Embodiment
The embodiment of the present application provides a kind of information processing method and device.
In order that those skilled in the art more fully understand the technical scheme in the application, it is real below in conjunction with the application
The accompanying drawing in example is applied, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described implementation
Example only some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, this area is common
The every other embodiment that technical staff is obtained under the premise of creative work is not made, should all belong to the application protection
Scope.
A kind of schematic flow sheet for information processing method that Fig. 1 provides for the embodiment of the present application, should for program angle
The executive agent of flow can apply (APP) or PC ends program etc..For slave unit angle, the executive agent of the flow can be with
Including but not limited to following equipment:Mobile phone, tablet personal computer, intelligent wearable device, vehicle device, personal computer, big-and-middle-sized calculating
Machine, computer cluster etc..
Flow in Fig. 1 may comprise steps of:
S101:Webpage is monitored.
In the embodiment of the present application, when being monitored to webpage, the particular content monitored can be preassigned.Such as,
Can with the DOM Document Object Model (Document Object Model, DOM) of web page monitored, can with dominant interface in web page monitored,
The interface interchange that can be related to web page monitored, can be with address change of web page monitored etc..
S102:When monitoring the webpage and occurring to specify change, it is determined that the pictorial information that the webpage after change is included.
In the embodiment of the present application, specified change such as can be that DOM structure changes, and can be dominant interface
Layout changes or webpage is not redirected but address changes.
In the embodiment of the present application, pictorial information can be the information that can be identified picture or position picture, such as, picture
Location, picture summary etc..By taking picture address as an example, it is determined that the pictorial information that the webpage after change is included, can specifically include:It is determined that
At least part picture address (preferably, can be whole picture addresses) that webpage after change is included.
Why to determine pictorial information, be because, if being injected into advertising pictures in webpage, the picture that webpage is included
Corresponding change should be able to occur for information.It therefore, it can analyse whether the non-of such as advertising pictures etc based on pictorial information
Normal picture injection.
In addition, in actual applications, the picture in webpage is probably that the control logic information included in webpage is generated,
Control logic information such as can be JavaScript code, VBScript codes etc..In this case, attacker may lead to
Cross and distort control logic information, picture is injected in corresponding webpage, as counter-measure, pictorial information can also include:Institute
State the summary of control logic information and/or the control logic information.In this way, being easy to subsequently also carry out school to control logic information
Test, to determine whether control logic information is tampered.
S103:According to the pictorial information of determination, the check results verified to the pictorial information are obtained.
In the embodiment of the present application, the verification can be completed by executive agent, can also be by the journey beyond executive agent
Sequence and/or it is accomplished manually.No matter verify and completed by whom, as long as executive agent results in what the pictorial information was verified
Check results.
Further, the verification can be specifically whether verification pictorial information changes or verify picture
Information specifically there occurs which changes, and whether the change occurred is allowed to, etc..Using pictorial information be picture address as
Example, whether have newly-increased picture address, can verify whether newly-increased picture address belongs to advertiser website etc. if can verify.
S104:According to the check results, judge whether monitored webpage has been injected into picture.
In the embodiment of the present application, if according to the check results, judging that monitored webpage has been injected into picture, then may be used
To handle the webpage after the change, counter-measure is used as.Specific processing action such as can be to perform to be directed to institute
The alarm action of the webpage after change is stated, can be directed to the webpage after the change to carry out interface interchange control of authority, also may be used
To be to reject picture for being injected into etc..
It by Fig. 1 method, can find that webpage has been injected into advertising pictures in time, and then can handle in time, therefore,
Be conducive to eliminating the influence that the advertising pictures are brought to the experience that user browses the webpage, can partly or entirely solve existing
The problem of having in technology.
It is another in the prior art, the number for name of endorsing can be directly realized by by HTTPS agreements to web service
According to transmission, to prevent webpage from being injected into picture, still, this mode is only applicable to HTTPS webpages, is not suitable for HTTP webpages,
And the interactive speed of webpage and server can be reduced, cost is high.And if the scheme of the application is applied to all webpages, and will not shadow
Ring the interactive speed of webpage and server, advantage of lower cost.
