ࡱ> vxstu @ bjbj00 URbRb#  $dddP v-yX$׋R),;{?mCm;{;{kkg){{{;{kk{;{{{ o kf J1dC}>yj?0o*z U~@UUzz{z zzzzD:HI_HISample Bank ATM title \* Mergeformat Use-Case Specification: Withdraw Cash Version <1.0> Table of Contents  TOC \o "1-3" 1. Brief Description  PAGEREF _Toc150831371 \h 4 2. Use-Case Diagram  PAGEREF _Toc150831372 \h 4 3. Preconditions  PAGEREF _Toc150831373 \h 4 4. Basic Flow of Events  PAGEREF _Toc150831374 \h 5 4.1 Insert Card  PAGEREF _Toc150831375 \h 5 4.2 Read Card  PAGEREF _Toc150831376 \h 5 4.3 Authenticate Customer  PAGEREF _Toc150831377 \h 5 4.4 Select Withdrawal  PAGEREF _Toc150831378 \h 5 4.5 Select Amount  PAGEREF _Toc150831379 \h 5 4.6 Confirm Withdrawal  PAGEREF _Toc150831380 \h 5 4.7 Eject Card  PAGEREF _Toc150831381 \h 5 4.8 Dispense Cash  PAGEREF _Toc150831382 \h 5 4.9 Use Case Ends  PAGEREF _Toc150831383 \h 5 5. Alternative Flows  PAGEREF _Toc150831384 \h 6 5.1 Customer Authentication  PAGEREF _Toc150831385 \h 6 5.1.1 Handle No Communications With the Bank System  PAGEREF _Toc150831386 \h 6 5.1.2 Handle No Communications With the Customers Bank  PAGEREF _Toc150831387 \h 6 5.1.3 Handle Inactive Card or Account  PAGEREF _Toc150831388 \h 6 5.1.4 Handle Stolen Bank Card  PAGEREF _Toc150831389 \h 6 5.1.5 Handle Invalid Bank Card Information  PAGEREF _Toc150831390 \h 7 5.1.6 Handle Correct PIN Not Entered  PAGEREF _Toc150831391 \h 7 5.2 Specialist Withdrawal Facilities  PAGEREF _Toc150831392 \h 8 5.2.1 Handle the Withdrawal of a Non-Standard Amount  PAGEREF _Toc150831393 \h 8 5.3 Card Handling  PAGEREF _Toc150831394 \h 8 5.3.1 Handle Card Jam  PAGEREF _Toc150831395 \h 8 5.3.2 Handle Unreadable Bank Card  PAGEREF _Toc150831396 \h 9 5.3.3 Handle Invalid Card  PAGEREF _Toc150831397 \h 9 5.3.4 Handle Card Left Behind By Customer  PAGEREF _Toc150831398 \h 10 5.4 Receipt Handling  PAGEREF _Toc150831399 \h 10 5.4.1 Offer Receipt Handling to the Customer  PAGEREF _Toc150831400 \h 10 5.4.2 Withdraw the Receipt Facility  PAGEREF _Toc150831401 \h 10 5.4.3 Handle the Printing of Receipts  PAGEREF _Toc150831402 \h 10 5.5 Error Handling  PAGEREF _Toc150831403 \h 11 5.5.1 Handle Authentication Failures  PAGEREF _Toc150831404 \h 11 5.5.2 Handle the Bank Not Approving the Withdrawal  PAGEREF _Toc150831405 \h 11 5.5.3 Handle Cash Dispensing Errors  PAGEREF _Toc150831406 \h 11 5.5.4 Handle Money Left Behind By Customer  PAGEREF _Toc150831407 \h 12 5.5.5 Handle Running Out Of Critical Resources  PAGEREF _Toc150831408 \h 12 5.5.6 Handle Running Out of Cash  PAGEREF _Toc150831409 \h 12 5.5.7 Handle Security Breaches  PAGEREF _Toc150831410 \h 12 5.5.8 Handle the Customer Quitting the Session  PAGEREF _Toc150831411 \h 13 5.5.9 Handle the Customer Stopping Responding  PAGEREF _Toc150831412 \h 13 5.5.10 Handle Video Recording Failure  PAGEREF _Toc150831413 \h 14 5.5.11 Handle Transaction Log Failure  PAGEREF _Toc150831414 \h 14 5.5.12 Handle Event Log Failure  PAGEREF _Toc150831415 \h 15 5.6 Handle the Bank System Stopping Responding  PAGEREF _Toc150831416 \h 15 5.6.1 Handle Loss of Connection to the Security Administrator or the Service Administrator  PAGEREF _Toc150831417 \h 15 6. Subflows  PAGEREF _Toc150831418 \h 16 6.1 Authenticate Customer  PAGEREF _Toc150831419 \h 16 6.2 Assess Funds on Hand  PAGEREF _Toc150831420 \h 16 6.3 Conduct Withdrawal  PAGEREF _Toc150831421 \h 16 6.4 Service Shutdown  PAGEREF _Toc150831422 \h 17 6.5 Handle Transaction Adjustments  PAGEREF _Toc150831423 \h 17 7. Key Scenarios  PAGEREF _Toc150831424 \h 17 7.1 Success Scenarios  PAGEREF _Toc150831425 \h 17 7.2 Failure Scenarios  PAGEREF _Toc150831426 \h 17 8. Postconditions  PAGEREF _Toc150831427 \h 18 9. Extension Points  PAGEREF _Toc150831428 \h 18 10. Special Requirements  PAGEREF _Toc150831429 \h 18 10.1 Reliable Cash Dispensing  PAGEREF _Toc150831430 \h 18  title \* Mergeformat Use-Case Specification: Withdraw Cash Brief Description This use case describes how a Bank Customer uses an ATM to withdraw money from a bank account. Use-Case Diagram  Preconditions The bank Customer must possess a bank card. The network connection to the Bank System must be active. The system must have at least some cash that can be dispensed. The cash withdrawal service option must be available. Basic Flow of Events Insert Card The use case begins when the actor Customer inserts their bank card into the card reader on the ATM. The system allocates an ATM session identifier to enable errors to be tracked and synchronized between the ATM and the Bank System. Read Card The system reads the bank card information from the card. Authenticate Customer Perform Subflow Authenticate Customer to authenticate the use of the bank card by the individual using the machine. Select Withdrawal The system displays the service options that are currently available on the machine. The Customer selects to withdraw cash. Select Amount The system prompts for the amount to be withdrawn by displaying the list of standard withdrawal amounts. The Customer selects an amount to be withdrawn. Confirm Withdrawal Perform Subflow Assess Funds on Hand Perform Subflow Conduct Withdrawal Eject Card The system ejects the Customers bank card. The Customer takes the bank card from the machine. Dispense Cash The system dispenses the requested amount of cash to the Customer. The system records a transaction log entry for the withdrawal. Use Case Ends The use case ends. Alternative Flows Customer Authentication Handle No Communications with the Bank System At the Validate Card Information step of Subflow Authenticate Customer if the Bank System cannot be contacted or does not reply within the set communication time out period, If the communications link has failed more times than the communication retry number, then the authentication attempt is abandoned and Basic Flow is resumed at Use Case Ends. The system will attempt to contact the Bank System until it has completed the number of retry attempts indicated by the communication retry number. If communications is re-established the Basic Flow is resumed at Authenticate Customer. If there is still no response from the Bank System the system creates an event log entry to record the failure of the communications link to the Bank System. The event log entry includes the type of failure. The system sends the event log to the Service Administrator to inform them that communications with Bank System has been lost. Resume the Basic Flow at Use Case Ends. Handle No Communications with the Customers Bank At the Validate Card Information step of Subflow Authenticate Customer if the Bank System reports that the Customers Bank cannot be contacted, The system creates an event log entry to record the fact that the Customers Bank was unavailable. The event log entry includes the bank card information (excluding the PIN). The system informs the Customer that communications with their Bank is not possible and that the Customer should try again later. Resume the Basic Flow at Use Case Ends. Handle Inactive Card or Account At the Validate Card Information step of Subflow Authenticate Customer if the Customers Bank reports that the card, or its associated account, are inactive, The system creates an event log entry to record the fact that the Customers account was inactive. The event log entry includes the bank card information (excluding the PIN). The system informs the