Specific embodiment
The embodiment of the invention provides a kind of information processing method and relevant devices, for by identifying that the falseness of video is broadcast
It puts, reduces the loss of video website.
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, those skilled in the art's every other implementation obtained without making creative work
Example, shall fall in the protection scope of this application.
Referring to Fig. 1, be a kind of flow chart of possible information processing method provided by the embodiments of the present application, it is specific to wrap
It includes:
101, server generates the first public private key pair;
It should be noted that in order to improve the safety carried out data transmission between server and client, it can be to clothes
Communication between business device and client is encrypted.In the embodiment of the present invention, asymmetric RSA cryptographic algorithms next life can be used
At public private key pair, wherein when client opens a video every time to be played out, then a pair of of public private key pair can be regenerated,
Ensure that the public private key pair of each video is different.
Optionally, in the present invention, server generates the first public affairs according to the information of client current video being played on
Private key pair comprising the first public key and the first private key.Generating random number can be used in specific first private key, and the first public key is then adjusted
Corresponding public key can be generated with the interface function of RSA, the first private key and the first public key are the relationships uniquely matched, and generate first
The implementation of public private key pair includes the following steps:
Step 1 generates random data;
Randdata=rand ();
One section of random data Randdata is generated by calling system function rand.
Step 2, identity number (identification, ID) and generating random number its Md5 according to current video
Value is as the first private key;
ClientPrivatekey=Md5.Create (Randdata+VideoId);
Wherein VideoId is used to indicate the ID number of current video, it should be noted that the ID of the current video is understood that
For the room number of each video.
It is spliced together by calling the interface Md5.Create of Md5 function to the ID number of random data and current video
Its Md5 value is calculated, to obtain the data of the first private key.
Step 3 calculates the first public key.
ClientPublickey=RSA.CreatePair (ClientPrivatekey);
First public key then calls the generation of RSA to match key interface RSA.CreatePair to generate.
To which final server generates a pair of first public key and the first private key information.
102, client generates the second public private key pair;
When server is interacted with client, the information of the first public key of oneself can be handed down to client by server first
End.At the same time, client can also generate a pair of second public private key pair according to the mode of server.The generation of server then also can
According to the ID number of current video, the User Identity number (user ID, Uid) and random data of user generate second
Private key, to ensure that private key when different clients play different video is different as far as possible.It is implemented as follows:
Step 1 generates random data;
Randdata=rand ();
One section of random data Randdata is generated by calling system function rand.
Step 2, according to current video ID number, Uid and generating random number its Md5 value as the second private key.
ServerPrivatekey=Md5.Create (Randdata+Uid+VideoId);
By calling the interface Md5.Create of Md5 function to spell come the ID number of Uid and current video to random number, user
It is connected to and calculates its Md5 value together, to obtain the data of the second private key.
Step 3 calculates the second public key.
ServerPublickey=RSA.CreatePair (ServerPrivatekey);
Second public key then calls the generation of RSA to match key interface RSA.CreatePair to generate.
To which client then generates the information of the second public private key pair.
After client receives the first public key that server issues at this time, then the information of the second public key of oneself is sent to clothes
Business device.
103, server and client exchange public key and generate shared code key;
Server and client side exchanges respective public key information, to generate a shared code key, it is to be understood that service
The shared code key that device and client generate is the same value.It should be noted that in order to guarantee what server and client side generated
Shared code key is the same value, and server and client side needs to negotiate to determine a generating algorithm before generating shared code key,
The generating algorithm is used to generate shared code key according to the first public key and the second public key.
Specific service device and client exchange public key and the shared code key realization of generation is as follows:
Step 1 exchanges public key.
First public key ServerPublickey of server is sent to client by server.
Second public key ClientPublickey of client is sent to server by client.
Step 2, client generate shared code key.
ShareKey=RSA.CreateShareKey (ServerPublickey, ClientPrivatekey);
Step 3, server generate shared code key.
ShareKey=RSA.CreateShareKey (ClientPublickey, ServerPrivatekey);
Since forming factors are consistent with generating algorithm, so that the value for the ShareKey that server and client side generates is consistent
's.
It should be noted that client generates shared code key by step 2, server generates shared code key by step 3,
There is no the restrictions of timing for the two processes, it can and step 2 is first carried out, step 3 can also be first carried out, or be performed simultaneously,
Specifically herein without limitation.
