[ detailed description ] embodiments
For better understanding of the technical solutions of the present application, the following detailed descriptions of the embodiments of the present application are provided with reference to the accompanying drawings.
It should be understood that the embodiments described are only a few embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
Fig. 1 is a flowchart of an embodiment of a method for verifying user authenticity according to the present application, and as shown in fig. 1, the method for verifying user authenticity may include:
Step 101, obtaining a user name and a registration number input by a user.
specifically, the user may be a merchant applying for entering the e-commerce platform, and thus, the user name and the registration number input by the user may be the merchant name and the registration number input by the merchant.
and 102, inquiring in a registration website according to the user name to obtain a registration name and a registration number returned by the registration website.
The registration websites can include a first registration website and a second registration website;
the registration name returned by the registration website may include a registration name returned by the first registration website and/or a registration name returned by the second registration website;
the registration number returned by the registration website comprises a registration number returned by a first registration website and/or a registration number returned by a second registration website;
The registration name returned by the registration website may include an english name and a chinese name.
Taking the first registration website as a commercial registration website and the second registration website as a commercial registration website as an example, the registration name returned by the registration website may include one or a combination of the following: the registration name (br _ name _ en and/or br _ name _ cn) returned by the commercial registration website, and the registration name (cr _ name _ en and/or cr _ name _ cn) returned by the industrial and commercial registration website; the registration number returned by the registration website may include one or a combination of the following: the registration number (br _ number) returned by the business registration website, and the registration number (cr _ number) returned by the industry and commerce registration website.
step 103, comparing the user name input by the user with the registration name returned by the registration website, and comparing the registration number input by the user with the registration number returned by the registration website.
Specifically, when comparing the user name input by the user with the registration name returned by the registration website, the user name input by the user and the registration name returned by the registration website may be standardized to make the format of the user name input by the user consistent with the format of the registration name returned by the registration website;
Similarly, when comparing the registration number input by the user with the registration number returned from the registration website, the registration number input by the user and the registration number returned from the registration website may be standardized to match the format of the registration number input by the user and the format of the registration number returned from the registration website.
and 104, verifying the authenticity of the user according to the comparison result.
In the verification method for the authenticity of the user, after the user name and the registration number input by the user are obtained, the user name and the registration number returned by the registration website are inquired in the registration website according to the user name, the registration name and the registration number returned by the registration website are obtained, the user name input by the user is compared with the registration name returned by the registration website, the registration number input by the user is compared with the registration number returned by the registration website, and finally the authenticity of the user is verified according to the comparison result, so that the authenticity of the user can be verified through the information returned by the registration website and a third-party credit investigation website, the coverage rate of the user is improved, and the effect of verifying the authenticity of the user is optimized.
Fig. 2 is a flowchart of another embodiment of the method for verifying the authenticity of the user, as shown in fig. 2, in the embodiment shown in fig. 1 of the present application, step 104 may be:
Step 201, if a registration name matching with the user name input by the user exists in the registration names returned by the registration website, and a registration number matching with the registration number input by the user exists in the registration numbers returned by the registration website, determining that the authenticity of the user passes the verification.
Further, after step 201, the method may further include:
step 202, if the registration number matched with the registration number input by the user returned by the registration website is unique, acquiring first state information of the user from the registration website according to the unique registration number, and inquiring in a third-party credit investigation website according to the unique registration number to acquire second state information of the user returned by the third-party credit investigation website.
Taking the user as an example of a merchant applying for entering the e-commerce platform, the first state information may include business state information and/or sale prohibition state and the like of the merchant acquired from the registration website; the second state information may include business state information and/or sale prohibition state and the like of the merchant returned by the third-party credit investigation website.
The third-party credit investigation website may be a D & B website, or may be another credit investigation website, which is not limited in this embodiment.
step 203, comparing the first state information with the second state information.
