Summary of the invention
In view of the above problems, propose the present invention, so as to provide a kind of overcome the problems referred to above or solve the problem at least in part for representing the method for computer graphic target security attribute and corresponding device.
According to one aspect of the present invention, providing a kind of method for representing computer graphic target security attribute, comprising:
File corresponding to anacom icon or function;
According to analysis result, determine to there is the computer icon of potential safety problem and corresponding danger classes, and mark danger classes on described computer icon; And
When cursor dwell is put at the described computer graphic that there is potential safety problem, represent described computer graphic target analysis result and corresponding suggestion for operation.
Described method also comprises: when cursor dwell is put at the described computer graphic that there is potential safety problem, also represent the attribute information of file corresponding to described computer icon or function, described attribute information comprises title, description, position, type, size, creation-time, modification time, one or more in the access time.
The step of the attribute information of the step of described expression described computer graphic target analysis result and corresponding suggestion for operation and the file corresponding to the described computer icon of described expression or function comprises: undertaken representing and/or being represented by the audio output device of electronic equipment by the display device of electronic equipment.
Describedly determine to exist the computer icon of potential safety problem and the step of corresponding danger classes based on cloud inquiry or carry out based on predefined database according to analysis result.
Described according to analysis result, determine that the step of the computer icon and corresponding danger classes that there is potential safety problem comprises: be defined as there is potential safety problem by the computer icon with one of following characteristics and there is the first danger classes:
The file pointed to as the computer icon of shortcut does not exist;
Computer icon as shortcut points to the file of UNKNOWN TYPE;
Computer icon as shortcut points to other shortcut;
Computer icon as shortcut points to script file;
Computer icon as shortcut points to network address;
Computer icon as shortcut points to the executable file with predefined compromising feature;
The icon of the file pointed to as the computer icon of shortcut is not system default;
Computer icon as shortcut does not point to any file;
Computer icon association file or as the file that the computer icon of shortcut points to, there is predefined specific properties;
The file of computer icon association can not normally be deleted;
As the file corruption that the computer icon of shortcut points to;
Computer icon as shortcut points to unknown path;
Computer icon as shortcut has the title similar with predefined shortcut icon and/or profile, but the file pointed to is different from the file that described predefined shortcut is pointed to;
The file pointed to as the computer icon of shortcut has and title/or icon like predefined files classes, but the file pointed to not described predefined file;
Computer icon is the registration table associations on operating system desktop;
Computer icon as shortcut points to unknown executable file;
Computer icon as shortcut points to specific hot key;
Computer icon as shortcut has the title similar with predefined shortcut icon and/or profile, but the executive mode pointed to is with parameter.
Described according to analysis result, determine that the step of the computer icon and corresponding danger classes that there is potential safety problem comprises: be defined as there is potential safety problem by the computer icon with one of following characteristics and there is the second danger classes:
Computer icon as shortcut points to the HTML type file with redirect;
The file attribute of the file of computer icon association is set to hiding;
The file of computer icon association cannot normally be deleted;
Computer icon creates after predefined time point;
As class mark (CLSID) None-identified that the computer icon of shortcut associates, and associate with registration table;
Computer icon as shortcut points to browser program;
The file pointed to as the computer icon of shortcut has the title exceeding predefined length.
There is the possibility of safety problem more greatly in the computer icon with the first danger classes, this computer icon is removed in the suggestion for operation for it compared with having the computer icon of the second danger classes.
Mark in the step of danger classes described on described computer icon, the computer icon with the first danger classes marks " danger ", the computer icon with the second danger classes marks " suspicious ".
According to a further aspect in the invention, providing a kind of device for representing computer graphic target security attribute, comprising:
Analysis module, for the file corresponding to anacom icon or function;
Danger classes is determined and labeling module, for according to analysis result, determines to there is the computer icon of potential safety problem and corresponding danger classes, and mark danger classes on described computer icon; And
First representation module, for when cursor dwell is put at the described computer graphic that there is potential safety problem, represents described computer graphic target analysis result and corresponding suggestion for operation.
Described device also comprises: the second representation module, for when cursor dwell is put at the described computer graphic that there is potential safety problem, also represent the attribute information of file corresponding to described computer icon or function, described attribute information comprises title, description, position, type, size, creation-time, modification time, one or more in the access time.