Customer that the account associated with the card is not active and that the Customer should contact their Bank for more information. Resume the Basic Flow at Use Case Ends. Handle Stolen Bank Card At the Validate Card Information step of Subflow Authenticate Customer if the Bank System reports that the card has been stolen: The system Confiscates the card. Captures a 10-second video image of the Customer. Creates an event log entry to record the fact that a stolen card has been used. The event log entry includes the video image and the current bank card information (excluding the PIN). Sends the event log entry to the Security Administrator, the Bank System and the Service Administrator to inform them that a stolen card is being used. Continues to videotape the Customer. The system delays for 5 minutes indicating that the system is busy (the system should try to keep the Customer at the machine for as long as possible). After the delay the system reports to the Customer that The card has been confiscated He or she should contact their bank if they have any questions. The system stops the video and creates an event log entry to store the captured images. The event log entry includes the video image and the current bank card information (excluding the PIN). Resume the Basic Flow at Use Case Ends. Handle Invalid Bank Card Information At the Validate Card Information step of Subflow Authenticate Customer if the Bank System reports that the bank card information is not valid, The system Captures a 10-second video image of the Customer. Creates an event log entry to record the fact that the card information was invalid. The event log entry includes the video image and the current bank card information (excluding the PIN). Sends the event log entry to the Security Administrator, the Bank System and the Service Administrator to inform them that a card with invalid bank card information is being used. The system reports to the Customer that The card could not be read He or she should contact their bank if they have any questions. Resume the Basic Flow at Use Case Ends. Handle Correct PIN Not Entered At the Validate Card Information step of Subflow Authenticate Customer if the PIN has not been entered correctly, The system informs the Customer that the PIN has been entered incorrectly If the Customer has made fewer than three attempts at entering the PIN, the system informs them that they can make another attempt. If this is the Customers third attempt, the system Confiscates the card. Captures a 10-second video image of the Customer. Creates an event log entry to record the fact that the Customer failed to enter the correct PIN number in three attempts. The event log entry includes the video image and the current bank card information (excluding the PIN). Sends the event log entry to the Bank System and the Service Administrator to inform them that a Customers bank card was confiscated because of the Customer failed to enter the PIN correctly. The system reports to the Customer that The card has been confiscated because the PIN number was not entered correctly. He or she should contact the Service Organization to retrieve the card He or she should contact their bank with any questions. Resume the Basic Flow at Use Case Ends. Specialist Withdrawal Facilities Handle the Withdrawal of a Non-Standard Amount At the Select Amount step of the Basic Flow if the Customer requires a non-standard amount, The system asks the Customer for the required amount indicating that the amount entered must be a multiple of the smallest denomination note held and must be below the amount of ATMs withdrawal limit and the amount of currency held by the machine. The Customer enters the desired amount. The use case resumes the Basic Flow from Confirm Withdrawal. Card Handling Handle Card Jam At the Insert Card steps of the Basic Flow, the Eject Card step of the Basic Flow and Alternative Flows, or at the Retrieve Card step of the Handle Card Left Behind by Customer Alternative Flow, if the bank card jams in the card reader, Emergency Eject Card The system attempts to eject the card. If the card ejection is successful, The system informs the Customer, That the card may be faulty That he or she should contact their Bank to get a replacement card That he or she should take the bank card from the machine The Customer takes the bank card from the machine. The use case resumes the Basic Flow at Use Case Ends. Emergency Confiscation If the emergency ejection fails the system attempts to retrieve the card and add it to the confiscated cards. If the card retrieval is successful, the system, Captures a 10-second video image of the Customer. Creates an event log entry to record the fact that a card has been retained because it became stuck in the card reader. The event log entry includes the video image and the current bank card information (excluding the PIN) if it is available. Sends the event log entry to the Bank System and the Service Administrator to inform them that a card has been retained because it became stuck in the card reader. Informs the Customer that the card cannot be returned because of a technical error and that they should contact the Service Organization for the return of their card. Card Jammed If the card could not be ejected or retrieved, the system, Captures a 10-second video image of the Customer. Creates an event log entry to record the fact that a card is jammed in the card reader. The event log entry includes the video image and the current bank card information (excluding the PIN) if it is available. Sends the event log entry to the Bank System and the Service Administrator to inform them that a card has become jammed in this ATM. Informs the Customer that the card cannot be returned because of a technical error and that they should contact the Service Organization for the return of their card. If the card is still jammed the system performs Subflow Service Shutdown to shutdown all service options and end the use case. Handle Unreadable Bank Card At the Read Card step of the Basic Flow if the system cannot read all the bank card information, The system captures a 10-second video image of the Customer. The system creates an event log entry to record the fact that the card could not be read. The event log entry includes the video image and any bank card information (excluding the PIN) that it managed to read. The system informs the Customer that the card cannot be read and that they should contact their bank to have the card checked. Eject Card The system ejects the Customers bank card. The Customer takes the bank card from the machine. The use case resumes the Basic Flow at Use Case Ends. Handle Invalid Card At the Read Card step of the Basic Flow if the system does not support the financial institution associated with the card or cannot identify the financial institution associated with card, 1 The system captures a 10-second video image of the Customer. 2 The system creates an event log entry to record the fact that an attempt was made to use the ATM using an invalid card. The event log entry includes the video image and the bank card information (excluding the PIN). 3 The system informs the Customer that the card cannot be used in this ATM. 4 Eject Card The system ejects the Customers bank card. The Customer takes the bank card from the machine. 