Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a process of rights management provided in an embodiment of the present application, which specifically includes the following steps:
s101: and receiving a credential generation request sent by a user through an account.
In the application, when the user cannot use the terminal device of the user and cannot use the authorization device, the terminal devices of other users can be used, but because the user directly logs in the account number of the user on the terminal devices of other users and performs resource control through the account number, the information of the account number of the user is likely to be directly leaked, and therefore, in the application, the problem can be solved through a mode of establishing the evidence.
In the whole credential establishment process, the credential generation request sent by the user through the account is received first, and the whole reception process can be completed by the terminal or the server, where the account is an account for which the user needs to use resources, and the credential generation request is mainly used to trigger the terminal or the server to execute the credential establishment operation, where the resources in the account may be resources of an electronic book or other electronic resources, and the description is given below by taking the server as an example.
S102: providing basic information to the user.
S103: and collecting multimedia information input by the user according to the basic information.
In the embodiment of the application, after receiving a credential generation request sent by a user through an account, a server may provide basic information to the user, where the basic information includes text information, video information, voice information, and other types of information, and subsequently, the server may collect multimedia information input by the user according to the basic information, where the multimedia information may be video information or voice information.
In practical application, compared with video information, voice information is more accurate and faster in subsequent recognition, and recognition cost is lower, so that the voice information can be preferentially adopted as multimedia information in the application.
For example, after receiving a credential generation request sent by user a, the server assumes that the basic information provided to user a is the text type information: you are me and collect voice information (i.e., multimedia information) input by the user a according to "you are me".
S104: and generating credential information according to the multimedia information.
In the embodiment of the application, after the terminal collects the multimedia information, the terminal can generate the credential information according to the multimedia information, and the credential information is mainly used for subsequently controlling the resources of the user account.
In the application, when subsequently using the credential information to control the resource of the user account, it is mainly verified whether the currently collected multimedia information of the user is consistent with the multimedia information contained in the credential information, and in order to further improve the security of the user account, in the application, an interface for inputting a password may be displayed to the user on the basis of collecting the multimedia information, so as to prompt the user to input the password, and after receiving the password input by the user, the terminal generates the credential information according to the multimedia information and the password.
S105: and establishing a corresponding relation between the control authority of the account and the credential information, and storing the corresponding relation.
In the present application, since the resources of the user account are subsequently controlled by the credential information, it is necessary to establish a corresponding relationship between the credential information and the control authority, and it is also necessary to know which account is to be controlled according to the credential information, and therefore, it is also necessary to establish a corresponding relationship between the credential information and the account, and store the two established corresponding relationships in a corresponding data storage region (e.g., a database).
By the method, the user can directly use the credential information to control the account number of the user, the account number is not controlled through the terminal equipment and the authorization equipment of the user on the premise of not revealing the account number information, and the safety risk of controlling the account number is effectively reduced.
In view of the practical application, in order to meet personalized requirements of different users on credential information, and to further improve the security of controlling an account by using the credential information, in the present application, before establishing a corresponding relationship between a control authority of the account and the credential information, a terminal may receive setting information sent by the user for the credential information, and set the credential information according to the setting information, where the setting information includes: the use period of the credential information (e.g., before 2016, 2, 1), the geographic range of use of the credential information (e.g., the credential information can only be used in beijing area), the credit limit of the resource of the credential information use account (e.g., the credit limit is 50 yuan), and the use object of the credential information (e.g., the credit limit can only be used by friends).
It should be noted that the credit of the resource of the credential information using account is divided into two cases, the first case is: as long as the resource amount of the resource of the account used by the current user credential information is lower than the limit of the resource of the account used in the credential information, the resource of the account can be used through the credential information; the second case is: as long as the resource amount of the resource of the account currently used by the user through the credential information is not equal to the amount of the resource of the account used in the credential information, the resource of the account cannot be used through the credential information.
After the terminal stores the established correspondence between the credential information and the control authority and the correspondence between the account number and the control authority in the data storage region, in order to facilitate resource control on the user account number by using the credential information, the credential information can be accurately found, and therefore, in the present application, an identifier of the credential information needs to be established, specifically, the basic information mentioned in step S102 may be used as the identifier of the credential information, the credential information and the identifier (that is, the basic information) thereof are stored, and the credential information and the control authority of the account number corresponding to the credential information are stored.
