Embodiment
To make the purpose, technical scheme and advantage of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described corresponding accompanying drawing.Obviously, described embodiment is only the application one
Section Example, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Go out the every other embodiment obtained under the premise of creative work, belong to the scope of the application protection.
Below in conjunction with accompanying drawing, the technical scheme that each embodiment of the application is provided is described in detail.
A kind of process for authentication that Fig. 1 provides for the embodiment of the present application, specifically includes following steps:
S101:Determine the corresponding checking scene of account to be verified described in current time.
In the prior art, no matter the initiator of authentication process itself is user or service provider, but for body
Part checking the problem of be generally all stored in server, and be also required to by server send to terminal carry out identity test
Card, that is to say, that be that account to be verified is determined by server, and select corresponding safety problem in usual authentication process itself
Send to the terminal of the Account Logon to be verified, carry out authentication process itself.Similarly, in the embodiment of the present application, can be by taking
Business device determines account to be verified, and each safety problem corresponding with the account to be verified.
Specifically, the server can determine the account for needing to carry out authentication using method same as the prior art,
It is used as account to be verified.For example, when any account in long-time without usage record, and when there is login behavior suddenly, it is determined that
The account needs to carry out authentication, and it is account to be verified to determine the account, or, when any account is initiated to be related to privacy information
Service request when, determine the account need carry out authentication, determine the account be account to be verified, or, when any
When the behavior of account records far from each other with historical behavior, determine that the account needs to carry out authentication, determine the account to treat
Account etc. is verified, the service implement body determines that the account the application to be verified is not limited using which kind of mode, can use
A variety of methods same as the prior art.
Further, since in the prior art, in order to improve the flexibility set a question during authentication and for authentication
Safety problem security, generally each account can correspond to multiple safety problems.And needing to test account progress identity
During card, the server can determine corresponding multiple safety problems according to the mark of the account, then select from each safety problem to refer to
The safety problem of fixed number amount is used for authentication, so that safety problem when carrying out authentication every time can incomplete one
Cause, both added the flexibility set a question, the exposure rate of each safety problem is reduced again, security is improved.
Similarly, in this application, the server also can determine that the corresponding each safety problem of the account to be verified, so as to follow-up
Operation.Specifically, the server can be according to the mark of the account to be verified of determination, from the mark of stored each account
Know in the corresponding relation with the mark of each safety problem, determine the mark of each safety problem of mark correspondence of the account to be verified,
And each safety problem corresponding with the account to be verified is determined by the mark of each safety problem, certainly, the server can also be adopted
Each safety problem corresponding with the account to be verified is determined in other ways, and the application is not limited this, and is repeated no more.
It should be noted that in the embodiment of the present application, the server can be a single equipment or again
The system of multiple devices composition, i.e. distributed server.
Further, as it was noted above, due to the correct option of different safety problems, may be deposited under different scenes
In the possibility being learned, (e.g., the account after login, due to may browse through most of accounts information in the account, causes one
The possibility increase that the correct option of Partial security problem is learned), and in order to avoid causing peace because accounts information is learned
The situation that the accuracy of full problem declines occurs, in the embodiment of the present application, when the server determine the account to be verified with
And after the corresponding each safety problem of the account to be verified, the server can also determine the corresponding checking field of the account to be verified
Scape, i.e. the scene when carrying out authentication residing for the account to be verified, so as to the progress of follow-up step.
Specifically, because the server is it is determined that after the account to be verified, the account to be verified generally only carries out body
Business can be just continued executing with after part checking, or the process that the account to be verified exits authentication does not continue to perform industry
Business, so after the server determines the account to be verified, the scene residing for the general account to be verified is in authentication knot
It will not change before beam.Then, in this application, the server can determine that this is to be tested according to default checking scene classification
Demonstrate,prove the checking scene residing for account current time.
