Specific embodiment
In being described below, in order to illustrate rather than in order to limit, it is proposed that such as tool of particular system structure, technology etc
Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specifically
The present invention can also be realized in the other embodiments of details.In other situations, it omits to well-known system, device, electricity
Road and the detailed description of method, in case unnecessary details interferes description of the invention.
It should be appreciated that ought use in this specification and in the appended claims, term " comprising " and "comprising" instruction
Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded
Body, step, operation, element, component and/or its presence or addition gathered.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment
And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is
Refer to any combinations and all possible combinations of one or more of the associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In order to illustrate technical scheme of the present invention, illustrated below by specific embodiment.
With reference to figure 1, Fig. 1 is the flow diagram of a kind of login authentication that one embodiment of the invention provides.This method can be with
Applied to server, example server can be one or more, and details are as follows for the present embodiment:
S101:The logging request that target terminal is sent is received, target account information and target terminal are carried in logging request
Device identification.
In the present embodiment, target terminal can be mobile phone terminal, palm PC (Personal
DigitalAssistant, PDA) etc. terminal devices.Target account information can be register account number or cell-phone number.Such as target is whole
End can be the terminal device for being mounted with sales applications.Target terminal device identification can be the international mobile device of target terminal
Identity code (International Mobile Equipment Identity, IMEI).
S102:Judge in the Terminal Equipment Identifier to prestore with the presence or absence of target terminal device identification.
In the present embodiment, the Terminal Equipment Identifier to prestore can be in advance registration or logged Terminal Equipment Identifier
List.
S103:If it is determined that there is no target terminal device identifications in the Terminal Equipment Identifier to prestore, then target account is obtained
The corresponding subscriber identity information of information.
In the present embodiment, target account information includes the log-on message of individual subscriber and account use information.For example, with
The post information at family is responsible for shops, place of checking card, late or information record of not checking card, position promotion, sale awards etc..
S104:Authentication prompt message is generated according to subscriber identity information.
In the present embodiment, authentication prompt message includes but not limited to select just from the subscriber identity information of offer
True option, is ranked up the subscriber identity information of offer the option that mistake is selected from the subscriber identity information of offer.
S105:Authentication prompt message is sent to target terminal.
In the present embodiment, authentication prompt message is sent to target terminal, authentication prompt message is used
Family such as is selected or is sorted the operation processings.
S106:The authentication information that target terminal returns is received, and judges whether are authentication information and identity information
Matching.
In the present embodiment, the authentication information that target terminal returns is used for for user according to authentication prompt message
User such as is selected or is sorted the operation processings generation.
S107:If it is determined that authentication information is matched with identity information, then allow target terminal login service device.
In the present embodiment, judging that authentication information is matched with identity information can include:Authentication information and body
The content of part information is identical or substantially identical or authentication information is consistent with the content logic of identity information.
In one embodiment of the invention, if it is determined that authentication information is mismatched with identity information, then forbid target
Terminal login service device, and send and log in abnormal prompt to target terminal.
From above-described embodiment it is found that the logging request sent by receiving target terminal, target account is carried in logging request
Family information and target terminal device identification;Judge in the Terminal Equipment Identifier to prestore with the presence or absence of target terminal device identification;If
Judge that there is no target terminal device identifications in the Terminal Equipment Identifier to prestore, then obtain the corresponding user's body of target account information
Part information;Authentication prompt message is generated according to subscriber identity information;Authentication prompt message is sent to target terminal;It connects
The authentication information that target terminal returns is received, and judges whether authentication information matches with identity information;If it is determined that identity
Verification information is matched with identity information, then allows target terminal login service device.Login authentication side provided in an embodiment of the present invention
Method and terminal device due to needing that repeatedly effective login authentication is carried out to logging device, ensure that the safety of logon account, drop
The risk that low login account is stolen.
With reference to figure 2, Fig. 2 is the flow diagram of a kind of login authentication that another embodiment of the present invention provides.In this implementation
In example, above-described embodiment can also be including the step of being verified by other-end, and details are as follows:
S201:Login authentication prompt message is sent to target terminal.
