Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
In order to solve the problem that the method for determining whether one-code multiple access exists in a merchant in the prior art is not optimized, embodiments of the present specification provide a method for determining one-code multiple access. The execution subject of the method for determining a code multiple access provided by the embodiments of the present disclosure may be, but is not limited to, a server, a personal computer, and the like, which can be configured to execute at least one of the terminals of the method provided by the embodiments of the present disclosure.
For convenience of description, the following description will be made of an embodiment of the method, taking an execution subject of the method as a server capable of executing the method as an example. It is understood that the implementation of the method by the server is merely an exemplary illustration and should not be construed as a limitation of the method.
Specifically, one or more embodiments of the present disclosure provide a flowchart of an implementation of a method for determining one-code multiple access, as shown in fig. 1, including:
step 110, determining at least one confidence resource transfer area corresponding to the resource transfer-in code based on the resource transfer times of the resource transfer-in code in a preset time period;
wherein, the resource transfer-in code can be a payment code provided by the merchant to the buyer for payment in practical application. As described in the background art, the method for determining one-code multiple access in the prior art is often to acquire an address registered by a receiver of a resource transfer-in party or an LBS address of the resource transfer-in party, where the receiver of the resource transfer-in party may be a merchant, that is, a seller in practical application, and the resource transfer-in party may be a buyer purchasing goods in the merchants in practical application, and since the address registered by the seller in practical application is not necessarily an actual address of the seller, the acquired LBS address is too fine to cause too much calculation workload, and the acquired LBS address is affected by a 3G/4G signal to cause an inaccurate positioning of a handheld mobile terminal of the buyer, further cause an inaccurate acquired LBS address, and the like, which results in that the existing method for determining one-code multiple access is not optimized.
In order to solve the problem, one or more embodiments of the present invention may determine at least one confidence resource transfer area corresponding to the resource transfer-in code based on the resource transfer times of the resource transfer-in code in a predetermined time period, and in this process, because the resource transfer times of the resource transfer-in code in the predetermined time period are considered, a situation that the resource transfer times are abnormally few is avoided, and a problem that an obtained LBS address is also affected by a 3G/4G signal to cause an inaccurate positioning of a buyer and further cause an inaccurate obtained LBS address can be avoided.
In order to further optimize the method for determining one-code multiple access in the prior art, one or more embodiments of the present invention introduce a geohash (chinese name is spatial index coding) code value on the basis of the obtained LBS address. Briefly, the geohash can be understood as a gridding coding method, that is, points are classified into one grid according to the longitude and latitude of each point on the map, and are coded for the grid, as shown in fig. 3, a schematic diagram of geohash coding on a middle area in the map shown in fig. 3 is shown, the middle area is divided into 9 grids, and the coding of each grid is sequentially: WX4ER, WX4G2, WX4G3, WX4EP, WX4G0, WX4G1, WX4DZ, WX4FB and WX4FO take grid WX4ER as an example, the position of the latitude and longitude coordinate falling into grid WX4ER can be positioned as an area with a geohash code value of WX4ER, and therefore the calculation amount of one-code multiple access determined only based on LBS latitude and longitude coordinate data is greatly reduced.
Therefore, at least one confidence resource transfer area corresponding to the resource transfer-in code is determined based on the resource transfer times of the resource transfer-in code in a preset time period, and at least one position information of a resource transfer-in party for transferring the resource through the resource transfer-in code in the preset time period can be obtained firstly; then, determining at least one geohash code value corresponding to the at least one location information; acquiring the resource transfer times of the resource transfer party performing the resource transfer through the resource transfer code in the area corresponding to the geohash code value within a preset time period; and finally, if the resource transfer times of the resource transfer party in the area corresponding to the geohash code value are larger than a preset threshold value, determining the area corresponding to the geohash code value as a confidence resource transfer area corresponding to the resource transfer code.
Acquiring at least one position information of a resource transfer-in party, specifically acquiring at least one longitude and latitude coordinate information of the resource transfer-in party; then determining a geohash code value corresponding to the obtained longitude and latitude coordinate information, and assuming that the geohash code value corresponding to the obtained longitude and latitude coordinate information includes four code values of WX4ER, WX4G2, WX4EP and WX4FO by taking fig. 3 as an example; and then acquiring the resource transfer times of the resource transfer party performing the resource transfer through the resource transfer code in the region corresponding to the four geohash code values within a predetermined time period, such as the time period of the latest month or one week, and assuming that the resource transfer times of the resource transfer party performing the resource transfer through the resource transfer code in the region corresponding to the four geohash code values within the last month are acquired, the resource transfer times are respectively 6, 220, 330 and 275.