Method based on Fig. 1, the embodiment of the present application additionally provides some specific embodiments of this method, and extension side
Case, is illustrated below.
In the embodiment of the present application, because the DOM of webpage is tree structure, then the operations such as inquiry traversal are carried out for DOM
Efficiency it is higher.It may be preferable to which based on DOM web page monitoreds, efficiency is higher.
For example, for step S101, it is described that webpage is monitored, it can specifically include:It is determined that current webpage, described
Webpage is obtained from web service end;Couple DOM of the webpage determined is monitored.Accordingly for step S102, the prison
Control the webpage to occur to specify change, can specifically include:Given content hair in the DOM for the webpage for monitoring determination
Changing (such as, structure changes, and specifies the content of node to change).
As described above, webpage is obtained from web service end, monitoring can be begun to when just getting the webpage,
Monitoring can just be started after the webpage is got for a period of time." change " can refer to:Sent out compared to when starting monitored
Change is given birth to;Or, occur compared to a certain moment (not including current time) when starting monitored between current time
Change.
In addition, in actual applications, during obtaining webpage, the webpage may also be injected into picture, in such case
Under, the webpage at web service end may be original out of question, but the webpage obtained is problematic, then can influence what is subsequently monitored to have
Effect property.In order to tackle such case, it can be immediately performed once when just getting the webpage:Obtain the webpage to acquisition
The check results that are verified of pictorial information, can be to the net of acquisition according to the check results, however, it is determined that verification does not pass through
Page carries out respective handling, such as, can obtain webpage from web service end again, or to causing verification not pass through in the webpage
Pictorial information be modified.And pass through if it is determined that verifying, then start the webpage that monitoring is obtained.
In the embodiment of the present application, it is determined that after pictorial information, the mode verified to pictorial information can have a variety of.
Such as, it can be pre-configured with or configure white list information or black list information in real time, then according to these information of configuration,
Pair determine pictorial information verify;For another example, the summary of pictorial information can be calculated, then summary is verified, as
To the check results of pictorial information.
By taking white list information as an example, for step S103, the pictorial information according to determination is obtained to the figure
The check results that piece information is verified, can specifically include:According to the pictorial information of determination, obtain according to the white of configuration
The check results that list information is verified to the pictorial information.
In actual applications, executive agent is generally user terminal, such as, the mobile device such as mobile phone, tablet personal computer.If school
Test process locally to complete, then for mobile device, bear larger, accordingly it is also possible to ask service end by mobile device
Complete.
For example, the pictorial information according to determination, acquisition is believed the picture according to the white list information of configuration
The check results verified are ceased, can specifically be included:The pictorial information of determination is sent to the verification service end specified,
And obtain the check results that the white list information according to configuration of verification service end return is verified to the pictorial information.
Verification service end can be the service end of monitored webpage or provide the 3rd of verification service for multiple websites are unified
Square service end etc..
Verification service end can obtain the white list information of configuration, and white list information typically can in advance be matched somebody with somebody by keeper
Put.White list information such as can be white list, white list hit rule etc., and monitored webpage likely corresponds to different white
List information.
Specific pictorial information can be preserved in white list, as it is legal (it is considered that above-mentioned such as advertising pictures it
Abnormal picture of class is illegal) pictorial information.In this case, white list hit rule can be specifically:
When it is determined that some picture address (being referred to as picture address A) and some picture address (referred to as picture address B) in white list it is complete
When exactly the same, the picture address B in picture address A hit white lists is determined.
Characteristic information (such as, the corresponding domain name of picture address, the picture address of pictorial information can also be preserved in white list
Summary etc.), be used as the characteristic information of legal pictorial information.By taking the corresponding domain name of picture address as an example, in this case,
White list hits rule:When it is determined that the corresponding domain names of picture address A be white list in certain domain name when, really
Determine the certain domain name in pictorial information A hit white lists.
According to analysis above, under an embodiment, the white list information according to configuration is believed the picture
Breath is verified, and can specifically be included:It is determined that white list and white list the hit rule of configuration;Hit and advised according to the white list
Then, determine whether the pictorial information hits the content in the white list.
