Data security control system and method based on block chain
Technical Field
The invention relates to the technical field of data security management, in particular to a data security control system and method based on a block chain.
Background
The blockchain is to form a chain by one block, a certain amount of information is stored between each block, the blocks are connected into a chain, the chain existing between the blocks is stored in the whole server, so long as one server can work in the whole system, the whole blockchain is safe, the hash value of each block in one blockchain is related to the hash value of the previous case, namely the hash value of the previous block is the leading hash value of the current block, and the mode ensures the order, the safety and the integrity of each block in all regional chains.
When a user stores and transmits data, the platform needs to guarantee the safety of the data, but the data types of different data are different, if only a higher safety strategy is uniformly adopted for the safety, the expenditure cost of the platform in safety is greatly increased, and if a lower safety strategy is uniformly used for the safety protection for the data for saving cost, the problem of the safety of the data is caused.
Disclosure of Invention
The present invention is directed to a data security control system and method based on blockchain to solve the above-mentioned problems in the background art.
In order to solve the technical problems, the invention provides the following technical scheme: a data security control method based on a block chain comprises the following steps:
step S100: acquiring the attacked historical data information in the block chain, and extracting the information type and the information content corresponding to the historical data information; randomly selecting a plurality of words from each information content as characteristic attribute words; selecting a characteristic attribute word from information content with the same data type, and calculating the prior probability of the corresponding characteristic attribute word in each information type based on the characteristic attribute word;
step S200: calculating a type occupation ratio corresponding to the data types based on the information content quantity corresponding to each data type, and recording the corresponding data type as a vulnerable data type when the type occupation ratio is larger than a type occupation ratio threshold; acquiring user data information input by a user on a platform; recording the time of inputting information by a user on a platform as the current time period; calculating the probability of the information type between each information type and the user data information based on the prior probability of the characteristic attribute words corresponding to the user data information and the information type; selecting an information type corresponding to the information type probability with the largest value as a data type to which the user data information belongs;
step S300: acquiring historical node data of each block in a block chain; extracting node data corresponding to each history period from the history node data; the node data comprises the number of nodes and node response time; based on the number of nodes and the node response time corresponding to each historical period block, respectively calculating the number of predicted nodes and the predicted node response time corresponding to the current period of the block;
step S400: calculating a safety value corresponding to the current time period of the block based on the number of the predicted nodes and the response time of the predicted nodes corresponding to the current time period of the block, selecting a block with the safety value larger than a safety value threshold as a safety block, and transmitting the user data information to the safety block for storage when the user data information is of a vulnerable data type; and when the user data information is not of the type of the attacked data, transmitting the user data information to any block for storage.
Further, step S100 includes:
step S101: recording and collecting the feature attribute words randomly selected from each information content to obtain a feature attribute word set V= { d 1 、d 2 、...、d r}; wherein ,d1 、d 2 、...、d r The method comprises the steps of randomly selecting 1 st, 2 nd, r's characteristic attribute words from each information content;
step S102: recording and collecting data types corresponding to each information content to obtain a data type set D= { x 1 、x 2 、...、x n}; wherein ,x1 、x 2 、...、x n Class 1, 2, & n data types; selecting a random moment before the block chain is attacked as a starting time stamp, and acquiring the time length of the distance between the time when each information content is attacked and the starting time stamp; acquiring the distance duration between the time when each information content is attacked and the starting time stamp; calculating arbitrary data type x of information content u Any feature attribute word d u Corresponding prior probability
wherein ,xu ∈D;For any data type x u Any feature attribute word d in the ith information content of (a) u The total number of corresponding characteristic attribute words, d u ∈V;/>Data type x u The duration of the distance between the time the ith information content is attacked and the start time stamp; gamma is a time influence coefficient; r is the total number of feature attribute words in the feature attribute word set V; />For any data type x u C-th feature attribute word d in i-th information content of (a) c The total number of the characteristic attribute words; j is of data type x u The total number of information contents;
step S103: when the calculated molecule with the prior probability of the characteristic attribute word in a certain data type is zero, a Laplacian smoothing algorithm is used for the prior probability of the molecule being zero, and a value of the molecule is added with 1; will be of arbitrary data type x u Record collection is carried out on prior probability of each characteristic attribute word of the information content of (a) to obtain any data type x u Is set of prior probabilities of (c) wherein ,/>The prior probabilities corresponding to the 1 st, 2 nd and r th characteristic attribute words are respectively represented; logarithmic numberAccording to each data type in the type set D, the prior probability of the corresponding characteristic attribute words is calculated respectively, record collection is carried out, and a set ++is obtained> wherein ,respectively denoted as data type x 1 、x 2 、...、x n Prior probability sets of each feature attribute word;
the step of randomly selecting the feature attribute words from each information content is to ensure that each selected feature attribute word has no relevance, if more feature attribute words are selected from a certain data type, the prior probability of the subsequent feature attribute words is biased towards the data type; and then, when the data type of the user data information is judged subsequently, the data type judgment is caused to be incorrect, the time length of the distance between the time when each information content is attacked and the starting time stamp is acquired, and the prior probability corresponding to the characteristic attribute word of a certain data type of the information content is calculated. Because attack time corresponding to information content can influence the characteristic attribute words in the calculation process, if the time corresponding to the information content is very close to the distance time of the current period, the timeliness of the information content is higher, and the influence on the prior probability of the characteristic attribute words is larger.
