponding to completely new password each specific digit as actually required Password Input.
8. a kind of accounting voucher processing method according to claim 7, it is characterised in that if there are three in step B240 Secondary the case where not decrypting, then has step B250, step B250 to specifically include: all numbers of completely new password being added and obtain entirety Data and, using overall data and as dividend, specific number corresponding to each specific digit is determined successively with B240 As divisor, corresponding quotient and the remainder are obtained, using the sum of quotient and the remainder as specific number corresponding to each specific digit, and Using corresponding specific number as actually required Password Input.
CN201910395031.4A 2019-05-13 2019-05-13 A kind of accounting voucher encryption method and decryption method Pending CN110135179A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910395031.4A CN110135179A (en) 2019-05-13 2019-05-13 A kind of accounting voucher encryption method and decryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910395031.4A CN110135179A (en) 2019-05-13 2019-05-13 A kind of accounting voucher encryption method and decryption method

Publications (1)

Publication Number Publication Date
CN110135179A true CN110135179A (en) 2019-08-16

Family

ID=67573615

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910395031.4A Pending CN110135179A (en) 2019-05-13 2019-05-13 A kind of accounting voucher encryption method and decryption method

Country Status (1)

Country Link
CN (1) CN110135179A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110555740A (en) * 2019-08-29 2019-12-10 国网浙江省电力有限公司宁波供电公司 Data processing method and system for ETC toll
CN110717187A (en) * 2019-09-19 2020-01-21 秦滢珺 Accounting document encryption method and decryption method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160117518A1 (en) * 2013-06-07 2016-04-28 Beijing Qihoo Technology Company Limited File Encryption/Decryption Device And File Encryption/Decryption Method
CN106815924A (en) * 2016-12-22 2017-06-09 河南职业技术学院 A kind of accounting voucher processing system
CN108390867A (en) * 2018-02-06 2018-08-10 杭州政信金服互联网科技有限公司 Card file enciphering method and decryption method are deposited in the administration of justice

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160117518A1 (en) * 2013-06-07 2016-04-28 Beijing Qihoo Technology Company Limited File Encryption/Decryption Device And File Encryption/Decryption Method
CN106815924A (en) * 2016-12-22 2017-06-09 河南职业技术学院 A kind of accounting voucher processing system
CN108390867A (en) * 2018-02-06 2018-08-10 杭州政信金服互联网科技有限公司 Card file enciphering method and decryption method are deposited in the administration of justice

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110555740A (en) * 2019-08-29 2019-12-10 国网浙江省电力有限公司宁波供电公司 Data processing method and system for ETC toll
CN110717187A (en) * 2019-09-19 2020-01-21 秦滢珺 Accounting document encryption method and decryption method

Similar Documents

Publication Publication Date Title
CN100334830C (en) Automated transaction machine digital signature system and method
RU2494455C2 (en) Electronic certification, identification and transmission of information using coded graphic images
US8281145B2 (en) Doing business without SSN, EIN, and charge card numbers
EP1734472B1 (en) Issuing machine and issuing system
US9147189B2 (en) Secure reports for electronic payment systems
CN108763463A (en) A kind of Digital Archives System based on block chain
CN1271449A (en) Electronic payment system
AU701005B2 (en) Charging system and method
CN110689415B (en) Public resource transaction platform management system
JPH08101867A (en) Software use permission system
US20130001302A1 (en) Automated Banking Machine that Operates Responsive to Data Bearing Records
CN101727650A (en) Comparing method and comparing system of electronic invoice
EP2905739A1 (en) Electronic bills management system and electronic bills management method
CN102231200A (en) Method for transacting bankcard application through mobile intelligent terminal
US20060083214A1 (en) Information vault, data format conversion services system and method
CN110135179A (en) A kind of accounting voucher encryption method and decryption method
US9552181B1 (en) Method and apparatus for authorizing a print device to perform a service
CN115841370A (en) Electronic bidding insurance letter full-flow public service system
US20150043025A1 (en) Method for transmitting documents and/or information with permanent authentication
US20070300067A1 (en) Notice of Revocation System for Revocable or Modifiable Documents
JP2008513858A (en) Method and equipment for postage payment
CN1916985A (en) Automated transaction machine digital signature system and method
KR20220048880A (en) The safe and convenient method to transfer trade account receivable
TW202040396A (en) Online bidding method and online bidding system using the encrypted block chain technology to provide a secured and reliable bidding system
US20070192589A1 (en) System and method for encrypting webpage logs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination