Specific embodiment
In order that those skilled in the art more fully understand the technical scheme in the application, below in conjunction with this
Accompanying drawing in application embodiment, is clearly and completely described to the technical scheme in the embodiment of the present application,
Obviously, described embodiment is only some embodiments of the present application, rather than whole embodiments.Base
Embodiment in the application, those of ordinary skill in the art are obtained under the premise of creative work is not made
The every other embodiment for taking, should all belong to the scope of the application protection.
Webpage is the basic element for constituting website, is the platform for carrying various website applications.Generally, net
Stand and be made up of webpage, if only domain name and fictitious host computer is without making any webpage, use
Family cannot still access the website.
Webpage is a text-only file comprising html tag, and it can be stored in certain corner of the world
A certain computer in, be one " page " in WWW, be HTML form (standard lead to
With an application of markup language, file extent entitled .html or .htm).Webpage is generally carried with image shelves
For picture.Webpage will be read by web browser.
Word is to constitute the two of webpage most basic elements with picture.Can simply be interpreted as:Text
Word, is exactly the content of webpage.Picture, is exactly the attractive in appearance of webpage.In addition, the element of webpage also includes
Animation, music, program etc..These web page elements can be referred to " data " or " information " herein
Generation.
Through the discussion of exemplary, it should be understood that term " data " and " information " can be herein
In be interchangeably used to refer to may be present in text in computer based environment, picture, audio, video or
The information of any other form.
The method of the information coding that Fig. 1 is provided for the embodiment of the application one, specifically includes following steps:
S110:Server obtains the first information of targeted customer;
The server, or internet site server of the server, e.g. company Intranet.With
As a example by company Intranet, on the server of company Intranet, there is intra-company's info web.Most company in order to
Prevent company internal information from revealing, only to intra-company employee open interior info web and company Intranet service
Device.
The targeted customer, can be logged on Website server or the information user that browses web sites.E.g. company
Interior employee, or the VIP user of certain internet site.Certain novel website, only supplements VIP with money
Afterwards, Website server can be just logged in, info web is checked, VIP user is exactly targeted customer.
Specifically, server obtains the first information of the targeted customer, in the embodiment of the application one, institute
State server and check instruction in response to what the target terminal user sent, the server obtains the target
The first information of user.The targeted customer input the information such as user name, password, Website login clothes in terminal
Business device.As targeted customer has the demand for checking site information, the site information checked, the mesh are wanted in click
The terminal that mark user uses sends and checks instruction.
The server obtains the first information of targeted customer, e.g. user's job number, and user identity demonstrate,proves number,
Address name, phone number, any one or the combination of several in webpage VIP grades.
The server obtains the first information of targeted customer, can be with direct access, it is also possible to indirect gain.
Specifically, the targeted customer can input the information such as user name password when logging in targeted website.It is described
Direct access, can obtain the targeted customer to log in the information being input into during targeted website.For example, described
When targeted customer logs in targeted website, comprising use in the information such as login name being input under the prompting of targeted website
Family job number, so, server directly can obtain user's job number from the information of targeted customer input.
The indirect gain, such as not comprising required for server in the information of targeted customer's input when logging in
The first information, so described server cannot from the targeted customer input information in directly obtain first
Information.Server can be inquired about to Subscriber Management System according to the information of user input and obtain the target and use
The first information at family.
For example, the first information is user's job number;During User logs in, input is name " Zhang San ", is not wrapped
Job number containing the employee.Now, server cannot the direct access first information (should from the information of user input
User's job number of employee).Server can be according to the name " Zhang San " of user input to Subscriber Management System
Inquire about and obtain user's job number of " Zhang San ", for example, 104.
By the first information, targeted customer can be corresponded to.The first information is in a specific model
In enclosing, for example, in intra-company, the first information of Existence and uniquenss, i.e., only corresponds to a targeted customer.
For example, the first information is user's job number.User's job number is usually company according to different departments, difference
Position, the character combination that different hiring date etc. is arranged.The use of all employees of same company
The rules of arrangement of family job number is the same, so may insure user's job number in in-company uniqueness.Example
Such as, job number 150203,15 representative therein is to enter company's registration in 2015, and 02 represents human resources
Portion, 03 represents 15 years the 3rd people for entering Human Resource Department, so in this intra-company, does not have
The first information (job number) for repeating occurs.