It should be understood that, in practical applications, the longitude and latitude coordinate information of the resource transfer-in party is acquired, and the longitude and latitude coordinate information can be acquired when the resource transfer-in code is scanned by the handheld mobile terminal to pay the seller through the resource transfer-in party, that is, the buyer, so that the acquired longitude and latitude coordinate information is affected by the 3G/4G signal, and when the address of the seller is located at a position where the 3G/4G signal is not strong enough, for example, when the address of the seller is located in an underground floor, the acquired longitude and latitude coordinate information of the resource transfer-in party may be inaccurate, for example, the longitude and latitude coordinate information of the position where the buyer leaves the seller may be acquired.
In order to solve the problem, the area corresponding to the geohash code value with the resource transfer frequency greater than the preset threshold is determined as the trusted resource transfer area corresponding to the resource transfer code, where the preset threshold may be determined according to practical experience and often reaches a certain number, and it is avoided that the area corresponding to the geohash code value with abnormally few resource transfer frequencies is determined as the trusted resource transfer area corresponding to the resource transfer code, that is, obviously, of the above four values, the resource transfer frequency in the area corresponding to the WX4ER code value is much smaller than the areas corresponding to the other three code values, so that the areas corresponding to the WX4G2, the WX4EP, and the WX4FO code values may be determined as the trusted resource transfer areas corresponding to the resource transfer code.
And step 120, determining whether the resource transfer code has one-code multiple access or not based on the region number and/or the region dispersion of the at least one confidence resource transfer region.
Optionally, determining whether the resource transfer code has multiple code accesses based on the number of regions and/or the region dispersion of the at least one confidence resource transfer region, and if it is determined that the number of regions of the at least one confidence resource transfer region is greater than 1, determining the region dispersion of the at least one confidence resource transfer region; then, whether the resource transfer code has one-code multiple access is determined according to the region dispersion. If the number of the at least one confidence resource transfer region is determined to be 1, the resource transfer code is only present in one business, that is, the resource transfer code does not have one code multiple access.
Specifically, when it is determined that the number of regions of at least one confidence resource transfer region is greater than 1, since there may be two points that are closer to each other and correspond to two geohash code values, respectively, as shown in fig. 3, where point a and point B are closer to each other, but correspond to two geohash code values, in order to avoid that there is an error in determining one-code multiple access, in the embodiments of the present application, when it is determined that the number of regions of at least one confidence resource transfer region is greater than 1, it may also be determined that there is one-code multiple access, and whether there is one-code multiple access is determined according to the dispersion.
Specifically, if it is determined that the number of the regions of the at least one confidence resource transfer region is greater than 1, determining the region dispersion of the at least one confidence resource transfer region, specifically, first, if it is determined that the number of the regions of the at least one confidence resource transfer region is greater than 1, determining a first central point of each confidence resource transfer region and a second central point of an overall region formed by the at least one confidence resource transfer region; and finally, determining the region dispersion of at least one confidence resource transfer region according to the first central point and the second central point of each confidence resource transfer region. In practical applications, the second central point may be determined according to the first central point of each trusted resource transfer area.
Taking fig. 2 as an example, following the assumption that the geohash code values corresponding to the obtained longitude and latitude coordinate information include four code values of WX4ER, WX4G2, WX4EP, and WX4FO, four first center points of four grid regions corresponding to the four code values of WX4ER, WX4G2, WX4EP, and WX4FO may be determined, respectively, then second center points of regions formed by the four center points, that is, second center points of an overall region formed by the four grid regions corresponding to the four code values, may be determined, and finally, the region dispersion of the four grid regions corresponding to the four code values may be determined according to the 4 first center points and the second center points.
Optionally, the region dispersion of at least one confidence resource transfer region is determined according to the first central point and the second central point of each confidence resource transfer region, and then, first, the distance between the first central point and the second central point of each confidence resource transfer region is determined; then, determining an average value of the distance between the first central point and the second central point of each confidence resource transfer area; and finally, determining the region dispersion of at least one confidence resource transfer region according to the average value of the distance between the first central point and the second central point of each confidence resource transfer region.