Wherein, the default checking scene classification at least includes:The checking scene of login and the checking for performing business
Scape.The checking scene of the login, i.e. when the account to be verified is not yet logined successfully, the server is carried out to the account to be verified
The scene of authentication.The checking scene of the execution business, i.e. the account to be verified has logged on success, and in executable
During the state of business, the server carries out the scene of authentication to the account to be verified.Also, the default checking scene
Classification can be by staff according to being set the need for practical application, for example, it is assumed that for each account, the account is calling
Need to use password A during the account corresponding shopping list, and call the account corresponding personal information be need to use it is close
Code B, then the server can also add checking scenario A and checking scenario B, correspond respectively to the account call shopping list it
Checking scene and the account afterwards have invoked the checking scene after personal information.
That is, in this application, the division of the checking scene be able to can currently be called based on the account with the account
The corresponding accounts information in family difference and divide.By taking the checking scene of login and the scene of execution business checking as an example, this is to be tested
Card account can not obtain each accounts information corresponding with the account to be verified before registration, then can determine that the checking in the login
The possibility that each accounts information of the account to be verified has been learned under scape is relatively low, and under the scene of the execution business, this is to be tested
Card account can access the corresponding each accounts information of the account to be verified, so each accounts information of the account to be verified is
The possibility being learned is higher.Certainly, in addition to the checking scene of login and the checking scene of execution business, the checking
How scape can also divide the application and be not specifically limited, as it was previously stated, can be by staff rule of thumb or practical application
The need for be configured.
It should be noted that in this application, calling after accounts information, then account information, which can be corresponded to, has an access
Record, to show that account information was called.
S102:According to the checking scene, the information being learned in the account to be verified is determined, and/or do not obtained
The information known.
In the embodiment of the present application, as described in step S101, because under different checking scenes, this is to be verified
Probability that the corresponding different accounts information of account has been learned is different, and the safety problem generated by prior art
Correct option, is possible to what is determined or be inferred to by the corresponding each accounts information of the account to be verified.For example, according to
The correct option of the safety problem for the fact that the be of little use information generation that family is known, it is possible to by being stored in the account to be verified
User personal information be inferred to (e.g., for safety problem " your City of birth ", then can be by being set in the account to be verified
" location " in the personal information put is inferred to), and the correct option of the safety problem of generation is recorded by the access of user,
It can then determine (e.g., for safety problem " the selection film that last week, you watched ", then may be used by the access record of the account to be verified
Determined by the purchaser record of the user), so the server can determine that the accounts information being learned, so as to subsequent operation.
Specifically, in this application, the server can be according to corresponding pass of the default accounts information with checking scene first
System, it is determined that under the checking scene that the account to be verified is presently in, in the corresponding all accounts informations of the account to be verified, deposits
In the possible accounts information of leakage, i.e. the information that would know that.
Afterwards, because the accounts information that under different checking scenes, the account to be verified would know that is different, but it can obtain
It is not meant to that account information has been learned.And the accounts information that would know that for each, if the account that would know that
Information is not by the account access mistake to be verified, then the possibility that accounts information can be called to be learned is still smaller, institute
It can also be determined with the server in preset time period, the access record of the account to be verified.
Then, the server can also be recorded according to the access, determine that the account to be verified is visited within the default period
The accounts information asked, the then accounts information that the account did not access in preset time period, although in current checking scene
Under can be accessed, but be not accessed yet, then the probability that the accounts information not accessed has been learned is relatively low.
Then, the server can be recorded according to access of the account to be verified in preset time period, from current authentication
In the accounts information that would know that under scene, it is determined that the accounts information being learned, that is, the information being learned.
Wherein, the default accounts information and the corresponding relation of checking scene can use formulaRepresent, K
Accounts information and the corresponding relation of checking scene are represented, S represents to verify scene, and i represents the numbering of different checking scenes, SiI.e.
I-th of checking scene is represented, I represents accounts information, IjRepresent j-th of accounts information, K (Si, IjThe numeral of)=1 represents IjAccount
Information is in SiIt not would know that under checking scene, K (Si, IjThe numeral of)=0 represents IjAccounts information is in SiIt would know that under checking scene.
