Disclosure of Invention
In order to solve the above problems or at least partially solve the above technical problems, in one embodiment of the present application, a method for authenticating an electronic cigarette by an electronic cigarette vending apparatus is provided. The method for verifying the electronic cigarette by the electronic cigarette selling equipment comprises the following steps:
establishing communication connection with the electronic cigarette;
responding to a data input event triggered by a user through an interactive interface, and acquiring identity data input by the user in the data input event;
the identity data are sent to a server, so that the server can verify the identity of the electronic cigarette user based on the identity data;
acquiring an activation code under the condition that the identity data passes verification;
sending the activation code to the electronic cigarette to activate the electronic cigarette.
Another embodiment of the present application provides an electronic cigarette vending apparatus, including:
the near field communication module is used for establishing communication connection with the electronic cigarette;
the data acquisition device is used for acquiring the identity data input by the user;
the remote communication module is used for sending the identity data to a server so that the server can verify the identity of the electronic cigarette user based on the identity data;
the remote communication module is used for acquiring an activation code under the condition that the identity data passes the verification, and the close-range communication module is used for sending the activation code to the electronic cigarette so as to activate the electronic cigarette.
In another embodiment of the present application, there is provided an electronic cigarette authentication method, including:
establishing communication connection with electronic cigarette vending equipment;
sending an electronic cigarette activation request through the electronic cigarette selling equipment so that the electronic cigarette selling equipment can send the identity data of the electronic cigarette user to a server, and authenticating the electronic cigarette user by the server based on the identity authentication data;
receiving an activation code sent by electronic cigarette selling equipment under the condition that an electronic cigarette user passes identity authentication;
checking the activation code;
and executing an unlocking action under the condition that the activation code passes the verification.
Another embodiment of the present application provides an electronic cigarette chip, including:
the electronic cigarette selling equipment comprises an electronic cigarette communication module, a control module and a control module, wherein the electronic cigarette communication module is used for being in communication connection with the electronic cigarette selling equipment;
and the electronic cigarette checking module is used for checking the activation code received by the communication module from the electronic cigarette selling equipment and executing an unlocking action under the condition that the activation code passes the checking.
Establishing communication connection with electronic cigarette vending equipment;
sending an electronic cigarette activation request through the electronic cigarette selling equipment so that the electronic cigarette selling equipment can send the identity data of the electronic cigarette user to a server, and authenticating the electronic cigarette user by the server based on the identity authentication data;
receiving an activation code sent by electronic cigarette selling equipment under the condition that an electronic cigarette user passes identity authentication;
checking the activation code;
and executing an unlocking action under the condition that the activation code passes the verification.
The embodiment of this application still provides an electron cigarette, including the electron cigarette chip, the electron cigarette chip includes:
the electronic cigarette selling equipment comprises an electronic cigarette communication module, a control module and a control module, wherein the electronic cigarette communication module is used for being in communication connection with the electronic cigarette selling equipment;
and the electronic cigarette checking module is used for checking the activation code received by the communication module from the electronic cigarette selling equipment and executing an unlocking action under the condition that the activation code passes the checking.
Establishing communication connection with electronic cigarette vending equipment;
sending an electronic cigarette activation request through the electronic cigarette selling equipment so that the electronic cigarette selling equipment can send the identity data of the electronic cigarette user to a server, and authenticating the electronic cigarette user by the server based on the identity authentication data;
receiving an activation code sent by electronic cigarette selling equipment under the condition that an electronic cigarette user passes identity authentication;
checking the activation code;
and executing an unlocking action under the condition that the activation code passes the verification.
Embodiments of the present application also provide a computer-readable storage medium storing a computer program, where the computer program stored in the computer-readable storage medium can implement the steps of any one of the above methods when executed by a processor.
Embodiments of the present application also provide a computing device, comprising: a memory and a processor, wherein,
the memory is used for storing programs;
the processor, coupled to the memory, is configured to execute the program stored in the memory, so as to implement the steps of any of the above methods.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments obtained by a person of ordinary skill in the art without any inventive work based on the embodiments in the present application shall fall within the scope of protection of the present application.
