Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one
Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
Below in conjunction with attached drawing, the technical scheme provided by various embodiments of the present application will be described in detail.
Currently, verifying cell-phone number scene it is more and more, due to cell-phone number be it is corresponding with communication equipment, this
In field, verifying cell-phone number alternatively referred to as verifies equipment.
Cell-phone number described in the embodiment of the present application can be terminal device and be used for when being communicated by mobile network
The Subscriber Number of identity user identity, such as mobile directory number, MDN (Mobile Directory Number, MDN), calling subscriber
The required group of number is MDN code when calling called subscriber, that is, our usually said cell-phone numbers.
With the development of computer technology, described terminal device is not limited in cell phone in the embodiment of the present application,
It can also be the equipment that tablet computer, smartwatch, vehicle-mounted mobile platform etc. can be communicated by mobile network.
As described in the background art, in the prior art, during verifying cell-phone number, the behaviour of user's progress is needed
Make more, convenience is lower.User just needs to be implemented the more operation unrelated with ongoing business in this way, excuse me user
Originally the business carried out influences the experience of user.For example, user, which carries out account using cell-phone number, registers business, registering
When account, the information such as some accounts, password, identity information are often filled in, then to the verification process of cell-phone number, it is clear that beat
The progress for having disturbed user's registration account business, affects the experience of user.
In addition, in the prior art, the process time-consuming for verifying cell-phone number is also longer.Specifically, equally to pass through short message
Mode verified for, after user clicks and sends short message button, often expending more than ten seconds, even longer time is whole
End can just receive short message, and after receiving short message, user will also switch application program, remember (or duplication) identifying code, then
Input (or stickup) identifying code.Whole operation process often wants 30 seconds or so time-consuming.
In addition, in the prior art, the failure rate for verifying cell-phone number is higher.Specifically, unskilled for some operations
User, be easier to the case where maloperation occur, and remember and input identifying code when be easy to appear mistake, cause cell-phone number to be tested
Card failure.In addition, the arrival rate of short message is relatively low under weak net environment, it is easy to cause cell-phone number authentication failed.
In addition, in the prior art, the mode of the verifying cell-phone number such as automatic short message reading is not sufficiently stable.Automatic short message reading
When, application program needs the short message received by preset interface reading terminals, the identifying code in short message is then extracted, with
Complete cell-phone number verifying.But short message reading needs to obtain equipment permission, and equipment permission can be got often by multi-party
The influence of face factor, for example, will not provide short message in Apple Macintosh operating system reads permission, the major part in Android operation system is set
Lead to automatic short message reading function for short message reading permission will not be provided in addition, the permission is relatively easy to be limited by security software
The realization of energy is impacted, therefore the mode of the verifying cell-phone number such as automatic short message reading is not sufficiently stable.
Verification method provided by the present application is described more fully below, the executing subject of this method can be calculating equipment, example
Such as smart phone, tablet computer terminal device.In addition, the executing subject of this method, which can also be, realizes provided by the present application test
The application program of card method.For ease of description, hereafter executing subject in this way be terminal for, to the embodiment party of this method
Formula is introduced.It is appreciated that it is a kind of illustrative explanation that the executing subject of this method, which is terminal, it is not construed as pair
The restriction of this method.
The implementation process schematic diagram of verification method provided by the present application is as shown in Fig. 2, include the following steps:
Step S101: according to the international mobile subscriber identity of terminal, certification letter is obtained by the gateway of telecom operators
Breath;
Wherein, which is information corresponding with the cell-phone number of terminal, and the cell-phone number of terminal is the world with terminal
Mobile identification number (IMSI:International Mobile Subscriber Identification Number) is right
The information answered hereinafter will for ease of description, cell-phone number corresponding with the IMSI of terminal is known as target mobile phones number in the application
Corresponding relationship of the target mobile phones number with IMSI is discussed in detail, which is stored in gateway.The terminal can be from gateway
The terminal of authentication information is obtained, in addition, if when the executing subject of step S101 is software (client), which can be with
It is the corresponding information of international mobile subscriber identity for the terminal that the software is run.
IMSI is used to distinguish the different user in cellular network, has uniqueness in all cellular networks.Mobile network
User communication when, will use IMSI as mark.In global system for mobile communications (Global System for Mobile
Communication, GSM) network, Universal Mobile Communication System (Universal Mobile Telecommunications
System, UMTS) in network and long term evolution (Long Term Evolution, LTE) network, IMSI identifies mould from client
Block (Subscriber Identification Module, SIM) card, is then directly from mobile phone in the cdma 2000 network,
Or Removable User Identity Module (Removable User Identity Module, RUIM) card.For SIM card and RUIM
For card, due to that can be removed from terminal, the IMSI of terminal device is often variable.
The corresponding relationship of IMSI and phone number, can be by the gateway of telecom operators in home location register (Home
Location Register, HLR) in definition, comprising being responsible for the data of telecom operators' user management in home location register
The gateway in library, telecom operators can be by inquiring the database, to determine phone number corresponding with IMSI.
The gateway of telecom operators is the gateway system for having phone number and obtaining function by telecom operators' setting.Electricity
Believe operator when user passes through terminal access mobile data network, can all be obtained by interface the phone number of user to
Charging.The interface has been opened to the outside world as gateway authentication interface at present, is allowed partner to use the interface, is obtained the mobile phone of user
Number.So, terminal by obtaining itself IMSI, can then request the gateway of telecom operators to obtain corresponding with IMSI
The corresponding cell-phone number of terminal can be obtained in cell-phone number.
It should be noted that when being verified to cell-phone number, it for the sake of security, often can't be directly by basis
The target mobile phones number that IMSI is determined return to terminal, but authentication information corresponding with target mobile phones number is returned to terminal, by
It is corresponding with target mobile phones number in IMSI, then and the corresponding authentication information of target mobile phones number is certification letter corresponding with IMSI
Breath.It may include the encryption information encrypted to target mobile phones number in authentication information, also may include and target mobile phones
Number corresponding identification information, the application are not construed as limiting this.
The gateway of telecom operators can return the authentication information after the corresponding authentication information of IMSI for getting terminal
Back to the terminal.Terminal after receiving authentication information, can request server cell-phone number to be verified is verified.
Step S102: checking request is sent to server.
It wherein, include cell-phone number to be verified and authentication information in the checking request, which is used for request server
Cell-phone number to be verified is verified according to authentication information.
Cell-phone number to be verified can be the cell-phone number to be verified that terminal receives user's input, and user can be by preset defeated
Enter frame and input cell-phone number to be verified, alternatively, cell-phone number to be verified can also be terminal according to the information of terminal local determine to
Cell-phone number is verified, the information of terminal local here such as can be the loCal number for being pre-stored within terminal local, so just
Without the cell-phone number of the manual input terminal of user, convenience is higher.That is, before sending checking request to server, eventually
End can also receive the cell-phone number to be verified of input, or cell-phone number to be verified can also be determined according to terminal local information.
It should be noted that terminal can pass through the shifting of terminal when sending gateway authentication request to the gateway of operator
Dynamic data network sends gateway authentication request to gateway, and mobile data network can be to be used to carry out by what telecom operators provided
The cellular network of network data transmission.
Before sending gateway authentication request, first it can determine whether mobile data network can be used, if it is available, can lead to
Cross mobile data network transmission;If unavailable, it can inform that user carries out cell-phone number by other verification modes
Verifying.Other verification modes mentioned here such as can be the verification mode of the forms such as short message, voice.
In the embodiment of the present application, terminal obtains authentication information by the gateway of telecom operators, which is and end
The corresponding information of the target mobile phones number at end, in this way, terminal, after sending checking request to server, server can believe certification
Breath is sent to gateway, returns to server target mobile phones number corresponding with authentication information by gateway, server can be according to mesh
Cell-phone number is marked, the cell-phone number to be verified in checking request is verified.It is to be verified that entire verification process only needs user to input
Cell-phone number, without check other operations such as short message, input identifying code, compared with the existing technology for, convenience compared with
It is high.
For terminal after checking request is sent to server, server can determine that authentication information is corresponding by gateway
Then target mobile phones number are verified cell-phone number to be verified according to target mobile phones number.