In the present application, the execution of steps S101 to S105 may also be completed by the terminal, where the terminal first receives a credential generation request sent by the user through an account, provides basic information to the user, collects multimedia information input by the user according to the basic information, generates credential information according to the multimedia information, establishes a corresponding relationship between the control authority of the account and the credential information, and sends the corresponding relationship between the control authority of the account and the credential information to the server for storage.
The above is a method for authority management provided in this embodiment of the application, credential information may be established by the above method, and subsequently, when a user needs to use resources in an account, resources in the user account may be controlled by the credential information, where the whole resource control process is shown in fig. 2.
Fig. 2 is a process of resource control provided in the embodiment of the present application, which specifically includes the following steps:
s201: a credential use request sent by a user is received.
In this application, when a user needs to use the credentials established in steps S101 to S106 to control resources in an account, the user may directly use a terminal device of another user, and send a credential payment request to a server through the terminal device, and the server makes a corresponding response after receiving the credential use request sent by the user, where the credential use request carries multimedia information input by the user, and is mainly used to use the credentials to control the account.
For example, after receiving a credential use request sent by a user using a terminal device of another user, the server needs to determine which credential information the user needs to use to control the account, that is, the server needs to know which identifier (i.e., basic information) of the credential information is, in this application, before receiving the credential use request sent by the user, the server needs to prompt the user to read by memory, provide the content of the basic information (e.g., the basic information is text information) to the user when establishing the credential information, and collect the voice information read by the user.
S202: and converting the multimedia information into basic information.
S203: and according to the basic information, determining the credential information corresponding to the basic information in the pre-stored credential information.
When the corresponding relationship between the credential information and the control authority and the corresponding relationship between the credential information and the account are stored, the basic information in step S102 is used as the identifier of the credential information, and in order to accurately find out which credential information the user currently needs to use to control the account, in this application, the server needs to convert the voice information carried in the credential use request into the basic information.
Subsequently, the server determines credential information corresponding to the basic information from the pre-stored credential information according to the converted basic information (i.e., the identifier of the credential information).
S204: and verifying the credential use request according to the credential information.
In practical applications, there is a high possibility that other users remember the basic information of the user that is read before establishing credential information in advance, that is, the voice information carried in the credential use request currently received by the server may be read by other users and is not a real user of the credential information, and therefore, in order to ensure the security of the credential information, the server needs to verify the credential use request after determining the credential information corresponding to the basic information.
Since the credential request carries the voice message, the present application provides a way to validate the credential request, specifically, the server extracts the standard multimedia message (i.e. the standard voice message) contained in the credential information, uses the multimedia message carried in the credential request as the multimedia message to be validated, compares the multimedia message to be validated with the standard multimedia message, determines the similarity between the multimedia message to be validated and the standard multimedia message, determines that the validation of the credential request is passed when the similarity is greater than a predetermined threshold, determines that the validation of the credential request is failed when the similarity is not greater than the predetermined threshold, and prompts the user to read again and validate again if the number of times the user reads does not exceed the predetermined threshold, wherein the standard multimedia message is created credential information, multimedia information used by the credential information is generated.
S205: and when the verification is passed, performing resource control on the account according to the control authority of the account corresponding to the credential information.
In the application, when the server passes the verification, resource control is performed on the account according to the control authority of the account corresponding to the credential information, if the control authority of the account corresponding to the credential information is a resource transfer authority, the server transfers resources in the account according to the resource transfer authority of the account corresponding to the credential information, and of course, after the user logs in the terminal device, the terminal device prompts the user to read by memory, and before the content of basic information (for example, the basic information is text information) provided for the user when the credential information is established, the user is prompted to set the resource amount of the transferred resources and the transferred object.
When the authentication fails, the control authority of the account corresponding to the credential information can be directly refused, resource control is carried out on the account, and the credential information can be frozen if necessary.
By the method, the user can directly use the credential information to control the account number of the user, the account number is not controlled through the terminal equipment and the authorization equipment of the user on the premise of not revealing the account number information, and the safety risk of controlling the account number is effectively reduced.
