Specific embodiment
In order to make those skilled in the art more fully understand the technical solution in this specification, below in conjunction with this explanation
Attached drawing in book embodiment is clearly and completely described the technical solution in this specification embodiment, it is clear that described
Embodiment be merely a part but not all of the embodiments of the present application.Based on this specification embodiment, this field
Those of ordinary skill's every other embodiment obtained without creative efforts, all should belong to the application
The range of protection.
Fig. 1 is a kind of flow diagram for account checking method based on transaction in assets that this specification embodiment provides, from journey
For sequence angle, the executing subject of process can be to be equipped on the applications client of terminal used by a user, for example, commodity are rented
It rents the client of application, client, the client of instant messaging application etc. of payment application.Terminal is such as mobile phone, plate electricity
Brain, smartwatch or vehicle device etc..It is above to execute master alternatively, it is also possible to there is third-party application client to assist the execution of process
Body belongs to the first asset node.
Process in Fig. 1 may comprise steps of:
S101: the first asset node receives the transaction in assets data broadcasted to all asset nodes.
In practical applications, during the assets of securitisation flow between each assets mechanism, there can be registration, turn
It allows, generate the business scenarios such as income and clearance, and assets mechanism money would generally be related between assets mechanism in processing business
Gold is transferred to and produces, and therefore, each assets mechanism can have the demand of book keeping operation reconciliation.
In order to realize that the demand of each assets mechanism book keeping operation reconciliation can be based on block chain skill in this specification embodiment
Art realizes the demand of each assets mechanism book keeping operation reconciliation.
In this specification embodiment, it is desirable to the demand of each assets mechanism book keeping operation reconciliation is realized based on block chain technology,
All moneys are given firstly the need of transaction in assets data broadcasting caused by the transaction in assets that will have been completed on some asset node
Node is produced, such as, it is assumed that transaction in assets data caused by the transaction in assets completed include that " transaction in assets type, assets are handed over
Easy both sides, exchange hour, transaction amount " gives transaction in assets data broadcasting to all asset nodes, that is, asset node A, assets
Node B and asset node C etc..
It should be noted that by transaction in assets caused by the transaction in assets completed on some asset node
Data broadcasting includes the asset node for generating transaction in assets data to all asset nodes.
Further, due in block chain technology only one asset node be able to record to all asset nodes broadcast
Transaction in assets data, that is to say, that only one asset node can keep accounts to the transaction in assets broadcasted, therefore,
In this specification embodiment, after giving transaction in assets data broadcasting to all asset nodes, it is thus necessary to determine which assets on earth
Node records broadcasted transaction in assets data, that is to say, that, it is thus necessary to determine which asset node is to the money broadcasted on earth
Transaction data is produced to keep accounts.
Further, illustrate in embodiment at this, determine which asset node records broadcasted transaction in assets on earth
Data can determine the asset node for recording broadcasted transaction in assets data by block chain common recognition algorithm.
It, can be with it should be noted that block chain common recognition algorithm can be and be reached common understanding algorithm using proof of work
It is that equity proves algorithm, can be delay proof of work algorithm, other common recognition algorithms, which kind of specifically used algorithm is also possible to
It can determine according to actual needs.In addition, in this specification embodiment, in order to distinguish the asset node of book keeping operation and subsequent
The asset node of book keeping operation is positioned as the first asset node herein, that is to say, that pass through by the asset node of the synchronization to be mentioned
Block chain common recognition algorithm, determines the first asset node, the first asset node records broadcasted transaction in assets data, by subsequent institute
The asset node of the synchronization to be mentioned is defined as the second asset node.
S102: the transaction in assets data are recorded.
There is the problem of transaction errors in transaction in assets both sides in order to prevent, therefore, in this specification embodiment, the first money
It produces node receiving after the transaction in assets data that all asset nodes are broadcasted, need to received transaction in assets number
According to being verified, determine whether received transaction in assets data are correct.
Again since each asset node can preserve the same block chain, and each block represented on block chain
The transaction in assets situation between each asset node is gone, it therefore, can be according to going through in block chain in this specification embodiment
History transaction in assets data determine whether received transaction in assets data are correct.
In conclusion determining whether received transaction in assets data correctly specifically may be used in this specification embodiment
To be, stored historic asset transaction data in block chain is obtained, according to the transaction in assets data that are recorded and described is gone through
History transaction in assets data verify the correctness of the transaction in assets data, when the verifying transaction in assets data are correct, record
The transaction in assets data.