The process verified below to server is described in detail, implementation process schematic diagram such as Fig. 3 institute of the process
Show, includes the following steps:
Step S201: the checking request that terminal is sent is received;
It wherein, include cell-phone number to be verified and authentication information in the checking request, which is that terminal passes through telecommunications
What the gateway of operator was got.
Step S202: in response to the checking request, the cell-phone number to be verified is tested according to the authentication information
Card.
The checking request that server can be sent according to client, obtains and authentication information pair from the gateway of telecom operators
The target mobile phones number answered.Since, comprising authentication information, which can be sent to gateway by server, so in checking request
Request gateway returns to cell-phone number corresponding with the authentication information afterwards.
As it was noted above, terminal phone number may be illegal if target mobile phones number are directly returned to terminal
User obtains.In addition, meaning that any place will be possibly not added in terminal if target mobile phones number are directly returned to terminal
The target mobile phones number of reason and cell-phone number to be verified issue server confirmation, then illegal user may crack, directly will
Target mobile phones number are set as number identical with cell-phone number to be verified, then issue server requests authentication again, just can not in this way
The cell-phone number of terminal is correctly verified.
Based on above-mentioned consideration, in the embodiment of the present application, authentication information may include being encrypted to obtain to target mobile phones number
Encryption information, also may include identification information corresponding with target mobile phones number.
So, when in authentication information including encryption information, gateway can be decrypted the encryption information, can be obtained
Then target mobile phones number are returned to server by target mobile phones number;When in authentication information include the corresponding mark of target mobile phones number
When information, then gateway can determine authentication information according to the corresponding relationship of the target mobile phones number pre-established and identification information
In the corresponding target mobile phones number of identification information, target mobile phones number are then returned into server.
Server, can be according to target mobile phones number to mobile phone to be verified after the target mobile phones number for receiving gateway transmission
It number is verified.Specifically in verifying, server may determine that whether target mobile phones number are consistent with cell-phone number to be verified, if target
Cell-phone number is consistent with cell-phone number to be verified, then is proved to be successful, if target mobile phones number and cell-phone number to be verified are inconsistent, verifies mistake
It loses.
If being proved to be successful, server can execute the related service logic after being proved to be successful, then by service logic
Processing result returns to terminal.For example, user, which carries out account by cell-phone number, registers business, then in user's input handset number
After clicking verifying button, in the case where being proved to be successful, then directly prompt subscriber phone number is proved to be successful.
If authentication failed, the terminal phone authentication failed is notified.User can choose other cell-phone number authentications
Formula is verified.
It should be noted that terminal can include the device identification of the terminal into the gateway authentication request that gateway is sent
(Token), device identification is used to identify the identity information of the equipment, also referred to as token.It is got in gateway according to IMSI
After authentication information, authentication information can be associated with device identification, associated authentication information and device identification are then sent to this
The corresponding terminal of device identification.
Equally, terminal also can include the device identification of the terminal, service when sending checking request to server, in request
Device can be according to the device identification to terminal return authentication result.Server, also can will be with when requesting gateway decrypted authentication information
The associated device identification of authentication information is sent to gateway, and the target mobile phones number that decryption obtains can be associated with by gateway with device identification,
And server is returned to, so that server verifies target mobile phones number and cell-phone number to be verified according to device identification.
Verification method provided by the embodiments of the present application, terminal obtain authentication information by the gateway of telecom operators, this is recognized
Demonstrate,prove information be information corresponding with the target mobile phones number of terminal, in this way, terminal to server send checking request after, server
Authentication information can be sent to gateway, server target mobile phones number corresponding with authentication information, server are returned to by gateway
The cell-phone number to be verified in checking request can be verified according to target mobile phones number.Entire verification process only needs user
Cell-phone number to be verified is inputted, other operations such as short message, input identifying code is checked without carrying out, comes compared with the existing technology
It says, convenience is higher.
In addition, verification method provided by the embodiments of the present application, complicated operation is carried out without user, and short without sending
Letter, etc. the processes such as short message to be received, can be by the mobile data network having built up when verifying, entire verification process can be
It is completed in 1 second, for the prior art, the time of consuming is shorter.