5 The use case resumes the Basic Flow at Use Case Ends. Handle Card Left Behind By Customer At the Eject Card step of the Basic and Alternative Flows or at the Emergency Eject Card step of the Handle Card Jam Alternative Flow if the bank card is not removed from the ATM within 30 seconds, The system beeps to alert the Customer. If the card has still not been removed within a minute of the alert being sounded then the system, Retrieve Card Retrieves the card and adds it to the confiscated cards. Adjust the Account Balances If there are still funds to be dispensed then the system performs Subflow Handle Transaction Adjustments to put the money back into the account because it will not now be dispensed. Record the Event The system creates an event log entry to record the fact that the card was left behind in the ATM. The event log entry includes the bank card information (excluding the PIN). The system sends the event log entry to the Bank System and the Service Administrator to inform them that the card has been left in the ATM. The system turns off the alert. The use case resumes the Basic Flow at Use Case Ends. Receipt Handling Offer Receipt Handling to the Customer At the Select Withdrawal step of the Basic Flow if the ATM is not out of paper, 1 The system offers the Customer the facility to have a receipt printed for the transaction. 2 The Customer indicates whether they want a receipt. 3 The use case resumes from the place where it was interrupted. Withdraw the Receipt Facility At the Select Withdrawal step of the Basic Flow if the ATM is out of paper or the paper is jammed, 1 The system informs the Customer that the facility to have a receipt printed for the transaction is currently unavailable. 2 The use case resumes from the place where it was interrupted. Handle the Printing of Receipts At the Dispense Cash step of the Basic Flow if a receipt was requested, 1 The system prints a withdrawal receipt. 2 If the ATM does not have sufficient paper to print the receipt or the printer jams, the system a Creates an event log entry to record the fact that the receipt printing is out of order. The event log entry includes the bank card information (excluding the PIN). b Sends the event log to the Bank System and the Service Administrator to inform them of the failure and its reason (out of paper or paper jam) c Informs the Customer that the receipt cannot be printed d Displays the withdrawal receipt information to enable the Customer to take a manual record of the transaction. e Asks the Customer to acknowledge that the receipt information has been displayed. f Displays the receipt information for two minutes or until it is acknowledged by the Customer. 3 The system beeps to alert the Customer that the receipt information is available. 4 The use case resumes from the place where it was interrupted. Error Handling Handle Authentication Failures At the Authenticate Customer step of the Basic Flow if the bank card is not authenticated, then Unless the card has been deliberately retained the card is returned to the Customer: Eject Card a The system ejects the Customers bank card. b The Customer takes the bank card from the machine. The use case resumes the Basic Flow at Use Case Ends. Handle the Bank Not Approving the Withdrawal At the Validate the Withdrawal step of the Subflow Conduct Withdrawal if the Bank System responds with a withdrawal rejection, then 1 If the Bank System rejected the withdrawal because there were not enough funds in the account, the system informs the Customer that the withdrawal has been rejected because the account does not have sufficient of funds 2 If the Bank System rejects the withdrawal for any other reason, the system Informs the Customer that the withdrawal has been rejected by the Customers Bank Advises them to contact their Bank for further details 3 The system records a transaction log entry for the transaction including the reason given for the transactions rejection. 4 The use case resumes the Basic Flow at Select Withdrawal. Handle Cash Dispensing Errors At the Dispense Cash step of the Basic Flow if the full amount cannot be dispensed (notes might be rejected by, or get stuck in, the counting and dispensing device), then 1 The system creates an event log entry to record the fact that there has been a dispensing error. The event log entry includes the bank card information (excluding the PIN) and the details of the cause of the dispensing error. 2 The system sends the event log entry to the Service Administrator and the Bank System to inform them that the ATM is no longer able to dispense cash. 3 The system disables the withdraw-cash service option. 4 The system records a transaction log entry for the transaction including both the amount that should have been dispensed and the amount that was actually dispensed. 5 Perform Subflow Handle Transaction Adjustments to balance the ATM and the Bank System. 6 The use case resumes the Basic Flow at Use Case Ends. Handle Money Left Behind By Customer At the Dispense Cash step of the Basic Flow if the cash is not removed from the ATM within 30 seconds, 1 The system beeps to alert the Customer. 2 If the cash has still not been removed within a minute of the alert being sounded, then the system Retrieves the cash checking the amount that has been left behind. Creates an event log entry to record the fact that cash has been left uncollected. The event log entry includes the bank card information (excluding the PIN), the amount of cash retrieved and the amount of cash dispensed. Records a transaction log entry for the transaction including both the amount that should have been taken and the amount that was actually taken. Performs Subflow Handle Transaction Adjustments to balance the ATM and the Bank System Turns off the alert. 3 The use case resumes the Basic Flow at Use Case Ends. Handle Running Out Of Critical Resources At Use Case Ends if the system does not have the capacity to log any more events or log any more transactions then, 1 Perform Subflow Service Shutdown to shutdown all service options and end the use case. Handle Running Out of Cash At Use Case Ends if the system has no more funds to dispense, 1 The system removes Withdraw Cash from the list of available service options. 2 The system creates an event log entry to record the fact that the ATM has run out of cash. 3 The system sends the event log entry to the Service Administrator and the Bank System to inform them that the ATM is no longer able to dispense cash. 4 The use case resumes from the place where it was interrupted. Handle Security Breaches At any time when an attempt to gain physical access to the currency dispenser is detected, 1 The system starts to videotape the Customer. 2 The system creates an event log entry to record the fact that the ATM has detected an attack 3 The system sends the event log entry to the Security Administrator, the Service Administrator and the Bank System to inform them that the ATM is being attacked. 4 If the card has not yet been ejected, the card is confiscated. 5 If a withdrawal has been approved but the cash has not yet been dispensed, the transaction is cancelled. 6 The system creates an event log entry to record the actions taken. The event log entry includes the bank card information (excluding the PIN). 