It is to be understood that the terminology used in the description of the embodiments herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, and "a" and "an" generally include at least two, but do not exclude at least one, unless the context clearly dictates otherwise.
It should be understood that although the terms first, second, third, etc. may be used in the embodiments of the present application to describe certain components, these components should not be limited by these terms. These terms are only used to distinguish one component from another. For example, a first certain component may also be referred to as a second certain component, and similarly, a second certain component may also be referred to as a first certain component, without departing from the scope of the embodiments of the present application.
It is also noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a good or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such good or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a commodity or system that includes the element.
In the various embodiments described above, while, for purposes of simplicity of explanation, the methodologies are shown and described as a series of acts, it is to be understood and appreciated by those of ordinary skill in the art that the methodologies are not limited by the order of acts, as some acts may, in accordance with one or more embodiments, occur in different orders and/or concurrently with other acts from that shown and described herein or not shown and described herein, as may be understood by those of ordinary skill in the art.
Those of skill would further appreciate that the various illustrative logical blocks, modules, units, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, units, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The inventors of the present application found that: as a substitute of nicotine substances, the electronic cigarette has certain addiction. The purchasable age of the e-cigarette is therefore limited to adults in various countries. However, the applicant of the present application has found that no feasible authentication solution for the purchaser of the electronic cigarette is involved in the prior art, and that the electronic cigarette can still be easily bought by minors.
The inventor of the application thinks that the purchasing channel, purchasing path and use scene of the electronic cigarette can be physically traced by means of technical means. So as to realize real-name supervision on the purchase and use of the electronic cigarette.
In view of this, embodiments of the present application provide an electronic cigarette selling device, an electronic cigarette verifying method, an electronic cigarette chip, an electronic cigarette, and a computer-readable storage medium.
Wherein, an electron cigarette vending machine, as shown with reference to fig. 1, includes:
the near field communication module is used for establishing communication connection with the electronic cigarette;
the data acquisition device is used for acquiring the identity data input by the user;
the remote communication module is used for sending the identity data to a server so that the server can verify the identity of the electronic cigarette user based on the identity data;
the remote communication module is used for acquiring an activation code under the condition that the identity data passes the verification, and the close-range communication module is used for sending the activation code to the electronic cigarette so as to activate the electronic cigarette.
In contrast, the present application embodiment also provides an electronic cigarette chip, also shown in fig. 1, including:
the electronic cigarette selling equipment comprises an electronic cigarette communication module, a control module and a control module, wherein the electronic cigarette communication module is used for being in communication connection with the electronic cigarette selling equipment;
and the electronic cigarette checking module is used for checking the activation code received by the communication module from the electronic cigarette selling equipment and executing an unlocking action under the condition that the activation code passes the checking.
The embodiment of the application also provides an electronic cigarette, which is also shown in fig. 1 and comprises the electronic cigarette chip. In addition, the electronic cigarette can also comprise an electronic cigarette working module connected with the electronic cigarette chip. When the electronic cigarette chip executes the unlocking action, the electronic cigarette working module can start working so as to heat the electronic cigarette cartridge.
The embodiment of the present application further provides an electronic cigarette selling device verification method, shown in fig. 2, including:
establishing communication connection with the electronic cigarette;
responding to a data input event triggered by a user through an interactive interface, and acquiring identity data input by the user in the data input event;
sending the identity data to a server so that the server can verify the identity of the electronic cigarette user based on the identity data;
acquiring an activation code under the condition that the identity data passes verification;
sending the activation code to the electronic cigarette to activate the electronic cigarette.
And, a corresponding electronic cigarette verification method, also shown in fig. 2, can be applied to the electronic cigarette chip described above, including:
establishing communication connection with electronic cigarette vending equipment;
sending an electronic cigarette activation request through the electronic cigarette selling equipment so that the electronic cigarette selling equipment can send the identity data of the electronic cigarette user to a server, and authenticating the electronic cigarette user by the server based on the identity authentication data;
receiving an activation code sent by electronic cigarette selling equipment under the condition that an electronic cigarette user passes identity authentication;
checking the activation code;
and executing an unlocking action under the condition that the activation code passes the verification.