In addition, verification method provided by the embodiments of the present application, complicated operation is carried out without user, can be grasped to avoid user
Various faults in work, the case where avoiding due to user's fault bring authentication failed.And in weak net (the short message function of terminal
Can be unavailable, but mobile data network is available) when, the verifying of cell-phone number still may be implemented, as long as mobile data network is available
, compared with the existing technology for, the success rate of verifying is higher.
In addition, verification method provided by the embodiments of the present application, mentions without applying for mobile device permission, and with mobile device
The interface of confession is unrelated, compared with the existing technology for, verification process is reliable and stable.
Foregoing invention design based on the application, for the ease of better understanding technical characteristic, means and the effect of the application
Fruit is cooked furtherly the verification method of the application below with reference to a kind of realization schematic diagram of a scenario of verification method shown in Fig. 4
It is bright.The process of following cell-phone numbers verifying is similar to the process that cell-phone number described previously is verified, do not make referrals to hereinafter other
Some steps may refer to associated description above, and details are not described herein again.
The implementation process schematic diagram of the process is as shown in figure 5, include the following steps:
Step S301: terminal sends gateway authentication request to the gateway of telecom operators, wraps in the gateway authentication request
International mobile subscriber identity containing the terminal;
Step S302: the gateway is requested according to the gateway authentication, the determining and international mobile subscriber identity pair
The target mobile phones number answered determine authentication information corresponding with the target mobile phones number, the authentication information are sent to the end
End;
Step S303: the terminal to server sends checking request, the checking request include cell-phone number to be verified and
The authentication information;
Step S304: the server obtains corresponding with the authentication information according to the checking request from the gateway
Target mobile phones number, the cell-phone number to be verified is verified according to the target mobile phones number of acquisition.
Foregoing invention design based on the application, for the ease of better understanding technical characteristic, means and the effect of the application
Fruit is below described further above-mentioned steps S301-S304.The process of following cell-phone number verifyings is tested with cell-phone number described previously
The process of card is similar, and some other step not made referrals to hereinafter may refer to associated description above, herein no longer
It repeats.
The implementation process schematic diagram of the process is as shown in fig. 6, include the following steps:
Step S401: terminal determines the number to be verified of user's input;
Terminal can receive the number to be verified of user's input by the preset input frame of client.
Step S402: terminal judges whether mobile data network can be with;
Described mobile data network is available in the application, and the mobile data network that can be in terminal is in the open state
When.It should be noted that the networking mode of present terminal equipment can be mobile number when mobile data network is in the open state
According to network, it is also possible to other networks, other networks mentioned here such as can be WLAN (Wireless
Fidelity, Wi-Fi).
Step S403: if available, terminal sends gateway authentication to the gateway of telecom operators by mobile data network
Request;
It wherein, include the international mobile subscriber identity of terminal in gateway authentication request.
Step S404: if unavailable, other verification modes be switched to, number to be verified is verified;
Step S405: gateway is requested according to the gateway authentication received, determining mobile with the world in gateway authentication request
The corresponding target mobile phones number of CUSTOMER ID;
Gateway can be by inquiring HLR, and acquisition target mobile phones number corresponding with international mobile subscriber identity.
Step S406: gateway determines authentication information corresponding with the target mobile phones number, which is sent to end
End;
Gateway can encrypt target mobile phones number, obtain encryption information, and encryption information is then contained in certification letter
In breath, in addition, gateway can also directly encrypt the authentication information comprising target mobile phones number, encrypted certification letter is obtained
Breath.
Step S407: authentication information is issued into terminal;
Step S408: terminal receives the authentication information, then sends checking request to server, includes in the checking request
The authentication information and cell-phone number to be verified;
Step S409: the authentication information in the checking request received is sent to gateway by server;
Step S410: the authentication information received is decrypted in gateway, obtains the target mobile phones for including in authentication information
Number;
Gateway is decrypted the encryption information in authentication information, obtains mesh according to the cipher mode to target mobile phones number
Mark cell-phone number;Or according to before, to the cipher mode of authentication information, authentication information can be decrypted, target mobile phones are obtained
Number.