Further, step S200 includes:
step S201: acquiring arbitrary data type x in information content u Corresponding amount of information content of (a)Acquiring total number C of information contents extracted from historical data information a The method comprises the steps of carrying out a first treatment on the surface of the Calculating arbitrary data type x u The type ratio of the corresponding information content quantity to the total information content quantity>Calculating the type duty ratio of each data type in the data type set D, and recording and collecting to obtain a type duty ratio set T= { p (x) 1 )、p(x 2 )、...、p(x n ) -a }; wherein p (x) 1 )、p(x 2 )、...、p(x n ) Respectively the data types are x 1 、x 2 、...、x n The corresponding type duty cycle; when the type duty ratio corresponding to the data type is larger than the type duty ratio threshold, the corresponding data type is marked as the vulnerable data type;
step S202: acquiring user data information input by a user on a platform; extracting characteristic attribute words in the characteristic attribute word set V from the user data information, and recording and gathering to obtain a user characteristic attribute word set of the user data information wherein ,/>Respectively, feature attribute words d in user data information 1 、d 2 、...、d r A corresponding number;
step S203: calculating arbitrary data type x in information content u Type attribute word probability of (a)
wherein ,for the c-th feature attribute word d in the feature attribute word set V in the user data information c A corresponding number; r is the special in the characteristic attribute word set VTotal number of feature words; />For any data type x u Corresponding feature attribute word d c Is a priori probability of (2);
step S204: calculating arbitrary data type x corresponding to user data information u The information type probability p (x) u |V):
wherein ,p(xu ) For any data type x u The type ratio of (2); sigma (sigma) n p(x u ) The sum value of the duty ratio of each data type in the data type set D is 1;
step S205: data type determination conditions are used for the information type of the user data information:judging; the data type judging condition is used for obtaining the information type corresponding to the maximum value of the information type probability, and the information type corresponding to the user data information is recorded;
the above steps use the ratio of the number of information contents corresponding to each data type to the number of overall information contents as a criterion for determining whether the data type is a vulnerable data type, because if a certain item of data corresponds to data which is attacked in its entirety, the more the data is indicated to be vulnerable, so that as soon as the feature attribute word appears in the user data information, the more the feature attribute word is indicated to be the data type with a greater degree of association with the feature attribute word.