In the present embodiment, login authentication prompt message can be mobile phone verification tip information or mailbox verification tip letter
Breath.For example, mobile phone verification tip information can be acquisition request identifying code prompt message.Mailbox verification tip information can be please
It asks and obtains mailbox verification page prompts information etc..
S202:The login authentication request that target terminal is sent is received, and the first verification letter is requested to generate according to login authentication
Breath.
In the present embodiment, login authentication request can obtain identifying code request or obtain mailbox to verify page
It requests in person and asks.First verification information can be identifying code or the mailbox verification page.
S203:The account number of terminal is verified according to target account acquisition of information, and sends the first verification information to account
Corresponding verification terminal is identified, so that user obtains the first verification information.
In the present embodiment, in the present embodiment, verification terminal can be target terminal or other terminal is set
It is standby.Such as verification terminal can be a mobile phone, tablet computer (Personal DigitalAssistant, PDA) or personal electricity
Brain (Personal Computer, PC).
S204:The second verification information that target terminal is sent is received, and judges the second verification information and the first verification information
It is whether identical.
In the present embodiment, in the present embodiment, the second verification information is tested for user according to verification terminal first is sent to
Demonstrate,prove the second verification information of information input.
S205:If it is determined that the second verification information is identical with the first verification information, then performs and obtain target account information correspondence
Subscriber identity information the step of.
In the present embodiment, if logging device is logged in for legal account, user can be by verifying that terminal obtains the first verification
Information, then user will input second verification information identical with the first verification information;If logging device is logged in for appropriating account, use
Family will not learn the first verification information of verification terminal, then will be unable to the input second verification letter identical with the first verification information
Breath.
From above-described embodiment it is found that by sending the first verification information to verification terminal, the second verification information of judgement and the
One verification information is identical, then obtains the corresponding subscriber identity information of target account information, can be into one by verifying the verification of terminal
Step ensures the safety of logon account.
With reference to figure 3, Fig. 3 is the flow diagram of a kind of login authentication that further embodiment of this invention provides.In this implementation
In example, the process of authentication prompt message is generated according to subscriber identity information in above-mentioned steps S104, is specifically included:
S301:The second verification of a correct first verification sub-information and at least one mistake is generated according to identity information
Sub-information.
S302:According to the second verification sub-information generation body of a correct first verification sub-information and at least one mistake
Part verification tip information.
In the present embodiment, authentication prompt message can be prompting selection one it is correct first verification sub-information and
The correct option or correct first verification of prompting selection one in second verification sub-information of at least one mistake
Wrong option in second verification sub-information of information and at least one mistake.
Correspondingly, the authentication information that target terminal returns is received in above-mentioned steps S106, and judges that authentication is believed
Breath and the whether matched process of identity information, specifically include:
S303:The authentication information that target terminal returns is received, authentication information is correct from one for sale user
The first verification sub-information and at least one mistake the second verification sub-information at least one verification sub-information to be measured for selecting.
S304:If it is determined that verification sub-information to be measured is correct, then judge that authentication information is matched with identity information.
In the present embodiment, judging verification sub-information to be measured can be for the correct first verification sub-information:When part is verified
Prompt message is in the second verification sub-information of the correct first verification sub-information of prompting selection one and at least one mistake
During the correct option, if verification sub-information to be measured is the correct option, judge that verification sub-information to be measured is correct.When part verification tip is believed
Breath is the mistake choosing in the second verification sub-information of the correct first verification sub-information of prompting selection one and at least one mistake
Xiang Shi if verification sub-information to be measured includes all wrong options, judges that verification sub-information to be measured is correct.