In practical applications, there may be a case where a user performs information setting on credential information before establishing a corresponding relationship between a control authority of an account and the credential information, and therefore, before performing resource control on the account according to the control authority of the account corresponding to the credential information, the server needs to verify the information set by the user.
In the present application, the following is given of the information that is relatively common among the information set by the user: the method includes the steps that a server determines whether the current time falls within the use time limit corresponding to credential information or not, and determines that the current geographic position of a user falls within the use geographic range corresponding to the credential information before resource control is performed on the account according to the control authority of the account corresponding to the credential information, and the resource amount of the resource currently used by the user does not exceed the limit corresponding to the credential information The number of uses.
In addition, for only verifying the voice information carried in the credential use request, the security may be still lower, and in order to further improve the security of the credential information, the present application further provides a verification method, specifically, after verifying whether the similarity between the voice message carried in the credential use request and the standard voice information included in the credential information does not exceed a preset threshold, the server also needs to receive a password sent by the user, and determines whether the received password is consistent with the password corresponding to the credential information, if the password is consistent, the verification is passed, and according to the control authority of the account corresponding to the credential information, resource control is performed on the account; if the password is inconsistent with the account number, the user can be prompted to re-input the password, and when the password input times exceed the preset times, the control authority of the account number corresponding to the credential information is refused, and the credential information is frozen.
In practical application, there may be a case where after a user inputs a password on a terminal device, an illegal person directly intercepts a request carrying the password and sends the request carrying the password to a server through another terminal device, so that, after receiving the password sent by the user, the server can confirm whether a device used by the user to send the password is consistent with a device used by the user to send a credential use request according to Media Access Control (MAC) carried in the request carrying the password and an Internet Protocol (IP), if so, continue to verify the password of the user, and if not, directly send a prompt message to the device used by the user to send the credential use request, prompt the user that the current credential information is used to Control the account with an environmental risk, and propose to cancel the credential use request, the credential information is directly frozen if necessary.
It should be noted that, each interaction performed between the terminal device and the server is performed in a manner of signing and verifying a signature, so that it is ensured that information is not tampered during transmission, and security of resource control on an account using credential information is further improved.
In the present application, the multimedia information may also be image information, and in the process of authority management, when the server provides basic information (e.g., information of text type) to the user, the server may prompt the user to clearly write the basic information on the white paper, and subsequently, when the server collects the multimedia information input by the user according to the basic information, the server may directly shoot the basic information on the white paper through the terminal to generate the image information, and generate the credential information according to the image information.
Subsequently, in the resource control process, before receiving a credential use request sent by a user, a server needs to prompt the user to clearly write down the credential on a plain paper by memorizing, content of basic information (for example, the basic information is text information) provided for the user when the credential information is established, and the basic information on the plain paper is photographed by a terminal, so as to generate image information, and the image information is carried in the credential use request, subsequently, when the server converts multimedia information into the basic information, the basic information in the image information carried in the credential use request can be identified in an image identification mode, subsequently, credential information corresponding to the basic information is determined in each pre-stored credential information according to the identified basic information, the credential use request is verified according to the credential information, when the verification passes, and performing resource control on the account according to the control authority of the account corresponding to the credential information.
In order to describe the method for authority management and resource control more clearly and in detail, the method for resource control provided by the application is described in detail in a payment scene in which the control authority is used as the payment authority and the credential use request is used as the payment request.
Fig. 3 is a process of rights management provided in an embodiment of the present application, which specifically includes the following steps:
s301: and receiving a credential generation request sent by a user through an account.
In the process of establishing a payment credential provided in the present application, the server first receives a credential generation request sent by a user through an account, and executes step S302.
For example, the user a needs to establish a payment credential, and therefore, after the user a logs in a payment account on its own mobile phone (i.e., a terminal device), the user a clicks a credential establishment button, that is, the server receives a credential generation request sent by the user through the payment account, and performs step S302.
S302: providing basic information to the user.
Continuing the above example, after receiving a credential generation request sent by the user a through the payment account, the server provides the user a with the basic information, assuming that the type of the basic information is text information, and the content of the basic information is as follows: i you are.