And step 204, acquiring the state information of the user according to the comparison result.
specifically, after comparing the first status information with the second status information, the status information of the user may be obtained with high logic, for example, if the first status information is that the business status of the merchant is normal, and the second status information is that the business status of the merchant is not normal, the business status of the merchant is determined to be not normal.
by acquiring the state information of the user, the embodiment can prevent the user with abnormal business state from entering the e-commerce platform, and avoid the loss caused by the user with abnormal business state entering the e-commerce platform.
Fig. 3 is a flowchart of a further embodiment of the method for verifying the authenticity of the user according to the present application, as shown in fig. 3, in the embodiment shown in fig. 2, the method may further include:
step 301, if there is no registration name matching the user name input by the user in the registration names returned by the registration websites, or there is no registration number matching the registration number input by the user in the registration numbers returned by the registration websites, acquiring the user address input by the user.
step 302, inquiring in a third-party credit investigation website according to the user name and the user address input by the user, and obtaining the credible information returned by the third-party credit investigation website.
step 303, when the trusted information is positive information, determining that the authenticity of the user is verified.
Wherein the positive information includes a user whose name is the user name input by the user, which is present in the user address input by the user.
That is, if a user name matching with a user name input by a user is not queried in the registration website or a registration number matching with a registration number input by the user is not queried, a third-party credit investigation website is queried according to the user name input by the user and a user address, and if the credible information returned by the third-party credit investigation website is that the user with the name of the user exists in the user address input by the user, the user can be determined to pass the authenticity verification.
In a specific implementation, steps 301 to 303 may be executed in parallel with step 201, or may be executed sequentially, which is not limited in this embodiment.
Further, after step 303, the method may further include:
Step 304, inquiring in a third-party credit investigation website according to the user name and the user address input by the user, and obtaining the state information of the user.
The status information of the user may be business status information of the user and/or sale prohibition status.
In this embodiment, by obtaining the state information of the user, the user with an abnormal business state can be prevented from entering the e-commerce platform, and the loss caused by the user with an abnormal business state entering the e-commerce platform is avoided.
Fig. 4 is a flowchart of a further embodiment of the method for verifying the authenticity of the user according to the present application, as shown in fig. 4, in the embodiment shown in fig. 1 of the present application, after step 101, the method may further include:
Step 401, removing the invalid fields in the user name and the registration number input by the user.
Thus, step 102 may be:
step 402, inquiring in the registered website according to the user name without the invalid field, and obtaining the registration name and the registration number returned by the registered website.
that is, after the user name and the registration number input by the user are acquired, the user name and the registration number input by the user may be cleaned to remove invalid fields, for example: signs such as "+" and/or space, and then inquiring in the registered website according to the user name without the invalid field.
Fig. 5 is a flowchart of a further embodiment of the method for verifying user authenticity according to the present application, and as shown in fig. 5, the method for verifying user authenticity may include:
Step 501, obtaining a user name and a registration number input by a user.
Step 502, inquiring in the registration website according to the user name, and obtaining the registration name and the registration number returned by the registration website.
step 503, comparing the user name input by the user with the registration name returned by the registration website, and comparing the registration number input by the user with the registration number returned by the registration website.
Then, if a registration name matching the user name input by the user exists in the registration names returned by the registration website, and a registration number matching the registration number input by the user exists in the registration numbers returned by the registration website, that is, the matching is successful, then step 504 is executed;
if there is no registration name matching the user name input by the user in the registration names returned by the registration website, or there is no registration number matching the registration number input by the user in the registration numbers returned by the registration website, that is, the matching is unsuccessful, then step 508 is executed.
step 504, determining that the authenticity of the user is verified.
Step 505, if the registration number matched with the registration number input by the user returned by the registration website is unique, acquiring the first state information of the user from the registration website according to the unique registration number, and inquiring in the third-party credit investigation website according to the unique registration number to acquire the second state information of the user returned by the third-party credit investigation website.
step 506, comparing the first state information with the second state information.
And step 507, acquiring the state information of the user according to the comparison result.
Specifically, after comparing the first status information with the second status information, the status information of the user may be obtained with high logic, for example, if the first status information is that the business status of the merchant is normal, and the second status information is that the business status of the merchant is not normal, the business status of the merchant is determined to be not normal.