Described first representation module and described second representation module are undertaken representing and/or being represented by the audio output device of electronic equipment by the display device of electronic equipment.
Described danger classes is determined to inquire about based on cloud with labeling module or based on predefined database, determine to there is the computer icon of potential safety problem and corresponding danger classes according to analysis result.
Described danger classes is determined be defined as there is potential safety problem by the computer icon with one of following characteristics with labeling module and have the first danger classes:
The file pointed to as the computer icon of shortcut does not exist;
Computer icon as shortcut points to the file of UNKNOWN TYPE;
Computer icon as shortcut points to other shortcut;
Computer icon as shortcut points to script file;
Computer icon as shortcut points to network address;
Computer icon as shortcut points to the executable file with predefined compromising feature;
The icon of the file pointed to as the computer icon of shortcut is not system default;
Computer icon as shortcut does not point to any file;
Computer icon association file or as the file that the computer icon of shortcut points to, there is predefined specific properties;
The file of computer icon association can not normally be deleted;
As the file corruption that the computer icon of shortcut points to;
Computer icon as shortcut points to unknown path;
Computer icon as shortcut has the title similar with predefined shortcut icon and/or profile, but the file pointed to is different from the file that described predefined shortcut is pointed to;
The file pointed to as the computer icon of shortcut has and title/or icon like predefined files classes, but the file pointed to not described predefined file;
Computer icon is the registration table associations on operating system desktop;
Computer icon as shortcut points to unknown executable file;
Computer icon as shortcut points to specific hot key;
Computer icon as shortcut has the title similar with predefined shortcut icon and/or profile, but the executive mode pointed to is with parameter.
Described danger classes is determined be defined as there is potential safety problem by the computer icon with one of following characteristics with labeling module and have the second danger classes:
Computer icon as shortcut points to the HTML type file with redirect;
The file attribute of the file of computer icon association is set to hiding;
The file of computer icon association cannot normally be deleted;
Computer icon creates after predefined time point;
As class mark (CLSID) None-identified that the computer icon of shortcut associates, and associate with registration table;
Computer icon as shortcut points to browser program;
The file pointed to as the computer icon of shortcut has the title exceeding predefined length.
There is the possibility of safety problem more greatly in the computer icon with the first danger classes, this computer icon is removed in the suggestion for operation for it compared with having the computer icon of the second danger classes.
Described danger classes is determined to mark " danger " on the computer icon with the first danger classes with labeling module, and the computer icon with the second danger classes marks " suspicious ".
The invention provides a kind of method and apparatus for representing computer graphic target security attribute.According to embodiments of the invention, by the file corresponding to anacom icon or function, determine to there is the icon of potential safety problem and corresponding danger classes accordingly, described icon marks danger classes, and when cursor dwell is on the described icon that there is potential safety problem, represent the analysis result of described icon and corresponding suggestion for operation, do not enable user understand which icon intuitively by means of only the mark on icon and may there is safety problem and corresponding danger classes, when user by cursor dwell on these icons time, concrete analysis result for these icons and suggestion for operation can also be provided to user, make user can take appropriate operation for these icons, avoid the destruction that dangerous icon may bring computer system.Thus, present invention greatly enhances the security for computer icon operation.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to technological means of the present invention can be better understood, and can be implemented according to the content of instructions, and can become apparent, below especially exemplified by the specific embodiment of the present invention to allow above and other objects of the present invention, feature and advantage.
Embodiment
Below with reference to accompanying drawings exemplary embodiment of the present disclosure is described in more detail.Although show exemplary embodiment of the present disclosure in accompanying drawing, however should be appreciated that can realize the disclosure in a variety of manners and not should limit by the embodiment set forth here.On the contrary, provide these embodiments to be in order to more thoroughly the disclosure can be understood, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
Hereinafter, for personal computer, principle of the present invention is described.But, this is only used to the object of illustrating, scope of the present invention is not limited to this, but be equally applicable to the electronic equipment that other has display device, such as, the portable electric appts such as mobile phone, panel computer, navigating instrument, audio frequency and/or video player, radio, mobile TV, multifunctional remote controlller; The stationary electronic device such as mainframe computer, printer, facsimile recorder, duplicating machine, all-in-one multifunctional machine, Set Top Box, public information inquiry equipment, interaction of multimedia information equipment; And the electronic equipment of other assembling display device.