Step S411: the target mobile phones number that decryption obtains are sent to server by gateway;
Step S412: whether the target mobile phones number and cell-phone number to be verified that server judgement receives are identical;
Step S413: if it is different, then server notifies the terminal authentication to fail, and S415 is entered step;
Step S414: if they are the same, then server executes the related service logic after being proved to be successful, by the processing of service logic
As a result the terminal is returned to, and enters step S415;
Step S415: terminal receive server return as a result, and processing result is shown, to inform user mobile phone
Number verification result.
In the entire verification process of step S401-S415, user is defeated by cell-phone number to be verified when executing step S401
After entering, only need to click verifying button, inform that terminal starts to verify cell-phone number to be verified, terminal, gateway and
Server will verify cell-phone number to be verified.
The operating process schematic diagram for please referring to user when Fig. 7 is verifying cell-phone number provided by the present application, relative to existing skill
For art, user need to only click verifying button after inputting cell-phone number to be verified, and terminal can be according to the IMSI of terminal realization pair
The verifying of cell-phone number to be verified carries out other operations without user, and convenience is higher.
The above are verification methods provided by the embodiments of the present application, are based on same thinking, and the embodiment of the present application also provides phase
The verifying device answered, as shown in figure 8, the device specifically includes:
Authentication information acquiring unit 501 passes through the gateway of telecom operators according to the international mobile subscriber identity of terminal
Authentication information is obtained, the authentication information is information corresponding with target mobile phones number, and the target mobile phones number are the state with terminal
The corresponding cell-phone number of border mobile identification number;
Checking request transmission unit 502 sends checking request to server, includes mobile phone to be verified in the checking request
Number and the authentication information, the checking request pass through the gateway for requesting the server according to the authentication information
The cell-phone number to be verified is verified.
In the embodiment of the present application, the specific embodiment of cell-phone number verifying is in one embodiment, described there are also very much
Authentication information acquiring unit 501 sends gateway authentication request to gateway, includes the state of the terminal in the gateway authentication request
Border mobile identification number;Receive the authentication information corresponding with the international mobile subscriber identity that the gateway is sent.
In one embodiment, authentication information acquiring unit 501 sends net to the gateway by mobile data network
Certification request is closed, the mobile data network is provided by the mobile operator.
In one embodiment, described device further includes cell-phone number determination unit 503 to be verified, is obtained in authentication information
Before unit 501 obtains authentication information by the gateway of telecom operators, the cell-phone number to be verified of input is received or according to terminal sheet
Ground information determines cell-phone number to be verified.
The above are verification methods provided by the embodiments of the present application, are based on same thinking, and the embodiment of the present application also provides phase
The verifying device answered, as shown in figure 9, the device specifically includes:
Checking request receiving unit 601 receives the checking request that terminal is sent, and includes hand to be verified in the checking request
Machine number and authentication information, the authentication information are what the terminal was got by the gateway of telecom operators;
Authentication unit 602, in response to the checking request, according to the authentication information, by the gateway to it is described to
Verifying cell-phone number is verified.
In the embodiment of the present application, the specific embodiment of cell-phone number verifying is there are also very much, in one embodiment, one
In kind embodiment, the authentication unit 602 is obtained and the authentication information pair according to the checking request from the gateway
The target mobile phones number answered;The cell-phone number to be verified is verified according to the target mobile phones number.
In one embodiment, the authentication information includes following at least one:
To the encryption information that target mobile phones number are encrypted, the target mobile phones number are and the international mobile subscriber
The corresponding cell-phone number of identification code;Identification information corresponding with the target mobile phones number.
In one embodiment, authentication unit 602 are to be encrypted to obtain to target mobile phones number in the authentication information
Encryption information when, the authentication information is sent to the gateway, so that the gateway is to the encryption in the authentication information
Information is decrypted, and obtains the target mobile phones number;The server receives the target mobile phones number that the gateway is sent;
In one embodiment, authentication unit 602 are mark corresponding with the target mobile phones number in the authentication information
When knowing information, the authentication information is sent to the gateway, so as to the determining mark with the authentication information of the gateway
Corresponding target mobile phones number;The server receives the target mobile phones number that the gateway is sent.
In one embodiment, authentication unit 602 judge whether are the target mobile phones number and the cell-phone number to be verified
Unanimously;When the target mobile phones number are consistent with the cell-phone number to be verified, determination is proved to be successful;The target mobile phones number with
When the cell-phone number to be verified is inconsistent, authentication failed is determined.
