Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In view of the problems of low attendance efficiency and low attendance accuracy in the existing attendance mode, the mobile attendance method, the mobile attendance device and the server provided by the embodiment of the invention can effectively improve the attendance efficiency and the attendance accuracy, and the embodiment of the invention is described in detail below.
The first embodiment is as follows:
first, a mobile attendance method for implementing an embodiment of the present invention is described with reference to fig. 1.
Fig. 1 shows a flowchart of a mobile attendance checking method, which is executed by a server, and includes the following steps:
step S102, receiving a sign-in request sent by a mobile terminal; wherein, the information carried by the check-in request comprises: mobile terminal identification, user information, check-in location and check-in time.
The mobile terminals can be mobile phones, iPads and other devices, the mobile terminal identification of each mobile terminal is unique, namely the identification of different mobile terminals is different, and the user information can be the name of the user and the sign-in position such as a conference room, an office or a classroom.
And step S104, judging whether the check-in request is legal or not according to the information carried by the check-in request.
Since the user may check in illegally through the browser or the simulator, or may check in once or more times through the mobile terminal instead of others, it is necessary to determine whether the check-in request is legal. The information carried in the check-in request is a mobile terminal identifier, whether the user successfully checks in through the mobile terminal in a certain time period can be judged by judging the mobile terminal identifier, if the user successfully checks in, and the re-received check-in request and the previously received check-in request have time conflicts and are overlapped, the check-in request is judged to be the check-in conflict request, the user is not allowed to check in again, namely, the check-in condition of replacing other people is prevented, namely, each mobile device can only check in once in a specific time period and area (the area limit of time + space). The check-in request can also include an encrypted key obtained by the mobile terminal through calculation, and when the server receives the check-in request, if the encrypted key is judged to be null, the server indicates that the user is an illegal check-in request performed through a browser or a simulator.
And step S106, if yes, issuing a sign-in success identifier to the mobile terminal.
The sign-in success identification can be a text prompt with sign-in success or a voice prompt for showing sign-in success. If the check-in request is judged to be illegal, when the request is illegal and belongs to the condition that the check-in request at this time and the previous successful check-in time conflict, a check-in conflict identifier is issued to the mobile terminal; when the request illegally belongs to a sign-in request of a user through a browser or a simulator, recording user information carried in the sign-in request, marking the user information, sending a sign-in invalid identifier and an identifier representing that the user information is marked to the mobile terminal, and enabling the user to enter a blacklist when the user illegally signs in for a certain number of times.
In the attendance checking method provided by the embodiment, the user can check in only through the mobile terminal, the method is convenient and fast, the server directly interacts with the mobile terminal, and the attendance checking efficiency can be effectively improved. In addition, the check-in request sent by the mobile terminal carries the mobile terminal identification, the user information, the check-in position and the check-in time, the check-in action can be effectively prevented from being replaced due to the uniqueness of the mobile terminal identification, the check-in position and the check-in time can limit the check-in range in terms of time dimension and space dimension, the validity of the check-in request can be comprehensively verified by combining the user information, and the check-in is considered to be successful only when the check-in request is legal. This kind of mode can make attendance result more accurate. To sum up, this embodiment can effectively improve attendance efficiency and attendance rate of accuracy.
The embodiment further provides a specific process of the mobile attendance method on the basis of the mobile attendance method, and as shown in a flow chart of another mobile attendance method shown in fig. 2, the following steps can be seen:
step S202, receiving a sign-in request sent by a mobile terminal; wherein, the information carried by the check-in request comprises: the mobile terminal comprises a mobile terminal identifier, user information, a sign-in position and sign-in time, and further comprises a first encryption key; the first encryption key is generated by the mobile terminal according to a first preset algorithm.
The first encryption key is generated according to a first preset algorithm according to the check-in request and is attached to the check-in request when the mobile terminal sends the check-in request.
Step S204, generating a second encryption key according to a second preset algorithm according to the information carried by the sign-in request; wherein the first preset algorithm is related to the second preset algorithm.