Further, step S300 includes:
step S301: recording and collecting the number of nodes corresponding to the obtained block history period to obtain a node number set B= { C corresponding to the history period 1 、C 2 、...、C z}; wherein ,C1 、C 2 、...、C z The number of internal nodes corresponding to the z history period blocks; acquiring a time length T of each time period from a starting time stamp B The method comprises the steps of carrying out a first treatment on the surface of the Acquiring the distance duration T of two adjacent time periods c The method comprises the steps of carrying out a first treatment on the surface of the Selecting a time length T with the smallest value from the time lengths of the distances between the time periods and the start time stamps Bo The method comprises the steps of carrying out a first treatment on the surface of the Calculating node time influence coefficient T corresponding to the node number of the L-th historical period of the block BaL :
Wherein m is a positive integer; t (T) BL A duration that is a distance between the L-th history period and the start time stamp;
calculating the number C of the predicted nodes of the current period of the block:
z is the number of historical time periods recorded in the node number set; c (C) L The number of the nodes corresponding to the L historical period block is the L historical period block;
step S302: recording and collecting the nodes corresponding to the acquired block history period to obtain a node response time set E= { E corresponding to the history period 1 、e 2 、...、e z}; wherein ,e1 、e 2 、...、e z For the 1 st, 2 nd, z history period blocksCorresponding internal node response time; calculating the predicted node response time e corresponding to the current time period of the block:
wherein ,eL The node response time corresponding to the L historical period of the block; z is the number of historical time periods recorded in the node number set.
Further, step S400 includes:
step S401: calculating a safety value H corresponding to the current period of the block:
c is the number of predicted nodes in the current period of the block; e is the response time of the predicted node corresponding to the current period of the block;
step S402: the block with the safety value larger than the safety value threshold is marked as a safety block; when the user data information is judged to be the vulnerable data type, adjusting the security policy of the user data information; the adjustment includes transmitting user data information to the secure block for storage; and when the user data information is not of the type of the attacked data, transmitting the user data information to any block for storage.
In order to better realize the method, a data security control system is also provided, and the data security control system comprises a priori probability module, a data type judging module, a prediction node module and a transmission module;
the prior probability module is used for extracting information types and information contents corresponding to the historical data information from the historical data information which is attacked in the blockchain, and calculating prior probability of the corresponding characteristic attribute words in each information type based on the characteristic attribute words;
the data judging module is used for marking the data type with the type occupation ratio larger than the type occupation ratio threshold as the vulnerable data type; calculating the probability of the information type between each information type and the user data information based on the prior probability of the characteristic attribute words corresponding to the user data information and the information type; selecting an information type corresponding to the information type probability with the largest value as a data type to which the user data information belongs;
the prediction node module is used for calculating the number of the prediction nodes and the response time of the prediction nodes corresponding to the current time period of the block based on the number of the nodes and the response time of the nodes corresponding to each historical time period of the block;
and the transmission module is used for calculating the safety value corresponding to the current time period of the block based on the number of the predicted nodes and the response time of the predicted nodes corresponding to the current time period of the block, selecting the block with the safety value larger than the safety value threshold as the safety block, determining the data type corresponding to the user data information based on the data type determination condition, adjusting the strategy of the safety position of the user data information, and transmitting the user data information to the corresponding block for storage.
Further, the prior probability module comprises a characteristic attribute word unit and a prior probability unit;
the characteristic attribute word unit is used for randomly selecting words in the information content and recording and collecting the selected words as characteristic attribute words;
the prior probability unit is used for obtaining the duration of the distance between the time of each information content being attacked and the starting time stamp; and calculating the prior probability corresponding to the characteristic attribute words of each data type.
Further, the data type judging module comprises a data type unit and a priori probability unit;
the data type unit is used for acquiring the quantity of the same information content of the data types, calculating the type proportion of each data type in the data type set, and recording and gathering to obtain the type proportion set of each data type; when the type duty ratio corresponding to the data type is larger than the type duty ratio threshold, the corresponding data type is marked as the vulnerable data type;
the prior probability unit is used for calculating the user data information based on the type attribute word probability and the number corresponding to the characteristic attribute words in the user data informationThe data type corresponding to the message is x n Is a probability of information type of (a).
Further, the prediction node module comprises a prediction node quantity unit and a prediction node response time unit;
a predicted node number unit for selecting a time length with the smallest value from the time lengths of the distances between the time periods and the start time stamps; calculating node time influence coefficients corresponding to the number of nodes in the block history period; calculating the predicted node number of the current period of the block based on the node time influence coefficient corresponding to the node number of the block history period and the node number corresponding to the block history period;
and the predicted node response time unit is used for recording and collecting the nodes corresponding to the acquired block historical time periods to obtain a node response time set corresponding to the historical time periods, and calculating the predicted node response time corresponding to the current time period of the block.