In addition, in the description carried out for personal computer hereafter, for the Windows operating system of Microsoft, principle of the present invention is described.Such as, but this is only used to the object of illustrating, and scope of the present invention is not limited to this, but is equally applicable to the operating system that other has graphic user interface, Linux, Mac OS, Unix etc.
Fig. 2 is according to an embodiment of the invention for representing the process flow diagram of the method for computer graphic target security attribute.As shown in Figure 2, in the method for representing computer graphic target security attribute, at the beginning, step S101 is performed: the file corresponding to anacom icon or function.According to embodiments of the invention, can by CreateRemoteThread function creation Remote thread injecting to explorer process, and hook on IShellView interface, after hanging up hook, refresh desktop, the attribute information of the file that the icon that at this moment just can be obtained on desktop by IShellView interface is corresponding or function, comprises the file etc. of position, size, display image and correspondence.
After step slol, step S103 is performed: according to analysis result, determine to there is the computer icon of potential safety problem and corresponding danger classes, and mark danger classes on described computer icon.
According to embodiments of the invention, described danger classes can comprise the first danger classes and the second danger classes, the possibility that the computer icon wherein with the first danger classes exists safety problem compared with having the computer icon of the second danger classes is larger, such as can by the first danger classes called after " danger " grade, by the second danger classes called after " suspicious " grade.But, scope of the present invention is not limited thereto, can also specify only there is a danger classes, or there is the danger classes of more than three or three, such as, by its called after " slightly suspicious ", " moderate is suspicious ", " highly suspicious ", " slightly dangerous ", " poor risk ", " highly dangerous " etc.
According to embodiments of the invention, describedly determine to exist the computer icon of potential safety problem and the step of corresponding danger classes based on cloud inquiry or carry out based on predefined database according to analysis result.Alternatively, described predefined database can be stored in the computing machine of user or server end.
According to embodiments of the invention, the step that described computer icon marks danger classes can realize in the following way: first call DrawIcon function, draw original icon, and then call DrawIcon function, draw the icon of " danger " of expression first danger classes and be superimposed upon original graph and put on face, or the icon of " suspicious " of drafting expression second danger classes be superimposed upon original graph and put on face.
After step s 103, step S105 is performed: when cursor dwell is put at the described computer graphic that there is potential safety problem, represent described computer graphic target analysis result and corresponding suggestion for operation.According to embodiments of the invention, when user uses sensing equipment (such as mouse, touch pad etc.) mobile cursor, WM_MOUSEMOVE message can be responded, and according to the cursor position in this message, judge whether cursor is positioned at certain computer graphic and puts on.In addition, can define when cursor dwell near icon on many regions on a large scale time, just can think that cursor dwell is on this icon.Cursor can also be defined how long to be on icon, just can think that cursor rests on this icon.
In addition, according to embodiments of the invention, described method 100 can also comprise step S107: when cursor dwell is put at the described computer graphic that there is potential safety problem, also represent the attribute information of file corresponding to described computer icon or function, described attribute information comprises title, description, position, type, size, creation-time, modification time, one or more in the access time.Alternatively, described attribute information can show with above-mentioned analysis result and corresponding suggestion for operation together, also can separate display in different positions, can also according to particular order successively display.
In addition, according to embodiments of the invention, when the cursor dwell of computing machine is put at the computer graphic that there is not safety problem, can represent that described computer icon does not exist safety problem, and represent the attribute information of file corresponding to described computer icon or function.
According to embodiments of the invention, in above-mentioned steps S105 and step S107, described computer graphic target analysis result and corresponding suggestion for operation can be represented by the display device of electronic equipment (such as computing machine) and/or by the audio output device of electronic equipment, or represent that described computer icon does not exist safety problem.
According to embodiments of the invention, the possibility that there is safety problem due to the computer icon with the first danger classes (" danger ") is comparatively large, and the suggestion for operation therefore for it can be remove this computer icon; And due to the computer icon with the second danger classes (" suspicious "), to there is the possibility of safety problem less, and the suggestion for operation therefore for it can be allow user select voluntarily whether to remove this computer icon.