S303: and collecting multimedia information input by the user according to the basic information.
S304: and generating credential information according to the multimedia information.
In the present application, the server needs to prompt and receive the password used by the user input credential in addition to collecting the multimedia information input by the user according to the basic information.
Continuing with the above example, assume that the server only collects voice information, and therefore, user a speaks the text information provided by the server: the server collects voice information read aloud by the user A, prompts the user A to input a password after the collection is finished, the user inputs the password into a password frame according to the prompt, and the server directly generates credential information according to the collected voice information of the user A and the received password.
S305: and establishing a corresponding relation between the payment authority of the account and the credential information, and storing the corresponding relation.
In this application embodiment, after the terminal generates the credential information according to the collected multimedia information of the user and the password input by the user, the terminal may perform corresponding setting on information in the generated credential information, specifically, the server may receive setting information sent by the user for the generated credential information, and set the generated credential information according to the setting information, where the setting information includes: at least one of the using time limit of the credential information, the using geographic range of the credential information, the payment amount of the account number used by the credential information, and the payment object of the credential information.
It should be noted that the amount of the payment amount of the credential information using the account is divided into two cases, the first case is: as long as the amount of the payment amount of the account used by the user for the current credential information is lower than the amount of the payment amount of the account used in the credential information, the payment amount of the account can be used through the credential information; the second case is: as long as the amount of the payment amount of the account used by the user for the current credential information is not equal to the amount of the payment amount of the account used in the credential information, the payment amount of the account cannot be used through the credential information.
Subsequently, the server establishes a corresponding relationship between the payment authority and the credential information after the information setting is completed, and meanwhile, a corresponding relationship between the credential information after the information setting is completed and the account needs to be established and stored.
Continuing with the above example, after the server generates credential information, assume that the user a sets the information in the generated credential information as follows:
setting the using period of the credential information to be 2016, 1 month and 20 days to 2016, 2 months and 15 days, setting the using geographic range of the credential information to be Beijing, setting the payment amount limit of the account number of the credential information to be 500 yuan, and setting the using object of the credential information to be any object.
After the user A finishes setting the information, the server establishes the corresponding relationship between the payment authority and the credential information after finishing setting the information, and meanwhile, the corresponding relationship between the credential information after finishing setting the information and the account needs to be established and stored.
By the method, the user can directly pay by using the account through the credential information, so that the account is not used for payment through own terminal equipment and authorization equipment on the premise of not revealing the account information, and the safety risk of payment by using the account is effectively reduced.
In addition, in the present application, an identifier of the credential information needs to be established, specifically, the basic information mentioned in step S102 may be used as the identifier of the credential information, the credential information and the identifier thereof (that is, the basic information) are stored, the credential information and the payment authority of the account corresponding to the credential information are stored, and the terminal may find the credential information to be used through the identifier of the credential information.
The above is a method for authority management provided in this embodiment of the application, credential information may be established by the above method, and subsequently, when a user needs to use an account to make a payment, the user can use the payment amount in the user account to make a payment through the credential information, and the whole resource control process is as shown in fig. 4.
Fig. 4 shows a process of resource control according to an embodiment of the present application, which specifically includes the following steps:
s401: and receiving a payment request sent by a user.
In practical application, a user needs to pay through a payment application installed on a terminal device in the process of actual shopping, but if the user does not currently carry the terminal device (such as a mobile phone) of the user at the moment and a merchant does not have an authorization device, the user can use the terminal device (such as a mobile phone) of the merchant to pay through the payment amount in an account according to the credential information.
In the whole process of payment by using the credential information, when the user uses the terminal device of the merchant, the payment amount can be preset and the payment object can be set.
Subsequently, in the process of establishing credential information by the user directly by means of memory reading in advance, the terminal carries the collected read multimedia information of the user in the payment request and sends the request to the server, and for convenience of explaining the implementation scheme of the application, the following description takes the multimedia information input by the user as voice information as an example.
For example, in an actual shopping process, since the user a does not currently carry his/her mobile phone and the merchant does not have an authorization device, the user a prepares to pay by using the credential information established in steps S301 to S305 through the merchant' S mobile phone.