7 The system sends the event log entry to the Security Administrator, the Service Administrator and the Bank System to inform them what action has been taken. 8 If a transaction was cancelled, then The system records a transaction log entry for the transaction including both the amount that should have been dispensed and the amount that was actually dispensed. Perform Subflow Handle Transaction Adjustments to balance the ATM and the Bank System. 9 The Customer is informed that the card has been confiscated and the transaction ended. 10 The system saves the video recording with the session ID 11 The use case resumes the Basic Flow at Use Case Ends. Handle the Customer Quitting the Session At any time, if the Customer elects to quit the session, Tidy Up the Session The system stops the current transaction. If the Customer quits after a withdrawal has been authorized but before the cash has been dispensed, then the system Records a transaction log entry for the transaction including both the amount that should have been dispensed and the amount that was actually dispensed. Performs Subflow Handle Transaction Adjustments to balance the ATM and the Bank System Eject Card The system ejects the Customers bank card. The Customer takes the bank card from the machine. The use case resumes the Basic Flow at Use Case Ends. Handle the Customer Stopping Responding At any time where a response from the Customer is requested, if no response is made within 30 seconds (this does not include removing the card or the cash when they are dispensed as these are explicitly handled by their own flows) 1 The system beeps to alert the Customer. 2 If there is still no reply within a minute of the alert being sounded, then the system Confiscates the card. Creates an event log entry to record that the card has been confiscated. The event log entry includes the bank card information (excluding the PIN). Sends the event log entry to the Bank System to inform the Customers bank that the card has been confiscated. If the event happens after a withdrawal has been authorized but before the cash has been dispensed, then the system Records a transaction log entry for the transaction including both the amount that should have been dispensed and the amount that was actually dispensed. Performs Subflow Handle Transaction Adjustments to balance the ATM and the Bank System e Turns off the alert. 3 The use case resumes the Basic Flow at Use Case Ends. Handle Video Recording Failure At any point in the flow of events where video is being recorded, if the video capture device fails or there is insufficient storage for the video images, 1 The system creates an event log entry to record the failure of the video system. The event log entry includes the type of failure (video storage full or video device failure). 2 The system sends the event log entry to the Service Administrator and the Bank System to inform them that the video system has failed. 3 The system turns off the video device to await the maintenance engineer. There is no need to disable the ATM because all functions can continue without the video being active. 4 The use case resumes from the point that the failure was detected. Handle Transaction Log Failure At any point in the flow of events where a transaction log is being recorded, if the log cannot be stored, 1 The system creates an event log entry to record the fact that transaction log has failed. The event log entry includes the current bank card information (excluding the PIN). 2 The system sends the event log entry to the Bank System and the Service Administrator to inform them that the transaction log is out of order. 3 If the event happens after a withdrawal has been authorized but before the cash has been dispensed, then the system Sends the transaction log entry to the Bank System to cancel the withdrawal. Creates an event log entry to record the fact that the transaction has been cancelled. The event log entry includes the current bank card information (excluding the PIN), the fact that the transaction was a withdrawal and the amount of the withdrawal. 4 The system informs the Customer that because of a technical problem their request cannot currently be fulfilled. 5 Eject Card The system ejects the Customers bank card. The Customer takes the bank card from the machine. 6 Perform Subflow Service Shutdown to shutdown all Customer services and end the use case. Handle Event Log Failure If at any point in the use case the event log fails the use case will continue to completion without logging any events. At the end of the use case, the Customer services will be shutdown (see Handle Running Out of Critical Resources). For the details of how event log failures are handled by the system see the Supplementary Specification. Handle the Bank System Stopping Responding At the Validate the Withdrawal step of the Subflow Conduct Withdrawal if the Bank System cannot be contacted or does not reply within the set communication time out period, Attempt to Re-establish Communications If the communications link has not failed, during this use case, more times than the communication retry number then the system will attempt to contact the Bank System until it has completed the number of retry attempts indicated by the communication retry number. If communication is re-established the flow is resumed at the Validate the Withdrawal step of the Subflow Conduct Withdrawal. Cancel the Withdrawal If there is still no response from the Bank System the system creates an event log entry to record the failure of the communication link to the Bank System. The event log entry includes the type of failure. The system sends the event log to the Service Administrator to inform them that communication with Bank System has been lost. The system records a transaction log entry for the transaction including the fact that the withdrawal was not authorized because of loss of communications with the Bank System. The system informs the Customer that the withdrawal has been rejected because the Bank System cannot be contacted. Eject Card The system ejects the Customers bank card. The Customer takes the bank card from the machine. Resume The Basic Flow The use case resumes the Basic Flow at Use Case Ends. Handle Loss of Connection to the Security Administrator or the Service Administrator If at any time the system attempts to contact the Security Administrator or the Service Administrator and fails, the use case will still continue to completion. For the details of how these generic communications failures are handled by the system, see the Supplementary Specification. Subflows Authenticate Customer 1. Validate Card Information The system sends the bank card information to the Bank System to confirm that the bank card and its associated account are active, that the card has not been reported stolen and that the bank card information (including the PIN) read from the bank card is valid. The system also sends the ATM ID and the ATM session identifier to the Bank System along with the bank card information. The Bank System acknowledges that the bank card information is valid and that the card can be used. 2. Validate User Identity The system prompts the Customer to enter the PIN. The Customer enters their PIN. The system checks that the PIN entered is identical to the PIN read from the bank card. 3. The flow of events resumes at the next step. Assess Funds on Hand 1 The system determines whether it has sufficient funds on hand to dispense the requested amount. The system checks to see if the total amount requested is greater than the amount on hand. The system checks to see if the requested amount can be dispensed with the denominations on hand. Note: It is possible to have sufficient funds in total and still be unable to dispense funds. Consider the case where the Customer has requested $35 but the system has only $40 in the form of two $20 bills. 