It should be noted that when authenticate to transaction in assets data it is incorrect when, then do not record this assets exchange
The transaction in assets data of generation.
S103: data synchronization request is sent at least two second asset nodes.
Since mistake occurs in the book keeping operation of the first asset node in order to prevent, the first asset node is complete in record transaction in assets data
Cheng Hou, whether the transaction in assets data that other assets node needs verification the first asset node of confirmation to be recorded are correct, and due to
Each asset node requires to save an identical block chain, and therefore, in this specification embodiment, the first asset node exists
After recording transaction in assets data, data synchronization request need to be sent at least two second asset nodes.
It should be noted that data synchronization request includes recorded transaction in assets data, e.g., transaction in assets class
Type, transaction in assets both sides, exchange hour, transaction amount.
S104: the common recognition result that second asset node is returned according to the data synchronization request is received.
Since whether the transaction in assets data that other assets node needs verification the first asset node of confirmation to be recorded are correct,
Therefore, in this specification embodiment, each second asset node is synchronized in the data for receiving the transmission of the first asset node and is asked
After asking, the transaction in assets data according to entrained by data synchronization request are needed, determine that the assets that the first asset node is recorded are handed over
Whether easy data are correct, specifically, stored historic asset transaction data in block chain is obtained, according to data synchronization request institute
The transaction in assets data of carrying and the historic asset transaction data, transaction in assets number entrained by verify data synchronization request
According to correctness then return to the first asset node when the transaction in assets data entrained by the verify data synchronization request are correct
Common recognition result be reach common understanding, will common recognition result be sent to the first asset node, entrained by verify data synchronization request
When transaction in assets data are incorrect, then the common recognition result for returning to the first asset node is not reach common understanding, by common recognition result hair
Give the first asset node.
S105: according to the common recognition as a result, determining the legitimacy of record.
S106: when determination records legal, the transaction in assets data recorded are added on block chain.
Since in practical applications, there are at least two for the second asset node, that is to say, that the first asset node meeting
At least two common recognitions are received as a result, common recognition result may be identical, it is also possible to it is different, therefore, in this specification embodiment, need
It to know together based on the received as a result, the legitimacy of recorded transaction in assets data is determined, specifically, reaching described in statistics
Whether the quantity of common recognition and the quantity that do not reach common understanding, the quantity reached common understanding described in judgement are more than described do not reach altogether
The quantity of knowledge, if so, determine record it is legal, if not, it is determined that record illegal.
Further, when determination records legal, the transaction in assets data recorded is added on block chain, determination is worked as
When recording illegal, the transaction in assets data recorded will not be added on block chain, need to redefine the friendship of this assets
The legitimacy of easy data.
It should be noted that due in existing asset management field transaction in assets book keeping operation and reconciliation be independent point
The operation flow opened, will lead to so each asset node can not quick obtaining to the transaction in assets data needed so that entire money
There are certain hysteresis qualitys for the reconciliation process of production transaction, therefore, by introducing block chain technology in asset management field, so that
First asset node sends data synchronization request at least two second asset nodes to reach common understanding, to complete book keeping operation pair
Account, it is ensured that transaction in assets has identical transaction in assets data copy in different asset nodes, will need asynchronous and synchronous originally
The mode of bill is reduced to generate transaction data during transaction in assets, significantly simplifies and reduce the consumption of reconciliation link
When, the timeliness of reconciliation is effectively raised, avoiding entire transaction in assets, there are hysteresis qualitys.
In addition, reaching common understanding by all asset nodes, and assert the mode of the legitimacy of transaction in assets, assets can be prevented
There is mistake or is tampered in transaction data.
In practical applications, since transaction in assets data are to be transmitted by Internet channel, and there are numbers for third party's network
It according to the factors such as leakage, unreliable, causes transaction in assets data there may be being tampered, therefore, implements in this specification
In example, the first asset node of the transaction in assets data broadcasted to all asset nodes is received in addition to needing to verify transaction in assets number
According to correctness, it is also necessary to verify whether received transaction in assets data are tampered, specifically, the first asset node receive to
The transaction in assets data encrypted, public key and the first cryptographic Hash of all asset node broadcast, subsequently through the public key to
The transaction in assets data of encryption are decrypted, and carry out Hash operation to the transaction in assets data after decryption, obtain the second cryptographic Hash,
It according to first cryptographic Hash and second cryptographic Hash, verifies whether the transaction in assets data are tampered, then obtains block
Stored historic asset transaction data in chain, according to the transaction in assets data and the historic asset number of deals recorded
According to verifying the correctness of the transaction in assets data, when the transaction in assets data are correct and are not tampered with, record the money
It produces transaction data and does not record the transaction in assets data when the transaction in assets data are incorrect or are tampered.
