Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one
Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
In order to improve the efficiency of the corresponding content of detection network object, this specification embodiment provides a kind of content detection side
Method and device, this method and device can be applied in the detection system for needing to detect the corresponding content of network object.
For example, this method and device can be applied to electric business and put down when the network address for the trade company that network object is a certain electric business platform
In the detection system of the corresponding content of the network address of the trade company of platform.
1 to Fig. 4 a kind of content detection algorithm that this specification embodiment provides is carried out specifically with reference to the accompanying drawing
It is bright.
As shown in Figure 1, a kind of content detection algorithm that this specification embodiment provides, may include steps of:
Step 102, the relevant information for obtaining network object to be detected.
Network object, the network object of Web content can be provided by referring to, such as the use of network address, social category application
Application in family, application market, etc..If network object is network address, the corresponding Web content provided can be network
Content in the corresponding webpage in address;If network object is the user of social category application, the corresponding Web content provided can be with
It is article, the video etc. that user issues in the social application;If network object is the application in application market, corresponding to provide
Web content can be the installation file of application.
The relevant information of network object can include but is not limited to describe the information of the network object self character and/or retouch
State the information of the owner (main body in other words) characteristic of the network object.
For example, if network object is the network address of the trade company of electric business platform, the relevant information of the network object
It may include that the flowing of access information of network address, the corresponding content of creation time information, network address of network address are gone through
History detection information etc. describe network address characteristic itself information and trade company belonging to industry type, the trading volume of trade company,
The credit rating of trade company, user are to the type of the evaluation information of trade company, trade company (for example whether belonging to commercial affairs expands trade company
The owner --- the information of the characteristic of trade company of the description such as (Business Development, BD) network object.
If network object is the user of social application, the relevant information of the network object may include the ground of user
Industry, the user hair in social application belonging to the historical content that reason position, the gender of user, user issue in social application
Whether the type of the historical content of cloth, user issued the information of the characteristic of the description network object such as information such as violation content.
If network object is the application in application market, the relevant information of the network object may include application
Type, the download of application, user describe the information of network object self character to evaluation information of application etc., and apply and open
The download of the other application of originator exploitation, the type of the other application of application developer exploitation, user open application developer
Evaluation information and the prestige record of application developer of the other application of hair etc. describe the information of owner's characteristic of network object.
In one example, step 102 can remove acquisition network pair at the appointed time or according to certain period
The relevant information of elephant, the relevant information for obtaining network object can be longer, this is because the portion in the relevant information of network object
A possibility that point passage of information at any time changes is smaller, it is possible to go to obtain with a longer period.In addition, can
To understand, the relevant information of the network object obtained in step 102 can build up preservation according to acquisition time, for some
It is not susceptible to the relevant information of variation, available primary long-time service later, this makes the data volume that step 102 once obtains
It is relatively fewer, therefore will not influence the efficiency of the corresponding content of detection network object.
Step 104, the relevant information based on the network object determine the risk label of the network object.
Risk label can be used for characterizing the height of the corresponding existing degree of risk of network object.In this specification embodiment
In, the risk label of network object can be composed of at least one risk indicator by preset logical relation, in other words wind
Dangerous label may include at least one risk indicator according to logic of propositions composition of relations.Wherein, logic of propositions relationship include but
It is not limited to the logical relations such as "AND" and "or".
As an example, when the network object is the network address of the trade company in default electric business platform, above-mentioned wind
Dangerous index can be any one of following index: whether the corresponding trade company of the network address is in white list, the network
Whether access temperature, the network address of address are newly-increased network address, the industry class of the corresponding trade company of the network address
Whether type, the trading volume of the corresponding trade company of the network address, the corresponding trade company of the network address are BD trade company and the net
The corresponding trade company in network address is with the presence or absence of rectification record, etc..
Continue so that the network object is the network address of the trade company in default electric business platform as an example, the risk of network object
Label for example can be " the access temperature of network address be greater than 10,000 daily and the corresponding trade company of network address be not in white list
Trade company ", or can be that " trading volume of the corresponding trade company of network address is not zero trade company corresponding with the network address not
It is BD trade company ", etc..
Step 106, based on the inspection policies with the risk tag match, the corresponding content of the network object is carried out
Safety detection, the corresponding inspection policies of different risk labels are different.
Optionally, before step 106, the content detection algorithm that this specification embodiment provides can also include: preparatory
The inspection policies of configuration and the risk tag match, the different corresponding inspection policies of risk label can be different.