Further, the transmission module comprises a transmission unit;
the transmission unit is used for selecting a block with the safety value larger than the safety value threshold value as a safety block for calculating the safety value corresponding to the current time period of the block, and transmitting the user data information to the safety block for storage when the user data information is of a vulnerable data type; and when the user data information is not of the type of the attacked data, transmitting the user data information to any block for storage.
Compared with the prior art, the invention has the following beneficial effects: the invention realizes the automatic judgment of the data type of the user data information input by the user in the platform based on the attack historical data information received in the blockchain, thereby automatically adjusting the security policy of the user data information, realizing the intelligent security control of the user data information, judging the security condition of each block in the blockchain by using the node quantity and the node response time, because if the number of the nodes is larger for the block, the more the node quantity means that more people participate in the consensus process, the malicious behavior is more difficult to happen, and because a plurality of nodes need to be controlled simultaneously to attack, in addition, the more nodes also means more scattered rights, so that any single entity cannot control the whole network, the increase of the node quantity can improve the security of the blockchain, the node response time is very important for guaranteeing the security of the blockchain network in the block, the reliability of the network can be improved, and the malicious nodes are prevented from trying to tamper the blockchain.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
FIG. 1 is a flow chart of a method of the present invention for a blockchain-based data security control system and method;
FIG. 2 is a block diagram of a system and method for controlling data security based on blockchain in accordance with the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1-2, the present invention provides the following technical solutions: a data security control method based on a block chain comprises the following steps:
step S100: acquiring the attacked historical data information in the block chain, and extracting the information type and the information content corresponding to the historical data information; randomly selecting a plurality of words from each information content as characteristic attribute words; selecting a characteristic attribute word from information content with the same data type, and calculating the prior probability of the corresponding characteristic attribute word in each information type based on the characteristic attribute word;
wherein, step S100 includes:
step S101: recording and collecting feature attribute words randomly selected from each information content to obtain feature genusSexual word set v= { d 1 、d 2 、...、d r}; wherein ,d1 、d 2 、...、d r The method comprises the steps of randomly selecting 1 st, 2 nd, r's characteristic attribute words from each information content;
step S102: recording and collecting data types corresponding to each information content to obtain a data type set D= { x 1 、x 2 、...、x n}; wherein ,x1 、x 2 、...、x n Class 1, 2, & n data types; selecting a random moment before the block chain is attacked as a starting time stamp, and acquiring the time length of the distance between the time when each information content is attacked and the starting time stamp; acquiring the distance duration between the time when each information content is attacked and the starting time stamp; calculating arbitrary data type x of information content u Any feature attribute word d u Corresponding prior probability
wherein ,xu ∈D;For any data type x u Any feature attribute word d in the ith information content of (a) u The total number of corresponding characteristic attribute words, d u ∈V;/>Data type x u The duration of the distance between the time the ith information content is attacked and the start time stamp; gamma is a time influence coefficient; r is the total number of feature attribute words in the feature attribute word set V; />For any data type x u Is the first of (2)C-th characteristic attribute word d in i information contents c The total number of the characteristic attribute words; j is of data type x u The total number of information contents;
step S103: when the calculated molecule with the prior probability of the characteristic attribute word in a certain data type is zero, a Laplacian smoothing algorithm is used for the prior probability of the molecule being zero, and a value of the molecule is added with 1; will be of arbitrary data type x u Record collection is carried out on prior probability of each characteristic attribute word of the information content of (a) to obtain any data type x u Is set of prior probabilities of (c) wherein ,/>The prior probabilities corresponding to the 1 st, 2 nd and r th characteristic attribute words are respectively represented; the prior probability of the corresponding characteristic attribute words is calculated for each data type in the data type set D, record collection is carried out, and a set +.> wherein ,respectively denoted as data type x 1 、x 2 、...、x n Prior probability sets of each feature attribute word;
step S200: calculating a type occupation ratio corresponding to the data types based on the information content quantity corresponding to each data type, and recording the corresponding data type as a vulnerable data type when the type occupation ratio is larger than a type occupation ratio threshold; acquiring user data information input by a user on a platform; recording the time of inputting information by a user on a platform as the current time period; calculating the probability of the information type between each information type and the user data information based on the prior probability of the characteristic attribute words corresponding to the user data information and the information type; selecting an information type corresponding to the information type probability with the largest value as a data type to which the user data information belongs;