Specifically, server obtains the first information of the targeted customer, in another embodiment of the application,
The server periodically obtains the first information of targeted customer.
For example, certain company's site, needs to push company's weekly to the targeted customer weekly.Server according to
Built-in clock, the first information of the targeted customer is obtained in regular time weekly.In the company of push week
Before report, server extracts the list information for pushing targeted customer, by the list information, obtains described
The first information of targeted customer.
S120:Server inquiry in preset rules obtains the volume corresponding to the first information of the acquisition
Code mode.
The preset rules, are that the first information is corresponded into coded system, are in the embodiment of the present application by
Each bit digital corresponds to coded fonts and is encoded in one information (user's job number), as shown in table 1.
Table 1
First information numeral |
Coded fonts |
0 |
The Song typeface |
1 |
Black matrix |
2 |
Lishu |
3 |
Microsoft is refined black |
4 |
Regular script |
5 |
Imitation Song-Dynasty-style typeface |
6 |
It is Chinese-language thin black |
7 |
Chinese-language regular script |
8 |
The Chinese-language Song typeface |
9 |
Chinese-language imitation Song-Dynasty-style typeface |
Specifically, preset rules as shown in table 1, each numeral a kind of font of correspondence, in the present embodiment
In, after server obtains first information user's job number, by the coding corresponding to each bit digital of user's job number
Font is all calculated.For example, job number is 104, it is exactly respectively black matrix to calculate coded fonts, the Song typeface,
Regular script;During next coding, server is encoded according to coded fonts to targeted website information.
The mapping of numeral and font is one for example, specific rules can be by web editor people in table 1
Member's setting, need to only ensure that the first information is corresponded with coded system.
130:The coded system inquired described in server by utilizing is encoded to targeted website information.
The first information can be corresponded to coded system, Ji Jiang by preset rules as described in Table 1, server
Each bit digital in one information corresponds to coded fonts.Server can be using these coded fonts to target
Presupposed information position is encoded in website.
In the present embodiment, the length of the presupposed information position can be consistent with first information length, presupposed information
Position could be arranged to the preceding first information length digit of every a line.
Information shown in Fig. 2, the first information of targeted customer is user's job number 104.In the present embodiment, in advance
If the length of information bit is three characters.Server is right according to the coded system inquired in step S230
Information shown in Fig. 2 is encoded.Preceding 3 characters i.e. to every a line of information shown in Fig. 2 are encoded,
It is black matrix, the Song typeface, regular script that the font of these characters is separately encoded.Information after coding as shown in figure 3,
The corresponding font of first three character per a line is respectively black matrix, the Song typeface, regular script.
In the application other embodiment, full detail can be encoded, it is also possible to certain to a few rows
Several character informations are encoded.In order to not allow the divulge a secret employee of idea to find that its information for browsing has been entered
Coding is gone, selection can compare the information of concealed location and encoded as far as possible.
Finally, the information after coding can be returned to the targeted customer by the server.The target
User may browse through the information after coding.
Find the use of leakage information in method in the present embodiment, the website that some information can be helped to be compromised
Family.Coded system is corresponded to by by user's first information, and information is encoded using coded system,
The information for finally being returned after coding to user is browsed for it, can quickly be found out after information is compromised and let out
Dew user.
The method of the information coding that following another embodiment of the application is provided, specifically includes following steps:
S210:Server obtains the first information of targeted customer.
S220:Server inquiry in preset rules obtains the volume corresponding to the first information of the acquisition
Code mode.
In the present embodiment, the first information of acquisition is converted to server the binary representation side of preset length
Formula, the corresponding relation according to table 2, coded system is corresponded to by the first information.
Table 2
First information numeral |
Coded system |
0 |
Without space |
1 |
Addition space |
Specifically, the first information is user's job number, and it is ten's digit representation, server gets use
After the job number of family, user's job number is scaled into binary representation mode, i.e. user's job number can be converted into numeral
1 and digital 0 combination.