And access record of the account to be verified in preset time period, formula can be used
Represent, V represents accessed accounts information and the corresponding relation of the account to be verified, U represents account to be verified, UiRepresent i-th
The account to be verified in account to be verified, i.e. the application, T represents preset time period, TkRepresent kth kind preset time period, I tables
Show accounts information, IjRepresent j-th of accounts information, V (Ui, Tk, Ij)=1 represents IjAccounts information is in TkIn preset time period not by
UiAccount access mistake to be verified, V (Ui, Tk, Ij)=0 represents IjAccounts information is in TkBy U in preset time periodiAccount to be verified
Accessed, wherein, the TkWith the SiThere is corresponding relation, and can be set by staff, wherein, when the checking scene needs to make
Authentication (that is, the low safety problem of correct option has been learned possibility) is carried out with the higher safety problem of security,
The then TkDuration can be longer, vice versa.
In addition, in this application, the default accounts information and the corresponding relation of checking scene, can by staff according to
The demand setting of experience or practical application.For convenience of description, the information that the application determines to be learned with the server continues
Subsequent step S103 explanation, the server determines the process for the information not being learned, it is seen that subsequent descriptions.
S103:When it is determined that be learned information when, asked using the safety unconnected to the information being learned
Topic carries out authentication to the account to be verified, when it is determined that be not learned information when, using with the letter not being learned
The safety problem of manner of breathing association carries out authentication to the account to be verified.
In the embodiment of the present application, when the server determines the corresponding accounts information being learned of the account to be verified
After (that is, the information being learned), due to the corresponding each safety problem of accounts information and this account to be verified being learned
Correct option have and can be associated, and if the correct option of any safety problem is associated with the accounts information being learned,
The accuracy of the safety problem is relatively low, is unsuitable for being used for authentication, so what the server was also an option that and had been learned
The unconnected safety problem of accounts information, i.e. the safety problem of answer can not be obtained by the accounts information being learned is right
The account to be verified carries out authentication.
Specifically, the server can be directed to the account to be verified each safety problem, according to default accounts information with
The corresponding relation of safety problem, it is determined that the accounts information associated with the correct option of the safety problem, afterwards, the server can
The associated accounts information of correct option and the account being learned determined in step s 103 of the safety problem are judged again
Whether family information matches, if, it is determined that the safety problem is associated with the accounts information being learned, if not, it is determined that should
Safety problem is unconnected to the accounts information being learned.Also, due to the server determine in step s 103 by
The accounts information known can be several, as long as so the server can determine any accounts information being learned with being somebody's turn to do
The correct option of safety problem is associated, you can determine that the safety problem is associated with the accounts information being learned.
Wherein, the default accounts information and the corresponding relation of safety problem can use formulaRepresent,
R represents accounts information and the corresponding relation of safety problem, and Q represents safety problem, QiI-th of safety problem is represented, I represents account
Information, IjRepresent j-th of accounts information, R (Qi, IjThe numeral of)=1 represents IjAccounts information and QiThe correct option of safety problem is not
It is associated, R (Qi, IjThe numeral of)=0 represents IjAccounts information and QiThe correct option of safety problem is associated, wherein, accounts information
It is associated with correct option, represent to determine or be inferred to the correct option by account information.
It should be noted that the beginning and ending time of the preset time period can be set by staff, for example, being opened from current time
Begin to recall, determine the default period.
Further, because the server can determine the corresponding K (S of the account to be verified in step s 103i, Ij) with
And V (Ui, Tk, Ij), so when the server determines the corresponding R (Q of the account to be verifiedi, Ij) after, the server just can lead to
Cross formula For each peace
Full problem, calculates the score of the safety problem, wherein, M represents account U to be verifiediAccounts information total quantity.When the score
When being not 0, i.e. A (Ui, Sj, Qk)>When 0, determine that the possibility that the correct option of the safety problem has been learned is relatively low, can be used for
Authentication, wherein, A (Ui, Sj, Qk) represent account U to be verifiediSafety problem QkIn checking scene SjUnder score.