Step 508, obtaining the user address input by the user.
Step 509, querying in the third-party credit investigation website according to the user name and the user address input by the user, and obtaining the trusted information returned by the third-party credit investigation website.
And 510, when the credible information is positive information, determining that the authenticity of the user is verified.
Step 511, inquiring in a third party credit investigation website according to the user name and the user address input by the user, and obtaining the state information of the user.
In this embodiment, after the user name and the registration number input by the user are acquired, if the user name matching the user name input by the user is inquired in the registration website and the registration number matching the registration number input by the user is inquired, the authenticity of the user is determined to pass the verification by using the information inquired by the registration website, and if the user name matching the user name input by the user or the registration number matching the registration number input by the user is not inquired in the registration website, the inquiry is performed in the third-party credit investigation website according to the user name and the user address input by the user and the authenticity of the user is verified according to the information returned by the third-party credit investigation website, so that the coverage rate of the authenticity verification of the user can be improved.
And when the user name matched with the user name input by the user is inquired in the registration website and the registration number matched with the registration number input by the user is inquired, the state information of the user is acquired from the registration website and the third-party credit investigation website, and then the state information acquired from the registration website and the third-party credit investigation website is compared, so that the state information of the user is acquired at high logic, the accuracy of the acquired state information of the user can be improved, the user with an abnormal business state can be prevented from entering an e-commerce platform, and the loss caused by the user with an abnormal business state entering the e-commerce platform is avoided.
fig. 6 is a schematic structural diagram of an embodiment of an apparatus for verifying user authenticity according to the present application, where the apparatus for verifying user authenticity in the present embodiment may be used as an electronic device, or a part of an electronic device, to implement the method for verifying user authenticity according to the present application. As shown in fig. 6, the apparatus for verifying the authenticity of the user may include: the system comprises an acquisition module 61, a query module 62, a comparison module 63 and a verification module 64;
The acquiring module 61 is configured to acquire a user name and a registration number input by a user; specifically, the user may be a merchant applying for entering the e-commerce platform, and thus, the user name and the registration number input by the user may be the merchant name and the registration number input by the merchant.
the query module 62 is configured to query the registered website according to the user name obtained by the obtaining module 61, and obtain a registration name and a registration number returned by the registered website; the registration websites can include a first registration website and a second registration website;
the registration name returned by the registration website may include a registration name returned by the first registration website and/or a registration name returned by the second registration website;
The registration number returned by the registration website comprises a registration number returned by a first registration website and/or a registration number returned by a second registration website;
the registration name returned by the registration website may include an english name and a chinese name.
Taking the first registration website as a commercial registration website and the second registration website as a commercial registration website as an example, the registration name returned by the registration website may include one or a combination of the following: the registration name (br _ name _ en and/or br _ name _ cn) returned by the commercial registration website, and the registration name (cr _ name _ en and/or cr _ name _ cn) returned by the industrial and commercial registration website; the registration number returned by the registration website may include one or a combination of the following: the registration number (br _ number) returned by the business registration website, and the registration number (cr _ number) returned by the industry and commerce registration website.
A comparison module 63, configured to compare the user name input by the user with the registration name returned by the registration website, and compare the registration number input by the user with the registration number returned by the registration website; specifically, when the comparing module 63 compares the user name input by the user with the registration name returned by the registration website, the user name input by the user and the registration name returned by the registration website may be standardized to make the format of the user name input by the user consistent with the format of the registration name returned by the registration website;
Similarly, when the comparing module 63 compares the registration number input by the user with the registration number returned from the registration website, the registration number input by the user and the registration number returned from the registration website may be standardized to match the format of the registration number input by the user and the format of the registration number returned from the registration website.
and the verification module 64 is used for verifying the authenticity of the user according to the comparison result of the comparison module 63.