Further, however, it is determined that pictorial information can hit the content in white list, then it is considered that verification pass through.It is no
Then, it is believed that verification does not pass through, illegal picture may is injected into webpage, the corresponding picture letter of illegal picture
Breath can not hit the content in white list.
Further, in actual applications, pictorial information is also possible to legally be changed by rear end, and such case is not belonging to
Distort, also not due to webpage is injected into picture and causes.If then verification service end determines that the pictorial information received can not be ordered
Content in middle white list, can also continue to interact, directly further to verify pictorial information, to determine with executive agent
Pictorial information is by legal modifications on earth or is tampered.In this way, being conducive to improving the reliability of the scheme of the application.Than
Such as, verification service end can be inquired by executive agent to the rear end:Fail the pictorial information of the content in hit white list
Whether caused by the modification action of rear end;If, it may be determined that by legal modifications, otherwise the pictorial information is, it may be determined that
The pictorial information is tampered.
In the embodiment of the present application, verification service end can be with identification informations such as the addresses of webpage, to corresponding white list
Information is identified, in order to the white list information corresponding to pictorial information in verification, received according to identification information determination.
Further, in actual applications, identical web page address can correspond to more than two different web pages, than
Such as, different user opens same web page address on different devices, and the webpage shown may be different.In this case,
Corresponding white list information can may not be correctly only determined by network address, the session identification of such as webpage can also be relied on
Other identification informations such as (session id) determine white list information.
For example, described be sent to the pictorial information of determination the verification service end specified, and obtain verification service
The check results that the white list information according to configuration that end is returned is verified to the pictorial information, can specifically include:Will
The pictorial information determined, the session identification of the webpage after the change and address are sent to the verification service end specified, with
And the white list information according to the session identification, the address and configuration that acquisition verification service end is returned is believed the picture
Cease the check results verified.
Being illustrated based on interaction flow to above- mentioned information processing method above, in the specific implementation, according to scene
Difference, interaction flow also has more flow details between the module and module of relevant device.Said with reference to example
It is bright.
Under the practical application scene that Fig. 2 provides for the embodiment of the present application, a kind of specific implementation of above- mentioned information processing method
The interaction flow schematic diagram of scheme.
Under Fig. 2 practical application scene, above- mentioned information processing method is applied in APP, and APP is installed on user terminal
On, browser control part and remote procedure call (RPC) module have been comprised at least in APP.Webpage exhibition after above-mentioned webpage, change
It is shown in the browser control part, above-mentioned pictorial information is picture address etc..
Browser control part can be specifically the example of the classes such as WebView, or built-in browser application etc..
Intermediate communication block can be used for being communicated between web page code and local (Native) code, specific to Fig. 2,
Intermediate communication block is used between monitored webpage (belonging to web page code) and browser control part (belonging to Native codes)
Communication, intermediate communication block can have a variety of implementations, and conventional has JS Bridge etc..Intermediate communication block can be included
In APP, can also be independently of APP outside.
The related code of supervisory control action may belong to web page code, can also belong to Native codes.Interactive stream in Fig. 2
Journey is by taking the previous case as an example.
The flow in Fig. 2 is briefly described below, interaction flow can include following action.
The monitor code for belonging to web page code is monitored to the DOM of webpage;
When the structure for monitoring the DOM changes, determine whole picture addresses that the webpage is included, and determine it is complete
Portion's picture address, the session identification of the webpage, the address of the webpage are sent to intermediate communication block;
The data received are sent to browser control part by intermediate communication block;
The data received are sent to RPC modules by browser control part;
The data received are sent to the verification service end specified by RPC modules, to ask to verify picture address;
Verification service end to the pictorial information of reception verify obtaining check results, specifically, and verification service end can be with
The white list information configured comprising white list service, by configuration service, then RPC modules can be by the data received (figure
Piece address etc.) white list service is sent to, white list can inquire about acquisition white list information, further according to the white list information of acquisition
Picture address verify to obtain check results;It should be noted that composition and the working method above of verification service end are only
It is example, not to the restriction of the application, such as, verification service end can also be only comprising white list service, etc.;
Check results are returned to RPC modules by verification service end;
The check results of reception are sent to browser control part by RPC modules;
The check results of reception are sent to intermediate communication block by browser control part;
The check results of reception are sent to web page code by intermediate communication block;
Web page code judges whether monitored webpage has been injected into picture according to check results, and if judging institute
The webpage of monitoring has been injected into picture, is handled accordingly for webpage.