For the embodiment of the application, the identification data may include at least age information of the user, and in the process of verifying the identity of the user of the electronic cigarette according to the identification data, the condition that the verification is passed should include at least an age greater than or equal to a legal adult age of a selling place of the electronic cigarette, or an age of a legal purchasable nicotine-based product. Still further, the identity data referred to in embodiments of the present application may include both the user's certificate number and biometric data. The use of dual authentication of both data may further improve security.
Besides, the method may further include the following steps: and sending the information of the electronic cigarette to a server, and receiving an activation code generated and sent by the server aiming at the information of the electronic cigarette. The electronic cigarette information referred to in the embodiments of the present application may include an ID, a batch, and the like of the electronic cigarette.
The activation code generated and sent by adopting the information aiming at the electronic cigarette has higher safety.
In the embodiment of the application, the remote communication module may be a wired network card accessing the internet, or a wireless network module based on technologies such as mobile data communication network, WIFI, bluetooth, NB-IOT/LoRa, and the like. The close-range communication module corresponds to the remote communication module and is responsible for communicating with the communication module of the electronic cigarette. In the present application, the near field communication module refers to a broad term "near field" communication, and not to a "near field communication module", that is, the "near field" communication module referred to in the present application is named mainly for the distinction from a "remote" communication module in charge of communication with a server. The communication principles may or may not be identical to the telecommunications module. The remote communication module and the near communication module belong to the same computer system architecture, and can be directly connected with each other in a communication way. Specifically, the near field communication module of the present application may be a bluetooth module, an NFC module, a WIFI module, a limited interface, or the like. The bluetooth module which can be used for both convenience and endurance is generally preferred.
That is to say, in the embodiment of this application, the electron cigarette can be connected with electron cigarette selling equipment through bluetooth low energy, or wired interface mode etc.. For example, when the e-cigarette is disposed within an e-cigarette vending apparatus, it may be placed on a base provided with a wired interface, thereby enabling a wired connection.
The e-cigarette may verify that the user's identity meets the requirements for using the e-cigarette before and after being purchased. Next, the technical solutions of the embodiments of the present application will be described with reference to practical application scenarios. First, we take the example of verifying the identity of a user before purchasing, and give an application scenario:
scene one
The close range communication module of the electronic cigarette selling equipment is a wired interface.
The electronic cigarette is set up in the electronic cigarette vending machine to sell the equipment with the electronic cigarette through this wired interface and be connected.
And, the data acquisition device that the equipment was sold to the electron cigarette can include: identification card identifiers, biometric identifiers such as cameras, fingerprint identification components, and the like.
After the user selects the electronic cigarette to be purchased before the electronic cigarette selling device or shows the purchasing intention in other ways, the electronic cigarette selling device gives a prompt to acquire and verify the identity data of the user.
The user follows the suggestion operation, can brush the ID card on ID card recognizer, verifies self identity data. When the identification data includes biometric data, such as fingerprint, palm print, iris, etc., the user may further perform facial recognition, fingerprint recognition, etc. verification by a biometric acquirer, such as a camera, a fingerprint recognition component, a palm print recognition component, etc., provided on the electronic cigarette vending apparatus.
Electronic cigarette selling equipment sends identity data to the server through the remote communication module after obtaining user's identity data through the data acquisition device, supplies the server to verify. And the server returns the activation code after completing the identity verification, and the returned activation code can be generated according to the information of the electronic cigarette. If the verification fails, the activation code is not returned.
At this point, the electronic cigarette vending apparatus may prompt the user for payment. After confirming receipt of payment by the user. Electronic cigarette selling equipment sends the activation code to the electronic cigarette through near field communication equipment, that is to say, this activation code passes through the electronic cigarette selling equipment and sends the check-up module for the electronic cigarette. When the verification module passes the verification of the activation code, the control chip of the electronic cigarette executes the unlocking action, so that the electronic cigarette working module can normally work, and the electronic cigarette is activated.
Then, the electronic cigarette selling equipment discharges the electronic cigarette purchased by the user, and the transaction is completed.