Finally, when the server determine available for authentication each safety problem after, just can be used any one or
The multiple safety problems that should be available for authentication of person, authentication is carried out to the account to be verified.
In addition, in this application, the corresponding relation of the default accounts information and safety problem, can by staff according to
The demand setting of experience or practical application.
By the method for authentication as shown in Figure 1, the server is determining account to be verified and this is to be verified
After the corresponding each safety problem of account, the checking scene residing for the account current time to be verified can be first determined, afterwards basis
Default accounts information and the corresponding relation of checking scene, are determined under the current time checking scene, the account that may be learned
Information, is recorded according to the access of the account to be verified in preset time period, determines that the account to be verified adjusts used accounts information,
It is determined that the accounts information being learned, finally, according to default accounts information and the corresponding relation of safety problem, it is determined that correctly answering
The case each safety problem associated with the accounts information being learned, and using other safety problems in the account to be verified
(that is, the safety problem unconnected to the accounts information being learned), authentication is carried out to the account to be verified.It can be seen that,
The method provided by the application, can be recorded according to the access of user, and each accounts information and safety problem correct option
Whether be associated, determine current time checking scene under, available safety problem.No longer simply only because verifying scene
Difference, and the safety problem of selection is determined, while the record of the access based on user so that the selection of setting a question of safety problem more may be used
Letter, while the resource using existing safety problem is improved, also improves the accuracy of safety problem, and then cause identity
The result of checking is more credible, and improves the efficiency of authentication.
In addition, in the embodiment of the present application, account information can include:Personal letter corresponding with the account to be verified
Breath, the user behaviors log of the account to be verified.Wherein, the corresponding personal information of the account to be verified may include:The account to be verified
The user profile (e.g., name, date of birth, sex, marital status etc.) of middle storage, the user for holding the account to be verified are pre-
The answer of the safety problem and safety problem that first set, the interlock account of the account to be verified, the good friend of the account to be verified
List etc., and the user behaviors log of the account to be verified may include:The account to be verified browses the record of information, the purchase of the account
Can the behavior comprising the account to be verified day in thing record, payment record of the account etc., the account access record to be verified
Will, still, access record are generally only determined by the server, and behavior daily record can generally pass through the account to be verified
It is determined that, for example, for account s, user changes the behavior of personal information, it can be recorded in account s access record, and by
The server is determined, but without record in account s user behaviors log, anyone is logged in after account s, can only browse this
Account s user behaviors log, determines the account browsed information, and can not know account s personal information and be modified.
It should be noted that in this application in step S103 and step S104, it is determined that the accounts information being learned
And the step of determine associated with safety problem accounts information and the relation of absolute sequencing is not present, can be simultaneously
It is determined that can also sequentially determine, as long as,, can be with to each safety problem of the account to be verified before authentication is carried out
Determine whether the safety problem is associated with the accounts information that has been learned, and using the accounts information with being learned
Unconnected safety problem enters authentication.
Another embodiment that the application is provided, it is assumed that user a is in login account U1When, there is provided two safety problems, Q1:
Where your birthplace isAnd Q2:Your senior middle school's form master's name, also, use account U in the user a1Process
In, server b is according to account U1Access record, generate safety problem, Q3:What the article that you often buy isAnd
Q4:Which is your good friend below, then, and account U1The problem of correspondence, can be as shown in table 1.
Problem identification |
Question text |
Q1 |
Where your birthplace is |
Q2 |
Your senior middle school's form master's name |
Q3 |
What the article that you often buy is |
Q4 |
Which is your good friend below |
Table 1
Also, account U1Corresponding accounts information can be as shown in table 2.
Accounts information is identified |
Accounts information content |
I1 |
Account U1Personal information |
I2 |
Account U1Shopping information |
I3 |
Account U1Buddy list |
Table 2
Meanwhile, default checking scene is the checking scene of the checking scene and execution business logged in server b,
As shown in table 3.