It should be noted that the transaction in assets data encrypted are to complete transaction in assets and generate transaction in assets data
Asset node encrypted by private key, the first cryptographic Hash is also the money completed transaction in assets and generate transaction in assets data
Produce what node obtained generated transaction in assets data progress Hash operation, subsequent, the money which can will encrypt
It produces transaction data, public key and the first cryptographic Hash and is all broadcast to all asset nodes.
Herein it should also be noted that, according to first cryptographic Hash and second cryptographic Hash, verifies the assets and hand over
Whether easy data are tampered specifically: when first cryptographic Hash is identical as second cryptographic Hash, then the transaction in assets
Data are not tampered with, when first cryptographic Hash and second cryptographic Hash be not identical, then the transaction in assets data quilt
Illegally distort.
In addition, in step S104, the first asset node the transaction in assets data recorded can be sent to other second
Asset node relates equally to the problem of transmitting data by Internet channel, that is to say, that transaction in assets data are to pass through here
Internet channel transmission, and third party's network is there are the factors such as leaking data, unreliable, cause transaction in assets data there may be
Therefore the problems such as being tampered in this specification embodiment, receives the second asset node of transaction in assets data in addition to needing to test
Demonstrate,prove transaction in assets data correctness, it is also necessary to verify whether received transaction in assets data are tampered, specifically, the second money
It produces node and receives the data synchronization request that the first asset node is sent, wherein include: having added of being recorded in data synchronization request
Close transaction in assets data, public key and third cryptographic Hash carries out the transaction in assets data encrypted subsequently through the public key
Decryption carries out Hash operation to the transaction in assets data after decryption, the 4th cryptographic Hash is obtained, according to the third cryptographic Hash and institute
The 4th cryptographic Hash is stated, verifies whether the transaction in assets data are tampered, then obtains stored historic asset in block chain and hands over
Easy data, the transaction in assets data according to entrained by data synchronization request and the historic asset transaction data, verify data
The correctness of transaction in assets data entrained by synchronization request, the transaction in assets data entrained by the verify data synchronization request are just
When really and being not tampered with, then the common recognition result for returning to the first asset node is to reach common understanding, and common recognition result is sent to first
Asset node then returns to first when the transaction in assets data entrained by the verify data synchronization request are incorrect or are tampered
The common recognition result of asset node is not reach common understanding, and common recognition result is sent to the first asset node.
It should be noted that the transaction in assets data encrypted are that the first asset node is encrypted by private key
, third cryptographic Hash is also that the first asset node obtains generated transaction in assets data progress Hash operation, and it is subsequent, the
The transaction in assets data encrypted, public key and third cryptographic Hash can be all broadcast to all asset nodes by one asset node.
Herein it should also be noted that, according to the third cryptographic Hash and the 4th cryptographic Hash, verifies the assets and hand over
Whether easy data are tampered specifically: when the third cryptographic Hash is identical as the 4th cryptographic Hash, then the transaction in assets
Data are not tampered with, when the third cryptographic Hash and the 4th cryptographic Hash be not identical, then the transaction in assets data quilt
Illegally distort.
Although the transaction in assets data on block chain be all it is disclosed, by the transaction in assets in transmission process
Data are encrypted, and can guarantee that transaction only limits authorized user and checks, number can not be checked and be handled to unauthorized user
According to being distorted to avoid unauthorized user from maximum probability to transaction in assets data, ensure that the peace of transaction in assets data
Quan Xing.
In addition, the transaction in assets book keeping operation reconciliation based on block chain is completed jointly by being distributed in the asset node of different places
, each asset node preserves complete transaction in assets data, thus it is guaranteed that transaction in assets data between asset node
Consistency, that is to say, that all asset nodes all save the same account book, simultaneously as transaction in assets data are stored in
On multiple assets node, therefore, it is tampered or transaction in assets data in case of transaction in assets data in a small number of asset nodes
The case where being damaged will not all impact the integrality of total assets transaction data, that is to say, that avoid any one
The operation of asset node unauthorized causes entire billing and accounting system error in data, anti-tamper.