In order to ensure the uniqueness of coding, the length of the binary representation mode of the first information must be with institute
State preset length identical, the preset length as described in curtailment, then to the left with 0 polishing, for example, default length
It is 6 to spend, and the binary representation of numeral 6 is 110, and length is 3, not enough preset length, then to the left with 0
Representation after polishing is 000110.
For example, 110 and 110000, in the case that length is differed, to add space or without space
Coded system is encoded to site information, the information after coding, may be completely the same, it is impossible to ensure coding
Uniqueness.
S230:The coded system inquired described in server by utilizing is encoded to targeted website information, and will
Information after coding is sent to the target terminal user.
Preset rules as described in Table 2, server can be by the binary representation of the preset length of the first information
Mode corresponds to coded system, and each bit digital that will be in the first information corresponds to addition space or do not add
Plus space.The server can be compiled using these coded systems to presupposed information position in targeted website
Code.
In the present embodiment, the length of the presupposed information position can be equal to the preset length.
In the present embodiment, the preset length is 6 characters, and presupposed information position could be arranged to every a line
Preceding 6 characters.Preceding 6 character of the coded system that server by utilizing is inquired to every a line of site information
Encoded, for example, the decimal representation of user's job number is 5, it is that two after 6 enter to be converted into preset length
Tabulation is shown as 000101, the coded system of representative be exactly without space, without space, without space,
Addition space, adds space, without space.Information as shown in Figure 2, user's job number is 5 company personnel,
Read the information.Server calculates binary user job number and is expressed as 000101, root according to user's job number 5
According to preset rules, job number 000101 is corresponded into coded system, i.e., without space, without space,
Without space, space is added, space is added, without space, at the 4th of every a line and the 6th
Space is added after character, without space after first, second and third, five characters.
Information after coding as shown in Figure 4, the first six character of server to every a line of the site information
Encoded, added space per the 4th of a line and after the 6th character in the present embodiment, first,
2nd, without space after three, five characters.
Finally, the information after coding is returned to the targeted customer by server.The targeted customer can be with
Browse the information after coding.
Method in the present embodiment can help website that leakage user is quickly found out after information is compromised.
Fig. 5 is the detailed process of the embodiment information of the application one decoding, specifically includes following steps:
S510:Server receives picture to be decoded.
The picture to be decoded, is the picture of the site information of the doubtful leakage that portal management personnel have found.Such as
Portal management personnel need to find out the user of leakage site information, the picture to be decoded can be uploaded into institute
State server.After portal management user uploads the picture to be decoded, the server can receive described
Picture to be decoded.
S520:The server is split and is numbered to the picture to be decoded, and to segmentation with numbering after
To be resolved small picture parse obtaining analysis result.
Join Fig. 6, step S520 can specifically include:
S601:The server carries out the picture to be decoded to be divided into several small pictures to be resolved, and
Segmentation numbering is carried out to the small picture to be resolved.
In a computer, each picture is made up of many pixels, and each point is exactly 1 pixel,
One pixel is exactly a kind of color lump of color, and (i.e. picture size is 100 pictures to such as 10 pixel X10 pixels
Element) figure, be exactly in fact to combine per 10, side point (small color lump).
In a computer, one pixel of black white image is with 1 byte representation, for example, the pixel of black
It is to be represented by 0, the pixel of white is represented by 1.One pixel of coloured image is with three table of bytes
Show, three bytes represent three primary colors (R is red, and G is green, and B is blue) red green blue value of color respectively.In computer,
So-called " how many " of RGB refer to just brightness, and are represented using integer.Under normal circumstances, RGB is each
There are 256 grades of brightness, be expressed as from 0,1,2... until 255 with numeral.R represents red component, and G is represented
Green component, B represents blue component.In each component, numerical value is smaller, and brightness is lower, and numerical value is bigger, bright
Degree is higher.For example, the pixel of black is expressed as (0,0,0), i.e. rgb value in colored image
It is R=0, G=0, B=0;White pixel point is expressed as (255,255,255) in colored image,
And rgb value is R=255, G=255, B=255.