In the embodiment of the present application, in order to provide the security of above-mentioned interaction flow, for one in above-mentioned interaction flow
Section or multistage transmission path (transmission path, RPC modules and verification service end such as, between intermediate communication block and browser
Between transmission path etc.), data safe transmission on these paths can be ensured based on specified security strategy.
According to the explanation to the corresponding examples of Fig. 2, the flow in Fig. 1 is remarked additionally.
Fig. 1 method can be used for including browser control part, remote procedure call module in APP, the APP;It is described
Web page display after webpage, the change is in the browser control part.Then it is above-mentioned the pictorial information is sent to it is specified
Verification service end, and obtain verification service end return the check results verified to the pictorial information, specifically may be used
With including:The pictorial information is sent to the RPC modules by the browser control part;The RPC modules are by described in reception
Pictorial information is sent to the verification service end specified, and receives being verified to the pictorial information for verification service end return
Check results;The check results of reception are sent to the browser control part by the RPC modules.
Further, the pictorial information is sent to the RPC modules by the browser control part, can specifically be included:
The pictorial information is sent to the browser control part;The pictorial information of reception is sent to institute by the browser control part
State RPC modules.The executive agent of " pictorial information is sent into the browser control part " can typically be to determine the figure
The main body of piece information, such as, web page code or be totally independent of functional module of webpage etc..
Wherein, above-mentioned web page code can refer to:The code included originally in webpage, or be the scheme for realizing the application
The code for being associated with webpage that increases newly is attached to code of webpage etc..
Further, it is described that the pictorial information is sent to the browser control part, it can specifically include:Will be described
Pictorial information is sent to intermediate communication block, and the intermediate communication block is used between web page code and local (Native) code
Communicated;The pictorial information of reception is sent to the browser control part by the intermediate communication block.
Correspondingly, check results can be returned along the opposite direction of the transmitting path of pictorial information, as seen from Figure 2, this
In repeat no more.
In addition, if the related code of supervisory control action not belongs to web page code, but when belonging to Native codes, then picture
Information, check results transmission can also be without intermediate communication block.
A kind of information processing method provided above for the embodiment of the present application, based on same invention thinking, the application is real
Apply example and additionally provide corresponding device, as shown in Figure 3.
A kind of structural representation for information processor corresponding to Fig. 1 that Fig. 3 provides for the embodiment of the present application, wherein,
Dashed rectangle represents optional module, and the device can be located at the executive agent of flow in Fig. 1, including:
Monitoring module 301, is monitored to webpage;
Determining module 302, when the monitoring module, which monitors the webpage, occurs to specify change, it is determined that the net after change
The pictorial information that page is included;
Module 303 is obtained, the pictorial information determined according to the determining module obtains and the pictorial information is carried out
The check results of verification;
Judge module 304, according to the check results, judges whether monitored webpage has been injected into picture.
Alternatively, the monitoring module 301 is monitored to webpage, is specifically included:
The monitoring module 301 determines current webpage, and the webpage is obtained from web service end;
Couple DOM Document Object Model DOM of the webpage determined is monitored;
The monitoring module 301, which monitors the webpage, to be occurred to specify change, is specifically included:
The structure that the monitoring module 301 monitors the DOM of the webpage of determination changes.
Alternatively, it is described to obtain the pictorial information that module 303 is determined according to the determining module 302, obtain to institute
The check results that pictorial information is verified are stated, are specifically included:
It is described to obtain the pictorial information that module 303 is determined according to the determining module 302, obtain according to the white of configuration
The check results that list information is verified to the pictorial information.
Alternatively, it is described to obtain the pictorial information that module 303 is determined according to the determining module 302, obtain basis
The check results that the white list information of configuration is verified to the pictorial information, are specifically included:
The pictorial information that the determining module 302 is determined is sent to the verification clothes specified by the module 303 that obtains
Business end, and obtain the verification that the white list information according to configuration of verification service end return is verified to the pictorial information
As a result.