If the server fails to verify the identity data, the activation code will not be returned. If an illegal user tries to break the verification and returns an incorrect activation code, the verification of the electronic cigarette verification module cannot pass, and the electronic cigarette working module cannot work. The reason why the verification of the identity data fails may include: the age of the user has not reached the legal age, the biometric data of the user has not matched, and the like.
Through set up identification on the equipment is sold to the electron cigarette, can just filter user's in the link of purchasing, can prevent more effectively that the minors from purchasing the electron cigarette.
Taking the authentication of the user after purchase as an example, the application also provides an application scenario:
scene two
In this example, the near field communication module of the e-cigarette vending device is a bluetooth module.
The user can take out the purchased electronic cigarette after paying. Of course, the user may obtain the purchased electronic cigarette through other channels.
The user sells equipment's interactive interface through the operation electron cigarette, sells equipment communication connection with the electron cigarette to propose the request of activation electron cigarette. The electronic cigarette selling equipment gives a prompt and requires to collect and verify the identity data of a user.
Similarly, the user can brush the identity card on the identity card recognizer and verify the identity data of the user along with the prompt operation. When the identification data comprises biological characteristic data such as fingerprints, palm prints, irises and the like, the user can further perform facial recognition, fingerprint recognition and the like through a camera, a fingerprint recognition element, a palm print recognition element and the like arranged on the electronic cigarette selling device.
Through the identity data that electronic cigarette selling equipment sent, the server backstage carries out identity data comparison and verification to after the verification succeeds, return an activation code to this electronic cigarette selling equipment. Electron cigarette selling equipment utilizes the communication connection with the electron cigarette, transmits the activation code for the electron cigarette to supply the check-up of electron cigarette check module. And after the verification is successful, the working module of the electronic cigarette can work.
It is worth mentioning that an interactive element can be arranged on the electronic cigarette, so that the electronic cigarette can acquire the identity data of the user through the electronic cigarette without the help of the electronic cigarette selling equipment.
Thus, optionally, the method may further comprise:
responding to a data input event triggered by a user on an interactive element of the electronic cigarette, and acquiring identity data input by the user;
sell the communication link of equipment establishment through with the electron cigarette and send identity data to electron cigarette and sell equipment to sell equipment by the electron cigarette and verify identity data.
Wherein, the interactive element can be also: fingerprint recognition elements, microphones, cameras, etc. Accordingly, the identity data may also include: user fingerprint, user voice, user head portrait, etc. And will not be described in detail.
It is worth noting that in the prior art, electronic cigarettes often include a tobacco rod and a cartridge. These two parts may be purchased separately. In the foregoing, no distinction is made between a tobacco rod and a cartridge, only the "electronic cigarette" or "electronic cigarette chip" is mentioned in general terms. It will be appreciated by those skilled in the art that the above techniques are applicable whether the rod or cartridge is purchased for use, or the entire electronic cigarette is purchased for use. That is, the tobacco rod chip and the tobacco cartridge chip can be respectively arranged on the tobacco rod and the tobacco cartridge of the electronic cigarette. And the anti-counterfeiting and identity authentication can be respectively carried out on the cigarette rod and the cigarette cartridge of the electronic cigarette.
However, the cost of providing a battery, a data interface, or a wireless chip on the cartridge is high. Accordingly, the inventors of the present application believe that the cartridge may be considered to be configured to be verified through the tobacco rod.
That is, each new cartridge is mounted on the tobacco rod, and the authentication process can be implemented by the communication between the tobacco rod and the server.
Furthermore, optionally, the cartridge may be authenticated only with the tobacco rod by way of local authentication. Referring specifically to fig. 3, optionally, the executing of the unlocking action by the foregoing method may further include:
unlocking a tobacco rod of the electronic cigarette;
and, the aforementioned method may further comprise:
the tobacco rod sends an agreement password to a tobacco cartridge connected with the tobacco rod in the electronic cigarette;
when the smoke cartridge judgment agreement password meets the first requirement, the smoke rod receives the dynamic password sent by the smoke cartridge;
when the cigarette rod judges that the dynamic password meets the second requirement, the cigarette rod sends out a driving signal to enable the electronic cigarette to enter a working state.