Wherein, inspection policies may include detection cycle, detection depth, detection range and specific content detection rule
Deng.For example, when network object is network address, detection depth can be the level of the corresponding Webpage of network address
Depth, for example for a website, into after homepage, next layer can be entered later by clicking the option button in homepage
Multiple pages of grade, then the option button etc. clicked in the page of next level can also be further into more next level
Other pages;Detection range can be the quantity etc. for needing to grab the Webpage of content.
In the security fields of the corresponding content of network object, a large amount of risk is generally concentrated in a small number of network objects, such as
In electric business platform, the risk of newly-increased network address and trade company is generally higher, and some in the presence of for a long time and larger
Trade company's risk is lower, extra high information exposure height of network address temperature, etc..Therefore, risk label pair can be based on
Network object is classified, and for the risk label for representing different degrees of risk, configures different inspection policies, specifically,
When the degree of risk that a risk label represents is high, relatively stringent inspection policies can be configured, conversely, when a risk mark
When the degree of risk that label represent is high, the inspection policies compared with relative loose can be configured.
By taking inspection policies include detection cycle as an example, if the network object is the net of the trade company in default electric business platform
Network address, then when the risk label of network address is that " the access temperature of network address is higher than preset value and network address is corresponding
Trade company is not the trade company in white list " when, it is primary to can be detection in one day with the inspection policies of the risk tag match;Work as network
When the risk label of address is " amount of access of network address is zero and network address is newly-built address ", with the risk tag match
Inspection policies to can be detection in three days primary.
It is understood that, it is assumed that certain electric business platform needs to carry out safety detection to the corresponding content of 1,000,000 network address, such as
Fruit uses the relevant technologies, then detection daily will obtain this corresponding content of 100 network address and be detected, and data volume is very big, non-
It is often time-consuming.And if using the content detection algorithm that this specification embodiment provides, since foundation risk label is to network object
Risk be classified, the network object of different risk labels is then directed to, using different inspection policies, therefore can not
It must all obtain this corresponding content of 1,000,000 network address daily, but the inspection based on the risk tag match with network address
Strategy is surveyed, the corresponding content in subnetwork address for obtaining 1,000,000 network address daily is detected, and which reduce need daily
The data volume to be detected, shortens detection time, improves detection efficiency.
When specific implementation, if in inspection policies including detection cycle, step 106 may include: to determine the last time
The historical time of safety detection is carried out to the corresponding content of the network object;Based on the detection week for including in the inspection policies
Phase and the historical time carry out safety detection to the corresponding content of the network object.
Further, above-mentioned based on the detection for including in the inspection policies if the network object is network address
Period and the historical time carry out safety detection to the corresponding content of the network object, may include: based on the detection
The detection cycle for including in strategy and the historical time determine that crawl the corresponding content of the network object crawls the time;
After the time is crawled described in the arrival, the corresponding content of the network object (not crawling if not reaching and crawling the time) is crawled;
Safety detection is carried out to the corresponding content of the network object crawled.Wherein, crawling step can be realized by crawler technology, be climbed
The content got can be text, be also possible to picture or video etc..
Further, inspection policies can also include crawling depth (corresponding with detection depth above), crawling
Range (corresponding with detection range above) and content detection rule, it is described crawl the time described in the arrival after, crawl institute
State the corresponding content of network object, comprising: after crawling the time described in the arrival, crawl depth based on described and described crawl model
It encloses, crawls the corresponding content of the network object;It is corresponding to the network object crawled based on the content detection rule
Content carries out safety detection.Wherein, content detection rule can also be pre-configured with, and content detection rule can be in the related technology
Detected rule, this specification embodiment do not limit this.
In short, a kind of content detection algorithm that this specification embodiment provides, due to being the wind for first determining network object
Dangerous label is then based on the inspection policies with the risk tag match of network object, carries out to the corresponding content of the network object
Safety detection, and the corresponding inspection policies of different risk labels are different, rather than it is every time corresponding to all-network object interior
Appearance is all detected, this data volume that single is detected is opposite to be reduced, therefore when can reduce resource consumption, shorten detection
Between, and then the efficiency of the corresponding content of network object can be improved.
Optionally, in another embodiment, a kind of content detection algorithm that this specification embodiment provides, can also wrap
It includes: safety detection being carried out to the corresponding content of the network object according to the fixed test period.Wherein, the fixed test period is greater than
In the related technology to detection in need network object carry out full dose detection period.
For example, if in the related technology to detection in need network object carry out full dose detection period be 1 day,
The above-mentioned fixed test period can be 5 days or one week.