Verify scene identity |
Verify scene |
S1 |
The checking scene of login |
S2 |
The checking scene of execution business |
Table 3
In addition, corresponding relation of the default accounts information with verifying scene in server b, i.e. K (Si, Ij), can be such as table 4
It is shown.
Table 4
It is visible by table 4, as account U1After login, account U can be accessed1Corresponding all accounts informations, so
In scene S2Under, each accounts information I1、I2And I3There is the possibility being learned.
Further, default accounts information and the corresponding relation of safety problem in server b, i.e. R (Qi, Ij), can
As shown in table 5.
Table 5
It is visible by table 5, accounts information I1With safety problem Q1Correct option be associated, i.e. pass through account U1In set
The personal information put, it may be determined that the birthplace information of the user, accounts information I2With safety problem Q3Correct option it is related
Connection, i.e. pass through account U1Shopping information, it may be determined that the commodity that the user buys in the recent period, accounts information I3With safety problem
Q4Correct option be associated, i.e. pass through account U1Buddy list, it may be determined that the good friend of the user, that is to say, that logical
Cross each accounts information I being learned1、I2、I3, safety problem Q can be obtained respectively1、Q3、Q4Answer.
Finally, server b just can be according to formula To the account U of the user a1Corresponding each safety problem, calculates obtaining for the safety problem
Point, then, safety problem Q1It is scored at 0, safety problem Q2It is scored at 1, safety problem Q3It is scored at 0, safety problem Q4
1 is scored at, server b can determine to use safety problem Q2And Q4, to account U1Carry out authentication, i.e. use
The safety problem of answer can not be obtained by the accounts information being learned, authentication is carried out.
Further, in another embodiment that the application is provided, due in the embodiment of the present application step S103, the clothes
Business device can determine the corresponding information being learned of the account to be verified, so the server can also be true in step s 103
The information not being learned in the fixed account to be verified.Wherein, the information can be the accounts information of the account to be verified.
Then, in the application step S104, the server can also determine correct option with being somebody's turn to do from each safety problem
The safety problem for the accounts information matching not being learned, and authentication is carried out to the account to be verified.
Specifically, first, in the application step S103, the server can use formula It is determined that
Default accounts information and the corresponding relation of checking scene, wherein, K represents accounts information and the corresponding relation of checking scene, S tables
Show checking scene, i represents the numbering of different checking scenes, SiI-th of checking scene is represented, I represents accounts information, IjTable
Show j-th of accounts information, K (Si, Ij)=1 represents IjAccounts information is in SiIt would know that under checking scene, K (Si, Ij)=0 represents Ij
Accounts information is in SiIt not would know that under checking scene.
Formula can be usedDetermine access note of the account to be verified in preset time period
Record, wherein, V represents accessed accounts information and the corresponding relation of the account to be verified, and U represents account to be verified, UiRepresent i-th
Individual account to be verified, i.e., the account to be verified in the application, T represents preset time period, TkRepresent kth kind preset time period, I
Represent accounts information, IjRepresent j-th of accounts information, V (Ui, Tk, Ij)=1 represents IjAccounts information is in TkQuilt in preset time period
UiAccount access mistake to be verified, V (Ui, Tk, Ij)=0 represents IjAccounts information is in TkNot by U in preset time periodiAccount to be verified
Accessed, wherein, the TkWith the SiThere is corresponding relation, and can be set by staff, wherein, when the checking scene needs to make
Authentication (that is, the low safety problem of correct option has been learned possibility) is carried out with the higher safety problem of security,
The then TkDuration can be longer, vice versa.
Secondly, in the application step S104, the server can use formulaDetermine default
The corresponding relation of accounts information and safety problem, R represents accounts information and the corresponding relation of safety problem, and Q represents safety problem,
QiI-th of safety problem is represented, I represents accounts information, IjRepresent j-th of accounts information, R (Qi, Ij)=1 represents IjAccounts information
With QiThe correct option of safety problem is associated, R (Qi, Ij)=0 represents IjAccounts information and QiThe correct option of safety problem is not
It is associated, wherein, accounts information is associated with correct option, represents to determine or be inferred to this just by account information
True answer.