2 If there are not sufficient funds on hand, the system a Informs the Customer that the amount requested is not available from the ATM b Offers the Customer a choice of the nearest available amount (s). If the amount requested was rejected because the correct denomination notes were not available, then both the nearest amounts below and above that requested are offered. If the amount requested was rejected because it was higher than the amount of fund available, then the nearest amount below that requested is offered. 3 The Customer selects an amount to be withdrawn. 4 The flow of events resumes at the next step. Conduct Withdrawal Validate the Withdrawal The system supplies the Bank System with the bank card information, the amount of the requested withdrawal, the ATM Session Identifier and the transaction fee and asks it to approve the withdrawal. The Bank System responds with a withdrawal acceptance to approve the withdrawal. Log the Authorization The system records a transaction log entry for the authorized withdrawal including the information that the cash is still to be dispensed. Return to Performing Flow Resume at the next step. Service Shutdown The ATM displays the fact that it is out of order and that no service options are available. 2 The system turns off the card reader to prevent the insertion of any more cards. 3 The system creates an event log entry to record the fact that the system has switched off all Customer services. The event log entry includes the time of the of service shutdown. If the recording of the event log fails, the system just ignores it. 4 If they are still contactable, the system sends the event log entry to the Service Administrator and the Bank System to inform them that the ATM is out of order. If they are not available, the system continues to attempt to inform them of the current state of the system. 5 The use case ends. Handle Transaction Adjustments 1 The system calculates the adjustment required by the Banking System for this withdrawal by subtracting the amount of cash dispensed from the amount approved for withdrawal. 2 The system informs the Bank System of the amount of the adjustment also specifying the bank card information, and the ATM Session Identifier. 3 The Bank System accepts or rejects the adjustment. 4 The system records a transaction log entry for the adjustment indicating whether the transaction was accepted or rejected and including the Bank Systems response. 5 Resume at the next step. Key Scenarios Success Scenarios Withdraw cash Basic Flow Withdraw cash of a non-standard amount Basic Flow, Alternative Flow: Handle the Withdraw of a Non-Standard Amount Withdraw cash with withdrawal receipt printed Basic Flow, Alternative Flow: Handle the Printing of Receipts Failure Scenarios Fail due to authentication failure Basic Flow, Alternative Flow: Handle Authentication Failures Fail due to invalid card Basic Flow, Alternative Flow: Handle Invalid Card Fail due to insufficient funds in the account Basic Flow, Alternative Flow: Handle the Bank Not Approving the Withdrawal Fail due to cash dispensing errors Basic Flow, Alternative Flow: Handle Cash Dispensing Errors Fail due to card jam Basic Flow, Alternative Flow: Handle Card Jam Fail due to inadequate critical resources Basic Flow, Alternative Flow: Handle Running Out of Critical Resources Fail due to non-responding bank system Basic Flow, Alternative Flow: Handle the Bank System Stops Responding Quit Basic Flow, Alternative Flow: Handle the Customer Quitting the Session Postconditions The ATM has returned the card and dispensed the cash to the Customer and the withdrawal is registered on the Customers account. The ATM has returned the card to the Customer and no withdrawal is registered on the Customers account. The ATM has returned the card but has not supplied the amount of cash registered as withdrawn from the Customers account. The discrepancy is registered in the ATMs log. The ATM has kept the card, no withdrawal has registered on the Customers account and the Customer has been notified where to contact for more information. Extension Points None Special Requirements Reliable Cash Dispensing The ATM shall dispense the correct amount of cash in at least 99% of cash withdrawals.  Bittner and Spence, USE CASE MODELING, pp. 301-330, 2002 Pearson Education Inc. Reproduced by permission of Pearson Education, Inc. All rights reserved. Sample Bank ATM subject \* Mergeformat Sample Bank ATM Version: 1.0title \* Mergeformat Use-Case Specification: Withdraw Cash Date: 01/07/2007 Confidential DOCPROPERTY "Company" \* MERGEFORMAT Sample Bank ,  DATE \@ "yyyy" 2007Page page 18  '(MNOQ_vw       " # 8 9 S ӸӧӸӸӖӸӸӅӸӸ jh'UmHnHu j}h'UmHnHu jh'UmHnHujh'UmHnHuh'CJaJmHnHuh'mHnHu hI CJjhA}0J&UjhI UhI hG'hm2PQ_`abcdv X & X " W   $a$_S T U V W X [ \ g h i    ! " # $ ˽ج˽؛˽؊˽y jkh'UmHnHu jh'UmHnHu jqh'UmHnHu jh'UmHnHuhr~\h'>*mHnHuh'CJaJmHnHuh'mHnHujh'UmHnHu jwh'UmHnHu/$ % & ) * 7 8 9 S T U V W X [ \ n o p     ܽܬܛ܊ j_h'UmHnHu jh'UmHnHu jeh'UmHnHu jh'UmHnHuhr~\h'>*mHnHuh'mHnHuh'CJaJmHnHujh'UmHnHu4   ! " $ % 7 8 R S T U V W Z [ s t  : ; < = > ? D E e f غةؘ؇ jh'UmHnHu jSh'UmHnHu jh'UmHnHu jYh'UmHnHuh'CJaJmHnHuh'mHnHujh'UmHnHu jh'UmHnHu2 ?  S UR,`?]C     3 4 N O P Q R S V W x y غةؘ؇ jA h'UmHnHu j h'UmHnHu jG h'UmHnHu jh'UmHnHuh'CJaJmHnHuh'mHnHujh'UmHnHu jMh'UmHnHu2 $%56PQRSTUZ[wxغةؘ؇ j h'UmHnHu j5 h'UmHnHu j h'UmHnHu j; h'UmHnHuh'CJaJmHnHuh'mHnHujh'UmHnHu j h'UmHnHu2 12LMNPQRWX  &'(*+,/0?@Zغةؘ؇ j#h'UmHnHu jh'UmHnHu j)h'UmHnHu j h'UmHnHuh'CJaJmHnHuh'mHnHujh'UmHnHu j/ h'UmHnHu2Z[\^_`ef9:;=>?DEjkغةؘ؇ jh'UmHnHu jh'UmHnHu jh'UmHnHu jh'UmHnHuh'CJaJmHnHuh'mHnHujh'UmHnHu jh'UmHnHu2"#<=WXY[\]bc"#=غةؘ؇ jh'UmHnHu jh'UmHnHu j h'UmHnHu jh'UmHnHuh'CJaJmHnHuh'mHnHujh'UmHnHu jh'UmHnHu2=>?ABCIJij !vwغةؘ؇ jvh'UmHnHu jh'UmHnHu j|h'UmHnHu jh'UmHnHuh'CJaJmHnHuh'mHnHujh'UmHnHu jh'UmHnHu29qT-l02@l & F&1$  `  345789<=PQklmopqtuغةؘ؇ jh'UmHnHu jjh'UmHnHu jh'UmHnHu jph'UmHnHuh'CJaJmHnHuh'mHnHujh'UmHnHu jh'UmHnHu2 !234NOPRSTWXijkغˬˬ؛ˬˬ؊y jXh'UmHnHu jh'UmHnHu j^h'UmHnHuhr~\h'^JmHnHu jh'UmHnHuh'CJaJmHnHuh'mHnHujh'UmHnHu jdh'UmHnHu/  '()+,-12KLfghjklmno01aj&隖z hI 5 hI 5\jLhG'UjhI UhI jhI CJOJQJU jh'UmHnHu jRh'UmHnHu jh'UmHnHujh'UmHnHuh'CJaJmHnHuh'mHnHu.1>'1m ^,?dB  8h^hgdb&gd5 4 & F&&012=aix'0FP[m !0,6>?HOclmt(0Wfž׮hM|hh h%h%>* hI 5] hI \] hI 56h Z0h= hI 5\ hI \ hI 5h%hI >*h5 4hI hT;DZF !!!!!"1#####$J%%&& & F[gdh 8^8gdh  & FIgdh gdh  & FHgdh ^gdh gdh '.C2<KXY / D E ,!5!=!R!!!!!!!!!"""""7"\"k"""""""##+#.####ԾԳԨԤԠԤ h5\hh=hhhh 5>*\h{gh{g5>*\h{ghh 5>*\h;] hh 5\hh hh56\ h\ h=\ h!5\h5>*\hV><#####$$$-$B$J$Y$$$$$% %%4%D%G%%%%%&&)&0&I&J&Z&o&&&''R'['''''''`(d()))))*6*K*[*^*l*v*z**hh_56\ h_\ h_5\h_5>*\h_h= hh 5\hh.v56\ h.v\ h.v5\h.v5>*\h.vhhhh 5>*\hh h;]=&)&&&&&'N(s( )C)a))a***=+H+z+8,,-/-o- & FYgdh  & FYgdh  & FWgdh  & FKgdh  & FXgdh gdh gdh *******+.