This specification embodiment is designed to provide the content safety detection scheme revealed all the details, with a longer week
Phase carries out full dose detection to the network object that needs detect, and prevents the corresponding content of the certain network objects of missing inspection.
Optionally, as shown in Fig. 2, in another embodiment, before above-mentioned steps 106, this specification embodiment is provided
A kind of content detection algorithm, can also include:
Step 108 judges whether to reach fixed test period corresponding detection time;If so, executing step 110;It is no
Then, above-mentioned steps 106 are executed.
Wherein, the fixed test period is greater than the network object progress full dose detection to institute's detection in need in the related technology
Period.
Step 110 carries out the corresponding content of the network object by the fixed test period corresponding inspection policies
Safety detection.
The purpose of this specification embodiment, which is not only in that, provides a content safety detection scheme revealed all the details, to prevent leak-stopping inspection
The corresponding content of certain network objects, also reside in prevent by fixed test cycle detection with according to the matched detection of network object
Strategy detection clashes, and makes repetition detection to the content of network object, results in waste of resources.
Optionally, as shown in figure 3, based on any of the above embodiments, in one kind that this specification embodiment provides
Hold detection method, can also include:
If step 112 detects the information for presetting safety regulation in the corresponding content of the network object comprising violating,
The supplier of the network object and/or the network object is audited.
As an example, if network object is the user of social application, the information of default safety regulation is violated
Such as can be fraud information, gambling information etc..
As an example, if network object is the network address of the trade company of electric business platform, the supplier of network object
The as trade company.
Step 114, in the supplier for auditing the determining network object and/or the network object, there are safety problems
When, take default measure to handle the supplier of the network object and/or the network object.
As an example, if network object is the network address of the trade company of electric business platform, default measure be can be down
Frame or rectification etc..
It is corresponding interior that detection network object not only can be improved in a kind of content detection algorithm that this specification embodiment provides
The efficiency of appearance, can also be in detecting the corresponding content of network object when safety regulation information default in the presence of violation, further
The supplier of network object and/or network object is audited on ground, and further takes in audit there are when safety problem
Default measure is handled.
In order to be more clearly understood that a kind of content detection algorithm for being the offer of this specification embodiment, below shown in Fig. 4
A more detailed flow diagram, to this specification embodiment provide content detection algorithm be illustrated, in the reality
It applies in example, network object is the network address of the trade company of electric business platform.
As shown in figure 4, the content detection algorithm that this specification embodiment provides can be applied to content detection system 400
In, which includes: that information management platform 41, Data Analysis Platform 42, tactical management platform 43, timed task starting are flat
Platform 44, crawler seed management platform 45, content crawl system 46, content detection system 47, auditing system 48 and processing system 49.
With continued reference to Fig. 4, a kind of content detection algorithm that this specification embodiment provides be may include steps of:
Step 401, Data Analysis Platform 42 obtain the relevant information of network object from information management platform 41.
The relevant information of step 402, Data Analysis Platform 42 based on network object analyzes the label for determining network object.
The risk label of network object is sent to tactical management platform 43 by step 404, Data Analysis Platform 42.
Step 405, tactical management platform 43 configure different inspection policies for different risk labels.
Step 406, timed task starting platform 44 start timing Detection task;For example, starting in the daily set time
Timing Detection task.
Step 407, crawler seed management platform 45 obtain the risk label with network address from tactical management platform 43
The inspection policies matched, and determined based on inspection policies whether need in the secondary timing Detection task it is corresponding to the network address
Content is detected;If desired, executing step 408;If it is not needed, waiting the starting of next timing Detection task.
Step 408, crawler seed management platform 45 are directed to the network address generation crawler seed for needing to carry out content detection.
Crawler seed is sent to content and crawls system 46 by step 409, crawler seed management platform 45.
Step 410, content, which are crawled system 46 and crawled using crawler seed, needs the network address for carrying out content detection corresponding
Content and be sent to content detection system 47.
Step 411, content detection system 47 are based on inspection policies, corresponding to the network address for needing to carry out content detection
Content is detected, and is sent to audit system comprising violating the network address of the information of default safety regulation in the content that will test out
System 48.
Step 412, the network address and/or the corresponding trade company of the network address that auditing system 48 receives are audited,
And network address and/or the corresponding trade company of the network address are determined there are when safety problem auditing, notifier processes system 49 is adopted
Default measure is taken to carry out the processing such as undercarriage to network address and/or the corresponding trade company of the network address.
It is that a kind of explanation of content detection algorithm is provided this specification above, the electronics provided below this specification is set
It is standby to be introduced.