It is after the server receives picture to be decoded, the picture segmentation to be decoded is to be resolved small into several
Picture, and the small picture to be resolved is numbered.
The server can be solved according to by picture segmentation to be decoded into several treating comprising character
Analyse small picture.For example, the to be resolved small picture shown in Fig. 7, comprising a letter V.
Specifically, the server can scan the white pixel between character and character in picture to be decoded
Point is split, for example, in the picture to be decoded, each two character has small―gap suture between up and down,
The small―gap suture is constituted by by some rows or several columns white pixel point.The white pixel point, refer to
Rgb value is the pixel of (255,255,255).The server be all according to these rgb values (255,
255,255) row or column that pixel is represented is split, by picture segmentation to be decoded into only comprising one
The to be resolved small picture of character.If it is pointed out that there is space between character and character, server
Automatically the white pixel point shared by space can be divided into an independent to be resolved small picture.Specifically,
Representation of the space in picture, is the pixel of N rows and M row whites, space white in picture
Row of the numerical value of the row and column of pixel more than the white pixel point of the small―gap suture between above-mentioned character and character
With the numerical value of row.Server can automatically identify space according to the line number of white pixel point and columns, and
Pixel shared by space is divided into a small picture to be resolved.
The server by the picture segmentation to be decoded into after small picture to be resolved several described, to described
Small picture to be resolved is numbered, for example, can be according to from left to right, order from top to bottom is numbered,
The character picture number of the first row first row is 1, and the character picture number of the first row secondary series is 2, numbering
Can by that analogy, until to last column, last character picture number for arranging terminates.
S602:The server to the segmentation after to be resolved small picture parse obtaining analysis result.
Each described small picture to be resolved is also made up of several pixels, and each pixel has RGB
Value.When parsing the small picture to be resolved, the server is by each picture in the small picture to be resolved
Vegetarian refreshments, represents, wherein X represents that the pixel is treated described with a three-dimensional array (X, Y, RGB)
The line number in small picture is parsed, Y represents columns of the pixel in the small picture to be resolved, RGB
Value is exactly the red green blue value of color of the pixel.The pixel of the first row secondary series in Fig. 7, close to white,
In computer, its rgb value, for example, (253,252,254).Parse the small picture to be resolved
When, the analysis result of the pixel of the first row secondary series is【1,2, (253,252,254)】.Finally,
Each small picture to be resolved, the analysis result is the set of several three-dimensional arrays.For example, one is treated
Parsing small picture has 5*5 pixel, and finally, the analysis result described in small picture to be resolved, is exactly 25
The set of individual three-dimensional array, for example:
【1,1, (115,88,33)】【1,2, (11,188,133)】【1,3, (112,88,
123)】【Isosorbide-5-Nitrae, (115,77,233)】【1,5, (11,18,23)】
【2,1, (85,212,56)】【2,2, (98,59,53)】【2,3, (255,255,255)】
【2,4, (0,0,0)】【2,5, (96,77,78)】
【3,1, (253,252,254)】【3,2, (1,33,56)】【3,3, (8,255,255)】
【3,4, (0,88,67)】【3,5, (85,0,0)】
【4,1, (196,144,122)】【4,2, (11,56,33)】【4,3, (51,74,0)】
【4,4, (255,255,0)】【4,5, (255,0,89)】
【5,1, (77,88,33)】【5,2, (66,85,0)】【5,3, (11,14,133)】
【5,4, (0,255,255)】【5,5, (5,8,3)】
S530:The server is waited to solve in data base querying according to the number order of small picture to be resolved with described
Analyse the corresponding character information of analysis result of small picture.
In the database, the corresponding three-dimensional array set of all character informations is stored.
Compiled with character comprising character (Chinese character, numeral, English, symbol, space etc.) in the character information
Code word body.
For example, in database, the character information of the expression of three-dimensional array set as follows is, (word
Body:Black matrix, character:With).