Wherein, the agreed password is a password preset before the cigarette rod and the cigarette cartridge leave the factory. It can be generated from a dynamic one of the crypto intervals, thus preventing hacking. The password interval in the tobacco rod chip can be updated through the connection with the server. Therefore, when a new batch of smoke cartridges are on the market, the updated cigarette rod chip can realize the two-way password authentication of the batch of smoke cartridges, and further has better safety.
It is worth mentioning that data can be written in the cartridge chip after the first pass of the verification, and the cartridge and the tobacco rod can be bound. In this way, the same cartridge can be prevented from abusing other rods after being refilled, further increasing safety. As a fit, optionally, the method may further comprise the steps of:
counting the suction times of a user and sending a counting writing signal to the smoke cartridge chip;
and stopping heating the cigarette cartridge in response to a stop signal fed back by the cigarette cartridge chip according to the counting result.
Through count the user's absorption number of times in the cigarette bullet chip, can make clear of the use progress of cigarette bullet. Furthermore, when the count exceeds a preset threshold value, the smoke bomb can be locked, so that the situation that an illegal user refills the smoke bomb and potential safety hazards caused by recycling of smoke bomb chips are avoided.
Further, optionally, if the dynamic password meets the second requirement, the electronic cigarette enters a workable state until the cartridge is taken out. Therefore, the cigarette bullet is not required to be repeatedly verified on the premise that the cigarette bullet is not taken out, the verification cost is saved, and the convenience is improved. And because the verification frequency is reduced, the battery of the tobacco rod can be saved, and the endurance time is prolonged.
Optionally, if the agreed password does not meet the first requirement or the dynamic password does not meet the second requirement, counting the number of times that the agreed password does not meet the requirement. Further optionally, if the counted number of times which do not meet the requirement is greater than or equal to the preset failure number of times, sending a locking signal to a chip of the cartridge to lock the cartridge; alternatively, the first and second electrodes may be,
and if the interval time of two adjacent unqualified events is less than or equal to the preset failure time, sending a locking signal to a chip of the cartridge to lock the cartridge.
For the chips of the smoke cartridge and the smoke rod, an illegal user may try to crack the activation code, the protocol password and the dynamic password by adopting a brute force cracking method. When cracking by brute force, the chip usually tries to input a large amount of random numbers in a short time, and records the cracked numbers as corresponding cracking passwords.
In the application, the smoke cartridge can be locked by the user who takes the cracking action in a targeted manner by counting the times and the frequency which do not meet the requirements. Once the smoke cartridge is locked, the smoke cartridge does not respond to any input signal any more, so that the cracking behavior of an illegal user can be effectively prevented.
At present, intelligent terminals mainly based on mobile phones have become indispensable extension organs for modern people due to extremely high popularity and good tool properties. The implementation of this application still provides and can be with the help of intelligent terminal, and supplementary electron cigarette selling equipment verifies the user identity.
Accordingly, the data input event may further include the steps of:
establishing communication connection with an intelligent terminal of a user;
and acquiring the identity data of the user from the intelligent terminal.
Next, another application scenario will be given based on the above scheme:
scene three
After the user pays, the purchased electronic cigarette is taken out from the electronic cigarette vending apparatus. Of course, the user may obtain the purchased electronic cigarette through other channels.
The user sells equipment's interactive interface through the operation electron cigarette, sells equipment communication connection with the electron cigarette to propose the request of activation electron cigarette. The electronic cigarette selling equipment gives a prompt and requires to collect and verify the identity data of a user.
The user follows the suggestion operation, sells equipment communication connection with the intelligent terminal that oneself held and electron cigarette, then inputs identity data through the interactive interface on the intelligent terminal. For example, the user can input the identification number through a touch screen or a keyboard, take a picture of the face, or collect a fingerprint, etc.
After the intelligent terminal acquires the identity data, the electronic cigarette selling equipment serves as a bridge and is transmitted to the server. The server compares and verifies the identity data in the background, and returns an activation code to the electronic cigarette selling device after the verification is successful. Electron cigarette selling equipment utilizes the communication connection with the electron cigarette, transmits the activation code for the electron cigarette to supply the check-up of electron cigarette check module. And after the verification is successful, the working module of the electronic cigarette can work.