As long as the asset node for having more than more than half, which does not fail or is not tampered with, ensures that entire financial system number
According to reliable and stable, and all asset nodes share a set of accounting data copy, and it is inconsistent fundamentally to solve accounting data
The problem of.
The above are this specification embodiments to provide the method for the reconciliation based on transaction in assets, is mainly used for asset management field
It is interior, specific as follows below in conjunction with the exemplary implementation process for illustrating the reconciliation based on transaction in assets of Fig. 2:
S201: asset node A completes transaction in assets;
It should be noted that transaction in assets data can be generated by completing transaction in assets.
S202: it trades to asset node B, asset node C, asset node D and asset management platform nodes broadcast assets
Data.
Assuming that determining that asset node B is accounting nodes (it is, first asset node) by block chain common recognition algorithm.
S203: asset node B record transaction in assets data.
S204: data synchronization request is sent to asset node A.
It should be noted that including recorded transaction in assets data in data synchronization request.
S205: asset node A, according to the transaction in assets data in data synchronization request, reaches common understanding.
S206: return is reached common understanding.
S207: data synchronization request is sent to asset node C.
S208: asset node C, according to the transaction in assets data in data synchronization request, reaches common understanding.
S209: return is reached common understanding.
S210: data synchronization request is sent to asset node D.
S211: asset node D, according to the transaction in assets data in data synchronization request, does not reach common understanding.
S212: return is not reached common understanding.
S213: data synchronization request is sent to asset management platform nodes.
S214: asset management platform nodes are reached common understanding according to the transaction in assets data in data synchronization request.
S215: return is reached common understanding.
S216: according to common recognition as a result, determining the legitimacy of record.
It should be noted that the quantity that statistics is reached common understanding is 3, the quantity that do not reach common understanding is 1, and judgement is reached altogether
The quantity 3 of knowledge is more than the quantity 1 that do not reach common understanding, it is determined that it is legal to record.
S217: asset node B is added to the transaction in assets data recorded on block chain.
Based on same thinking, this specification embodiment additionally provides the corresponding device of the above method, as shown in Figure 3.
Fig. 3 is a kind of structure for account checking apparatus based on transaction in assets corresponding to Fig. 1 that this specification embodiment provides
Schematic diagram, described device include:
First receiving module 301 receives the transaction in assets data broadcasted to all asset nodes for the first asset node;
Logging modle 302, for recording the transaction in assets data;
Sending module 303, for sending data synchronization request at least two second asset nodes, wherein the data
Synchronization request includes recorded transaction in assets data;
Second receiving module 304 is total to for receiving second asset node according to what the data synchronization request returned
Know result;
Determining module 305, for being known together according to described as a result, determining the legitimacy of record;
Adding module 306, for when determining module 305 determines and records legal, the transaction in assets data recorded to be added
It is added on block chain.
Described device further include:
Node determining module 307 is received for 301 first asset node of the first receiving module to all asset nodes
Before the transaction in assets data of broadcast, by block chain common recognition algorithm, the first asset node is determined.
The logging modle 302 is specifically used for, and stored historic asset transaction data in block chain is obtained, according to being remembered
The transaction in assets data of record and the historic asset transaction data, verify the correctness of the transaction in assets data, work as verifying
When the transaction in assets data are correct, the transaction in assets data are recorded.
The common recognition result includes: to reach common understanding and do not reach common understanding;The determining module 305 is specifically used for, and counts institute
State the quantity reached common understanding and the quantity that do not reach common understanding, the quantity reached common understanding described in judgement whether be more than it is described not
The quantity reached common understanding, if so, determine record it is legal, if not, it is determined that record illegal.
First receiving module 301 is specifically used for, and the first asset node is received have been added to what all asset nodes were broadcasted
Close transaction in assets data, public key and the first cryptographic Hash, the logging modle 302 stored history money in obtaining block chain
Before producing transaction data, it is also used to that the transaction in assets data encrypted are decrypted by the public key, to the money after decryption
It produces transaction data and carries out Hash operation, obtain the second cryptographic Hash, according to first cryptographic Hash and second cryptographic Hash, verifying
Whether the transaction in assets data are tampered, and when the transaction in assets data are correct and are not tampered with, record the assets and hand over
Easy data.