For example, as shown in Figure 3, the computer icon that there is potential safety problem has marked its danger classes (" suspicious " or " danger "), and when cursor dwell is on the second row the 4th icon, show the analysis result about this icon and corresponding suggestion for operation, namely " network address C: Program Files pointed by this shortcut (x86) Internet Explorer iexplore.exehttp: //www.sssd.com is not in 360 credible network address database; if not the shortcut that you create, and suggestion is removed ".In addition, alternatively, when cursor dwell is on this icon, above-mentioned analysis result about this icon and corresponding suggestion for operation can also be reported by the mode of the loudspeaker sound of computing machine.
According to embodiments of the invention, the computer icon with one of following characteristics is defined as there is potential safety problem and there is the first danger classes (" danger "):
A file that () is pointed to as the computer icon of shortcut does not exist, this may be because program unloading does not thoroughly cause, or the shortcut that wooden horse is residual, also the computer icon with this feature can be defined as that there is the second danger classes (" suspicious ");
B () points to the file of UNKNOWN TYPE as the computer icon of shortcut, if this is not the shortcut that user creates, then advise removing, otherwise performs this file and may bring security risk;
C () points to other shortcut as the computer icon of shortcut, in the ordinary course of things, normal software can not produce this shortcut icon;
D () points to script file as the computer icon of shortcut, if this is not the shortcut that user creates, then advises removing, otherwise perform this file and may bring security risk;
E () points to network address as the computer icon of shortcut, if this is not the shortcut that user creates, then advise removing, otherwise perform this shortcut and may bring security risk, also the computer icon with this feature can be defined as having the second danger classes, allow user select voluntarily whether to remove this computer icon according to the credibility of pointed network address;
F () points to the executable file with predefined compromising feature as the computer icon of shortcut, in the ordinary course of things, normal software can not produce this shortcut icon, and predefined compromising feature based on cloud inquiry or can be determined based on predefined database;
G () is not system default as the icon of the file that the computer icon of shortcut points to, if this is not the icon that user revises, then advise removing, otherwise performs this file and may bring security risk;
H () does not point to any file as the computer icon of shortcut, this may be because program unloading does not thoroughly cause, or the shortcut that wooden horse is residual, the computer icon with this feature can be defined as having the second danger classes yet;
Computer icon association file or as the file that the computer icon of shortcut points to, there is predefined specific properties, this type of file normally rogue program creates, perform this file and may bring security risk, also the computer icon with this feature can be defined as having the second danger classes, described predefined specific properties based on cloud inquiry or can be determined based on predefined database;
J the file of () computer icon association can not normally be deleted, this may be because program unloading does not thoroughly cause, or the shortcut that wooden horse is residual, also the computer icon with this feature can be defined as having the second danger classes;
K file corruption that () is pointed to as the computer icon of shortcut, this may be because program unloading does not thoroughly cause, or the shortcut that wooden horse is residual;
L () points to unknown path as the computer icon of shortcut, in the ordinary course of things, normal software can not generate this shortcut;
M () has the title similar with predefined shortcut icon and/or profile as the computer icon of shortcut, but the file pointed to is different from the file that described predefined shortcut is pointed to, this type of shortcut is this predefined shortcut icon of disguise as normally, to lure that user clicks into;
N file that () is pointed to as the computer icon of shortcut has and title/or icon like predefined files classes, but the file pointed to is described predefined file not, this type of shortcut is this predefined shortcut icon of disguise as normally, to lure that user clicks into;
O () computer icon is the registration table associations on operating system desktop, it is abnormal that it may cause icon to show, and maybe cannot run, this normally rogue program create;
P () points to unknown executable file as the computer icon of shortcut, perform this file and may bring security risk, also the computer icon with this feature can be defined as having the second danger classes;
Q () points to specific hot key as the computer icon of shortcut, in the ordinary course of things, normal software can not generate this shortcut, creates if not user, then advise removing;
R () has the title similar with predefined shortcut icon and/or profile as the computer icon of shortcut, but the executive mode pointed to is with parameter, this type of shortcut is this predefined shortcut icon of disguise as normally, to lure that user clicks into.