If from above-described embodiment it is found that by generating a correct first verification sub-information and multiple by identity information
Second verification sub-information of mistake, and according to the second verification of a correct first verification sub-information and at least one mistake
Information generate authentication prompt message, authentication information for sale user from one it is correct first verification sub-information and to
The verification sub-information to be measured selected in few one the second wrong verification sub-information, if it is determined that verification sub-information to be measured is just
Really, then judge that authentication information is matched with identity information, can further ensure the sale user of the account logged in to close
Method registered user ensures the safe to use of account.
In another embodiment of the present invention, identity information includes the post information of sale user, is responsible for shops, checks card
Information, step S301 generate the second verification of a correct first verification sub-information and at least one mistake according to identity information
The process of sub-information, specifically includes:
The post Information Authentication that a correct post Information Authentication information and several mistakes are generated according to post information is believed
Breath;
One correctly responsible shops verification letter of responsible shops's verification information and several mistakes is generated according to responsible shops
Breath;
The Information Authentication letter of checking card of correctly check card place verification information and a several mistakes is generated according to information of checking card
Breath;
Determine that correct post Information Authentication information, correctly responsible shops's verification information or place of correctly checking card are verified
Any one in information is the first verification sub-information;
Determine the post Information Authentication information of several mistakes, responsible shops's verification information of several mistakes or several mistakes
Multiple in Information Authentication information of checking card are the second verification sub-information;
According to the first verification sub-information and the second verification sub-information generation authentication prompt message.
In the present embodiment, post information can be the post promotion information of user.Responsible shops can be each user
Corresponding at least one shops, such as user are that when selling user, actually can carry out sale in multiple shops.It checks card
Information can be place of checking card, wherein place of checking card can be the location information uploaded in shops position user's work hours;It beats
Card information can also be the time of checking card, the late time that includes but not limited to check card, continuously late date;Information of checking card may be used also
To be shops or the shops never to check card that user often checks card.
From above-described embodiment it is found that by the post information of user, being responsible for shops, the second verification that information of checking card generates
Information and the personal information close association of user, the illegal registrant with account not usurped can not possibly obtain detailed sale and use
The post information at family is responsible for shops, information of checking card, and cannot complete account login.
In one embodiment of the invention, above-mentioned steps S104 can also include:
Multiple verification sub-informations are generated according to subscriber identity information, multiple verification sub-informations have to be carried out according to preset rules
The attribute of sequence;
According to it is multiple verification sub-informations generation authentication prompt messages, authentication prompt message for prompting user to
Multiple verification sub-informations of machine arrangement sort according to preset rules.
In the present embodiment, subscriber identity information includes but not limited to the position promotion information of user, sale awards information
(sales company's ranking etc.), shops's azimuth mark or shops's access frequency etc..
Correspondingly, above-mentioned steps S106 receives the authentication information that target terminal returns, and judges authentication information
Whether matched with identity information, including:
The authentication information that target terminal returns is received, authentication information is multiple verifications of the user to random alignment
Verification information to be measured after sub-information sequence;
If it is determined that the sequence of verification information to be measured has the sequence one carried out according to preset rules with multiple verification sub-informations
It causes, then judges whether authentication information matches with identity information.
In the present embodiment, judge the sequence of verification information to be measured and multiple verification sub-informations have according to preset rules into
Capable sequence is consistent, can include:The post promotion sequence and true post for selecting user are transferred and promoted sequence unanimously;Can also be
The sequence (from high to low or from low to high) of shops's access frequency of selection is consistent with true shops's access frequency.
From above-described embodiment it is found that by verifying that user selects the sequence of multiple verification sub-informations and multiple verification sub-informations
It is consistent with the sequence carried out according to preset rules, ensure the legitimacy of logon account user.
With reference to figure 4, Fig. 4 is the flow diagram of a kind of login authentication that further embodiment of this invention provides.In this implementation
Example in, the location information of logging request also carried terminal equipment, step S101 receive target terminal send logging request it
Afterwards, it further includes:
S401:The location information that target account information corresponds to the affiliated shops of user is obtained, shops is at least one.
In the present embodiment, target account information correspond to the location information of the affiliated shops of user can be by the data that prestore
It directly reads in library, and is marked on the electronic map.