wherein, step S200 includes:
step S201: acquiring arbitrary data type x in information content u Corresponding amount of information content of (a)Acquiring total number C of information contents extracted from historical data information a The method comprises the steps of carrying out a first treatment on the surface of the Calculating arbitrary data type x u The type ratio of the corresponding information content quantity to the total information content quantity>Calculating the type duty ratio of each data type in the data type set D, and recording and collecting to obtain a type duty ratio set T= { p (x) 1 )、p(x 2 )、...、p(x n ) -a }; wherein p (x) 1 )、p(x 2 )、...、p(x n ) Respectively the data types are x 1 、x 2 、...、x n The corresponding type duty cycle; when the type duty ratio corresponding to the data type is larger than the type duty ratio threshold, the corresponding data type is marked as the vulnerable data type;
step S202: acquiring user data information input by a user on a platform; extracting characteristic attribute words in the characteristic attribute word set V from the user data information, and recording and gathering to obtain a user characteristic attribute word set of the user data information wherein ,/>Respectively, feature attribute words d in user data information 1 、d 2 、...、d r A corresponding number;
step S203: calculating arbitrary data type x in information content u Type attribute word probability of (a)
wherein ,for the c-th feature attribute word d in the feature attribute word set V in the user data information c A corresponding number; r is the total number of feature attribute words in the feature attribute word set V; />For any data type x u Corresponding feature attribute word d c Is a priori probability of (2);
step S204: calculating arbitrary data type x corresponding to user data information u The information type probability p (x) u |V):
wherein ,p(xu ) For any data type x u The type ratio of (2); sigma (sigma) n p(x u ) The sum value of the duty ratio of each data type in the data type set D is 1;
step S205: data type determination conditions are used for the information type of the user data information:judging; the data type judging condition is used for obtaining the information type corresponding to the maximum value of the information type probability, and the information type corresponding to the user data information is recorded;
step S300: acquiring historical node data of each block in a block chain; extracting node data corresponding to each history period from the history node data; the node data comprises the number of nodes and node response time; based on the number of nodes and the node response time corresponding to each historical period block, respectively calculating the number of predicted nodes and the predicted node response time corresponding to the current period of the block;
wherein, step S300 includes:
step S301: recording and collecting the number of nodes corresponding to the obtained block history period to obtain a node number set B= { C corresponding to the history period 1 、C 2 、...、C z}; wherein ,C1 、C 2 、...、C z The number of internal nodes corresponding to the z history period blocks; acquiring a time length T of each time period from a starting time stamp B The method comprises the steps of carrying out a first treatment on the surface of the Acquiring the distance duration T of two adjacent time periods c The method comprises the steps of carrying out a first treatment on the surface of the Selecting a time length T with the smallest value from the time lengths of the distances between the time periods and the start time stamps Bo The method comprises the steps of carrying out a first treatment on the surface of the Calculating node time influence coefficient T corresponding to the node number of the L-th historical period of the block BaL :
Wherein m is a positive integer; t (T) BL A duration that is a distance between the L-th history period and the start time stamp;
for example, a duration T when the distance between the 2 nd history period and the start time stamp B2 8h, m is 2; duration T Bo For 2h, duration T c 2h; calculating node time influence coefficients corresponding to the number of nodes in the 2 nd historical period of the block
Calculating the number C of the predicted nodes of the current period of the block:
z is the number of historical time periods recorded in the node number set; c (C) L The number of the nodes corresponding to the L historical period block is the L historical period block;
step S302: recording and collecting the nodes corresponding to the acquired block history period to obtain a node response time set E= { E corresponding to the history period 1 、e 2 、...、e z}; wherein ,e1 、e 2 、...、e z Interior node response times for the 1 st, 2 nd, z history period blocks; calculating the predicted node response time e corresponding to the current time period of the block:
wherein ,eL The node response time corresponding to the L historical period of the block; z is the number of historical time periods recorded in the node number set;
step S400: calculating a safety value corresponding to the current time period of the block based on the number of the predicted nodes and the response time of the predicted nodes corresponding to the current time period of the block, selecting a block with the safety value larger than a safety value threshold as a safety block, and transmitting the user data information to the safety block for storage when the user data information is of a vulnerable data type; transmitting the user data information to any block for storage when the user data information is not of the type of the attacked data;
wherein, step S400 includes:
step S401: calculating a safety value H corresponding to the current period of the block:
c is the number of predicted nodes in the current period of the block; e is the response time of the predicted node corresponding to the current period of the block;
step S402: the block with the safety value larger than the safety value threshold is marked as a safety block; when the user data information is judged to be the vulnerable data type, adjusting the security policy of the user data information; the adjustment includes transmitting user data information to the secure block for storage; transmitting the user data information to any block for storage when the user data information is not of the type of the attacked data;
in order to better realize the method, a data security control system is also provided, and the data security control system comprises a priori probability module, a data type judging module, a prediction node module and a transmission module;
the prior probability module is used for extracting information types and information contents corresponding to the historical data information from the historical data information which is attacked in the blockchain, and calculating prior probability of the corresponding characteristic attribute words in each information type based on the characteristic attribute words;
the data judging module is used for marking the data type with the type occupation ratio larger than the type occupation ratio threshold as the vulnerable data type; calculating the probability of the information type between each information type and the user data information based on the prior probability of the characteristic attribute words corresponding to the user data information and the information type; selecting an information type corresponding to the information type probability with the largest value as a data type to which the user data information belongs;
the prediction node module is used for calculating the number of the prediction nodes and the response time of the prediction nodes corresponding to the current time period of the block based on the number of the nodes and the response time of the nodes corresponding to each historical time period of the block;
the transmission module is used for calculating the safety value corresponding to the current time period of the block based on the number of the predicted nodes and the response time of the predicted nodes corresponding to the current time period of the block, selecting the block with the safety value larger than the safety value threshold as the safety block, adjusting the strategy of the safety position of the user data information based on the data type corresponding to the user data information obtained by the data type judgment condition, and transmitting the user data information to the corresponding block for storage;
the prior probability module comprises a characteristic attribute word unit and a prior probability unit;
the characteristic attribute word unit is used for randomly selecting words in the information content and recording and collecting the selected words as characteristic attribute words;
the prior probability unit is used for obtaining the duration of the distance between the time of each information content being attacked and the starting time stamp; calculating the prior probability corresponding to the characteristic attribute words of each data type;
the data type judging module comprises a data type unit and a priori probability unit;
the data type unit is used for acquiring the quantity of the same information content of the data types, calculating the type proportion of each data type in the data type set, and recording and gathering to obtain the type proportion set of each data type; when the type duty ratio corresponding to the data type is larger than the type duty ratio threshold, the corresponding data type is marked as the vulnerable data type;
the prior probability unit is used for calculating the data type x corresponding to the user data information based on the type attribute word probability and the number corresponding to the characteristic attribute words in the user data information n Is a probability of information type;
the prediction node module comprises a prediction node quantity unit and a prediction node response time unit;
a predicted node number unit for selecting a time length with the smallest value from the time lengths of the distances between the time periods and the start time stamps; calculating node time influence coefficients corresponding to the number of nodes in the block history period; calculating the predicted node number of the current period of the block based on the node time influence coefficient corresponding to the node number of the block history period and the node number corresponding to the block history period;
the prediction node response time unit is used for recording and collecting the nodes corresponding to the obtained block historical time periods to obtain a node response time set corresponding to the historical time periods, and calculating the prediction node response time corresponding to the current time period of the block;
the transmission module comprises a transmission unit;
the transmission unit is used for selecting a block with the safety value larger than the safety value threshold value as a safety block for calculating the safety value corresponding to the current time period of the block, and transmitting the user data information to the safety block for storage when the user data information is of a vulnerable data type; and when the user data information is not of the type of the attacked data, transmitting the user data information to any block for storage.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: the foregoing description is only a preferred embodiment of the present invention, and the present invention is not limited thereto, but it is to be understood that modifications and equivalents of some of the technical features described in the foregoing embodiments may be made by those skilled in the art, although the present invention has been described in detail with reference to the foregoing embodiments. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.