The correlation may indicate that the first preset algorithm is the same as the second preset algorithm, or that the first preset algorithm is different from the second preset algorithm. The first encryption key is generated by the mobile terminal according to a first preset algorithm, and the second encryption key is generated by the server according to the first preset algorithm.
In step S206, it is determined whether the first encryption key and the second encryption key are the same. If yes, go to step S208; if not, step S216 is performed.
Step S208, searching for a mobile terminal identifier which is the same as the mobile terminal identifier carried by the received check-in request in a plurality of mobile terminal identifiers stored in a database of the server, and determining the check-in request stored in the database corresponding to the same mobile terminal identifier; the stored check-in request is a check-in request corresponding to the check-in successful identifier, and the information carried by the stored check-in request comprises: mobile terminal identification, user information, check-in location and check-in time.
According to the mobile terminal identification carried by the check-in request sent by the mobile terminal, the same mobile terminal identification is searched in the mobile terminal identifications stored in the server, the check-in request which is stored in the server and corresponds to the same mobile terminal identification is determined, namely, the check-in request which corresponds to the check-in success identification is determined, if a student sends the check-in request to the server through a mobile phone of the student, before the check-in request, the student sends the check-in request to the server through the mobile phone of the student and completes the check-in, the server stores the check-in request which corresponds to the completion of the check-in, and the check-in request comprises information carried by the check-in request.
Step S210, judging whether the check-in time carried by the received check-in request conflicts with the stored check-in time carried by the check-in request; if not, executing step S212; if so, go to step S214.
The check-in time carried by the check-in request stored in the server can be check-in time recorded in the form of hours, months and days, if the check-in time carried by the check-in request is different from the check-in time in the corresponding check-in request stored in the server after the check-in is successful for the last time by less than the time of a lesson, the check-in request is considered to be a conflict check-in, and the conflict check-in also comprises repeated check-in, if the student completes the check-in a lesson, and sends the check-in request again in the course on course period, the check-in request sent again is considered to be repeated check-in.
Step S212, the check-in request is determined to be legal, and a check-in success identifier is issued to the mobile terminal.
If the first encryption key is the same as the second encryption key, the time conflict does not exist between the check-in request and the check-in completed by the mobile terminal before, and the check-in request is determined to be legal.
Step S214, issuing a sign-in conflict identifier to the mobile terminal.
If the time conflict exists between the check-in request and the check-in completed by the mobile terminal before, and the user can check-in again by the mobile terminal after finishing the check-in by himself or herself, and sends a check-in conflict identifier to the mobile terminal to prevent the check-in behavior by replacing other people.
Step S216, determining that the sign-in request is illegal, recording the user information carried in the sign-in request, and issuing a sign-in invalid identifier and an identifier representing that the user information is marked to the mobile terminal.
If the first encryption key is different from the second encryption key, the fact that the user possibly sends a check-in request to the server through the simulator is indicated, the server can determine that the check-in request is an illegal request, record user information carried in the check-in request, such as the name of the user, and mark the user information. The sign-in invalid identification can be words or voice with sign-in invalid identification, and the identification for representing that the user information is marked can be words or voice with information such as user name and the like which is marked.
The mobile attendance method provided by the embodiment of the invention comprises the steps of receiving a check-in request sent by a mobile terminal, wherein the check-in request also carries a first encryption secret key generated by the mobile terminal according to the check-in request according to a first preset algorithm, generating a second encryption secret key by a server according to a second preset algorithm according to information carried by the check-in request, judging whether the first encryption secret key and the second encryption secret key are the same, if not, indicating that a user does not pass the check-in request sent by the mobile terminal but can pass the check-in request sent by an illegal way such as a browser or a simulator, and determining that the check-in request is an illegal request, thereby effectively preventing the illegal check-in behavior of the user, ensuring that the attendance result is more accurate, and if the first encryption secret key and the second encryption secret key are the same, judging whether the check-in time carried by the received check-in request conflicts with the stored check-in time carried by the check-in request, if the check-in conflict does not occur, the sign-in success identifier is sent to the mobile terminal, if the check-in conflict occurs, the sign-in success identifier represents that the user may replace other people to sign in or the user's own repeated sign-in, the sign-in conflict identifier is sent to the mobile terminal, the action of replacing other people to sign in is prevented, and the check-in accuracy rate can be effectively improved.