According to embodiments of the invention, the computer icon with one of following characteristics is defined as there is potential safety problem and there is the second danger classes (" suspicious "):
(a ') points to the HTML type file with redirect as the computer icon of shortcut, and when this shortcut be not user create, advise removing it;
The file attribute of the file of (b ') computer icon association is set to hiding, and this causes possibly cannot viewing this file, carries out repairing the normal display that can recover this file to it;
The file of (c ') computer icon association cannot normally be deleted, and this may be because program unloading does not thoroughly cause, or the shortcut that wooden horse is residual;
(d ') computer icon is that after predefined time point, (in such as nearest one week) creates, and after needing user to examine, then operates this icon;
Class mark (CLSID) None-identified that (e ') associates as the computer icon of shortcut, and associate with registration table, perform this file and may bring security risk;
(f ') point to browser program as the computer icon of shortcut;
The file that (g ') points to as the computer icon of shortcut has the title exceeding predefined length, and it possibly normally cannot be opened or delete, and usual normal file seldom uses this type of overlength file name.
The invention provides a kind of method for representing computer graphic target security attribute.According to embodiments of the invention, by the file corresponding to anacom icon or function, determine to there is the icon of potential safety problem and corresponding danger classes accordingly, described icon marks danger classes, and when cursor dwell is on the described icon that there is potential safety problem, represent the analysis result of described icon and corresponding suggestion for operation, do not enable user understand which icon intuitively by means of only the mark on icon and may there is safety problem and corresponding danger classes, when user by cursor dwell on these icons time, concrete analysis result for these icons and suggestion for operation can also be provided to user, make user can take appropriate operation for these icons, avoid the destruction that dangerous icon may bring computer system.Thus, present invention greatly enhances the security for computer icon operation.
Corresponding with above-mentioned method 100, present invention also offers a kind of device 200 for representing computer graphic target security attribute, see Fig. 4, this device 200 comprises:
Analysis module 201, for the file corresponding to anacom icon or function, it may be used for performing according to the step S101 in method 100 of the present invention;
Danger classes is determined and labeling module 203, for according to analysis result, determine to there is the computer icon of potential safety problem and corresponding danger classes, and mark danger classes on described computer icon, it may be used for performing according to the step S103 in method 100 of the present invention; And
First representation module 205, for when cursor dwell is put at the described computer graphic that there is potential safety problem, represent described computer graphic target analysis result and corresponding suggestion for operation, it may be used for performing according to the step S105 in method 100 of the present invention.
In an embodiment of the present invention, described device 200 also comprises the second representation module 207, for when cursor dwell is put at the described computer graphic that there is potential safety problem, also represent the attribute information of file corresponding to described computer icon or function, described attribute information comprises title, description, position, type, size, creation-time, modification time, one or more in the access time, and it may be used for performing according to the step S107 in method 100 of the present invention.
In an embodiment of the present invention, described first representation module 205 and described second representation module 207 are undertaken representing and/or being represented by the audio output device of electronic equipment by the display device of electronic equipment.
In an embodiment of the present invention, described danger classes is determined to inquire about based on cloud with labeling module 203 or based on predefined database, determine to there is the computer icon of potential safety problem and corresponding danger classes according to analysis result.
In an embodiment of the present invention, described danger classes is determined be defined as there is potential safety problem by the computer icon with one of following characteristics with labeling module 203 and have the first danger classes:
The file pointed to as the computer icon of shortcut does not exist;
Computer icon as shortcut points to the file of UNKNOWN TYPE;
Computer icon as shortcut points to other shortcut;
Computer icon as shortcut points to script file;
Computer icon as shortcut points to network address;
Computer icon as shortcut points to the executable file with predefined compromising feature;
The icon of the file pointed to as the computer icon of shortcut is not system default;
Computer icon as shortcut does not point to any file;
Computer icon association file or as the file that the computer icon of shortcut points to, there is predefined specific properties;
The file of computer icon association can not normally be deleted;
As the file corruption that the computer icon of shortcut points to;
Computer icon as shortcut points to unknown path;
Computer icon as shortcut has the title similar with predefined shortcut icon and/or profile, but the file pointed to is different from the file that described predefined shortcut is pointed to;
The file pointed to as the computer icon of shortcut has and title/or icon like predefined files classes, but the file pointed to not described predefined file;
Computer icon is the registration table associations on operating system desktop;
Computer icon as shortcut points to unknown executable file;
Computer icon as shortcut points to specific hot key;
Computer icon as shortcut has the title similar with predefined shortcut icon and/or profile, but the executive mode pointed to is with parameter.