+U+V+++++ ,",2,5,B,K,,,z----------..Q.T.r......@/N/}//////*0?0O0R0_0h000001 1h1k1112"2&232522hI hhhh 5>*\h;]h= hh 5\hh_56\ h_\ h_5\h_5>*\h_hh Ho---(.r..*/@/r/U01>111 252V22234?4M4]4 & F) & FWgdh  & FYgdh  & FZgdh gdh gdh  & FYgdh 222222S3r3334%4+4=4>4_4d4o4p4444444444444445 5(515K5_5ӛzpeh Jh J5>*\h'mh'm>*\h'mhQ5>*\ h'm5\h'mh'm\ hQ5\hQhI \hQhI 5>*\ hQ\ h\hh\hQhQ5>*\hQh;] hI 5\hQhQ\hQhQ5>*\hQhI 5>*\hI hQ&]4K5`55555+6e66666T7778N99:<: & F\gdb & F^gdb<^gdb<^ & FS & FS ^`gdb<`gdb< & F\gdb<_5`5J6S6|666666666A7R7777738<8l888888999::<:J:t:u:y::::;;);,;L;U;;<O<<<<<<< ====0=1=𪠛 hI 5 hw 5hw hI 5>*hw hI 56\]hI 5>*\h62h625>*\h=h Jh J5>*\hhI 5>*\h;] hI 5\hI h JhI 5>*\;<:n:B;;n<< =j==z>>?0?c???j@@AAAA B & Figdp|gdp| 0^`0  & Fh 8gd!  & F( 88^8^gdb< & FL1=S=\=j====>>7>L>\>_>>?%?.?G?P?|??????????? @>@S@j@@@@A#A'A0AXAmA}AAAAAAB B)B*\hp|hbhp|5>*\ hw 5hw hw 5>*hw hb<hI 5>*\h;] hI 5h!h!5>*h= hI 5\hI < B*\h;]hbhI 56\]h=hbhI 5>*\hbhb5>*\hI 5>*\ hI 5\h JhI 5>*\ h JhI hI hb\h Jh J\ h J5\h Jh J5>*\4FFF G;GSG[GGG H'H8HOH_IaIeIfIsItIIIII?JHJJJJJJJJJKK7L* hI 5\hI 5\]h_h_\]h_5\]h_hI 5>*\] h_] hI ]h_h_5>*\hMnh=hI h_\h_hI 5>*\h_1HH?I_III2JJjKKLiLLM]MlMMMANLNzNNNOO^ & F: 8^ p^p` 0^`0ANKNLNoNxNNNNNNNNNOO0O1ODOUOVOWO{OOOOOOIPPPQQ`QoQQQQQR"R&R3R4RJRRR2S;SOS麵ʖ咇xh_h_\ h_5\h_hI 5>*\h_ho^ho^\hMnh56\hh56\ h\ h5\h hI ]ho^hI 5>*\h;] hI 5\ hI 5hI hhI 5>*\hh5>*\/OsPPQIQQRRRSGTT&UUUUCVmVVWWXXX)YRYY & FO & FN 0^`0OSdStSwSSSJTjToT}TTT(U)U8UVUUUUUUUUUUUVVW(WlWuWWWWWW XXX YYY$Y'YUYbYcYYYYZ=ZJZZZZZ;[D[\\\\]ºhThI 5>*\hCAhCA5>*\h_h_\ h_5\h_h_5>*\h_hCAhI 5>*\h;]hI 56\]hMnhI hI 5\@YZ:ZxZZ$[[[\p\\\]]M^^~__J```6aoaaaa & Fagd & FP 0^`0]]e^n^^^^^^^^^__Z`x`+a5aRa\a`amaaaaaaYbybbb/cMcuccccccccdddddee ff(f=fMfPf]fff@gOggg]hghkhxhLiUiiiijjjhT hI 5hhhI 5>*\hh5>*\hMnhCAhI 5>*\h;]hI 56\]hI hI 5\Gabbcuccccd=d$eNeeeSff6gg'hBhzhh4i^ & FE & FR & FagdJ & Fagd & FQ ^`gdTh`hgdT4iipj#khkkkl4mmmngotooo.pGpqqqwrrs & Fjgdv & Fmgdv & Ffgdr & Fcgdr 0^`0jkk ll2lAlSl\lxllllllmmn nSn\nxnnnniosotoooooooookptpqqqqqqqrrXrnrorurwr~rrržhvhv5>*\hvhI 5>*\h1h156\hSh156\h1h1\ h15\h1hI 5>*\h1hThI 56\] hI 5hrhrhr5>* hI 5\hI 6rrssssssst#t%t3t:t;ttttt u)uuuvvvvvvwww!w,w-wGwQwUwbwcwdwxxxxxyy*y3y4y hW5\hWh|\|h|\|5>*h|\|h|\|5h|\|hW5h Z0hCAhCAhI 5>*\h;] hI 5hvhv5>*\hvhI 5>*\hShv56\h1hv\ hv5\hv hI 5\hI 2s%t;t uu:vvvvw-wewwxxxyzzz{ & FUgdWh^hgdW  p@ zgdCA & Fogdv & Fmgdv & Fmgdv & Fjgdv4y?yGyRygyqyyyyyyyyyzz6z*h_hI 5>*hMnhI 5hI h":h4^ h4^hW hMnhMn hMn5 hW5hMnh":h|\|5>*h|\|h|\|5h|\|hW5hW hW5\8{E{d{{{|d||}*~y~2atRD^8^8gd_ & Fqgd_ & Fsgd_ & Fqgd_8^8 & Fah^hh^hgd4^ & FVgdW€*r΁݁D]^ƂՂPYjsЇ݇+01^_ƻh-Ef5OJQJ^JhYUOJQJ^Jh-EfOJQJ^JhYUhYUOJQJ^JhhYU5OJQJ^JhYU5OJQJ^JhhYU^JhT;h&*[h_hI 5>*\hI 5>*\hEe=hEe=5>*\ hI 5\hI 1^w84G\{*Ї_͈ЈgdYU^gdYU 0^`0gdYUgd&*[ 0^`0gd&*[ 0^`0 & F4h`hgd_͈̈ЈCD\]_k؉݉ /1źź||qgZgMBh /5OJQJ^Jh /5OJQJ\^JhYUhd7,OJQJ^Jhd7,OJQJ^Jhd7,5OJQJ^Jhd7,5OJQJ\^JhhYUOJQJ^Jh-Ef5OJQJ\^JhNOJQJ^JhhNOJQJ^JhN5OJQJ^JhN5OJQJ\^JhhYU^JhhYU5OJQJ^Jh-EfOJQJ^JhYUh-EfOJQJ^JD m%t݌%6;Pi] d1$7$8$H$gdA} & F2gd}[^gd}[^gd /^gdYU^gdN1HMl܊ފ%LNejĹĹċvl_[WMjhA}0J&UhI hT;hh}[OJQJ^JhYUOJQJ^JhNOJQJ^JhN5OJQJ^JhN5OJQJ\^JhMnOJQJ^JhYUh}[OJQJ^Jh}[OJQJ^Jh}[5OJQJ^Jh}[5OJQJ\^Jh /5OJQJ^Jh /5OJQJ\^JhYUh /OJQJ^Jh /OJQJ^JŽɎ\]^_aqrtuЏя FGRSVWghlmstyz|}̵̽҉hI hi0JmHnHu h'0Jjh'0JUhimHnHuh3jh'Uh'h'5CJ$OJQJ h'CJhihA}OJQJ^JhiCJOJQJ^JaJhA}CJOJQJ^JaJhA}1]^_`aqrst oD($If]D$If $&dPa$ $dN '^`gdA} $Iflkd--$$Ifl0$k 04 la 20.YkdQ.$$Ifl$V%04 la$Iflkd-$$Ifl0$k 04 lan~ca__]kd.$$IflF H$Z Z Z 0    4 la $$Ifa$ $$Ifa$ h$If]h*0PBP/ =!"#$%0'0 PBP/ =!"#$%}DyK _Toc150831371}DyK _Toc150831372}DyK _Toc150831373}DyK _Toc150831374}DyK _Toc150831375}DyK _Toc150831376}DyK _Toc150831377}DyK _Toc150831378}DyK _Toc150831379}DyK _Toc150831380}DyK _Toc150831381}DyK _Toc150831382}DyK _Toc150831383}DyK _Toc150831384}DyK _Toc150831385}DyK _Toc150831386}DyK _Toc150831387}DyK _Toc150831388}DyK _Toc150831389}DyK _Toc150831390}DyK _Toc150831391}DyK _Toc150831392}DyK _Toc150831393}DyK _Toc150831394}DyK _Toc150831395}DyK _Toc150831396}DyK _Toc150831397}DyK _Toc150831398}DyK _Toc150831399}DyK _Toc150831400}DyK _Toc150831401}DyK _Toc150831402}DyK _Toc150831403}DyK _Toc150831404}DyK _Toc150831405}DyK _Toc150831406}DyK _Toc150831407}DyK _Toc150831408}DyK _Toc150831409}DyK _Toc150831410}DyK _Toc150831411}DyK _Toc150831412}DyK _Toc150831413}DyK _Toc150831414}DyK _Toc150831415}DyK _Toc150831416}DyK _Toc150831417}DyK _Toc150831418}DyK _Toc150831419}DyK _Toc150831420}DyK _Toc150831421}DyK _Toc150831422}DyK _Toc150831423}DyK _Toc150831424}DyK _Toc150831425}DyK _Toc150831426}DyK _Toc150831427}DyK _Toc150831428}DyK _Toc150831429}DyK _Toc150831430Dd7#T  C 0Auc_diagram3b94R{ֹthm?ln 4R{ֹthm?PNG  IHDRY'sRGBPLTEHtHtHHHHtHHHHHtHHHttHtHHHttHtttHttttt3HHHHtHtߜttHHtߜ߿ߜHߜtߜIDATx {8afvJv.v`w$?nI! mt^m[&BeqHR2D & ""Ȣ h,,, & ""Ȣ h,,, & ""Ȣ h,,, & ""Ȣ h,,, & ""Ȣ h,,, & ""Ȣ h,,2 Hϰ^]"*uY+EE,, ,7-,,,d! YdZ̔Ah!7; +BZ,oBVYBAA?"9s^d! YYYB,ddd!+JE< Y1vZsN Y%(~ j"E>xr }nWEڹڿj dX,r.@9UZ,;L E-qbdEwuH #{])t*dtXnh!wVTdV#k|\Ycb՚CKde}| ޕAw,]8H\!3W=d Yq|qcB"t,\E+d*^Wrꔭ6WٲJL5VV'vWj/+{Ȋɛ ۻ^7fHU Y+#1o3$sxRꮤ+U0!TKl)bbmnY6-ռXOJֺ*RR6)75^ TTU׋rC$d`$C=ΒKYs#G¹rnX\r7,#VlYM&oYg@vZ]> !Kڔ\כҐЈX7nFz$҆=榄>ٟ>7:ϊƕ_}9,d˗W._A֠\aX]9b5nWmX YC +d WmX YC +d WmX YC +d*WY洢6mwڎV(OF5;ٞcpJE (V1 a!-iV(++|]U]xeKd.@ lDV7Y~Ժ+ysz>]<##Vq@ YNYE+Y1J\bt6~>! ՝^7NA+DWqt[ԻhByVX*S9i9+q/wUbe!9gVOT0fk&]q ṷkTV{VW\0K:/= i̖zN]5U'' \ԥ-=(gTδ9ϢAL15Pս~RzW(SBFKv5=Әa#zYϼ'3d}S.gըQ][c'v\M倕1`Ov 3CjjԦ~Ӄʌ5]6n=κ^5R:7|ޘa%qjLh`v3jG'5`7;e$\:.s"[w{_ArMQNQ莮agrJγlhYTfUh*S;0ûC踐EBB?.d9Å,-df+b\r Y[ V .dlE Y>BB .dy Y[ V/.dl!+4[BN5%be6q YAʎ+^_Eiݢ{o t^BVH0޹,P2dp Y["me-i! Y䌶EzCRr2CxugWIovZ]4dk Du,dd'Y7f+,d! YBAA,,,d! YYi!+RX{-d 5-dE 1-d --d*}Y7E:`9aa9arB YcF-di!k$N Ycu ddd,,,BEEE|C$6ۅ!kDɧkz%O_*39dyff\,3uwJ.T~׭Z#}[e>W$M}W۬v\߃Z[Zh㮾i^HfI絞,uռf){XlE>Q\mrGv3s;V3Ngōk(9rQUX",dŜ\D9),/iqNR9ﶻ+ YP%ɧTߙ=7D)7e5V =]AAA!"""YYY ddd,,,BEEEAAA!"""YYY ddd,,,BEEEAAA!"""YYY ddd,,,BEd+IENDB`$$If!vh55k #v#vk :V l055k 4$$If!vh55k #v#vk :V l055k 4z$$If!vh5V%#vV%:V l05V%4$$If!vh5Z 5Z 5Z #vZ :V l05Z / 47B@B Normal 1$d_HmH sH tH T@T Heading 1$ & Fx<@&5CJOJQJ<@< Heading 2  & F@&CJB@B Heading 3  & F@& 56CJ@@@ Heading 4  & F@&5CJD@D Heading 5 & F<@&CJH@H Heading 6 & F<@&6CJ@@@ Heading 7 & F<@&D@D Heading 8 & F<@&6J @J Heading 9 & F<@& 56CJDA@D Default Paragraph FontVi@V  Table Normal :V 44 la (k(No List POP Paragraph2$P^a$B*mH sH uB>@B Title$da$5CJ$OJQJPJ@P Subtitle $<a$6CJ$OJQJmH sH uF@"F Normal Indent|^`|>@> TOC 1 $<]>@> TOC 2 $]^:@: TOC 3 $`^`4@b4 Header  !4 @r4 Footer  !.)@. Page NumberHOH Paragraph3$dP^a$HOH Paragraph4$dP^a$6O6 Tabletext $x>B@> Body Text$x^.. TOC 4 X^X.. TOC 5  ^ .. TOC 6 ^.. TOC 7 ^.. TOC 8 !x^x.. TOC 9 "@^@O2 Bullet1p# & FP>T?^`POB Bullet2p$ & F>Th?^`B* @YR@  Document Map%-D OJQJD&@aD Footnote ReferenceCJH*f@rf  Footnote Text&'$$h((&d^h` CJOJQJXOX Main Title($d<a$5CJ KHOJQJ@O@ Paragraph1)$dPa$8P@8 Body Text 2*6B*NC@N Body Text Indent +^ 6>*B*HOH Body,$dx1$a$OJQJtH ubOb Bullet4-$ & FQ hdx1$]h^a$OJQJ>O> InfoBlue.x^6B*0U@0 Hyperlink>*B*T^@T Normal (Web)0ddd1$[$\$CJaJPOP infoblue1x1$^6B*PJ]phTO"T Example#2dxx1$]^OJQJB'1B Comment ReferenceCJaJ4B4  Comment Text4@jAB@ Comment Subject55\HbH  Balloon Text6CJOJQJ^JaJNd  ,PQ_`abcdv X&X"W?SUR,`?  ] C  9 q T-l02@l1>'1m ^,?dBZF1J)N s !C!a!!a"""=#H#z#8$$%/%o%%%(&r&&*'@'r'U()>))) *5*V***+,?,M,],K-`-----+.e.....T///0N112<2n2B33n44 5j55z66707c777j889999 :<:t::^;;;;0<L<===P>p>>>>.???