After server and client side generates shared code key, secret key pair server and client side is shared according to this and is encrypted
Or decryption processing.Optionally, in the embodiment of the present application, in addition to being encrypted or being solved using asymmetric RSA cryptographic algorithms
Outside close processing, data encryption algorithm (Data Encryptin Standard, DES) or other Encryption Algorithm can also be used,
Specifically herein without limitation.
104, server is separately added into verification information in each video of live streaming platform;
All videos for platform is broadcast live all are that user uploads onto the server the video made, and server then can be right
Each video is audited, and the watermark of live streaming platform is added to prevent other platforms from stealing the video in each video.?
After watermark is added to video, server can be separately added into verification information, and the verification information in each video of live streaming platform
The broadcasting that will not influence video, only plays the role of verifying, i.e. verification information client that platform is broadcast live for identification.
It should be noted that the verification information that server is added in each video can be different, for example, server can
To generate each video uniquely corresponding verification information according to the identification information of each video (identification, ID);Or
Person, server can also to each video generate a unique character string, such as to each video generate at random one 128 or
The character string that person is 256, and using the character string as the corresponding verification information of each video.Therefore, server generates verification information
Mode specifically herein without limitation.
105, client obtains the video information of current video;
When user watches current video by client, client can download the video information of the current video,
In the video information of the current video carry the verification information of current video.
106, client generates client calculated result according to the verification information in video information;
After client obtains the verification information of current video, client is calculated according to the verification information of the current video
Client calculated result, specific implementation can be as follows:
Md5result=md5.create (data+deviceid+token+time);
Wherein, Md5result is for indicating client calculated result, and md5.create is the interface of md5 algorithm, and data is then
It is the verification information in current video, deviceid indicates the unique id of equipment of client, and the deviceid of each user is not
Equally;Token is the token that server issues when client logs in, and time indicates the current timestamp information of client.
107, user end to server sends client calculated result;
After client calculated result is calculated in client, the client calculated result is added according to shared key
It is close, and encrypted client calculated result is sent to server.Wherein, it in the embodiment of the present invention, can be calculated using encryption
Method such as Advanced Encryption Standard (advanced encryption standard, AES) algorithm carries out client calculated result
Encryption, is implemented as follows:
EncryptData=Aes.Encrypt (Md5result, ShareKey);
Wherein encryptData is for indicating encrypted client calculated result, and Md5result is for indicating client
Calculated result, ShareKey is for indicating shared code key.
Optionally, in the embodiment of the present invention, step 101 to step 103 is optional step, i.e. server and client can be with
Shared code key is not generated, when client-toclient calculated result is encrypted, in addition to using ShareKey to be encrypted
In addition, the random number that server generates at random to client when the client can also be used to log in every time, therefore, client pair
The mode that client calculated result is encrypted is specifically herein without limitation.
108, server receives client calculated result according to shared code key;
After server receives encrypted client calculated result, which is solved
It is close, obtain original client calculated result.
Specifically, aes algorithm can be used also operation is decrypted to encrypted client calculated result in server,
It is implemented as follows:
Md5result=Aes.decrypt (encryptData, ShareKey);
Therefore server receives encrypted client calculated result, and is decrypted to have obtained original client according to shared code key
Hold calculated result.
Random number pair corresponding, that server generates at random to client when client is logged in every time using the client
When client calculated result is encrypted, then also operation is decrypted using the random number that this is generated at random in server, therefore, clothes
The mode of operation is decrypted specifically herein without limitation to client calculated result in business device.
In addition, since the client of only live streaming platform can just decrypt the verification information, and other non-live streaming platforms
Client has been not aware that a verification information, and it is not apparent how calculate client calculated result, therefore, when client not
When reporting the client calculated result, what server can determine currently viewing current video is recorded as false record.
109, server generates server calculated result according to video data;
It should be noted that server has the entire video content of current video, therefore server is also according to client
Calculation carries out MD5 calculating, to obtain server calculated result, specifically obtains the mode and step of server calculated result
Rapid 106 is similar, and specific details are not described herein again.
It should be noted that server generates server calculated result by step 109, client is raw by step 106
At client calculated result, specific sequential relationship is simultaneously not present in the two processes, it can step 109 is first carried out, it can also be with
Step 106 is first carried out, or is performed simultaneously, specifically herein without limitation.