In an embodiment of the present invention, described danger classes is determined be defined as there is potential safety problem by the computer icon with one of following characteristics with labeling module 203 and have the second danger classes:
Computer icon as shortcut points to the HTML type file with redirect;
The file attribute of the file of computer icon association is set to hiding;
The file of computer icon association cannot normally be deleted;
Computer icon creates after predefined time point;
As class mark (CLSID) None-identified that the computer icon of shortcut associates, and associate with registration table;
Computer icon as shortcut points to browser program;
The file pointed to as the computer icon of shortcut has the title exceeding predefined length.
In an embodiment of the present invention, there is the possibility of safety problem more greatly in the computer icon with the first danger classes, this computer icon is removed in the suggestion for operation for it compared with having the computer icon of the second danger classes.
In an embodiment of the present invention, described danger classes is determined to mark " danger " on the computer icon with the first danger classes with labeling module 203, and the computer icon with the second danger classes marks " suspicious ".
Because above-mentioned each device embodiment is corresponding with aforementioned approaches method embodiment, therefore no longer each device embodiment is described in detail.
Intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with display at this algorithm provided.Various general-purpose system also can with use based on together with this teaching.According to description above, the structure constructed required by this type systematic is apparent.In addition, the present invention is not also for any certain programmed language.It should be understood that and various programming language can be utilized to realize content of the present invention described here, and the description done language-specific is above to disclose preferred forms of the present invention.
In instructions provided herein, describe a large amount of detail.But can understand, embodiments of the invention can be put into practice when not having these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand in each inventive aspect one or more, in the description above to exemplary embodiment of the present invention, each feature of the present invention is grouped together in single embodiment, figure or the description to it sometimes.But, the method for the disclosure should be construed to the following intention of reflection: namely the present invention for required protection requires feature more more than the feature clearly recorded in each claim.Or rather, as claims below reflect, all features of disclosed single embodiment before inventive aspect is to be less than.Therefore, the claims following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and adaptively can change the module in the device in embodiment and they are arranged in one or more devices different from this embodiment.Some block combiner in embodiment can be become a module or unit or assembly, and multiple submodule or subelement or sub-component can be put them in addition.Except at least some in such feature and/or process or module be mutually repel except, any combination can be adopted to combine all processes of all features disclosed in this instructions (comprising adjoint claim, summary and accompanying drawing) and so disclosed any method or equipment or unit.Unless expressly stated otherwise, each feature disclosed in this instructions (comprising adjoint claim, summary and accompanying drawing) can by providing identical, equivalent or similar object alternative features replaces.
In addition, those skilled in the art can understand, although embodiments more described herein to comprise in other embodiment some included feature instead of further feature, the combination of the feature of different embodiment means and to be within scope of the present invention and to form different embodiments.Such as, in detail in the claims, the one of any of embodiment required for protection can use with arbitrary array mode.
Each device embodiment of the present invention with hardware implementing, or can realize with the software module run on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that the some or all functions that microprocessor or digital signal processor (DSP) can be used in practice to realize according to the some or all modules in the device of the embodiment of the present invention.The present invention can also be embodied as part or all the device program (such as, computer program and computer program) for performing method as described herein.Realizing program of the present invention and can store on a computer-readable medium like this, or the form of one or more signal can be had.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or provides with any other form.
The present invention will be described instead of limit the invention to it should be noted above-described embodiment, and those skilled in the art can design alternative embodiment when not departing from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and does not arrange element in the claims or step.Word "a" or "an" before being positioned at element is not got rid of and be there is multiple such element.The present invention can by means of including the hardware of some different elements and realizing by means of the computing machine of suitably programming.In the unit claim listing some devices, several in these devices can be carry out imbody by same hardware branch.Word first, second and third-class use do not represent any order.Can be title by these word explanations.