S402:According to the location information of target terminal and the location information of all shops, determine that distance objective terminal is nearest
Shops be target shops.
In the present embodiment, the location information of target terminal can be address or satellite positioning coordinate.Wherein, satellite
Position coordinate can be the Big Dipper elements of a fix or global location (Global Positioning System, GPS) elements of a fix.
S403:Judge whether target terminal and the distance value of target shops have exceeded pre-determined distance threshold range.
In the present embodiment, in the present embodiment, pre-determined distance threshold range is judges terminal device whether in shops
Neighbouring standard value according to management user can be configured.For example, pre-determined distance threshold range is 5~10m.
S404:If it is determined that distance value has exceeded pre-determined distance threshold range, then send and log in abnormal prompt to target terminal.
From above-described embodiment it is found that by judge terminal device and shops distance value whether pre-determined distance threshold range,
It can ensure that login position is consistent with shops position, prevent different-place login, ensure the safety of sale user's login account.
In another embodiment of the present invention, if it is determined that the authentication information is mismatched with the identity information,
Authentication error prompt message is then sent to the terminal device.If within the first preset period, carried if sending authentication error
The number for showing information is more than preset verification frequency threshold value, then the target account is identified corresponding account blocks, with
It is further ensured that the safety of account, reduces the loss after account is stolen
In another embodiment of the present invention, within the second preset period, if sending time for logging in abnormal prompt
Number is more than preset prompting frequency threshold value, then the target account is identified corresponding account blocks.Ensure the peace of account
Entirely, the loss after account is stolen is reduced.
Corresponding to the login validation method of foregoing embodiments, Fig. 5 is a kind of login authentication that one embodiment of the invention provides
The structure diagram of device for convenience of description, illustrates only and the relevant part of the embodiment of the present invention.With reference to Fig. 5, the device packet
It includes:First receiving module 501, the first judgment module 502, the first acquisition module 503, the first generation module 504, first send mould
Block 505, the second judgment module 506 and login process module 507.
For receiving the logging request of target terminal transmission, target is carried in the logging request for first receiving module 501
Account information and target terminal device identification;
First judgment module 502, for judging in the Terminal Equipment Identifier to prestore with the presence or absence of the target terminal equipment
Mark;
First acquisition module 503, for if it is determined that the target terminal is not present in the Terminal Equipment Identifier to prestore
Device identification then obtains the corresponding subscriber identity information of the target account information;
First generation module 504, for generating authentication prompt message according to the subscriber identity information;
First sending module 505, for sending the authentication prompt message to the target terminal;
Second judgment module 506 for receiving the authentication information that the target terminal returns, and judges the identity
Whether verification information matches with the identity information;
Login process module 507, for if it is determined that the authentication information is matched with the identity information, then allowing institute
It states target terminal and logs in the server.
From above-described embodiment it is found that the logging request sent by receiving target terminal, target account is carried in logging request
Family information and target terminal device identification;Judge in the Terminal Equipment Identifier to prestore with the presence or absence of target terminal device identification;If
Judge that there is no target terminal device identifications in the Terminal Equipment Identifier to prestore, then obtain the corresponding user's body of target account information
Part information;Authentication prompt message is generated according to subscriber identity information;Authentication prompt message is sent to target terminal;It connects
The authentication information that target terminal returns is received, and judges whether authentication information matches with identity information;If it is determined that identity
Verification information is matched with identity information, then allows target terminal login service device.Login authentication side provided in an embodiment of the present invention
Method and terminal device due to needing that repeatedly effective login authentication is carried out to logging device, ensure that the safety of logon account, drop
The risk that low login account is stolen.