The user A sets the payment amount of 50 yuan on a payment application in a mobile phone of a merchant, sets the merchant as a payment object, prompts the user A to read basic information (namely, you and my others) corresponding to the credential information in the examples from the step S301 to the step S305 by memory, collects voice information read by the user A, and sends a payment request carrying the voice information to a server.
S402: converting the multimedia information into basic information;
continuing to use the above example, after receiving a payment request sent by a user, the server converts voice information carried in the payment request into basic information in a voice recognition mode, that is, converts the voice information into text information: you are me.
S403: according to the basic information, confirming credential information corresponding to the basic information in each pre-stored credential information;
continuing with the above example, the server determines, from the basic information "you-me-he" (i.e., the identification of the credential information), the credential information corresponding to the basic information among the pre-stored credential information.
S404: verifying the payment request according to the credential information;
s405: and when the authentication is passed, the account is used for payment according to the payment authority of the account corresponding to the credential information.
Continuing to use the above example, after the server determines the credential information, the server directly extracts the standard voice information from the credential information, takes the voice information carried in the payment request as the voice information to be verified, compares the voice information to be verified with the standard voice information, determines the similarity between the voice information to be verified and the standard voice information, and if the similarity is smaller than a preset threshold and the number of reading times does not exceed the preset threshold, the server may prompt the user a to read again, and perform verification again
Assuming that the similarity is greater than a preset threshold, and verifying the information set in the credential information is started, that is, setting the lifetime of the credential information to be 2016, 1, 20, to 2016, 2, 15, setting the geographic range of use of the credential information to be beijing, setting the amount of payment of the account number of use of the credential information to be 500 yuan (assuming that the first case mentioned in step S305 is taken as an example here), prompting the user a to input a password for payment if any object of use of the credential information passes verification.
Subsequently, after receiving the password sent by the user A, the server firstly confirms whether the equipment used by the user A for sending the password is consistent with the equipment used by the user A for sending the credential using request, if not, the server directly sends prompt information to the equipment used by the user A for sending the credential using request, prompts the user A that the current credential using information has environmental risk on account control, and proposes to cancel the credential using request.
If the equipment is consistent, the password input by the user A is continuously verified, if the password input by the user A is inconsistent with the password contained in the credential information, the user A can be prompted to input the password again, if the password input times exceed the preset times, the payment authority of the account corresponding to the credential information is refused, the credential information is frozen, and if the password input by the user A is consistent with the password contained in the credential information, the account of the user A is used for completing the payment of the shopping and prompting the user to pay successfully.
By the method, the user can directly pay by using the account through the credential information, so that the account is not used for payment through own terminal equipment and authorization equipment on the premise of not revealing the account information, and the safety risk of payment by using the account is effectively reduced.
Based on the same idea, the present embodiment provides four devices, that is, a first device for rights management, as shown in fig. 5, a first device for rights management, as shown in fig. 6, a second device for rights management, as shown in fig. 7, and a second device for resources control, as shown in fig. 8.
Fig. 5 is a schematic structural diagram of a first rights management apparatus according to an embodiment of the present application, where the apparatus includes:
a receiving module 501, configured to receive a credential generation request sent by a user through an account;
a providing module 502 for providing basic information to the user;
an acquisition module 503, configured to acquire multimedia information input by the user according to the basic information;
a generating module 504, configured to generate credential information according to the multimedia information;
a corresponding relationship establishing module 505, configured to establish a corresponding relationship between the control authority of the account and the credential information, and store the corresponding relationship.
The device further comprises:
a password generating module 506, configured to receive a password input by the user before the generating module 504 generates credential information according to the multimedia information, where the generating module 504 is specifically configured to generate credential information according to the multimedia information and the password.
The device further comprises:
an information setting module 507, configured to receive setting information sent by the user for the credential information before the corresponding relationship between the control authority of the account and the credential information is established by the corresponding relationship establishing module 505, and set the credential information according to the setting information, where the setting information includes: at least one of the service life of the credential information, the geographic range of use of the credential information, the amount of resources of the account used by the credential information, and the object of use of the credential information.
The correspondence establishing module 505 is specifically configured to use the basic information as an identifier of the credential information, store the credential information and the identifier thereof, and store the credential information and the control authority of the account corresponding to the credential information.