In specific implementation, a flowchart of another mobile attendance checking method shown in fig. 3 is given on the basis of fig. 1, and the following steps can be seen:
step S302, receiving a query request sent by a mobile terminal; the query request carries the AP information and the current time of the mobile terminal connection.
Taking the example that the user signs in a meeting room, the user can send a query request to the server through a mobile phone of the user, and can uniquely determine the location division of the area corresponding to the AP (Access Point) information (such as an MAC address) by using the unique characteristics of the AP information (such as the MAC address) connected to the mobile terminal.
Step S304, checking the sign-in options corresponding to the AP information and the current time through a pre-recorded sign-in option table; the corresponding relation of the AP information, the time and the check-in option is recorded in the check-in option table.
And searching the meeting subjects of the areas corresponding to the AP (MAC address), such as the meeting room where the user is located and the next meeting room at the current time, through a pre-recorded check-in type selection table.
Step S306, determining the found check-in option as response information; wherein the response information includes at least one check-in option for the AP information and the current time.
The conference subjects of the conference room where the user is located and the next conference room at the current time are found, the found corresponding conference subjects of the conference rooms different in the current time are used as response information, the sign-in options are included, such as the conference subject of the first conference room at the current time, the conference subject of the second conference room at the current time, at the moment, the two sign-in options are provided, and the sign-in options of the response information are not less than one.
And step S308, sending the response information to the mobile terminal so that the mobile terminal determines a target sign-in option and sends a sign-in request based on the target sign-in option.
The user selects the sign-in option according to the response information sent to the mobile terminal, if the conference subject of the first conference room at the current time is selected as the target sign-in option, the sign-in request is sent based on the target sign-in option, and the information carried by the sign-in request comprises: mobile terminal identification, user information, check-in location and check-in time.
Step S310, judging whether the check-in request is legal or not according to the information carried by the check-in request.
Step S312, if yes, the successful sign-in identifier is sent to the mobile terminal.
The sign-in success mark can be a text prompt with sign-in success or a voice prompt for showing sign-in success, and prompts the user that the sign-in is successful. If the check-in request is judged to be illegal, the specific process is described in step S106, and will not be described herein again.
According to the mobile attendance checking method provided by the embodiment of the invention, the inquiry request carries the AP information connected with the mobile terminal and the current time, the position division of the area corresponding to the AP information can be uniquely determined by utilizing the unique characteristic of the AP information connected with the mobile terminal, the more accurate response information can be issued according to the current time, and the check-in request is sent by the mobile terminal according to the response information, so that the check-in accuracy is further improved.
Example two:
on the basis of the mobile attendance method provided in the first embodiment, the present embodiment takes the example of the student signing in class, the attendance object is the student, and the attendance field is the course signing in, and is applied to the mobile attendance method, for example, as shown in the flowchart of the mobile attendance method shown in fig. 4, the specific steps are as follows:
(1) if the client of the student (namely, the mobile terminal) is connected with Wi-Fi in a certain classroom covered by Wi-Fi, the student sends an inquiry request to the server through the client, wherein the inquiry request comprises the MAC address (namely, the AP information) contained in the current Wi-Fi and the current time.
(2) And when receiving an inquiry request of the client, the server screens and matches the courses in the MySQL database according to the received MAC address information and the time information, and if the screening result meets the course information at the current time and the current place, the server issues the corresponding course information at the current time and the current space to the client.