When carrying out authentication through intelligent terminal, need not to set up repeatedly the identification element of ID card recognizer, biological characteristic acquisition ware class on the equipment is sold to the electron cigarette, can show the manufacturing cost who reduces the equipment is sold to the electron cigarette.
It is particularly worth mentioning that when the electronic cigarette selling device communicates through the intelligent terminal, the electronic cigarette selling device can not only obtain the identity data by means of elements such as a camera on the intelligent terminal, but also optionally obtain the identity data stored in the associated application program directly through the intelligent terminal.
That is, the aforementioned data input event may further include the steps of:
establishing communication connection with an intelligent terminal of a user;
and acquiring the identity data of the user from the associated application program in the intelligent terminal.
The related application referred to in the present application generally refers to an application that has acquired and acquired user identity data for reasons of payment, security, and the like. In the prior art, there are some "national level" applications where the amount of equipment is large, such as pay-Bao, WeChat, and so on. These applications often already identify and verify the user's identity data in order to provide secure payment functionality. Therefore, when the electronic cigarette needs to verify the identity of the user, the electronic cigarette can directly make a request to the public API interfaces of the application programs, and obtain the identity data of the user through the authorization of the application programs.
The security of the user identity data is better guaranteed and the verification resources are saved by utilizing the associated application program to carry out identity verification.
Yet another embodiment of the present application further provides a computing device, as shown in fig. 4, including: a memory 51 and a processor 52, wherein,
a memory 51 for storing a program;
a processor 52 coupled to the memory 51 for executing the program stored in the memory 51 for:
establishing communication connection with the electronic cigarette;
responding to a data input event triggered by a user through an interactive interface, and acquiring identity data input by the user in the data input event;
the identity data are sent to a server, so that the server can verify the identity of the electronic cigarette user based on the identity data;
acquiring an activation code under the condition that the identity data passes verification;
sending the activation code to the electronic cigarette to activate the electronic cigarette.
Yet another embodiment of the present application also provides a computing device comprising: a memory 51 and a processor 52, wherein,
a memory 51 for storing a program;
a processor 52 coupled to the memory 51 for executing the program stored in the memory 51 for:
establishing communication connection with electronic cigarette vending equipment;
sending an electronic cigarette activation request through the electronic cigarette selling equipment so that the electronic cigarette selling equipment can send the identity data of the electronic cigarette user to a server, and authenticating the electronic cigarette user by the server based on the identity authentication data;
receiving an activation code sent by electronic cigarette selling equipment under the condition that an electronic cigarette user passes identity authentication;
checking the activation code;
and executing an unlocking action under the condition that the activation code passes the verification.
The memory 51 described above may be configured to store other various data to support operations on the computing device. Examples of such data include instructions for any application or method operating on a computing device. The memory 51 may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The processor 52 may also implement other functions besides the above functions when executing the program in the memory 51, and refer to the descriptions of the foregoing embodiments specifically.
Further, as shown in fig. 4, the computing device may further include: communication components 43, display 44, power components 45, audio components 46, and the like. Only some of the components are schematically shown in fig. 4, and the computing device is not meant to include only the components shown in fig. 4.
Accordingly, another embodiment of the present application further provides a computer-readable storage medium, which stores a computer program, and the computer program stored in the computer-readable storage medium can implement the steps or functions of the foregoing methods when being executed by a processor.
To sum up, the embodiment of this application can provide better anti-fake verification function to prevent illegal user from purchasing and using the electron cigarette through verifying user's identity, but also have good convenience.
Finally, it should be noted that those skilled in the art will appreciate that embodiments of the present application present many technical details for the purpose of enabling the reader to better understand the present application. However, the technical solutions claimed in the claims of the present application can be basically implemented without these technical details and various changes and modifications based on the above-described embodiments. Accordingly, in actual practice, various changes in form and detail may be made to the above-described embodiments without departing from the spirit and scope of the present application.