In the verification device for user authenticity, after the obtaining module 61 obtains the user name and the registration number input by the user, the query module 62 queries in the registration website according to the user name to obtain the registration name and the registration number returned by the registration website, the comparison module 63 compares the user name input by the user with the registration name returned by the registration website and compares the registration number input by the user with the registration number returned by the registration website, and finally the verification module 64 verifies the authenticity of the user according to the comparison result, thereby realizing the verification of the authenticity of the user through the information returned by the registration website and the third-party credit investigation website, improving the coverage rate of the user, and optimizing the effect of verifying the authenticity of the user.
Fig. 7 is a schematic structural diagram of another embodiment of the apparatus for verifying user authenticity according to the present application, in an implementation manner of this embodiment, the verification module 64 is specifically configured to determine that the authenticity of the user passes the verification when a registration name matching the user name input by the user exists in the registration names returned by the registration website, and a registration number matching the registration number input by the user exists in the registration numbers returned by the registration website.
Further, the query module 62 is further configured to, after the verification module 64 determines that the authenticity of the user passes the verification, when the registration number returned by the registration website and matching with the registration number input by the user is unique, obtain first state information of the user from the registration website according to the unique registration number, and perform a query in a third-party credit investigation website according to the unique registration number to obtain second state information of the user returned by the third-party credit investigation website;
Taking the user as an example of a merchant applying for entering the e-commerce platform, the first state information may include business state information and/or sale prohibition state and the like of the merchant acquired from the registration website; the second state information may include business state information and/or sale prohibition state and the like of the merchant returned by the third-party credit investigation website.
The third-party credit investigation website may be a D & B website, or may be another credit investigation website, which is not limited in this embodiment.
A comparing module 63, configured to compare the first state information with the second state information;
The obtaining module 61 is further configured to obtain the status information of the user according to the comparison result of the comparing module 63.
specifically, after the comparing module 63 compares the first status information with the second status information, the obtaining module 61 may obtain the status information of the user with high logic, for example, if the first status information is that the business status of the merchant is normal, and the second status information is that the business status of the merchant is not normal, the obtaining module 61 determines that the business status of the merchant is not normal.
In this embodiment, the obtaining module 61 can avoid the user with abnormal business state entering the e-commerce platform by obtaining the state information of the user, and avoid the loss caused by the user with abnormal business state entering the e-commerce platform.
in another implementation manner of this embodiment, the obtaining module 61 is further configured to obtain the user address input by the user when a registration name matching the user name input by the user does not exist in the registration names returned by the registration website, or a registration number matching the registration number input by the user does not exist in the registration numbers returned by the registration website;
The query module 62 is further configured to query in a third-party credit investigation website according to the user name and the user address input by the user, so as to obtain trusted information returned by the third-party credit investigation website;
The verification module 64 is further configured to determine that the authenticity of the user is verified when the trusted information obtained by the query module 62 is positive information; the positive information includes a user whose name is the user name input by the user, which is present in the user address input by the user.
That is, if the query module 62 does not query the registered website with the user name matching the user name input by the user or does not query the registered number matching the registered number input by the user, the query module 62 queries the third-party credit investigation website according to the user name and the user address input by the user, and if the trusted information returned by the third-party credit investigation website is that the user with the name of the user exists in the user address input by the user, the verification module 64 may determine that the user passes the authenticity verification.
Further, the query module 62 is further configured to, after the verification module 64 determines that the authenticity of the user is verified, query in a third-party credit investigation website according to the user name and the user address input by the user, so as to obtain the status information of the user.
The status information of the user may be business status information of the user and/or sale prohibition status.
in this embodiment, the query module 62 can avoid the user with abnormal business state entering the e-commerce platform by obtaining the state information of the user, and avoid the loss caused by the user with abnormal business state entering the e-commerce platform.
Further, the apparatus for verifying the authenticity of the user may further include: a cleaning module 65;
A cleaning module 65, configured to remove invalid fields in the user name and the registration number input by the user after the obtaining module 61 obtains the user name and the registration number input by the user;
The query module 62 is specifically configured to query the registered website according to the user name without the invalid field.
that is, after the obtaining module 61 obtains the user name and the registration number input by the user, the cleaning module 65 may clean the user name and the registration number input by the user to remove invalid fields, for example: the symbol such as "+" and/or space, and then the query module 62 queries the registered website according to the user name without the invalid field.
