Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one
Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
In the application scenarios of the prior art, although Third-party payment platform or bank provide " freezing money transfer " this
One transfers accounts risk control mode, but since it only just carries out freezing of funds row after receiving freezing of funds application/notice
Not to be actively engaged in risk control of transferring accounts substantially.In practical application scene, when Third-party payment platform or
When bank receives freezing of funds application/notice, often money transfer has arrived account and has shifted.This allows for sending out in electric swindleness behavior
When raw, the risk control mode of transferring accounts of Third-party payment platform or bank's offer is not implemented effectively.
It transfers accounts risk control method in view of the above-mentioned problems, this specification embodiment proposes one kind.In order to propose this explanation
The method of book embodiment, inventor analyze the application scenarios of the prior art first.What needs to be explained here is that in this specification reality
It applies in the description of example, before the current behavior of transferring accounts of supervision department's confirmation belongs to fraud, so-called behavior presence of transferring accounts
Risk refers to that the behavior of transferring accounts may be fraud, is not to say that the behavior of transferring accounts must be fraud.It transfers accounts risk
Control refers in the behavior of transferring accounts there are taking corresponding risk control strategy of transferring accounts when risk (may be fraud), thus
Monetary losses are avoided when confirming that the behavior of transferring accounts belongs to fraud.
In practical application scene, the risk control mode of transferring accounts of Third-party payment platform or bank's offer has been unable to get
The main reason for effect is implemented first is that, " initiation transfer accounts behavior " is too long to the time interval between " freezing money transfer ", in third
When square payment platform or bank freeze money transfer, which has arrived account and has shifted.Therefore, in order to ensure turn
Account risk control mode is effectively implemented, it is necessary to just implement freezing of funds before money transfer is transferred.That is, to the greatest extent may be used
Can shortening " initiation transfer accounts behavior " to the time interval between " freezing money transfer ".
Since electric swindleness behavior belongs to small probability event, for being spoofed people, often it is spoofed for the first time.Namely
Say be spoofed after human hair feel is spoofed do not know next what this does completely.Even if some, which are spoofed people, is realizing oneself quilt
Can report a case to the security authorities at the first time to public security organ when fraud, but its money transfer is not freezed in application at the first time, but public security organ
It reminds to be spoofed people's application and freeze money transfer or public security organ after receiving to report a case to the security authorities and receives transmitting bank or third after reporting a case to the security authorities
Square payment platform carries out freezing of funds.This allows for " initiation transfer accounts behavior " to having to pass through " report between " freezing money transfer "
Case link ".
As shown in Figure 1, electricity swindleness implementer cheats first is spoofed people (implementing fraud) in a certain actual scene
(S110);After cheating successfully, it is spoofed people and initiates to transfer accounts behavior (S120) to electricity swindleness implementer;It transfers accounts after behavior, is taken advantage of
Swindleness people has found itself to be spoofed (S130);It is spoofed people and reports a case to the security authorities (S140);People is spoofed to Third-party payment platform or bank Shen
It please freeze money transfer or police's notice Third-party payment platform or bank freezing money transfer (S150);Third-party payment is flat
Platform or bank freeze related money transfer (S160) after receiving freezing of funds application/notice.In above-mentioned scene, due to reporting a case to the security authorities
The presence of time-consuming (step S140), so that " initiation transfer accounts behavior " is extended to the time interval between " freezing money transfer ".
Further, in practical application scene, directly freezing money transfer is that the common risk control of transferring accounts of one kind is arranged
It applies, still, directly freezing money transfer is not risk control measure of uniquely transferring accounts.Also, implement the time of freezing of funds
The implementation details such as node, the selection for freezing object will have a direct impact on the result of implementation of freezing of funds.Further, it is much answering
With under scene, since the operating process of fund freezed and thawed is very complicated, need to avoid implementing freezing of funds side as far as possible
Case.
However, due to being spoofed the limitation of people itself cognition, can not often confirm most effective in practical application scene
Risk control strategy of transferring accounts, the mode for freezing money transfer immediately would generally be directlyed adopt by being spoofed people, this is possible to shadow
Ring final risk control effect of transferring accounts.Especially, final certification transfer accounts behavior risk not in the presence of, freeze
Money transfer and the operation finally thawed, complicate the behavior of transferring accounts significantly, can seriously reduce trading experiencing.In addition, due to quilt
Fraud people is usually not familiar with freezing of funds application process, this is allowed for from " money transfer is freezed in application " to " freezing money of transferring accounts
Time interval between gold " is extended.
Therefore, based on above-mentioned analysis, in one embodiment of this specification, currently behavior is transferred accounts there are after risk in confirmation,
Money transfer is monitored by bank or Third-party payment platform.The execution details of the monitoring behavior is for currently specific
Executive condition is transferred accounts to determine, it includes but be not limited to simple freezing of funds operation, can be for money transfer
Freeze, be also possible to other operations of the analysis and Control etc. flowed to money transfer.Since the execution details of monitoring behavior is needle
It specifically transfers accounts executive condition to current and determines, therefore can guarantee risk control effect of transferring accounts to the maximum extent.