With reference to figure 5, in one embodiment of the invention, described device further includes:
Second sending module 508, for sending login authentication prompt message to the target terminal;
Second generation module 509, for receiving the login authentication request that the target terminal is sent, and according to the login
Checking request generates the first verification information;
Third sending module 510 for verifying the account number of terminal according to the target account acquisition of information, and is sent
First verification information is to the corresponding verification terminal of the account number, so that user obtains the first verification information;
Third judgment module 511 for receiving the second verification information of target terminal transmission, and judges second verification
Whether information and first verification information are identical;
First acquisition module 503 is additionally operable to if it is determined that the second verification information is identical with the first verification information, then perform
The step of obtaining the target account information corresponding subscriber identity information.
With reference to figure 5, in one embodiment of the invention, first generation module 504, including:
Sub-information generation unit 5041 is verified, for generating a correct first verification son letter according to the identity information
Second verification sub-information of breath and at least one mistake;
Authentication prompt message generation unit 5042, for according to one correct first verification sub-information and extremely
Few one the second wrong verification sub-information generates the authentication prompt message;
Second judgment module 506, including:
Authentication information receiving unit 5061, it is described for receiving the authentication information that the target terminal returns
Authentication information is the second verification son letter for selling user from a correct first verification sub-information and at least one mistake
At least one verification sub-information to be measured selected in breath;
Authentication information identifying unit 5062, for if it is determined that the verification sub-information to be measured is correct, then described in judgement
Authentication information is matched with the identity information.
With reference to figure 5, in one embodiment of the invention,
The verification sub-information generation unit 5041 is additionally operable to according to the multiple verification letters of subscriber identity information generation
Breath, the multiple verification sub-information have the attribute being ranked up according to preset rules;
The authentication prompt message generation unit 5042 is additionally operable to according to the multiple verification sub-information generation
Authentication prompt message, the authentication prompt message be prompt user to multiple verification sub-informations of random alignment according to
Preset rules sort;
The authentication information receiving unit 5061 is additionally operable to receive the authentication letter that the target terminal returns
Breath, the authentication information are user to verification information to be measured after multiple verification sub-informations sequence of random alignment;
The authentication information identifying unit 5062, be additionally operable to if it is determined that the sequence of the verification information to be measured with it is described
Multiple verification sub-informations are consistent with the sequence carried out according to preset rules, then judge the authentication information and the identity
Whether information matches.
With reference to figure 5, in one embodiment of the invention, described device further includes:
Second acquisition module 512, for obtaining the location information that the target account information corresponds to the affiliated shops of user, institute
It is at least one to state shops;
Determining module 513, for the location information according to the target terminal and the location information of all shops, determine away from
The shops nearest from the target terminal is target shops;
4th judgment module 514, for judging whether the target terminal and the distance value of the target shops have exceeded
Pre-determined distance threshold range;
The login process module 507 is additionally operable to if it is determined that the distance value has exceeded pre-determined distance threshold range, then send out
It send and logs in abnormal prompt to the target terminal.
In another embodiment of the present invention, login process module 507, for if it is determined that the authentication information with
The identity information mismatches, then sends authentication error prompt message to the terminal device.If in the first preset period
It is interior, if the number for sending authentication error prompt message is more than preset verification frequency threshold value, by target account mark pair
The account answered is blocked, and to be further ensured that the safety of account, reduces the loss after account is stolen
In another embodiment of the present invention, login process module 507, within the second preset period, if
It is more than preset prompting frequency threshold value to send and log in the number of abnormal prompt, then by the target account identify corresponding account into
Row block.Ensure the safety of account, reduce the loss after account is stolen.
Referring to Fig. 6, Fig. 6 is the schematic block diagram of one embodiment of the invention login authentication terminal device.This reality as shown in Figure 6
The terminal 600 applied in example can include:One or more processors 601, one or more input equipments 602, one or more
Then output equipment 603 and one or more memories 604.Above-mentioned processor 601, input equipment 602, then output equipment 603 and
Memory 604 completes mutual communication by communication bus 605.Memory 604 is used to store computer program, the calculating
Machine program includes program instruction.Processor 601 is used to perform the program instruction of the storage of memory 604.Wherein, 601 quilt of processor
The function that described program instruction is called to perform each module/unit in the following above-mentioned each device embodiment of operation is configured to, such as
The function of module 501 to 513 shown in Fig. 5.