Following the example of fig. 2, the four distances a, b, c and d between the four first center points and the second center point may be determined first, then the average value of the four distances (a + b + c + d)/4 is determined, and finally the region dispersion of the four grid regions is determined according to the average value of the four distances (a + b + c + d)/4.
Optionally, determining whether the resource transfer code has one code multiple access according to the region dispersion, and if it is determined that the average value of the distances between the first central point and the second central point of each confidence resource transfer region is within a preset range, determining that the resource transfer code does not have one code multiple access; and if the average value of the distances between the first central point and the second central point of each confidence resource transfer area is determined not to be in the preset range, determining that the resource transfer code has one code multiple access. If the average value (a + b + c + d)/4 of the four distances is determined to be within the preset range, it is determined that there is no code multiple access for the resource transfer code, and if (a + b + c + d)/4 is determined not to be within the preset range, it is determined that there is code multiple access for the resource transfer code.
When determining whether the resource transfer-in code has the phenomenon of one-code multiple access, because the confidence resource transfer area corresponding to the resource transfer-in code can be determined, and then whether the one-code multiple access exists is determined based on the number and the dispersion of the confidence resource transfer areas, the complexity of determining the one-code multiple access is simplified, the number of the areas is considered, the dispersion of the areas is also considered, the error of determining the one-code multiple access is reduced, and the method for determining the one-code multiple access in the prior art is optimized.
To solve the problem of insufficient optimization of the method for determining one-code multiple access in the prior art, the present specification further provides a method for determining one-code multiple access, as shown in fig. 3, which is a schematic implementation flow diagram of the method, including:
step 310, determining at least one confidence transaction area corresponding to the transaction code based on the transaction information of the payment code in a preset time period;
optionally, based on the transaction information of the payment code in the predetermined time period, at least one trusted transaction area corresponding to the transaction code is determined, specifically, at least one position information of a transaction transfer party performing a transaction through the payment code in the predetermined time period may be first obtained; then, determining at least one geohash code value corresponding to the at least one location information; acquiring the transaction times of a transaction transfer party performing transaction through the payment code in an area corresponding to the geohash code value within a preset time period; and finally, if the number of times of the transaction transfer party in the region corresponding to the geohash code value is larger than a preset threshold value, determining the region corresponding to the geohash code value as a confidence resource transaction region corresponding to the payment code.
Optionally, at least one piece of location information of the transaction transfer-in party is obtained, and then at least one piece of longitude and latitude coordinate information of the transaction transfer-in party can be obtained.
At step 320, it is determined whether there is one-code multiple access to the payment code based on the zone number and/or the zone dispersion of the at least one trusted transaction zone.
Optionally, determining whether the payment code has one-code multiple access based on the region number and/or the region dispersion of the at least one trusted transaction region, first determining the region dispersion of the at least one trusted transaction region if it is determined that the region number of the at least one trusted transaction region is greater than 1; and determining whether the payment code has one-code multiple access or not according to the region dispersion. If the number of the at least one trusted transaction area is determined to be 1, it may be determined that the payment code is used in only one merchant, and it may be determined that there is no one-code multiple access to the payment code.
Optionally, if it is determined that the number of the at least one trusted transaction area is greater than 1, determining the area dispersion of the at least one trusted transaction area, and first, if it is determined that the number of the at least one trusted transaction area is greater than 1, determining a first central point of each trusted transaction area and a second central point of an overall area formed by the at least one trusted transaction area; and finally, determining the region dispersion of at least one confidence transaction region according to the first central point and the second central point of each confidence transaction region. In practice, the second center point may be determined based on the first center point of each trusted transaction area.
Optionally, the area dispersion of at least one confidence transaction area is determined according to the first central point and the second central point of each confidence transaction area, and specifically, the distance between the first central point and the second central point of each confidence transaction area may be determined first; then, determining an average value of the distance between the first central point and the second central point of each confidence transaction area; finally, determining the region dispersion of at least one confidence resource transfer region according to the average value of the distance between the first central point and the second central point of each confidence transaction region.