In one embodiment, described device further includes Service Processing Unit 603 and notification unit 604, wherein institute
Service Processing Unit 603 is stated when being proved to be successful, the related service logic after being proved to be successful is executed, by the processing knot of service logic
Fruit returns to the terminal;
The notification unit 604 notifies the terminal phone authentication failed in authentication failed.
At least one above-mentioned technical solution provided by the embodiments of the present application can reach it is following the utility model has the advantages that
Terminal obtains authentication information by the gateway of telecom operators, which is right with the target mobile phones number of terminal
The information answered, in this way, terminal is after sending checking request to server, authentication information can be sent to gateway by server, by
Gateway returns to server target mobile phones number corresponding with authentication information, and server can be according to target mobile phones number, to verifying
Cell-phone number to be verified in request is verified.Entire verification process only needs user to input cell-phone number to be verified, is not necessarily to
Check other operations such as short message, input identifying code, compared with the existing technology for, convenience is higher.
In addition, verification method provided by the embodiments of the present application, complicated operation is carried out without user, and short without sending
Letter, etc. short message to be received, by the mobile data network having built up when verifying, entire verification process can be completed in 1 second,
For the prior art, the time of consuming is shorter.
In addition, verification method provided by the embodiments of the present application, complicated operation is carried out without user, can be grasped to avoid user
Various faults in work, the case where avoiding due to user's fault bring authentication failed.And in weak net (the short message function of terminal
Can be unavailable, but mobile data network is available) when, the verifying of cell-phone number still may be implemented, only mobile data network is available
, compared with the existing technology for, the success rate of verifying is higher.
In addition, verification method provided by the embodiments of the present application, mentions without applying for mobile device permission, and with mobile device
The interface of confession is unrelated, compared with the existing technology for, verification process is reliable and stable.
It should be noted that in the 1990s, it is hardware that the improvement of a technology, which can be distinguished clearly,
On improvement (for example, improvement to circuit structures such as diode, transistor, switches) or software on improvement (for method
The improvement of process).However, with the development of technology, the improvement of current many method flows can be considered as hardware circuit
Structure directly improves.Designer is nearly all obtained by the way that improved method flow to be programmed into hardware circuit accordingly
Hardware circuit.Therefore, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, can
Programmed logic device (Programmable Logic Device, PLD) (such as field programmable gate array (Field
Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, logic function is by user to device programming
To determine.Voluntarily programmed by designer come a digital display circuit " integrated " on a piece of PLD, without asking chip manufacturing
Manufacturer designs and makes dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this
Programming uses " logic compiler (logic compiler) " software instead mostly also to realize, it and program development are used when writing
Software compiler is similar, and the source code before compiling also write by handy specific programming language, this is referred to as hard
Part description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many
Kind, such as ABEL (Advanced Boolean Expression Language), AHDL (Altera Hardware
Description Language)、Confluence、CUPL(Cornell University Programming
Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、
PALASM, RHDL (Ruby Hardware Description Language) etc., most generally use VHDL at present
(Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog.
Those skilled in the art, which also will be apparent to the skilled artisan that, only needs that slightly programming in logic is simultaneously with above-mentioned several hardware description languages by method flow
It is programmed into integrated circuit, so that it may be readily available the hardware circuit for realizing the logical method process.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing
The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can
Read medium, logic gate, switch, specific integrated circuit (Application Specific Integrated Circuit,
ASIC), the form of programmable logic controller (PLC) and insertion microcontroller, the example of controller includes but is not limited to following microcontroller
Device: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320 are deposited
Memory controller is also implemented as a part of the control logic of memory.It is also known in the art that in addition to
Pure computer readable program code mode is realized other than controller, can be made completely by the way that method and step is carried out programming in logic
Controller is obtained to come in fact in the form of logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and insertion microcontroller etc.
Existing identical function.Therefore this controller is considered a kind of hardware component, and to including for realizing various in it
The device of function can also be considered as the structure in hardware component.Or even, it can will be regarded for realizing the device of various functions
For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when application.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program
Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group
Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by
Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with
In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.