Finally, the server just can pass through formula For each safety problem, the score of the safety problem is calculated, wherein, M represents account to be verified
Family UiAccounts information total quantity.When this is scored at 0, i.e. A (Ui, Sj, QkDuring)=0, it is determined that the account letter not being learned
Breath is matched with the correct option of the safety problem, that is to say, that the server can determine that the correct option of the safety problem is obtained
The possibility known is relatively low, available for authentication.
Then, when the server determine available for authentication each safety problem after, just can be used any one or
The multiple safety problems that should be available for authentication of person, authentication is carried out to the account to be verified.
It can be seen that, the server can also use the correct option each safety problem associated with the accounts information not being learned,
Authentication is carried out to the account to be verified.The method provided by the application, can be recorded according to the access of user, and each account
Whether family information is associated with the correct option of safety problem, determines under current time checking scene, available safety problem.
It is no longer simple and to determine the safety problem of selection only because the difference of checking scene, while the record of the access based on user, makes
The selection of setting a question for obtaining safety problem is more credible, while the resource using existing safety problem is improved, also improves peace
The accuracy of full problem, and then make it that the result of authentication is more credible, and improve the efficiency of authentication.
It should be noted that the executive agent that the embodiment of the present application provides each step of method may each be same and set
It is standby, or, this method is also used as executive agent by distinct device.Such as, step S101 and step S102 executive agent can be with
For equipment 1, step S103 executive agent can be equipment 2;Again such as, step S101 executive agent can be equipment 1, step
Rapid S102 and step S103 executive agent can be equipment 2;Etc., i.e. the server can be made up of multiple devices
Distributed server.Meanwhile, the executive agent of each step for the method that the embodiment of the present application is provided also is not limited to server,
Can also be terminal, the terminal can be the equipment such as mobile phone, PC, tablet personal computer.
Based on the authentication process itself shown in Fig. 1, the embodiment of the present application also corresponds to and provides a kind of device of authentication, such as
Shown in Fig. 2.
A kind of structural representation of the device for authentication that Fig. 2 provides for the embodiment of the present application, including:
First determining module 201, determines the current corresponding checking scene of the account to be verified;
Second determining module 202, according to the checking scene, determines the information being learned in the account to be verified,
And/or the information not being learned;
Authentication module 203, when it is determined that be learned information when, using uncorrelated to the information being learned
The safety problem of connection carries out authentication to the account to be verified, when it is determined that be not learned information when, using with it is described not
The safety problem that the information being learned is associated carries out authentication to the account to be verified.
The checking scene at least includes:The checking scene of execution business after the checking scene of login and login.
Second determining module 202, according to default accounts information with verifying the corresponding relation of scene and described treating
The access record of account is verified, it is determined that account corresponding and being accessed within the default period with the checking scene is believed
Breath, as the information being learned, and/or determine with it is described verify scene it is corresponding and within the default period not by
The accounts information accessed, is used as the information not being learned.
Second determining module 202, according to default checking scene and the corresponding relation of period, determines the checking
The scene corresponding period, it is determined that the accounts information being accessed within the checking scene corresponding period, according to default
Checking scene and the corresponding relation of period, checking scene corresponding period is determined, it is determined that in the checking scene
The accounts information not being accessed in the corresponding period.
The authentication module 203, when it is determined that be learned information when, be learned using correct option with described
Information unmatched safety problem authentication is carried out to the account to be verified, when it is determined that be not learned information when, adopt
Authentication is carried out to the account to be verified with the safety problem of correct option and the information matches not being learned.
Described information includes:Personal information corresponding with the account to be verified, the user behaviors log of the account to be verified.
Specifically, the device of above-mentioned authentication as shown in Figure 2 can be located in server, the service implement body can be with
It is an equipment or the system being made up of multiple devices, i.e. distributed server.
Based on the authentication process itself shown in Fig. 1, the embodiment of the present application also corresponds to the device for providing another authentication,
As shown in Figure 3.