【1,1, (110,188,33)】【1,2, (116,188,13)】【1,3, (112,88,
123)】【Isosorbide-5-Nitrae, (115,77,233)】【1,5, (11,18,23)】
【2,1, (85,212,56)】【2,2, (98,59,53)】【2,3, (245,255,255)】
【2,4, (0,0,0)】【2,5, (96,177,78)】
【3,1, (253,252,254)】【3,2, (1,33,56)】【3,3, (8,255,255)】
【3,4, (0,88,67)】【3,5, (85,255,0)】
【4,1, (196,144,122)】【4,2, (11,56,33)】【4,3, (51,74,0)】
【4,4, (255,255,0)】【4,5, (255,255,89)】
【5,1, (77,88,33)】【5,2, (66,85,0)】【5,3, (11,14,133)】
【5,4, (0,255,255)】【5,5, (5,8,3)】
The server is to be resolved small with described in data base querying according to the number order of small picture to be resolved
The corresponding character information of analysis result of picture.
Picture to be decoded as shown in Figure 3, is divided into after some small pictures, the character of the first row first row
" and " where the numbering of to be resolved small picture be 1, the three-dimensional array for obtaining of parsing is【1,1, (110,
188,33)】【1,2, (116,188,13)】【1,3, (112,88,123)】【Isosorbide-5-Nitrae, (115,
77,233)】【1,5, (11,18,23)】
【2,1, (85,212,56)】【2,2, (98,59,53)】【2,3, (245,255,255)】
【2,4, (0,0,0)】【2,5, (96,177,78)】
【3,1, (253,252,254)】【3,2, (1,33,56)】【3,3, (8,255,255)】
【3,4, (0,88,67)】【3,5, (85,255,0)】
【4,1, (196,144,122)】【4,2, (11,56,33)】【4,3, (51,74,0)】
【4,4, (255,255,0)】【4,5, (255,255,89)】
【5,1, (77,88,33)】【5,2, (66,85,0)】【5,3, (11,14,133)】
【5,4, (0,255,255)】【5,5, (5,8,3)】
The server inquires about the corresponding character information of the three-dimensional array in database, can inquire about
To (font:Black matrix, character:With).Finally, the server obtains the solution of all small pictures to be resolved
The corresponding character information of analysis result.
S540:The server extracts the corresponding character information of analysis result of the small picture to be resolved
In effective information, and the effective information is mapped as the first information according to preset rules.
The effective information, can be one or two in the font or character included in the character information
Combination.
In the embodiment of the application one, the effective information is font.
The server, extracts the corresponding effective information (font) of character of the presupposed information position,
Preset rules according to table 1, the first information is mapped as by the effective information (font).Example
Such as, in the present embodiment, Fig. 3 is picture to be decoded, and the presupposed information position is first three character of every a line,
The corresponding effective information (font) of first three character of the every a line of the server extraction is respectively black matrix,
The Song typeface, regular script, according to the preset rules of table 1, maps out the first information i.e. user's job number 104.
In the another embodiment of the application, the effective information that the server is extracted is character.
The server extracts the corresponding effective information (character) of the small picture to be resolved, and judges each
Whether there is space character after the character of the unblank of capable preceding described preset length, according to the preset rules of table 2,
Numeral 1 is mapped as if any space, no space is mapped as numeral 0, can obtain length is preset length 1
Combination with 0, described 1 and 0 combination is exactly the binary representation mode of the first information.Such as Fig. 4
Shown picture to be decoded, the server can be solved, first, second and third, five non-NULLs per a line
There is no space, have space after the 4th and the 6th nonspace character after lattice character, according to the preset rules of table 2,
The binary representation mode for mapping out the first information is exactly 000101, and it is exactly 5 to be converted to the decimal system, finally may be used
It is the user that user's job number is 5 with the user for finding leakage site information.
Method in the present embodiment can help website that leakage user is quickly found out after information is compromised.
The device of the information coding that Fig. 8 is provided for the embodiment of the application one, including:
Acquisition module 800, the first information for obtaining targeted customer;
Enquiry module 810, obtains corresponding to the first information of the acquisition for the inquiry in preset rules
Coded system;
Coding module 820, the coded system for being inquired described in is encoded to targeted website information;
Sending module 830, for the information after coding to be sent to the target terminal user.