Fig. 5 is the structural schematic diagram for the electronic equipment that one embodiment of this specification provides.Referring to FIG. 5, in hardware
Level, the electronic equipment include processor, optionally further comprising internal bus, network interface, memory.Wherein, memory can
It can include memory, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-easy
The property lost memory (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible to
Including hardware required for other business.
Processor, network interface and memory can be connected with each other by internal bus, which can be ISA
(Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral
Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard
Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always
Line etc..Only to be indicated with a four-headed arrow in Fig. 5, it is not intended that an only bus or a type of convenient for indicating
Bus.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating
Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logical layer
Content detection device is formed on face.Processor executes the program that memory is stored, and is specifically used for executing following operation:
Obtain the relevant information of network object to be detected;
Based on the relevant information of the network object, the risk label of the network object is determined;
Based on the inspection policies with the risk tag match, safe inspection is carried out to the corresponding content of the network object
It surveys, the corresponding inspection policies of different risk labels are different.
Content detection algorithm disclosed in the above-mentioned embodiment illustrated in fig. 1 such as this specification can be applied in processor, or
It is realized by processor.Processor may be a kind of IC chip, the processing capacity with signal.During realization, on
Each step for stating method can be completed by the integrated logic circuit of the hardware in processor or the instruction of software form.It is above-mentioned
Processor can be general processor, including central processing unit (Central Processing Unit, CPU), network processes
Device (Network Processor, NP) etc.;Can also be digital signal processor (Digital Signal Processor,
DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate
Array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or crystalline substance
Body pipe logical device, discrete hardware components.It may be implemented or execute and is in this specification one or more embodiment disclosed
Each method, step and logic diagram.General processor can be microprocessor or the processor be also possible to it is any conventional
Processor etc..The step of method in conjunction with disclosed in this specification one or more embodiment, can be embodied directly in hardware decoding
Processor executes completion, or in decoding processor hardware and software module combination execute completion.Software module can position
In random access memory, flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register
In the storage medium of equal this fields maturation.The storage medium is located at memory, and processor reads the information in memory, in conjunction with it
Hardware completes the step of above method.
The electronic equipment can also carry out the content detection algorithm of Fig. 1, and details are not described herein for this specification.
Certainly, other than software realization mode, other implementations are not precluded in the electronic equipment of this specification, such as
Logical device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is not limited to each
Logic unit is also possible to hardware or logical device.
This specification embodiment also proposed a kind of computer readable storage medium, the computer-readable recording medium storage
One or more programs, the one or more program include instruction, and the instruction is when by the portable electric including multiple application programs
When sub- equipment executes, the method that the portable electronic device can be made to execute embodiment illustrated in fig. 1, and be specifically used for executing following
Operation:
Obtain the relevant information of network object to be detected;
Based on the relevant information of the network object, the risk label of the network object is determined;
Based on the inspection policies with the risk tag match, safe inspection is carried out to the corresponding content of the network object
It surveys, the corresponding inspection policies of different risk labels are different.
Fig. 6 is the structural schematic diagram for the content detection device 600 that this specification provides.Referring to FIG. 6, real in a kind of software
It applies in mode, content detection device 600 can include: data obtaining module 601, label determining module 602 and first detection module
603。
Data obtaining module 601, for obtaining the relevant information of network object to be detected.
Network object, the network object of Web content can be provided by referring to, such as the use of network address, social category application
Application in family, application market, etc..
The relevant information of network object can include but is not limited to describe the information of the network object self character and/or retouch
State the information of the owner (main body in other words) characteristic of the network object.
Label determining module 602 determines the risk of the network object for the relevant information based on the network object
Label.
Risk label can be used for characterizing the height of the corresponding existing degree of risk of network object.In this specification embodiment
In, the risk label of network object can be composed of at least one risk indicator by preset logical relation, in other words wind
Dangerous label may include at least one risk indicator according to logic of propositions composition of relations.Wherein, logic of propositions relationship include but
It is not limited to the logical relations such as "AND" and "or".
First detection module 603, for based on the inspection policies with the risk tag match, to the network object pair
The content answered carries out safety detection, and the corresponding inspection policies of different risk labels are different.
Optionally, the content detection algorithm that this specification embodiment provides can also include: configuration module, for matching in advance
Set the inspection policies with the risk tag match.
Specifically, when the degree of risk that a risk label represents is high relatively stringent inspection policies can be configured, instead
It can configure the inspection policies compared with relative loose when the degree of risk that a risk label represents is high.
Wherein, inspection policies may include detection cycle, detection depth, detection range and specific content detection rule
Deng.