Alternatively, it is described that the pictorial information is verified according to pre-configured white list information, specifically include:
It is determined that white list and white list the hit rule of configuration;
Rule is hit according to the white list, determines whether the pictorial information hits the content in the white list.
Alternatively, the pictorial information that the determining module 302 is determined is sent to what is specified by the acquisition module 303
Service end is verified, and the white list information according to configuration that acquisition verification service end is returned is verified to the pictorial information
Check results, specifically include:
It is described to obtain the pictorial information that module 303 determines the determining module 302, webpage after the change
Session identification and address are sent to the verification service end specified, and obtain that verification service end returns according to the session mark
The check results that the white list information of knowledge, the address and configuration is verified to the pictorial information.
Alternatively, described device also includes:
Whether processing module 305, in the judge module 304 according to the check results, judge monitored webpage
It is injected into after picture, if the judge module 304 judges that monitored webpage has been injected into picture, to the net after the change
Page is handled.
Alternatively, the pictorial information is that picture address and/or picture are made a summary.
Alternatively, the pictorial information includes picture address and/or picture is made a summary;
If the corresponding picture of the pictorial information is generated based on the control logic information included in the webpage, institute
Stating pictorial information also includes:The summary of the control logic information and/or the control logic information.
The apparatus and method that the embodiment of the present application is provided are one-to-one, and therefore, device also has corresponding side
The similar advantageous effects of method, due to the advantageous effects of method being described in detail above, therefore, here
Repeat no more the advantageous effects of corresponding intrument.
In the 1990s, for a technology improvement can clearly distinguish be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (for the improvement of method flow).So
And, with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Designer nearly all obtains corresponding hardware circuit by the way that improved method flow is programmed into hardware circuit.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, PLD
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, its logic function is determined by user to device programming.By designer
Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, without asking chip maker to design and make
Special IC chip.Moreover, nowadays, substitution manually makes IC chip, and this programming is also used instead mostly " patrols
Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development,
And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but have many kinds, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present
Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also should
This understands, it is only necessary to slightly programming in logic and be programmed into method flow in integrated circuit with above-mentioned several hardware description languages,
The hardware circuit for realizing the logical method flow can be just readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing
Device and storage can by the computer of the computer readable program code (such as software or firmware) of (micro-) computing device
Read medium, gate, switch, application specific integrated circuit (Application Specific Integrated Circuit,
ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, the example of controller includes but is not limited to following microcontroller
Device:ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, are deposited
Memory controller is also implemented as a part for the control logic of memory.It is also known in the art that except with
Pure computer readable program code mode is realized beyond controller, can be made completely by the way that method and step is carried out into programming in logic
Obtain controller and come real in the form of gate, switch, application specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc.
Existing identical function.Therefore this controller is considered a kind of hardware component, and various for realizing to including in it
The device of function can also be considered as the structure in hardware component.Or even, can be by for realizing that the device of various functions is regarded
For that not only can be the software module of implementation method but also can be the structure in hardware component.
System, device, module or unit that above-described embodiment is illustrated, can specifically be realized by computer chip or entity,
Or realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet PC, wearable device or these equipment
The combination of equipment.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented
The function of each unit can be realized in same or multiple softwares and/or hardware during application.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the present invention can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the present invention can be used in one or more computers for wherein including computer usable program code
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein
Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, commodity or equipment including a series of key elements are not only including those key elements, but also wrap
Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described
Also there is other identical element in process, method, commodity or the equipment of element.
The application can be described in the general context of computer executable instructions, such as program
Module.Usually, program module includes performing particular task or realizes routine, program, object, the group of particular abstract data type
Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these DCEs, by
Remote processing devices connected by communication network perform task.In a distributed computing environment, program module can be with
Positioned at including in the local and remote computer-readable storage medium including storage device.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment
Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.It is real especially for system
Apply for example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method
Part explanation.
Embodiments herein is the foregoing is only, the application is not limited to.For those skilled in the art
For, the application can have various modifications and variations.It is all any modifications made within spirit herein and principle, equivalent
Replace, improve etc., it should be included within the scope of claims hereof.