(3) The client side obtains the course information issued by the server side, if the course information is null, the client side is prompted to change the position or refresh the client side to resend the query request, the client side can also send the information that the MAC address information of the current position is not recorded into the background database to the server, and if the current course information is not null, the course needing to be checked in can be selected and the check-in request can be sent.
(4) When a student at a client sends a check-in request, the client sends current student information (school number, name and the like), selected course information (course place, course time, course teacher, course name and the like), current check-in time and encrypted key information obtained by calculation of a first preset algorithm as the check-in request to a server, and the server checks the encrypted key information.
(5) After receiving a sign-in request sent by a client, the server analyzes an encryption key, and if the encryption key is empty, the server issues a sign-in invalid identifier to the client; if the client side is not empty, an encryption key is obtained through calculation of a second preset algorithm, whether the encryption key calculated by the client side is the same as the encryption key calculated by the server or not is judged, if not, the encryption algorithms of the client side and the server are different, the student sends a check-in request through the simulator, the check-in identification is illegal check-in, if yes, the student judges whether the client side completes check-in of other courses within the course time range corresponding to the course requested to be checked-in according to the check-in request, and if yes, the check-in conflict identification is issued to the client side; if not, judging whether the client finishes the check-in of the course within the time range of the course corresponding to the course requested to check-in, if so, issuing a check-in repeated identifier to the client, if not, indicating that the check-in is successful, storing the check-in request information into a database, and issuing a check-in successful identifier to the client.
(6) The client receives the information sent by the server, if the sent information is that the information prompting whether the student needs to cancel the previous sign-in of the mobile terminal exists in the sign-in conflict identification, the course sign-in can not be carried out if the information is not cancelled; if the issued information is an invalid sign-in, indicating that the interface simulation is currently carried out to forge the sign-in, wherein the invalid sign-in contains information for prompting that the current student information is marked, and the sign-in is invalid; if the issued information is the sign of successful check-in, the check-in is successful.
Fig. 5 illustrates a flow chart of the administrator entering MAC address information of the corresponding classroom, as seen in the following steps:
(1) the mobile terminal administrator inputs MAC address information of a classroom, firstly, the Wi-Fi information is connected to the classroom, a physical address corresponding to the current classroom is input, and the Wi-Fi information is clicked and uploaded to a server background to wait.
(2) The server receives MAC address information and corresponding physical location information (classroom information) sent by the mobile terminal, judges whether the received information is stored in a MySQL database, if the received information is stored in the database, the uploading conflict is described, and the feedback identifier is failed to upload; if the received information is not summarized with the database, the uploading is not conflicted, the uploading is successful, the information is written into the database, and the feedback identifier is uploaded successfully.
(3) The mobile terminal receives a feedback identifier sent by the server, if the feedback identifier is an uploading conflict, the MAC address information of the current position is already uploaded, and the administrator needs to move the position to perform the steps (1) and (2) again; if the feedback identification is successful uploading, the MAC address information of the current position is successfully uploaded.
Fig. 6 illustrates a flow chart of course information entry, which can be seen in the following steps:
(1) and at the Web end, a teacher or an administrator can select a time and a place to construct course information, submit the constructed course information to the server background, and wait for the feedback information of the server.
(2) After receiving the course construction information sent by the Web end, the server firstly judges the classroom and time contained in the constructed course, judges whether the received information conflicts with the database summary information according to a specific rule, if so, feeds back the identification of the Web end as the course construction conflict, and if not, indicates that the course construction is successful, and writes the course construction conflict into the database.
(3) If the user teacher or administrator at the Web end receives the identification returned by the server background, and if the identification is used for creating course conflicts, the user needs to edit and select the time period or the place selected by the user teacher or the administrator, and then the steps (1) and (2) are carried out again.