The device of the information decoding that Fig. 9 is provided for the embodiment of the application one, including:
Receiver module 900, for receiving picture to be decoded.
Parsing module 910, for the picture to be decoded to be split and numbered, and to segmentation and numbering
To be resolved small picture afterwards parse obtaining analysis result.
The parsing module 910, can be comprising segmentation module and numbering module:
The segmentation module, for by picture segmentation to be decoded into several small pictures to be resolved;
The numbering module, is numbered for the to be resolved small picture after to segmentation.
Enquiry module 920, treats in data base querying for the number order according to small picture to be resolved with described
Parse the corresponding character information of analysis result of small picture.
Mapping block 930, in the corresponding character information of analysis result according to the small picture to be resolved
Effective information, the effective information is mapped as the first information according to preset rules.
The effective information, can be one or two in the font or character included in the character information
Combination.
The embodiment of the present application provides data encoding information coding method, coding/decoding method and device, by by target
The first information of user is converted to coded system, and targeted website information is encoded, so that user browses
Site information there is the feature of user.After user's sectional drawing leakage site information, can be revealed by decoding
The picture of information, corresponds to the user of leakage site information, facilitates portal management personnel to rapidly find out leakage and uses
Family, prevents it from revealing site information again.
In the nineties in 20th century, it is changing on hardware that can clearly be distinguished for the improvement of a technology
The improvement entered on (for example, the improvement to circuit structures such as diode, transistor, switches) or software is (right
In the improvement of method flow).However, with the development of technology, the improvement of current many method flows is
Through directly improving for hardware circuit can be considered as.Designer is nearly all by by improved method flow
It is programmed into hardware circuit to obtain corresponding hardware circuit.Therefore, it cannot be said that method flow
Improvement cannot be realized with hardware entities module.For example, PLD (Programmable
Logic Device, PLD) (for example field programmable gate array (Field Programmable Gate Array,
FPGA it is exactly)) such a integrated circuit, its logic function is determined by user to device programming.By setting
Meter personnel are voluntarily programmed a digital display circuit " integrated " on a piece of PLD, without asking chip system
Manufacturer is made to design and make special IC chip.And, nowadays, substitution manually makes integrated
Circuit chip, this programming also uses " logic compiler (logic compiler) " software instead to realize mostly,
Software compiler used is similar when it writes with program development, and the source code before compiling also is obtained
Write with specific programming language, this is referred to as hardware description language (Hardware Description
Language, HDL), and HDL is also not only a kind of, but have many kinds, such as ABEL (Advanced
Boolean Expression Language)、AHDL(Altera Hardware Description Language)、
Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL
(Ruby Hardware Description Language) etc., that most commonly use at present is VHDL
(Very-High-Speed Integrated Circuit Hardware Description Language) with
Verilog.Those skilled in the art also will be apparent to the skilled artisan that and only need to method flow with above-mentioned several hardware descriptions
Language slightly programming in logic and is programmed into integrated circuit, it is possible to is readily available and is realized the logical method stream
The hardware circuit of journey.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor
Or processor and storage can be by computer readable program code (such as softwares of (micro-) computing device
Or firmware) computer-readable medium, gate, switch, application specific integrated circuit (Application Specific
Integrated Circuit, ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, controller
Example include but is not limited to following microcontroller:ARC 625D、Atmel AT91SAM、Microchip
PIC18F26K20 and Silicone Labs C8051F320, Memory Controller is also implemented as depositing
A part for the control logic of reservoir.It is also known in the art that except with pure computer-readable program
Code means are realized beyond controller, can cause to control by the way that method and step is carried out into programming in logic completely
Device is with the shape of gate, switch, application specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc.
Formula realizes identical function.Therefore this controller is considered a kind of hardware component, and to bag in it
The structure that the device for realizing various functions for including can also be considered as in hardware component.Or even, can be with
To be used to realizing that the device of various functions is considered as not only being the software module of implementation method but also can be hardware
Structure in part.
System, device, module or unit that above-described embodiment is illustrated, specifically can be by computer chip or reality
Body is realized, or is realized by the product with certain function.