@ @@@?A_AAA2BBjCCDiDDE]ElEEEAFLFzFFFGGsHHIIIIJJJKGLL&MMMMCNmNNOOPPP)QRQQR:RxRR$SSSTpTTTUUMVV~WWJXXX6YoYYYYZZ[u[[[[\=\$]N]]]S^^6__'`B`z``4aapb#chcccd4eeefggtggg.hGhiiiwjjk%l;l mm:nnnno-oeoopppqrrrsEsdssstdttu*vyvx2xaxtxxRyyyDz^zwzzz8{4|G}\}{}*~~~_̀ЀD m%t݄%6;Pi]^_`aqrst n~00000000000000000000000000000000000000000000000000000000000x0x000x0x00x0x000x0x 0x0x 0x0x 0x& 02x& 02& 02& 02 0x 0x01x01x 0x0'x 0x0mx 00x0 0x0x0 0x0,x0,x 0x0x0x 000 0x0 0x 0x( 0x0xH 0xH 0xH 0xH 0xH 0H 00x( 0x0xI 0xI 0I 0x0x( 0x0[ 0[ 0[ 00( 00xX 0K 0K 0K 0K 0K 0X 0X 0 W 0xW 0xX 0xX 0( 0x0"Y 0"xY 0=#"xY 0=#"xY 0=#"Y 0"xW 0"xW 0"xY 0"x( 0x0%xZ 0%xZ 0%xZ 0%xY 0o%%xY 0o%%xY 0o%%Y 0o%%Z 0%(W 0%xW 0%xW 0%xZ 0%x 0x( 05*5*0V*) 0V*x) 0V*x) 0V*x 0x( 0?,?,0M,x\ 0M,0M,x0M,xS 0M,xS 0-M,xS 0-M,xS 0-M,S 0M,xS 0M,x0M,\ 0M,0M,0M,^ 0M,x^ 0M,^ 0M,x^ 0M,\ 0M,00M,xL 0M,xL 0M,xL 0M,xL 0M,0M,( 0?,?,x04x( 04( 04x( 04x( 04h 04xh 04x( 04x( 0?,?,x0707070707x07i 07xi 0707( 0?,?,80t:x0t:x0t:x( 0c7t:0t:( 0c7t:x0t:x( 0c7t:0t:x0t:x0t:0t:x 0x( 0>>x0>x0>x0>x0>x( 0>>0@0@0@( 0>>x0?Ax0?A0?Ax0?A0?A0?A@0?Ax0?Ax0?Ax0?Ax0?Ax 0( 0]E]Ex0lEx: 0lEx0lEx0lEx0lEx: 0lE( 0]E]Ex0Fx0Fx0FxN 0FxN 0F0F0F( 0]E]E0Jx0J0Jx0JH0Jx0Jx0Jx( 0]E]Ex0M0Mx0MxO 0MO 0MxO 0MxO 0MO 0Mx0Mx( 0]E]Ex0)Qx0)Qx( 0]E]Ex0R0R0R0R0R( 0]E]Ex0S0Sx0S0Sx0SP0Sx0Sx0Sx0SxP 0SP 0Sx0Sx0S0Sx( 0]E]Ex0oYa 0oYx0oYx0oYxQ 0oYxQ 0oYxa 0oYa 0u[oYxa 0u[oY0oYx( 0]E]E0\0\0\R 0\R 0\XR 0\xR 0\xE 0\xE 0\x0\0\( 0 ]E]Ex0z`x0z`0z`x0z`x0z`( 0 ]E]Ex0hcx0hcx0hcx0hcxc 0hcxc 0hc0hc0hcf 0hcf 0hc0hc( 0 ]E]E`0.hx 0x0ix0im 0ixj 0ij 0ixm 0ixm 0%lim 0%lixm 0%lixm 0%lixm 0ixo 0ixo 0ixm 0ix0i( 0ii0eox 0 0ppx0pU 0ppU 0pxU 0px0pxV 0pV 0pxV 0px0px 0pp0sa 0sa 0sx0sx0sx0sx0sx0sx 0ppxq 0axs 0axs 0axq 0ax0axq 0ax0ax 0pp4 0wzx0wzx0wzx0wzx0wzx 0pp0\}0\}x0\}x0\}x0\}x 0 0x0x00x0x 0x0Ѐ0Ѐ0Ѐ0Ѐ0Ѐ0Ѐ0Ѐ0Ѐx0Ѐ0Ѐx 02 02 0x2 0x2 0x 0x0% 0 x 0;;0x@0x@0@'00P-@0@0@0@0@0@0@0h @0h @0l @0 @0 @0 @0 @0 @0@0@0 @0 @0 @0 @0@00ܜ-PQ_`abcdv02@l1>'1m ^,?dBZF1J)N s !C!a!!a"""=#H#z#8$$%/%o%%%(&r&&*'@'r'U()>))) *5*V***+,?,M,],K-`-----+.e.....T///0N11<2n2B33n44 5j55z6607c777j88999 :<:t::^;;;0<==P>p>>>>.???@ @@@?A_AAA2BBjCCDiDDE]ElEEEAFLFzFFFGGsHHIIIIJJJKGLL&MMMM̀ЀD00000000@000  00m   00   0& 0 & 0 & 0 & 0   0 000 00 00, 000 00D0D 000 00F0F 000 008  0 0YY* 0mm0H 0H 0H 0H 0H 0H 00* 0mm0mI 0mI 0mI 0m0m* 0mm0q[ 0q[ 0q[ 0q0q* 0mm0X 0K 0K 0K 0K 0K 0X 0X 0W 0W 0X 0X 0* 0mm0Y 0Y 0 Y 0 Y 0 Y 0W 0W 0Y 0* 0mm0"Z 0"Z 0"Z 0"Y 0""Y 0""Y 0""Y 0""Z 0"W 0"W 0"W 0"Z 0" 0YY* 0y'y'0') 0') 0') 0' 0YY* 0))0)@0)0)S 0)S 0>*)S 0b*)S 0b*)S 0b*)S 0>*)S 0>*)0)0)0)0)K 0)K 0)K 0)K 0)0)L 0)L 0)L 0)L 0)0)* 0))01( 01( 01( 01( 01( 01( 01* 0))0I40I40I40I4@0I40I40I40I4* 0))079 079 07> 07> 07> 07> 07> 079 07 0YY* 0::0:0:0:0:* 0::01<01<01<* 0::0o=0o=0o=0o=0o=0o=0o=0o=0o=0o=0o= 0YY* 0AA0A: 0A0A0A0A: 0A* 0AA0C0C0CN 0CN 0C0C0C* 0AA0F0F0F0F0F0F0F* 0AAA 0""@0%"@0%"@0%"A 0""@0"@0"@0"0="""%S $  Z=&#*2_51=BFANOS]jr4y€1ILMNPQRSTUWXY[]^`bdfhikmorsuwy{| &o-]4<: BHOYa4is{^] JOVZ\_acegjlnpqtvxz}~K'Mv8TVh"$8TVo 7SUs;=e  3OQx5QSw1MP '*?[^ : = j   < X [ " > A i   v  4 7 P l o 3ORj (+Kgjln %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%.>Zq %UT!?2$P.(c_C2$Z|œK=ŒqfX2$݉ Lqޫ@0(  B S  ?U _Toc423410237 _Toc425054503 _Toc423410238 _Toc425054504 _Toc150831371 _Toc423410239 _Toc425054505 _Toc423410253 _Toc425054512 _Toc150831372 _Toc150831373 _Toc423410240 _Toc425054506 _Toc150831374 _Toc150831375 _Toc150831376 _Toc150831377 _Toc150831378 _Toc150831379 _Toc150831380 _Toc150831381 _Toc150831382 _Toc150831383 _Toc423410241 _Toc425054507 _Toc150831384 _Toc150831385 _Toc150831386 _Toc11988688 _Toc150831387 _Toc11988689 _Toc150831388 _Toc11988690 _Toc150831389 _Toc11988691 _Toc150831390 _Toc11988692 _Toc150831391 _Toc150831392 _Toc150831393 _Toc150831394 _Toc150831395 _Toc150831396 _Toc150831397 _Toc150831398 _Toc150831399 _Toc150831400 _Toc150831401 _Toc150831402 _Toc150831403 _Toc150831404 _Toc150831405 _Toc150831406 OLE_LINK1 _Toc150831407 _Toc150831408 _Toc150831409 _Toc150831410 _Toc150831411 _Toc150831412 _Toc150831413 _Toc150831414 _Toc150831415 _Toc11988687 _Toc150831416 _Toc150831417 _Toc150831418 _Toc150831419 _Toc150831420 _Toc150831421 _Toc150831422 _Toc150831423 _Toc423410255 _Toc425054514 _Toc150831424 _Toc133041607 _Toc150831425 _Toc133041608 _Toc150831426 _Toc150831427 _Toc150831428 _Toc423410251 _Toc425054510 _Toc150831429 _Toc15083143022'm,""%%5*V*?,M,47t:>>@?A]ElEFJJM)QRSoY\z`hc.hiieoppsaxwz\}ЀЀ%;;;P   !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGMNHIJKLOPQRST/???&&0=0>((""%%U**L,\,57:>>@^AkEEGJJJMQQ9RTY<\`cFhiiopptsxzz}5OOOh+@HIOQXY^nGNls&-!%,RY""%%44<<=GDG0M7MPPQQRXYX'[.[__ggii llɆԆֆ^_SVms}442B3BBBjCkCCCDDiDjDLFMFzF{F^QbQ'`(`ii*v+vyvzv !_3333333333333333dv 8Xh&8Xo"7Ws?e3Sx5Uw1R ,?` ? j  < ] " C i  v  9 P q 3Tj -Kl02@>'1m ,?d)C!a!""=#H#%%*'@'5*V*?,],K-`-..124 5677799;;0<L<==>>@ @?A_A]EEAFLFJJPPR:RSTYYu[[]]z``hccggtg.hGh%l;lnno.ooopprsstaxxyyDz]zG}{}ЀY%i_arts}_s SG" 0 4h 9Cb$c'CrWTd3[WRN=|%  `i*HJuXL Psp  8Y ur (l<!&` e2zD_ wU 6K\N_plAf\} +oX̲nm mJdm KU;v`&%Nj6a=:s61f '@Ax!z:D" y@"R"9?$&?$8,UR$rj %4hm2Q&:]v'ld6(nYsd)̏El*T,% *u,$y*v 7F+pfb^{$-p.NcK- K&/6%)0Ng41*=1E,1 Q+2 Hu3}tqT6 i!6t^'7U}$nL8u8vx`x/9`80@c9U} -:|`tAe;\}3^`83_|S61O` xS=mbhFGqbUg6a\5^hW/jZJj+pjXF}/m Zqf5(*q 6t Pau Zuwle]{. $|{Fj {,4{  }Ά؋fM~jx3@.@.@..@...@ ....@ .....@ ......@ .......@ ........* hh^h`OJQJo(h 88^8`OJQJo(h ^`OJQJo(oh   ^ `OJ QJ o(h   ^ `OJQJo(h xx^x`OJQJo(oh HH^H`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(^`o(h pp^p`OJQJo(@ L@ ^@ `L.^`.^`.L^`L.^`.PP^P`. L ^ `L.h ^`hH.h pp^p`hH.h @ L@ ^@ `LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h PP^P`hH.h  L ^ `LhH.0^`0o(^`. L ^ `L.  ^ `.xx^x`.HLH^H`L.^`.^`.L^`L.0^`0o(^`. L ^ `L.  ^ `.xx^x`.HLH^H`L.^`.^`.L^`L. ^`o(hH)0^`0o(L^`L.^`.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.h^`.h   ^ `OJQJo(oh   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h^`.h   ^ `OJQJo(oh   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o( hh^h`OJQJo(h^`.h   ^ `OJQJo(oh   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h88^8`.h ^`o(hH)h L ^ `L.h  ^ `.hxx^x`.hHLH^H`L.h^`.h^`.hL^`L.h pp^p`hH)h@ @ ^@ `OJQJo(hHh L^`LhH.h ^`hH.h ^`hH.h L^`LhH.h PP^P`hH.h   ^ `hH.h L^`LhH.808^8`0o()^`o(h $ $ ^$ `OJQJo(@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.h ^`OJQJo(h  ^ `.h   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h 88^8`hH.h ^`hH.h  L ^ `LhH.h   ^ `hH.h xx^x`hH.h HLH^H`LhH.h ^`hH.h ^`hH.h L^`LhH. pp^p`hH) ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h^`.h   ^ `OJQJo(oh   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o( pp^p`o(hH) ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. ^`o(hH)0^`0o(L^`L.^`. ^`o(hH.pLp^p`L.@ @ ^@ `.^`.L^`L.h ^`OJQJo(h ^`OJQJo(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJ QJ o( hh^h`OJQJo( pp^p`o(hH) ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.0^`0o(^`. L ^ `L.  ^ `.xx^x`.HLH^H`L.^`.^`.L^`L.h 88^8`hH.h ^`hH.h  L ^ `LhH.h   ^ `hH.h xx^x`hH.h HLH^H`LhH.h ^`hH.h ^`hH.h L^`LhH.h pp^p`hH.h@ @ ^@ `OJQJo(hHh L^`LhH.h ^`hH.h ^`hH.h L^`LhH.h PP^P`hH.h   ^ `hH.h L^`LhH.h ^`hH.h   ^ `hH.h  L ^ `LhH.h xx^x`hH.h HH^H`hH.h L^`LhH.h ^`hH.h ^`hH.h L^`LhH.0^`0o(^`. L ^ `L.  ^ `.xx^x`.HLH^H`L.^`.^`.L^`L.0^`0o(^`. L ^ `L.  ^ `.xx^x`.HLH^H`L.^`.