The multimedia information includes voice information.
Fig. 6 is a schematic structural diagram of a first resource control apparatus according to an embodiment of the present application, where the apparatus includes:
a receiving module 601, configured to receive a credential use request sent by a user, where the credential use request carries multimedia information input by the user;
a conversion module 602, configured to convert the multimedia information into basic information;
a determining module 603, configured to determine, according to the basic information, credential information corresponding to the basic information from pre-stored credential information;
a verification module 604, configured to verify the credential use request according to the credential information;
and the control module 605 is configured to, when the authentication passes, perform resource control on the account according to the control authority of the account corresponding to the credential information.
The multimedia information is voice information;
the conversion module 602 is specifically configured to convert the multimedia information into basic information in a voice recognition manner.
The verification module 604 is specifically configured to extract standard multimedia information included in the credential information, use multimedia information carried in the credential use request as to-be-verified multimedia information, compare the to-be-verified multimedia information with the standard multimedia information, determine a similarity between the to-be-verified multimedia information and the standard multimedia information, determine that the credential use request is verified when the similarity is greater than a set threshold, and determine that the credential use request is not verified when the similarity is not greater than the set threshold.
The device further comprises:
setting an information verification module 606, configured to determine that the current time falls within the service life corresponding to the credential information, and determine that the current geographic position of the user falls within the geographic usage range corresponding to the credential information before the control module 605 performs resource control on the account according to the control permission of the account corresponding to the credential information, and determine that the resource amount of the resource currently used by the user does not exceed the amount corresponding to the credential information, and determine that a usage object of the credential information currently used by the user is consistent with the usage object corresponding to the credential information.
The device further comprises:
a password verification module 607, configured to receive the password sent by the user before the control module 605 performs resource control on the account according to the control authority of the account corresponding to the credential information, and determine that the received password is consistent with the password corresponding to the credential information.
The device further comprises:
a device verification module 608, configured to determine that a device used by the user to send a password is consistent with a device used by the user to send the credential use request before the control module 605 performs resource control on the account according to the control permission of the account corresponding to the credential information.
Fig. 7 is a schematic structural diagram of a second rights management device according to an embodiment of the present application, where the device includes:
a receiving module 701, configured to receive a credential generation request sent by a user through an account;
a providing module 702 for providing basic information to the user;
an acquisition module 703, configured to acquire multimedia information input by the user according to the basic information;
a generating module 704, configured to generate credential information according to the multimedia information;
the corresponding relationship establishing module 705 is configured to establish a corresponding relationship between the payment authority of the account and the credential information, and store the corresponding relationship.
The device further comprises:
an information setting module 706, configured to receive setting information sent by the user for the credential information before the corresponding relationship establishing module 705 establishes a corresponding relationship between the payment authority of the account and the credential information, and set the credential information according to the setting information, where the setting information includes: at least one of the service life of the credential information, the geographic range of use of the credential information, the payment amount of the account number used by the credential information, and the payment object of the credential information.
The correspondence establishing module 705 is specifically configured to use the basic information as an identifier of the credential information, store the credential information and the identifier thereof, and store the credential information and the payment authority of the account corresponding to the credential information.
Fig. 8 is a schematic structural diagram of a second resource control apparatus according to an embodiment of the present application, where the apparatus includes:
a receiving module 801, configured to receive a payment request sent by a user, where the payment request carries multimedia information input by the user;
a conversion module 802, configured to convert the multimedia information into basic information;
a determining module 803, configured to determine credential information corresponding to the basic information in pre-stored credential information according to the basic information;
a verification module 804, configured to verify the payment request according to the credential information;
and the control module 805 is configured to use the account to pay according to the payment authority of the account corresponding to the credential information when the authentication passes.
The device further comprises:
setting information verification module 806, configured to determine that the current time falls within the service life corresponding to the credential information before the control module 805 uses the account to pay according to the payment authority of the account corresponding to the credential information, and determine that the current geographic position of the user falls within the use geographic range corresponding to the credential information, and determine that the amount of the payment amount currently paid by the user is not more than the payment amount corresponding to the credential information, and determine that the payment object currently used by the user is consistent with the payment object corresponding to the credential information.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.