Based on same thinking, this specification embodiment additionally provides the corresponding equipment of the above method and non-volatile calculating
Machine storage medium.
A kind of reconciliation equipment based on transaction in assets corresponding to Fig. 1 that this specification embodiment provides, comprising:
At least one processor;And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one
A processor executes so that at least one described processor can:
First asset node receives the transaction in assets data broadcasted to all asset nodes;
Record the transaction in assets data;
Data synchronization request is sent at least two second asset nodes, wherein the data synchronization request includes to be remembered
The transaction in assets data of record;
Receive the common recognition result that second asset node is returned according to the data synchronization request;
According to the common recognition as a result, determining the legitimacy of record;
When determination records legal, the transaction in assets data recorded are added on block chain.
A kind of nonvolatile computer storage media corresponding to Fig. 1 that this specification embodiment provides, is stored with calculating
Machine executable instruction, the computer executable instructions setting are as follows:
First asset node receives the transaction in assets data broadcasted to all asset nodes;
Record the transaction in assets data;
Data synchronization request is sent at least two second asset nodes, wherein the data synchronization request includes to be remembered
The transaction in assets data of record;
Receive the common recognition result that second asset node is returned according to the data synchronization request;
According to the common recognition as a result, determining the legitimacy of record;
When determination records legal, the transaction in assets data recorded are added on block chain.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims
It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment
It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable
Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can
With or may be advantageous.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device,
For equipment, nonvolatile computer storage media embodiment, since it is substantially similar to the method embodiment, so the ratio of description
Relatively simple, the relevent part can refer to the partial explaination of embodiments of method.
Device that this specification embodiment provides, equipment, nonvolatile computer storage media with method be it is corresponding, because
This, device, equipment, nonvolatile computer storage media also have the advantageous effects similar with corresponding method, due to upper
Face is described in detail the advantageous effects of method, therefore, which is not described herein again corresponding intrument, equipment, it is non-easily
The advantageous effects of the property lost computer storage medium.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So
And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer
Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker
Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " is patrolled
Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development,
And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed is most generally used at present
Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also answer
This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages,
The hardware circuit for realizing the logical method process can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing
The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can
Read medium, logic gate, switch, specific integrated circuit (Application Specific Integrated Circuit,
ASIC), the form of programmable logic controller (PLC) and insertion microcontroller, the example of controller includes but is not limited to following microcontroller
Device: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320 are deposited
Memory controller is also implemented as a part of the control logic of memory.It is also known in the art that in addition to
Pure computer readable program code mode is realized other than controller, can be made completely by the way that method and step is carried out programming in logic
Controller is obtained to come in fact in the form of logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and insertion microcontroller etc.
Existing identical function.Therefore this controller is considered a kind of hardware component, and to including for realizing various in it
The device of function can also be considered as the structure in hardware component.Or even, it can will be regarded for realizing the device of various functions
For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when specification.
It should be understood by those skilled in the art that, this specification embodiment can provide as method, system or computer program
Product.Therefore, this specification embodiment can be used complete hardware embodiment, complete software embodiment or combine software and hardware
The form of the embodiment of aspect.Moreover, it wherein includes that computer is available that this specification embodiment, which can be used in one or more,
It is real in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code
The form for the computer program product applied.
This specification is referring to the method, equipment (system) and computer program product according to this specification embodiment
Flowchart and/or the block diagram describes.It should be understood that can be realized by computer program instructions every in flowchart and/or the block diagram
The combination of process and/or box in one process and/or box and flowchart and/or the block diagram.It can provide these computers
Processor of the program instruction to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices
To generate a machine, so that generating use by the instruction that computer or the processor of other programmable data processing devices execute
In the dress for realizing the function of specifying in one or more flows of the flowchart and/or one or more blocks of the block diagram
It sets.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that this specification embodiment can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in this specification
Form.Moreover, can be used can in the computer that one or more wherein includes computer usable program code for this specification
With the computer program product implemented in storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Form.
This specification can describe in the general context of computer-executable instructions executed by a computer, such as journey
Sequence module.Generally, program module include routines performing specific tasks or implementing specific abstract data types, programs, objects,
Component, data structure etc..This specification can also be practiced in a distributed computing environment, in these distributed computing environment
In, by executing task by the connected remote processing devices of communication network.In a distributed computing environment, program module
It can be located in the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The foregoing is merely this specification embodiments, are not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.