FIG. 8 is a schematic structural diagram of an embodiment of an electronic device according to the present application, as shown in FIG. 8, the electronic device may include at least one processor; and at least one memory communicatively coupled to the processor, wherein: the memory stores program instructions executable by the processor, and the processor calls the program instructions to execute the method for verifying the authenticity of the user provided by the embodiment of the application.
Wherein, above-mentioned electronic equipment can be for equipment such as smart mobile phone, smart watch or panel computer, also can be for the server, for example: the cloud server, in this embodiment, does not limit the form of the electronic device.
FIG. 8 illustrates a block diagram of an exemplary electronic device suitable for use in implementing embodiments of the present application. The electronic device shown in fig. 8 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 8, the electronic device is in the form of a general purpose computing device. Components of the electronic device may include, but are not limited to: one or more processors 410, a memory 430, and a communication bus 440 that connects the various system components (including the memory 430 and the processing unit 410).
communication bus 440 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. These architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus, to name a few.
Electronic devices typically include a variety of computer system readable media. Such media may be any available media that is accessible by the electronic device and includes both volatile and nonvolatile media, removable and non-removable media.
Memory 430 may include computer system readable media in the form of volatile Memory, such as Random Access Memory (RAM) and/or cache Memory. The electronic device may further include other removable/non-removable, volatile/nonvolatile computer system storage media. Although not shown in FIG. 8, a disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a Compact disk Read Only Memory (CD-ROM), a Digital versatile disk Read Only Memory (DVD-ROM), or other optical media) may be provided. In these cases, each drive may be connected to the communication bus 440 by one or more data media interfaces. Memory 430 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the application.
a program/utility having a set (at least one) of program modules, including but not limited to an operating system, one or more application programs, other program modules, and program data, may be stored in memory 430, each of which examples or some combination may include an implementation of a network environment. The program modules generally perform the functions and/or methodologies of the embodiments described herein.
the electronic device may also communicate with one or more external devices (e.g., keyboard, pointing device, display, etc.), one or more devices that enable a user to interact with the electronic device, and/or any devices (e.g., network card, modem, etc.) that enable the electronic device to communicate with one or more other computing devices. Such communication may occur via communication interface 420. Furthermore, the electronic device may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public Network such as the Internet) via a Network adapter (not shown in FIG. 8) that may communicate with other modules of the electronic device via the communication bus 440. It should be appreciated that although not shown in FIG. 8, other hardware and/or software modules may be used in conjunction with the electronic device, including but not limited to: microcode, device drivers, Redundant processing units, external disk drive Arrays, disk array (RAID) systems, tape Drives, and data backup storage systems, among others.
The processor 410 executes various functional applications and data processing by executing programs stored in the memory 430, for example, to implement the user authenticity verification method provided by the embodiment of the present application.
the embodiment of the present application further provides a non-transitory computer-readable storage medium, which stores computer instructions, where the computer instructions cause the computer to execute the method for verifying user authenticity provided by the embodiment of the present application.
The non-transitory computer readable storage medium described above may take any combination of one or more computer readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read Only Memory (ROM), an Erasable Programmable Read Only Memory (EPROM), a flash Memory, an optical fiber, a portable compact disc Read Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of Network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
in the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
It should be noted that the terminal according to the embodiments of the present application may include, but is not limited to, a Personal Computer (Personal Computer; hereinafter, referred to as PC), a Personal Digital Assistant (Personal Digital Assistant; hereinafter, referred to as PDA), a wireless handheld device, a Tablet Computer (Tablet Computer), a mobile phone, an MP3 player, an MP4 player, and the like.
in the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) or a Processor (Processor) to execute some steps of the methods according to the embodiments of the present application. And the aforementioned storage medium includes: a U disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
the above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.