110, server determines whether client calculated result and server calculated result are consistent;If it is not, thening follow the steps
111;If so, thening follow the steps 112;
After server obtains client calculated result and server calculated result, client calculated result and server are compared
Whether calculated result is consistent, if client calculated result and server calculated result are inconsistent, thens follow the steps 113;If client
It holds calculated result consistent with server calculated result, thens follow the steps 114.
111, what server determined currently viewing current video is recorded as false record;
When client calculated result and server calculated result are inconsistent, illustrate that the calculating of client is problematic, then really
The fixed currently viewing video is recorded as false record, i.e. this time broadcasting of the current video is not considered the viewing time of current video
In number.
112, what server determined currently viewing current video is recorded as validation record.
When client calculated result is consistent with server calculated result, it is believed that there is no problem for the calculating of client,
Client has true broadcasting current video, it is determined that the currently viewing video is recorded as validation record, i.e. the current video
This time play and count in the watched time of current video.
It should be noted that in the embodiment of the present invention, video is identified except through information processing method shown in FIG. 1
Falseness plays, and can also identify that the false of video plays in the following way, such as:
Mode 1:Server and client side can negotiate a shared key, which is used for server and client
Communication between end is encrypted or is decrypted.Server according to the current video of client terminal playing obtain video data, such as with
Machine data Rdata originates frame data startFrame and calculative frame number NumFrames and current timestamp letter
Breath;The video data is sent to client by server, so that client carries out that client is calculated according to video data
Calculated result, specifically, client is come to carry out MD5 to video data from the starting frame number of current video and calculative frame number
Calculate, at the same when calculating also can plus the random data Rdata that server issues, even thus ensure identical start frame and
Frame number, the client calculated result being finally calculated is inconsistent.It is implemented as follows:
Md5result=Md5.Create (video_data+Rdata);Wherein Md5result is by indicating based on client
It calculates as a result, video_data is for indicating the start frame of video to the video data of frame number;Rdata is for indicating that server issues
Random data.Therefore make again eventually by result data i.e. client calculated result, the client that md5 algorithm has obtained HASH
Client calculated result encryption is sent to server with shared key.Server receives the client that client is sent and calculates
As a result, and being decrypted using shared key;Wherein, server also can obtain server meter according to identical algorithm according to video data
It calculates as a result, when client calculated result and when server calculated result difference, then server, which determines, currently viewing described works as forward sight
Frequency is recorded as false record.
Mode 2:Periodically obtaining acquisition information in the client, (acquisition information includes the video number of viewing, and user is only
One uid, the opening time of start frame when video-see, the code rate of current video, the FPS that current video plays, video it is hard
Part decoding, software decoding, video-see state recording (whether it is wrong occur etc., if having Caton phenomenon), the sight of video
See duration, and the entire total amount for watching the video stream data that duration is downloaded), such as with 1 minute for boundary, came every 1 minute
One acquisition information is acquired, and the Encryption Algorithm that the acquisition information is negotiated using client and server will be acquired into information
Be reported to server.Therefore, (third-party platform uses general or third-party platform oneself to any third-party platform robber brush
Video player) video flowing or do not watched video, then the acquisition information is not had.For hacker,
The acquisition information of this paper is that (Encryption Algorithm is that sharing of being held consultation by client and server is secret to encrypted acquisition information
Key is to rely on time and the exclusive information of user the encryption that encrypts, and acquire information, then replicate the data come it is pseudo-
Acquisition information is made, it is illegal that server, which then can identify the acquisition information by decryption acquisition information, while even if acquisition
Information is trapped, and hacker obtains, and acquisition information can not also be decrypted less than shared code key), it is not easy to it forges and intercepts and captures.
Further in order to periodically report the data of plaintext to acquire to cracking or hacker plays the role of interference
Information, clear data acquisition are not mainly especially important information comprising part, are plaintexts the purpose is to data acquisition information, black
Visitor is very easy to find data acquisition information, thus allow hacker think be herein by report the data acquisition information of these plaintexts come
Brush behavior is stolen in identification.Wherein, data acquisition information may include current user equipment unique ID information, long letter when currently viewing
Breath, the id information of currently viewing film, currently watched video code rate information.This data acquisition information is then mainly used for interfering
Hacker.