^`.L^`L.h 88^8`hH.h ^`hH.h   ^ `hH.h   ^ `hH.h xx^x`hH.h HLH^H`LhH.h ^`hH.h ^`hH.h L^`LhH. hh^h`OJQJo(h ^`OJQJo(h   ^ `OJQJo(oh   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h ^`hH.h pp^p`hH.h @ L@ ^@ `LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h PP^P`hH.h  L ^ `LhH.h^`.h  ^ `.h L ^ `L.hxx^x`.hHH^H`.hL^`L.h^`.h^`.hL^`L. pp^p`o(hH) ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h 88^8`o(hH)h ^`OJQJo(oh   ^ `OJ QJ o(h   ^ `OJQJo(h xx^x`OJQJo(oh HH^H`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h   ^ `OJQJo(oh   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h pp^p`OJQJo(oh @ @ ^@ `OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h PP^P`OJQJo(oh   ^ `OJ QJ o(h ^`hH.  ^ `o(h  L ^ `LhH.h xx^x`hH.h HH^H`hH.h L^`LhH.h ^`hH.h ^`hH.h L^`LhH.^`o(hpp^p`.@ L@ ^@ `L.^`.^`.L^`L.^`.PP^P`. L ^ `L.^`.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.h ^`OJQJo(h   ^ `OJQJo(oh   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(^`o(pp^p`.@ L@ ^@ `L.^`.^`.L^`L.^`.PP^P`. L ^ `L.0^`0o(^`. L ^ `L.  ^ `.xx^x`.HLH^H`L.^`.^`.L^`L.h ^`OJQJo(h pp^p`OJQJo(oh @ @ ^@ `OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h PP^P`OJQJo(oh   ^ `OJ QJ o( hh^h`OJQJo(0^`0o(^`. L ^ `L.  ^ `.xx^x`.HLH^H`L.^`.^`.L^`L.h 88^8`hH.h ^`hH.h  L ^ `LhH.h   ^ `hH.h xx^x`hH.h HLH^H`LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h  ^ `.h L ^ `L.hxx^x`.hHH^H`.hL^`L.h^`.h^`.hL^`L. pp^p`hH) ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. hh^h`OJQJo( hh^h`OJQJo( hh^h`OJQJo( hh^h`OJQJo(h ^`OJQJo(h ^`OJQJo(oh m m ^m `OJ QJ o(h ==^=`OJQJo(h   ^ `OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h }}^}`OJQJo(oh MM^M`OJ QJ o(h^`.h  ^ `.h L ^ `L.hxx^x`.hHH^H`.hL^`L.h^`.h^`.hL^`L.h^`.h   ^ `OJQJo(oh   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h   ^ `OJQJo(oh   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h 88^8`hH.h ^`hH.h   ^ `hH.h   ^ `hH.h xx^x`hH.h HLH^H`LhH.h ^`hH.h ^`hH.h L^`LhH.h^`.h  ^ `.h L ^ `L.hxx^x`.hHH^H`.hL^`L.h^`.h^`.hL^`L.h ^`hH.h pp^p`hH.h @ L@ ^@ `LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h PP^P`hH.h  L ^ `LhH.h ^`OJQJo(h   ^ `OJQJo(oh   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h ^`hH.h pp^p`hH.h @ L@ ^@ `LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h PP^P`hH.h  L ^ `LhH.h ^`OJQJo($ L$ ^$ `L.\ \ ^\ `o(xx^x`.HH^H`.L^`L.^`.^`.L^`L.h 88^8`OJQJo(h ^`OJQJo(oh   ^ `OJ QJ o(h   ^ `OJQJo(h xx^x`OJQJo(oh HH^H`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h pp^p`o(hH)h @ @ ^@ `hH.h L^`LhH.h ^`hH.h ^`hH.h L^`LhH.h PP^P`hH.h   ^ `hH.h L^`LhH.808^8`0o()^`o(h $ $ ^$ `OJQJo(@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.h^`.h   ^ `OJQJo(oh   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o( hh^h`OJQJo(^`o(pp^p`.@ L@ ^@ `L.^`.^`.L^`L.^`.PP^P`. L ^ `L.h ^`hH.h pp^p`hH.h @ L@ ^@ `LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h PP^P`hH.h  L ^ `LhH.h ^`OJQJo(h   ^ `OJQJo(oh   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(88^8`o(^`. L ^ `L.  ^ `.xx^x`.HLH^H`L.^`.^`.L^`L.h^`.h   ^ `OJQJo(oh   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o( hh^h`OJQJo(h 88^8`hH.h ^`hH.h  L ^ `LhH.h   ^ `hH.h xx^x`hH.h HLH^H`LhH.h ^`hH.h ^`hH.h L^`LhH.^`o(pp^p`.@ L@ ^@ `L.^`.^`.L^`L.^`.PP^P`. L ^ `L.hpp^p`.h@ @ ^@ `.hL^`L.h^`.h^`.hL^`L.hPP^P`.h  ^ `.hL^`L. hh^h`OJQJo(h ^`hH.h   ^ `hH.h  L ^ `LhH.h xx^x`hH.h HH^H`hH.h L^`LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`OJQJo(h pp^p`OJQJo(oh @ @ ^@ `OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h PP^P`OJQJo(oh   ^ `OJ QJ o( hh^h`OJQJo(h ^`hH.h   ^ `hH.h  L ^ `LhH.h xx^x`hH.h HH^H`hH.h L^`LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`OJQJo(h   ^ `OJQJo(oh   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h^`OJQJo(hHh| | ^| `OJQJ^Jo(hHohLL^L`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh\\^\`OJQJ^Jo(hHoh,,^,`OJ QJ o(hH ^`hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h ^`OJQJo(h pp^p`OJQJo(oh @ @ ^@ `OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h PP^P`OJQJo(oh   ^ `OJ QJ o( ^`o(hH)0^`0o(L^`L.^`5. ^`o(hH.pLp^p`L.@ @ ^@ `.^`.L^`L.hpp^p`)h @ @ ^@ `OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h PP^P`OJQJo(h   ^ `OJQJo(oh ^`OJ QJ o( ^`o(hH)^`.L^`L.0^`0o(pp^p`.   ^ `OJQJo(^`.^`.L^`L. ^`hH) ^`hH. L^`LhH. ^`hH. pp^p`hH. @ L@ ^@ `LhH. ^`hH. ^`hH. L^`LhH.h 88^8`hH.h ^`hH.h   ^ `hH.h   ^ `hH.h xx^x`hH.h HLH^H`LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`OJQJo(h pp^p`OJQJo(oh @ @ ^@ `OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h PP^P`OJQJo(oh   ^ `OJ QJ o(h^`.@ 0@ ^@ `0o(h   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o( ^`OJQJo( ^`OJQJo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJ QJ o( ^`OJQJo( ^`OJQJo(o PP^P`OJ QJ o(h 88^8`hH.h ^`hH.h  L ^ `LhH.h   ^ `hH.h xx^x`hH.h HLH^H`LhH.h ^`hH.h ^`hH.h L^`LhH. @ @ ^@ `o(hH)pp^p`.@ L@ ^@ `L.^`.^`.L^`L.^`.PP^P`. L ^ `L.0^`0o(^`. L ^ `L.  ^ `.xx^x`.HLH^H`L.^`.^`.L^`L. ^`o(hH)0^`0o(L^`L.^`. ^`o(hH.pLp^p`L.@ @ ^@ `.^`.L^`L.h ^`OJQJo(h pp^p`OJQJo(oh @ @ ^@ `OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h PP^P`OJQJo(oh   ^ `OJ QJ o(hpp^p`)h@ @ ^@ `.hL^`L.h^`.h^`.hL^`L.hPP^P`.h  ^ `.hL^`L. hh^h`OJQJo(h ^`hH.h   ^ `hH.h  L ^ `LhH.h xx^x`hH.h HH^H`hH.h L^`LhH.h ^`hH.h ^`hH.h L^`LhH. hh^h`OJQJo( hh^h`OJQJo( hh^h`OJQJo(h ^`hH.h pp^p`hH.h @ L@ ^@ `LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h PP^P`hH.h  L ^ `LhH.h ^`OJQJo(h   ^ `OJQJo(oh   ^ `OJ QJ o(h xx^x`OJQJo(h HH^H`OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h ^`hH.h   ^ `hH.h  L ^ `LhH.h xx^x`hH.h HH^H`hH.h L^`LhH.h ^`hH.h ^`hH.h L^`LhH.h @ @ ^@ `hH)h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h   ^ `hH.h ^`hH.h !L!^!`LhH. hh^h`OJQJo(h pp^p`OJQJo(h @ @ ^@ `OJQJo(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJQJo(oh ^`OJ QJ o(h PP^P`OJQJo(h   ^ `OJQJo(oh ^`OJ QJ o( ^`hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.tHu34{NsR+sdOhSG"Paup qT6Q+26tE,1m*qpI:D"{BNcK-F}/mr 0 HO!&` 3&?_pXj]=1UR$ {K +o.JUj6j % m/Wg)mW7v]XoZpj7F+ZJjy@"i!6U  ?3[5^htAe;{$-"ZR;N=|bGIS=mb% *DBS1O`83_v' }e]{b-H+}"=K&/l*D_ ,$y*AfD*HJD$nL8D%?DtID0@c9XL Dg41?$1f '?9RL6Km2Q&C6Msd) 9m PC3<8Y %vS W/jGqb'7ZqfM~+U6(nm.=R -: $|{ZuwCx/9Ax!=: 4>^%%)0?$c'C@h 8^8`OJQJo(t @h ^`OJQJo(ss         ƻ \P;                ~X        V                           0f}                lbˤ \P;      \P;                                   0f}        \P;        ^                                           0ls        .'fu        \P;                          0f}        0f}        \P;        \P;         #:?       ʬ                 \P;        :h        &        \P;        F                          \P;                 \P;                                   \P;                 \P;  :      \P;        0f}                 R        \P;        zr                          ` /                          \P;                 \P;                 \P;        0f}Fpb               0f}  : \P;            \P;         Hܙ       \P;                 0f}                \P;                                   \P;                          \P;                 [Z!b<JWI h Nh9b\43 !b&G'd7,=,Q, / Z0 m1625 4nD7 :T;o;Ee=V>CAQDssI J^JcPYU&*[4^o^-Ef%af{g'm.vQ,{p|M||\|A}%.X ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r Oh+'0( 8D ` l x (Use-Case Specification: Withdraw CashSample Bank ATMispencebook_ucspec.dotmyers147Microsoft Word 10.0@$@Q@~G@G1r՜.+,0$ px   Sample BankdD| &Use-Case Specification: Withdraw Cash Title  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abdefghijlmnopqrwRoot Entry F`31yData g/1Table-WordDocumentUSummaryInformation(cDocumentSummaryInformation8kCompObjj  FMicrosoft Word Document MSWordDocWord.Document.89q