Optionally, determining whether the payment code has one code multiple access according to the region dispersion, and if it is determined that the average value of the distances between the first central point and the second central point of each trusted transaction region is within a preset range, determining that the payment code does not have one code multiple access; and if the average value of the distances between the first central point and the second central point of each confidence transaction area is determined not to be within the preset range, determining that the payment code has one code multiple access.
When the payment code is determined to have the phenomenon of one-code multiple access, the confidence transaction area corresponding to the payment code can be determined, and then the existence of the one-code multiple access is determined based on the number and the dispersion of the confidence transaction areas, so that the complexity of determining the one-code multiple access is simplified, the number of the areas is considered, the dispersion of the areas is also considered, the error of determining the one-code multiple access is reduced, and the method for determining the one-code multiple access in the prior art is optimized.
Fig. 4 is a schematic structural diagram of an electronic device provided in an embodiment of the present specification. Referring to fig. 4, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 4, but that does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory to the memory and then runs the computer program to form the association device of the resource value-added object and the resource object on the logic level. The processor is used for executing the program stored in the memory and is specifically used for executing the following operations:
determining at least one confidence resource transfer area corresponding to the resource transfer-in code based on the resource transfer times of the resource transfer-in code in a preset time period;
determining whether there is one code multiple access for the resource transfer code based on the zone number and/or zone dispersion of the at least one of the trusted resource transfer zones.
The method for determining a code multiple access as disclosed in the embodiment of fig. 1 of the present specification can be applied to or implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps and logic blocks disclosed in one or more embodiments of the present specification may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with one or more embodiments of the present disclosure may be embodied directly in hardware, in a software module executed by a hardware decoding processor, or in a combination of the hardware and software modules executed by a hardware decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
The electronic device may further perform the method for determining a code multiple access of fig. 1, which is not described herein again.
Of course, besides the software implementation, the electronic device in this specification does not exclude other implementations, such as logic devices or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or logic devices.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present specification. Referring to fig. 5, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 5, but this does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to form a device for selecting the resource value-added object based on the resource object on the logic level. The processor is used for executing the program stored in the memory and is specifically used for executing the following operations:
determining at least one confidence transaction area corresponding to the transaction code based on the transaction times of the payment code in a preset time period;
determining whether there is one code multiple access for the payment code based on the zone number and/or zone dispersion of the at least one trusted transaction zone.
The method for determining a code multiple access as disclosed in the embodiment of fig. 3 of the present specification can be applied to or implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps and logic blocks disclosed in one or more embodiments of the present specification may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with one or more embodiments of the present disclosure may be embodied directly in hardware, in a software module executed by a hardware decoding processor, or in a combination of the hardware and software modules executed by a hardware decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
The electronic device may further perform the method for determining a code multiple access of fig. 3, which is not described herein again.
Of course, besides the software implementation, the electronic device in this specification does not exclude other implementations, such as logic devices or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or logic devices.
Fig. 6 is a schematic structural diagram of an apparatus 600 for determining a code multiple access provided in the present specification. Referring to fig. 6, in a software implementation, an apparatus 600 for determining a code multiple access may include a first determining unit 601 and a second determining unit 602, wherein:
a first determining unit 601, configured to determine, based on the number of resource transfer times of a resource transfer code in a predetermined time period, at least one confidence resource transfer region corresponding to the resource transfer code;
a second determining unit 602, configured to determine whether there is one-code multiple access for the resource transfer code based on the region number and/or the region dispersion of the at least one trusted resource transfer region.
In one embodiment, the second determining unit 602,
if the number of the at least one confidence resource transfer region is larger than 1, determining the region dispersion of the at least one confidence resource transfer region;
and determining whether the resource transfer code has one-code multiple access or not according to the region dispersion.
In one embodiment, the second determining unit 602,
if the number of the at least one confidence resource transfer area is larger than 1, determining a first central point of each confidence resource transfer area and a second central point of an integral area formed by the at least one confidence resource transfer area;
determining the region dispersion of the at least one confidence resource transfer region according to the first central point and the second central point of each confidence resource transfer region.
In one embodiment, the second determining unit 602,
determining a distance between a first center point and the second center point of each of the confidence resource transfer regions;
determining an average of the distance between the first center point and the second center point for each of the confidence resource transfer regions;
determining the region dispersion of the at least one confidence resource transfer region according to the average value of the distance between the first central point and the second central point of each confidence resource transfer region.