It should be noted that the streaming video traffic data for the client downloads that the present invention reports can extraordinary identification robber
The behavior of brush, the video of viewing such as 10 minutes normal first, then must hold in the range of a reasonable video flow,
All it is then illegal not in range, while is brushed even if hacker goes to steal, then it there must be very big network bandwidth, could be brushed
A large amount of falseness watched time, hence for hacker then by great cost.Therefore can be compared by the above- mentioned information of this paper
Good identifies the user for stealing brush video-see number.
Mode 3:It is understood that it is limited for watching the frequency of video simultaneously for user normal for one
's.And for hacker, so that a large amount of viewing record is forged, then it needs a large amount of brush viewing record that can bear interest.
Need a kind of method so to prove that client has a verifying for carrying out viewing video, verification method can be client pass through it is certain
Calculation amount obtain a verify data, wherein the cpu resource of client can be consumed by calculating verify data, so that client
When concurrently watching video simultaneously, need concurrently to carry out largely to calculate consumption cpu resource, so that its concurrent limited amount,
Therefore the behavior of the brush watched time of client can be prevented.For normal users, normal primary video of watching does not influence user,
And concurrent a large amount of hair viewing videos then will affect very greatly, increase its cost.So how algorithm for design, enable to
Client have certain calculation amount be verified as a result, and cannot be around calculating, while server is relatively easy to again
Judge whether the result of client is correct.So present invention then devises a set of algorithm and comes so that client has certain calculation amount,
Server be easier to identify again client as a result, and not consuming the computing resource of server.Client and service first
Device can negotiate a shared code key, and then server can generate the random string and one 0 number of 32 bit lengths.
This 2 data can be all ultimately routed in client.And the shared code key negotiated before is encrypted.Client receives
After the data of server, the data of server are decrypted first, to obtain random data character string and calculative
The number digit of the 0 of result data.Client writes algorithm to generate the result data of server needs.Client calculates
The currently watched video of TOKEN data, client that the unique ID of equipment comprising client, client use when logging in is unique
Random data that ID, server issue, current system timestamp information are spliced together, and plus the random of client itself
Data come together to calculate MD5 value, and specific implementation is as follows:
Md5result=Md5.Create (DeviceId+Token+videoId+rdata+Time+
clientRandData);Wherein DeviceId is then the unique ID of equipment of client;Wherein Token is then that client logs in clothes
Token value when business device;VideoId is then unique id of video;Rdata is then the random data that server issues;
ClientRandData is then the random data that client generates.The result data of HASH has been obtained eventually by md5 algorithm,
In the result data that may require that client calculating due to server, start the number for 0.Such as what is be calculated is
"2013dabcd6987abc4523654123451263".It is 2 and is not 0 due to starting first of the result data, institute
It also needs to generate random data constantly with client to calculate MD5 value, until start bit is 0, just meets the requirement of server.
So the calculation amount of client is then generating random data, continuous calculating MD5 value, until meeting wanting for server with continuous
It asks.Server can also play the role of adjusting to the calculation amount of client, for example, be initiated with 0 number it is more, then client
Calculation amount it is then bigger.So that client calculating is extremely complex.Client calculating is completed after meeting the result of server, will
The data that result data and client participate in calculating are sent to server.It then include Md5result+DeviceId+Time+
clientRandData.And other data include the unique ID of video and log in when token server itself have record.Server
Verify client calculated result.The result data for meeting server is reported to server by client, and server then can be according to visitor
Family end data verifies.Md5result=Md5.Create (DeviceId+Token+videoId+rdata+Time+
clientRandData);And it is whether consistent with client to Md5result judgement, and whether 0 number originated is full
Foot, if meet if illustrate client the result is that correct.And server only need to calculate a MD5 value it is known that
Whether the result of client is correct, because client is to calculate MD5 value frequently to obtain a suitable random data
ClientRandData, and the result that server is then reported from client knows the random data of client selection, to service
Device verifying is then fairly simple.
The embodiment of the present invention is described from the angle of information processing method above, separately below from server and visitor
The angle at family end is respectively described the embodiment of the present invention.