It should be appreciated that in embodiments of the present invention, alleged processor 601 can be central processing unit (Central
Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), application-specific integrated circuit (Application SpecificIntegrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
It can also be any conventional processor etc. to manage device.
Input equipment 602 can include Trackpad, fingerprint and adopt sensor (for acquiring the finger print information of user and fingerprint
Directional information), microphone etc., output equipment 603 can include display (LCD etc.), loud speaker etc..
The memory 604 can include read-only memory and random access memory, and to processor 601 provide instruction and
Data.The a part of of memory 604 can also include nonvolatile RAM.For example, memory 604 can also be deposited
Store up the information of device type.
In the specific implementation, processor 601, input equipment 602, the output equipment 603 described in the embodiment of the present invention can
The realization method described in the first embodiment and second embodiment of service request method provided in an embodiment of the present invention is performed,
Also the realization method of the described terminal of the embodiment of the present invention is can perform, details are not described herein.
A kind of computer readable storage medium, the computer-readable storage medium are provided in another embodiment of the invention
Matter is stored with computer program, and the computer program includes program instruction, and described program instruction is realized when being executed by processor
All or part of flow in above-described embodiment method can also instruct relevant hardware to complete by computer program,
The computer program can be stored in a computer readable storage medium, the computer program when being executed by processor,
The step of above-mentioned each embodiment of the method can be achieved..Wherein, the computer program includes computer program code, the meter
Calculation machine program code can be source code form, object identification code form, executable file or certain intermediate forms etc..The calculating
Machine readable medium can include:Any entity of the computer program code or device, recording medium, USB flash disk, shifting can be carried
Dynamic hard disk, magnetic disc, CD, computer storage, read-only memory (Read-Only Memory, ROM), random access memory
(Random Access Memory, RAM), electric carrier signal, telecommunication signal and software distribution medium etc..Need what is illustrated
It is that the content that the computer-readable medium includes can be fitted according to legislation in jurisdiction and the requirement of patent practice
When increase and decrease, such as in certain jurisdictions, according to legislation and patent practice, it is electric carrier wave that computer-readable medium, which does not include,
Signal and telecommunication signal.
The computer readable storage medium can be the internal storage unit of the terminal described in aforementioned any embodiment, example
Such as the hard disk or memory of terminal.The computer readable storage medium can also be the External memory equipment of the terminal, such as
The plug-in type hard disk being equipped in the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (SD,
Secure Digital) card, flash card (Flash Card) etc..Further, the computer readable storage medium can be with
Both the internal storage unit of the terminal had been included or including External memory equipment.The computer readable storage medium is used to store
Other programs and data needed for the computer program and the terminal.The computer readable storage medium can be also used for
Temporarily store the data that has exported or will export.
Those of ordinary skill in the art may realize that each exemplary lists described with reference to the embodiments described herein
Member and algorithm steps can be realized with the combination of electronic hardware, computer software or the two, in order to clearly demonstrate hardware
With the interchangeability of software, each exemplary composition and step are generally described according to function in the above description.This
A little functions are performed actually with hardware or software mode, specific application and design constraint depending on technical solution.Specially
Industry technical staff can realize described function to each specific application using distinct methods, but this realization is not
It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description
End and the specific work process of unit can refer to the corresponding process in preceding method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed terminal and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
Only a kind of division of logic function can have other dividing mode in actual implementation, such as multiple units or component can be tied
It closes or is desirably integrated into another system or some features can be ignored or does not perform.In addition, shown or discussed phase
Coupling, direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit
Connection or electricity, the connection of mechanical or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit
The component shown may or may not be physical unit, you can be located at a place or can also be distributed to multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the embodiment of the present invention
Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
It is that each unit is individually physically present or two or more units integrate in a unit.It is above-mentioned integrated
The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or replace
It changes, these modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with right
It is required that protection domain subject to.