A kind of structural representation of the device for authentication that Fig. 3 provides for the embodiment of the present application, including:
Determining module 301, determines the current corresponding checking scene of account to be verified;
Scoring modules 302, for the safety problem prestored, according to formula
Calculate score A of the safety problem in the checking scene;
Authentication module 303, the safety problem being not zero using score A is carried out identity to the account to be verified and tested
Card;
Wherein, IjJ-th of accounts information in the account to be verified is represented, M represents the account letter of the account to be verified
Cease total quantity;As the accounts information IjWhen unconnected to the correct option of the safety problem, R (Ij)=1, otherwise R (Ij)
=0;As the accounts information IjWhen not would know that in the checking scene, K (Ij)=1, otherwise K (Ij)=0;When the account
Family information IjIt is not out-of-date by the account access to be verified in the preset time period, V (Ij)=1, otherwise V (Ij)=0.
In addition, the formulaAuthentication that specifically can be as shown in Figure 1
During formulaIt is public
Formula R (Ij)、K(Ij) and V (Ij) it can specifically distinguish the formula during authentication as shown in Figure 1AndFor above-mentioned formula specifically
Bright and calculating process the application is repeated no more.
Specifically, the device of above-mentioned authentication as shown in Figure 3 can be located in server, the service implement body can be with
It is an equipment or the system being made up of multiple devices, i.e. distributed server.
In the 1990s, for a technology improvement can clearly distinguish be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (for the improvement of method flow).So
And, with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Designer nearly all obtains corresponding hardware circuit by the way that improved method flow is programmed into hardware circuit.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, PLD
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, its logic function is determined by user to device programming.By designer
Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, without asking chip maker to design and make
Special IC chip.Moreover, nowadays, substitution manually makes IC chip, and this programming is also used instead mostly " patrols
Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development,
And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but have many kinds, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present
Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also should
This understands, it is only necessary to slightly programming in logic and be programmed into method flow in integrated circuit with above-mentioned several hardware description languages,
The hardware circuit for realizing the logical method flow can be just readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing
Device and storage can by the computer of the computer readable program code (such as software or firmware) of (micro-) computing device
Read medium, gate, switch, application specific integrated circuit (Application Specific Integrated Circuit,
ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, the example of controller includes but is not limited to following microcontroller
Device:ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, are deposited
Memory controller is also implemented as a part for the control logic of memory.It is also known in the art that except with
Pure computer readable program code mode is realized beyond controller, can be made completely by the way that method and step is carried out into programming in logic
Obtain controller and come real in the form of gate, switch, application specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc.
Existing identical function.Therefore this controller is considered a kind of hardware component, and various for realizing to including in it
The device of function can also be considered as the structure in hardware component.Or even, can be by for realizing that the device of various functions is regarded
For that not only can be the software module of implementation method but also can be the structure in hardware component.
System, device, module or unit that above-described embodiment is illustrated, can specifically be realized by computer chip or entity,
Or realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet PC, wearable device or these equipment
The combination of equipment.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented
The function of each unit can be realized in same or multiple softwares and/or hardware during application.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the present invention can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the present invention can be used in one or more computers for wherein including computer usable program code
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein
Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, commodity or equipment including a series of key elements are not only including those key elements, but also wrap
Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described
Also there is other identical element in process, method, commodity or the equipment of element.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product.
Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code
The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The application can be described in the general context of computer executable instructions, such as program
Module.Usually, program module includes performing particular task or realizes routine, program, object, the group of particular abstract data type
Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these DCEs, by
Remote processing devices connected by communication network perform task.In a distributed computing environment, program module can be with
Positioned at including in the local and remote computer-readable storage medium including storage device.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment
Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.It is real especially for system
Apply for example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method
Part explanation.
Embodiments herein is the foregoing is only, the application is not limited to.For those skilled in the art
For, the application can have various modifications and variations.It is all any modifications made within spirit herein and principle, equivalent
Replace, improve etc., it should be included within the scope of claims hereof.