Referring to Fig. 2, Fig. 2 is one embodiment schematic diagram of server provided in an embodiment of the present invention, the server, tool
Body includes:
Processing unit 201, for being separately added into verification information in each video of live streaming platform, the verification information is used for
Identify the client of the live streaming platform;
Transmit-Receive Unit 202, when the client terminal playing current video, for receiving the client of the client transmission
Calculated result, the client calculated result are that the client is calculated according to the verification information of the current video;
Determination unit 203, it is current for determining when the client calculated result and server calculated result are inconsistent
The false record that is recorded as of the current video is watched, the server calculated result is the server according to the video counts
According to being calculated.
Optionally, in some possible implementations, the server further includes:
Generation unit 204 generates shared code key for holding consultation with the client, and the shared code key is used for institute
The communication between server and the client is stated to be encrypted or decrypted.
Optionally, in some possible implementations, the generation unit 204 includes:
Generation module 2041, for generating the first public private key pair according to the information of the current video, described first is public and private
Key is to including the first public key and the first private key;
Transceiver module 2042, for sending first public key to the client, so that the client is according to institute
It states the first public key and generates shared code key;
The generation module 2041 is also used to generate the shared code key according to first public key and the second public key, described
Second public key is generated and sent by the client.
Optionally, in one possible implementation, the server further includes:
Decryption unit 205, for decrypting the client calculated result according to the shared code key, the visitor after being decrypted
Family end calculated result.
Referring to Fig. 3, Fig. 3 is one embodiment schematic diagram of client provided in an embodiment of the present invention, the client, tool
Body includes:
Obtaining unit 301, when client terminal playing current video, for obtaining the video information of the current video, institute
Stating video information includes verification information;
Generation unit 302, for generating client calculated result according to the verification information;
Transmit-Receive Unit 303, for the client calculated result to be sent to the server, so that the server
Whether the record that the currently viewing current video is determined according to the client calculated result is false record.
Optionally, in one possible implementation, the generation unit 302 is also used to:It is carried out with the server
Negotiate to generate shared code key, the shared code key is used to carry out the communication between the client and the video network server
Encryption or decryption;
The client further includes:
Encryption unit 304, for encrypting the client calculated result according to the shared code key.
As shown in figure 4, the embodiment of the invention provides a kind of electronic equipment, including memory 410, processor 420 and deposit
The computer program 411 that can be run on memory 420 and on processor 420 is stored up, processor 420 executes computer program
Following steps are realized when 411:Verification information is separately added into each video of live streaming platform, verification information institute for identification
State the client of live streaming platform;When the client terminal playing current video, receives the client that the client is sent and calculate
As a result, the client calculated result is that the client is calculated according to the verification information of the current video;When described
When client calculated result and server calculated result are inconsistent, determine the currently viewing current video is recorded as false note
Record, the server calculated result are that the server is calculated according to the video data.
Optionally, the processor is also used to:
It holds consultation with the client and generates shared code key, the shared code key is used for the server and the visitor
Communication between the end of family is encrypted or is decrypted.
Optionally, it holds consultation with the client and generates shared code key and include:
According to the information of the current video generate the first public private key pair, first public private key pair include the first public key and
First private key;First public key is sent to the client, so that the client generates altogether according to first public key
Enjoy code key;The shared code key is generated according to first public key and the second public key, second public key is given birth to by the client
At and send.
Optionally, the video data is sent to the client includes:The visitor is decrypted according to the shared code key
Family end calculated result, the client calculated result after being decrypted.
Optionally, before generating shared code key according to first public key and the second public key, further include:With the client
Determine generating algorithm, the generating algorithm is for generating the shared code key.
In the specific implementation process, when processor 420 executes computer program 411, the corresponding embodiment of Fig. 1 may be implemented
Middle any embodiment.
The electronic equipment introduced by the present embodiment is implements to set used by a kind of server in the embodiment of the present invention
It is standby, so based on method described in the embodiment of the present invention, those skilled in the art can understand the electricity of the present embodiment
The specific embodiment of sub- equipment and its various change form, so how to be realized for the electronic equipment herein of the invention real
The method applied in example is no longer discussed in detail, as long as the method that those skilled in the art implement in the embodiment of the present invention is used
Equipment, belong to the range to be protected of the invention.
Referring to Fig. 5, Fig. 5 is a kind of embodiment signal of computer readable storage medium provided in an embodiment of the present invention
Figure.