For convenience of description, it is divided into various units with function during description apparatus above to describe respectively.Certainly,
The function of each unit can be realized in same or multiple softwares and/or hardware when the application is implemented.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or meter
Calculation machine program product.Therefore, the present invention can be using complete hardware embodiment, complete software embodiment or knot
Close the form of the embodiment in terms of software and hardware.And, the present invention can be used and wherein wrapped at one or more
Containing computer usable program code computer-usable storage medium (including but not limited to magnetic disk storage,
CD-ROM, optical memory etc.) on implement computer program product form.
The present invention is produced with reference to method according to embodiments of the present invention, equipment (system) and computer program
The flow chart and/or block diagram of product is described.It should be understood that can by computer program instructions realize flow chart and
/ or block diagram in each flow and/or the flow in square frame and flow chart and/or block diagram and/
Or the combination of square frame.These computer program instructions to all-purpose computer, special-purpose computer, insertion can be provided
The processor of formula processor or other programmable data processing devices is producing a machine so that by calculating
The instruction of the computing device of machine or other programmable data processing devices is produced for realizing in flow chart one
The device of the function of being specified in individual flow or multiple one square frame of flow and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in can guide computer or the treatment of other programmable datas to set
In the standby computer-readable memory for working in a specific way so that storage is in the computer-readable memory
Instruction produce include the manufacture of command device, the command device realization in one flow of flow chart or multiple
The function of being specified in one square frame of flow and/or block diagram or multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices, made
Obtain and series of operation steps is performed on computer or other programmable devices to produce computer implemented place
Reason, so as to the instruction performed on computer or other programmable devices is provided for realizing in flow chart one
The step of function of being specified in flow or multiple one square frame of flow and/or block diagram or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/defeated
Outgoing interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory
And/or the form, such as read-only storage (ROM) or flash memory (flash RAM) such as Nonvolatile memory (RAM).
Internal memory is the example of computer-readable medium.
Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be by appointing
What method or technique realizes information Store.Information can be computer-readable instruction, data structure, program
Module or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory
(PRAM), static RAM (SRAM), dynamic random access memory (DRAM), its
The random access memory (RAM) of his type, read-only storage (ROM), electrically erasable are read-only
Memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage
(CD-ROM), digital versatile disc (DVD) or other optical storages, magnetic cassette tape, tape magnetic
Disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be calculated
The information that equipment is accessed.Defined according to herein, computer-readable medium does not include temporary computer-readable matchmaker
Body (transitory media), such as data-signal and carrier wave of modulation.
Also, it should be noted that term " including ", "comprising" or its any other variant be intended to non-row
His property is included, so that process, method, commodity or equipment including a series of key elements not only include
Those key elements, but also other key elements including being not expressly set out, or also include for this process,
Method, commodity or the intrinsic key element of equipment.In the absence of more restrictions, by sentence " including
One ... " key element that limits, it is not excluded that in the process including the key element, method, commodity or set
Also there is other identical element in standby.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer journey
Sequence product.Therefore, the application can using complete hardware embodiment, complete software embodiment or combine software and
The form of the embodiment of hardware aspect.And, the application can be used and wherein include calculating at one or more
Machine usable program code computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM,
Optical memory etc.) on implement computer program product form.
The application can be described in the general context of computer executable instructions, example
Such as program module.Usually, program module includes performing particular task or realizes particular abstract data type
Routine, program, object, component, data structure etc..This can also in a distributed computing environment be put into practice
Application, in these DCEs, by the remote processing devices connected by communication network come
Execution task.In a distributed computing environment, program module may be located at including local including storage device
In remote computer storage medium.
Each embodiment in this specification is described by the way of progressive, identical phase between each embodiment
As part mutually referring to, what each embodiment was stressed be it is different from other embodiment it
Place.For especially for system embodiment, because it is substantially similar to embodiment of the method, so description
Fairly simple, the relevent part can refer to the partial explaination of embodiments of method.
Embodiments herein is the foregoing is only, the application is not limited to.For this area skill
For art personnel, the application can have various modifications and variations.All institutes within spirit herein and principle
Any modification, equivalent substitution and improvements of work etc., within the scope of should be included in claims hereof.