When specific implementation, if including detection cycle in inspection policies, first detection module 603 can be used for: determine
The last time carries out the historical time of safety detection to the corresponding content of the network object;Based on including in the inspection policies
Detection cycle and the historical time, to the corresponding content of the network object carry out safety detection.
Further, if the network object is network address, first detection module 603 can be used for: based on described
The detection cycle for including in inspection policies and the historical time, determination crawl when crawling of the corresponding content of the network object
Between;After the time is crawled described in the arrival, crawls the corresponding content of the network object and (do not climbed if not reaching and crawling the time
It takes);Safety detection is carried out to the corresponding content of the network object crawled.Wherein, crawling step can be by crawler technology reality
Existing, the content crawled can be text, be also possible to picture or video etc..
Further, inspection policies can also include crawling depth (corresponding with detection depth above), crawling
Range (corresponding with detection range above) and content detection rule, first detection module 603 can be used for: reach institute
State after crawling the time, based on it is described crawl depth and it is described crawl range, crawl the corresponding content of the network object;Based on institute
Content detection rule is stated, safety detection is carried out to the corresponding content of the network object crawled.Wherein, content detection rule
It can be pre-configured with, content detection rule can be detected rule in the related technology, and this specification embodiment does not limit this
It is fixed.
The content detection device 600 that this specification embodiment provides, due to being the risk label for first determining network object,
The inspection policies with the risk tag match of network object are then based on, safe inspection is carried out to the corresponding content of the network object
Survey, and the corresponding inspection policies of different risk label are different, rather than every time to the corresponding content of all-network object all into
Row detection, this data volume that single is detected is opposite to be reduced, therefore can be reduced resource consumption, be shortened detection time, in turn
The efficiency of the corresponding content of network object can be improved.
Optionally, in another embodiment, this specification embodiment provide content detection device 600, can also include:
Second monitoring modular, for carrying out safety detection to the corresponding content of the network object according to the fixed test period.Wherein, Gu
Determine detection cycle be greater than in the related technology to institute detection in need network object progress full dose detection period.
This specification embodiment is designed to provide the content safety detection scheme revealed all the details, with a longer week
Phase carries out full dose detection to the network object that needs detect, and prevents the corresponding content of the certain network objects of missing inspection.
Optionally, as shown in fig. 7, in another embodiment, the content detection device 600 that this specification embodiment provides,
It can also include: judgment module 604 and the second detection module 605.
Judgment module 604 reaches fixed test period corresponding detection time for judging whether;If so, triggering the
Two detection modules 605;Otherwise, first detection module 603 is triggered.
Wherein, the fixed test period is greater than the network object progress full dose detection to institute's detection in need in the related technology
Period.
Second detection module 605, for pressing the fixed test period corresponding inspection policies to the network object pair
The content answered carries out safety detection.
The purpose of this specification embodiment, which is not only in that, provides a content safety detection scheme revealed all the details, to prevent leak-stopping inspection
The corresponding content of certain network objects, also reside in prevent by fixed test cycle detection with according to the matched detection of network object
Strategy detection clashes, and makes repetition detection to the content of network object, results in waste of resources.
Optionally, as shown in figure 8, based on any of the above embodiments, the content that this specification embodiment provides is examined
Device 600 is surveyed, can also include: auditing module 606 and processing module 607.
Auditing module 606, if for detecting in the corresponding content of the network object comprising violating default safety rule
Information then audits the supplier of the network object and/or the network object.
Processing module 607, for auditing the supplier for determining the network object and/or the network object in the presence of peace
When full problem, default measure is taken to handle the supplier of the network object and/or the network object.
It is corresponding interior that detection network object not only can be improved in the content detection device 600 that this specification embodiment provides
The efficiency of appearance, can also be in detecting the corresponding content of network object when safety regulation information default in the presence of violation, further
The supplier of network object and/or network object is audited on ground, and further takes in audit there are when safety problem
Default measure is handled.
It should be noted that the method that content detection device 600 can be realized the embodiment of the method for Fig. 1, related place can
With reference to the content detection algorithm of embodiment illustrated in fig. 1, details are not described herein again.
In short, being not intended to limit the protection of this specification the foregoing is merely the preferred embodiment of this specification
Range.With within principle, made any modification, changes equivalent replacement all spirit in this specification one or more embodiment
Into etc., it should be included within the protection scope of this specification one or more embodiment.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.When not limiting more, the element that is limited by sentence "including a ...", it is not excluded that in the mistake including the element
There is also other identical elements in journey, method, commodity or equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.