The scheme of signing in at class for students is applicable to a mobile attendance method based on AP information (such as MAC addresses). In the whole check-in process, in order to ensure the usability of the mobile attendance checking method, the technologies of RESTFUL, MD5 encryption, information mutual exclusion, asynchronous loading, real-time refreshing and the like are analyzed, the automatic addition of the MAC address information of Wi-Fi into a database is realized through the design of the MAC address information of Wi-Fi, and a user can automatically send a request to a background to acquire corresponding attendance checking classroom information after the mobile phone is linked with the Wi-Fi information.
From the viewpoint of obtaining the MAC address information of the Wi-Fi, the mobile terminal can allow the mobile terminal to obtain the MAC address of the information of the linked Wi-Fi, the MAC address information is unique and can be used as a unique identification mark, and the attendance information is also subjected to corresponding encryption technology, so that the safety of the transmission process can be ensured, and the attendance information cannot be simulated or tampered.
Meanwhile, the identification of the request when the mobile terminal signs in is also the only identification of the mobile terminal, so that each mobile terminal can be ensured to represent a user, when the mobile terminal signs in, the check-in request is carried out, the check-in of other courses can not be carried out when the course which is successfully signed in is not finished through the overall mutual exclusion processing, and the check-in of the next course can be carried out unless the user cancels the information that the course which is successfully signed in this time.
After the user successfully signs in, the sign-in request information is stored in the MYSQL database, so that the sign-in information is stored and the accuracy and reliability of the sign-in are ensured.
The check-in process may end up with an overview of: the user is marked through the unique identification mark of the mobile terminal, and the check-in course information and the check-in classroom information at the current time are bound through the MAC address of Wi-Fi or the information of the unique identification mark in the base station and are stored in the database. Whether the current check-in time is finished or not can be judged through the time of the course information when the course is checked in, whether check-in of a plurality of users is carried out through one mobile terminal or not is judged, it is guaranteed that one mobile terminal can only carry out effective check-in on the course once, other check-in information is invalid, and finally the check-in information is bound with each user mobile phone.
The final overview of the check-in process is mainly to explain that the mobile attendance checking method is not limited to a specific scene, and as long as a check-in mode capable of marking a mobile terminal is available, the check-in mode of a specific occasion is carried out through two dimensions of time and space, so that an accurate and reliable check-in mode can be achieved.
Through the mode, the user only needs to sign in through the client, namely the mobile terminal, the system is convenient and fast, interaction is directly carried out through the server and the mobile terminal, and the attendance checking efficiency can be effectively improved. In addition, the inquiry request sent by the mobile terminal is provided with the MAC address contained in the current Wi-Fi, the sign-in request carries user information, a sign-in position, sign-in time and an encryption key, the uniqueness of the MAC address information can be used as a uniquely identified identifier, so that the sign-in behavior can be effectively prevented from being replaced, the server calculates the encryption key according to the sign-in request, judges whether the sign-in request is legal according to the encryption key calculated by the mobile terminal and the encryption key calculated by the server, the sign-in position and the sign-in time can limit the attendance range by using both time dimension and space dimension, and the validity of the sign-in request can be comprehensively verified by combining with the user information, and the sign-in request is considered to be successful only when the sign-in request is legal. This kind of mode can make attendance result more accurate. To sum up, this embodiment can effectively improve attendance efficiency and attendance rate of accuracy.
Example three:
corresponding to the foregoing method embodiment, this embodiment provides a mobile attendance device, referring to a block diagram of a structure of the mobile attendance device shown in fig. 7, where the device is disposed on a server side and includes the following modules:
a receiving module 702, configured to receive a check-in request sent by a mobile terminal; wherein, the information carried by the check-in request comprises: mobile terminal identification, user information, sign-in position and sign-in time;
the judging module 704 is used for judging whether the check-in request is legal or not according to the information carried by the check-in request;
a sending module 706, configured to send a successful sign-in identifier to the mobile terminal if the sign-in request is legal.