In one embodiment, the second determining unit 602,
if the average value of the distances between the first central point and the second central point of each confidence resource transfer area is determined to be in a preset range, determining that the resource transfer code does not have a code multiple access;
and if the average value of the distances between the first central point and the second central point of each confidence resource transfer area is determined not to be within the preset range, determining that the resource transfer code has one code multiple access.
In one embodiment, the first determining unit 601,
acquiring at least one position information of a resource transfer-in party which carries out resource transfer-in through the resource transfer-in code in the preset time period;
determining at least one geohash code value corresponding to the at least one of the location information;
acquiring the resource transfer times of the resource transfer party performing the resource transfer through the resource transfer code in the preset time period for performing the resource transfer in the area corresponding to the geohash code value;
and if the resource transfer times of the resource transfer party in the area corresponding to the geohash code value for resource transfer are determined to be larger than a preset threshold, determining the area corresponding to the geohash code value as a trusted resource transfer area corresponding to the resource transfer code.
In one embodiment, the first determining unit 601,
and acquiring at least one longitude and latitude coordinate information of the resource transfer party.
The apparatus 600 for determining one-code multiple access can implement the method of the embodiment of the method in fig. 1, and specific reference may be made to the method for determining one-code multiple access in the embodiment shown in fig. 1, which is not described again.
Fig. 7 is a schematic structural diagram of an apparatus 700 for determining a code multiple access provided in the present specification. Referring to fig. 7, in a software implementation, an apparatus 700 for selecting a resource value-added object based on a resource object may include a first determining unit 701 and a second determining unit 702, wherein:
a first determining unit 701, configured to determine, based on transaction information of a payment code within a predetermined time period, at least one trusted transaction area corresponding to the transaction code;
a second determining unit 702 determines whether there is one-code multiple access to the payment code based on the zone number and/or the zone dispersion of the at least one trusted transaction zone.
In one embodiment, the second determining unit 702:
if the number of the at least one region of the confidence transaction region is determined to be larger than 1, determining the region dispersion of the at least one region of the confidence transaction region;
and determining whether the payment code has one-code multiple access or not according to the region dispersion.
In one embodiment, the second determining unit 702:
if the number of the at least one confidence transaction area is larger than 1, determining a first central point corresponding to each confidence transaction area and a second central point of an integral area formed by the at least one confidence transaction area;
and determining the region dispersion of the at least one confidence transaction region according to the first central point and the second central point of each confidence transaction region.
In one embodiment, the second determining unit 702:
determining a distance between a first center point and the second center point of each of the trusted transaction areas;
determining an average of the distance between the first center point and the second center point for each of the trusted transaction areas;
determining the region dispersion of the at least one confidence resource transfer region according to the average value of the distance between the first central point and the second central point of each confidence transaction region.
In one embodiment, the second determining unit 702:
if the average value of the distances between the first central point and the second central point of each confidence transaction area is determined to be within a preset range, determining that the payment code has no one-code multiple access;
and if the average value of the distances between the first central point and the second central point of each confidence transaction area is determined not to be within the preset range, determining that the payment code has one code multiple access.
In one embodiment, the first determining unit 701,
acquiring at least one position information of a transaction transfer party which carries out transaction through the payment code within the preset time period;
determining at least one geohash code value corresponding to the at least one of the location information;
acquiring the transaction times of a transaction transfer party performing transaction through the payment code in the preset time period in a region corresponding to the geohash code value;
and if the number of times of the transaction transfer party in the region corresponding to the geohash code value is larger than a preset threshold value, determining the region corresponding to the geohash code value as a trusted resource transaction region corresponding to the payment code.
In one embodiment, the first determining unit 701,
and acquiring at least one longitude and latitude coordinate information of the transaction transfer-in party.
The apparatus 700 for determining one-code multiple access can implement the method of the embodiment of the method in fig. 3, which may specifically refer to the method for determining one-code multiple access in the embodiment shown in fig. 3, and is not described again.
In short, the above description is only a preferred embodiment of the present disclosure, and is not intended to limit the scope of the present disclosure. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of one or more embodiments of the present disclosure should be included in the scope of protection of one or more embodiments of the present disclosure.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.