As shown in figure 5, present embodiments providing a kind of computer readable storage medium 500, it is stored thereon with computer journey
Sequence 511, the computer program 511 realize following steps when being executed by processor:It is separately added into each video of live streaming platform
Verification information, the verification information for identification it is described live streaming platform client;When the client terminal playing current video,
The client calculated result that the client is sent is received, the client calculated result is the client according to described current
The verification information of video is calculated;When the client calculated result and server calculated result are inconsistent, determine current
The false record that is recorded as of the current video is watched, the server calculated result is the server according to the video counts
According to being calculated.
Optionally, it is also used to realize following steps when which is executed by processor:
It holds consultation with the client and generates shared code key, the shared code key is used for the server and the visitor
Communication between the end of family is encrypted or is decrypted.
Optionally, it is also used to realize following steps when which is executed by processor:Work as forward sight according to described
The information of frequency generates the first public private key pair, and first public private key pair includes the first public key and the first private key;To the client
First public key is sent, so that the client generates shared code key according to first public key;It is public according to described first
Key and the second public key generate the shared code key, and second public key is generated and sent by the client.
Optionally, it is also used to realize following steps when which is executed by processor:According to it is described share it is secret
Key decrypts the client calculated result, the client calculated result after being decrypted.
Optionally, it is also used to realize following steps when which is executed by processor:It is true with the client
Determine generating algorithm, the generating algorithm is for generating the shared code key.
Referring to Fig. 6, for the embodiment schematic diagram of another electronic equipment provided in an embodiment of the present invention.
As shown in fig. 6, the embodiment of the invention provides a kind of electronic equipment, including memory 610, processor 620 and deposit
The computer program 611 that can be run on memory 620 and on processor 620 is stored up, processor 620 executes computer program
Following steps are realized when 611:When playing current video, the video information of the current video, the video information packet are obtained
Include verification information;Client calculated result is generated according to the verification information;The client calculated result is sent to described
Server, so that the server determines that the record of the currently viewing current video is according to the client calculated result
It is no to be recorded to be false.
Optionally, the processor 620 is also used to execute:
It holds consultation with the server and generates shared code key, the shared code key is used for the client and the view
Communication between frequency network server is encrypted or is decrypted;
After the client generates client calculated result according to the verification information, the client is by the client
Calculated result is sent to before the server, and the processor 620 is also used to execute:
The client calculated result is encrypted according to the shared code key.
In the specific implementation process, when processor 620 executes computer program 611, the corresponding embodiment of Fig. 1 may be implemented
Middle any embodiment.
The electronic equipment introduced by the present embodiment is implements to set used by a kind of client in the embodiment of the present invention
It is standby, so based on method described in the embodiment of the present invention, those skilled in the art can understand the electricity of the present embodiment
The specific embodiment of sub- equipment and its various change form, so how to be realized for the electronic equipment herein of the invention real
The method applied in example is no longer discussed in detail, as long as the method that those skilled in the art implement in the embodiment of the present invention is used
Equipment, belong to the range to be protected of the invention.
Referring to Fig. 7, Fig. 7 is a kind of embodiment signal of computer readable storage medium provided in an embodiment of the present invention
Figure.
As shown in fig. 7, present embodiments providing a kind of computer readable storage medium 700, it is stored thereon with computer journey
Sequence 711, the computer program 711 realize following steps when being executed by processor:When playing current video, obtain described current
The video information of video, the video information include verification information;Client calculated result is generated according to the verification information;It will
The client calculated result is sent to the server, so that the server is determined according to the client calculated result
Whether the record of the currently viewing current video is false record.
Optionally, following steps are realized when which is executed by processor:
It holds consultation with the server and generates shared code key, the shared code key is used for the client and the view
Communication between frequency network server is encrypted or is decrypted;
It is described to send the client calculated result after the generation client calculated result according to the verification information
Before the server, which realizes following steps when being executed by processor:
The client calculated result is encrypted according to the shared code key.
It should be noted that in the above-described embodiments, all emphasizing particularly on different fields to the description of each embodiment, in some embodiment
The part being not described in may refer to the associated description of other embodiments.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructions
And/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer to
Enable the processor of general purpose computer, special purpose computer, embedded computer or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Concept, then additional changes and modifications may be made to these embodiments.So it includes preferred that the following claims are intended to be interpreted as
Embodiment and all change and modification for falling into the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies
Within, then the invention is also intended to include including these modification and variations.