According to the mobile attendance checking device provided by the embodiment of the invention, the check-in request sent by the mobile terminal is received, the check-in request carries mobile terminal identification information, user information, check-in position information and check-in time information, whether the check-in request is legal or not is further judged according to the information carried by the check-in request, and if the check-in request is legal, a check-in success identification is issued to the mobile terminal. In the attendance mode that this embodiment provided, the user only needs can sign in through mobile terminal, and convenient and fast directly interacts by server and mobile terminal, can effectively promote attendance efficiency. In addition, the check-in request sent by the mobile terminal carries the mobile terminal identification, the user information, the check-in position and the check-in time, the check-in action can be effectively prevented from being replaced due to the uniqueness of the mobile terminal identification, the check-in position and the check-in time can limit the check-in range in terms of time dimension and space dimension, the validity of the check-in request can be comprehensively verified by combining the user information, and the check-in is considered to be successful only when the check-in request is legal. This kind of mode can make attendance result more accurate. To sum up, this embodiment can effectively improve attendance efficiency and attendance rate of accuracy.
In particular implementation, the check-in request further comprises a first encryption key; the first encryption key is generated by the mobile terminal according to a first preset algorithm; the judgment module 704 is configured to generate a second encryption key according to a second preset algorithm according to the information carried by the check-in request; wherein the first preset algorithm is related to the second preset algorithm; judging whether the first encryption key and the second encryption key are the same; if so, judging whether the information carried by the check-in request conflicts with the information carried by the check-in request stored in a database of the server, and if not, determining that the check-in request is legal. The sending module 706 is configured to issue a sign-in invalid identifier to the mobile terminal if the first encryption key is different from the second encryption key; and if the information carried by the check-in request conflicts with the information carried by the check-in request stored in the database of the server, issuing a check-in conflict identifier to the mobile terminal.
In another embodiment, the receiving module 702 includes: the check-in unit is used for searching check-in options corresponding to the AP information and the current time through a pre-recorded check-in option table if a query request sent by the mobile terminal is received before the check-in request is received; the query request carries AP information connected with the mobile terminal and the current time; the corresponding relation among the AP information, the time and the check-in options is recorded in the check-in option list; the determining unit is used for determining the found check-in option as response information; wherein the response information includes at least one check-in option for the AP information and the current time; and the sending unit is used for sending the response information to the mobile terminal so that the mobile terminal determines the target sign-in option and sends a sign-in request based on the target sign-in option.
The device provided by the embodiment has the same implementation principle and technical effect as the foregoing embodiment, and for the sake of brief description, reference may be made to the corresponding contents in the foregoing method embodiment for the portion of the embodiment of the device that is not mentioned.
An embodiment of the present invention provides a server, referring to a schematic structural diagram of a server shown in fig. 8, where the server includes: the device comprises a processor 80, a memory 81, a bus 82 and a communication interface 83, wherein the processor 80, the communication interface 83 and the memory 81 are connected through the bus 82; the processor 80 is arranged to execute executable modules, such as computer programs, stored in the memory 81.
The memory 81 may include a high-speed Random Access Memory (RAM) and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 83 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, etc. may be used.
Bus 82 may be an ISA bus, PCI bus, EISA bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 8, but that does not indicate only one bus or one type of bus.
The memory 81 is used for storing a program, the processor 80 executes the program after receiving an execution instruction, and the method executed by the apparatus defined by the flow process disclosed in any of the foregoing embodiments of the present invention may be applied to the processor 80, or implemented by the processor 80.
The processor 80 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 80. The Processor 80 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory 81, and the processor 80 reads the information in the memory 81 and performs the steps of the above method in combination with its hardware.
Embodiments of the present invention further provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, performs the steps of the method of any one of the foregoing embodiments.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the system described above may refer to the corresponding process in the foregoing embodiments, and is not described herein again.
The mobile attendance method, the mobile attendance device and the computer program product of the server provided by the embodiment of the invention comprise a computer readable storage medium storing program codes, instructions included in the program codes can be used for executing the method described in the previous method embodiment, and specific implementation can refer to the method embodiment, and is not described herein again.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.