Further, in one embodiment of this specification, money transfer is carried out by bank or Third-party payment platform
Monitoring is currently to transfer accounts behavior there are after risk in confirmation, is actively carried out, rather than waited by bank or Third-party payment platform
It is executed again after actively applying under the police remind or waiting the notices of the police after being spoofed people and reporting a case to the security authorities, this allows for " initiating
Transfer accounts behavior " experience " link of reporting a case to the security authorities " is not needed between " monitoring money transfer ", it substantially reduces " initiation transfer accounts behavior " and arrive and " supervise
Interval time between control money transfer ".Also, since bank or Third-party payment platform only need to confirm that the current behavior of transferring accounts is deposited
The monitoring to money transfer can be targetedly initiated in risk, without being spoofed people itself application, this also avoids
Application is time-consuming.
Further, in practical application scene, when being spoofed people and reporting a case to the security authorities, report is not familiar with due to being spoofed people itself
Case process does not have cognition fully aware of to current fraud experienced, and no normal direction supervision department, which provides, completely to be had
The case information of effect, this after just influencing whether case processing.Therefore, current in confirmation in one embodiment of this specification
Behavior transfer accounts there are after risk, is actively reported a case to the security authorities by bank or Third-party payment platform.Since bank or Third-party payment are flat
Therefore inherently the transfer accounts execution platform of behavior of platform is reported a case to the security authorities by bank or Third-party payment platform, not only can be to prison
Pipe portion door, which provides, is spoofed itself the experience information that people is submitted, moreover it is possible to provide detailed account-related information and correlation of transferring accounts
Information, which greatly enhances the integrated degrees for information of reporting a case to the security authorities.Also, due between bank or Third-party payment platform and supervision department
Complete interactive strategy can be preset, avoiding problems be spoofed people to report a case to the security authorities process due to itself being unfamiliar with and lead to not smoothly
Report a case to the security authorities or report a case to the security authorities information submittal error the case where generation.
Below in conjunction with attached drawing, the technical solution that each embodiment of this specification provides is described in detail.
As shown in Fig. 2, in one embodiment of this specification, the specific execution process of method includes:
S210 judges whether there is the indicating risk information of transferring accounts for behavior of transferring accounts;
If illustrating row current and unconfirmed of transferring accounts there is currently no the indicating risk information of transferring accounts for behavior of transferring accounts
For with the presence or absence of risk, therefore return step S210, maintain the monitoring for indicating risk information of transferring accounts;
When existing, when transferring accounts indicating risk information, then explanation has confirmed that the behavior of transferring accounts there are risk, and monitoring at this time is transferred accounts row
For money transfer (S220) and to supervising platform send risk trade report a case to the security authorities information (S230).
Specifically, supervising platform is the novel illegal criminal of telecommunication network with anti-swindle center linkage in an application scenarios
Guilty transaction risk incident management platform (referred to as electricity swindleness platform), is that the linkage of public security organ and Third-party payment company, bank is flat
Platform.
Further, be usually to be spoofed people initiating to transfer accounts after behavior in practical application scene, itself recognize by
Fraud, then proposes related application.Regulatory agency, bank or Third-party payment platform receive ability after the application for being spoofed people
Confirmation is currently transferred accounts, and there are risks for behavior.But due to the problem of being spoofed people itself cognition, often behavior of transferring accounts is being initiated
It just can be appreciated that and itself be spoofed after for a long time, this just substantially prolongs " initiation transfer accounts behavior " and arrive between " monitoring money transfer "
Interval time.
In view of the above-mentioned problems, the current behavior of transferring accounts of confirmation whether there is the root of risk in one embodiment of this specification
The foundation of indicating risk information (generation transfer accounts) is not restricted to the active application information for the person of being spoofed, but also including to working as
Before transfer accounts the active analysis result of behavior.
Specifically, in one embodiment of this specification, method further include:
It monitors whether to receive the report information for behavior of transferring accounts, when receiving report information, generates risk of transferring accounts
Prompt information;
And/or
Risk judgement is carried out to behavior of transferring accounts, when the behavior that determines to transfer accounts is there are when risk, generation is transferred accounts indicating risk information.
Specifically, for the report information for the behavior of transferring accounts, can be the person's of being spoofed consciousness in one embodiment of this specification
Application information after being spoofed to itself, be also possible to other people/mechanism observes the report information after fraud.
Further, it is contemplated that indefinite risk judgment cannot be carried out to behavior of transferring accounts, it is therefore, real in this specification one
It applies in example, risk judgment validity period is set, monitor whether to receive report information within risk judgment validity period and/or to transferring accounts
Behavior carries out risk judgement, then no longer monitors whether to receive report information and/or to row of transferring accounts beyond risk judgment validity period
To carry out risk judgement.
Further, it is contemplated that in commonly used scene, risk is carried out to behavior of transferring accounts and determines only to need progress primary, and
Monitoring to report information is that a duration is, therefore, in one embodiment of this specification, as shown in Figure 3:
S310 carries out risk judgement to behavior of transferring accounts, and judgement transfers accounts behavior with the presence or absence of risk;
When determining result is to be, step S320 is executed, generates indicating risk information of transferring accounts;
When it is no for determining result, step S330 is executed, monitors whether to receive the report information for behavior of transferring accounts;
When receiving report information, step S320 is executed, generates indicating risk information of transferring accounts;
When not receiving report information, return step S330 continues to monitor the risk judgment until behavior of currently transferring accounts
Validity period terminates.
Further, in one embodiment of this specification, when carrying out risk judgement to behavior of transferring accounts:
According to the transfer amounts for the behavior of transferring accounts, and/or transfer accounts remark information, and/or transfer accounts beneficiary information, and/or turn
Account beneficiary historical transaction record, and/or transfer accounts initiator information, and/or initiator's history of transferring accounts record judgement of transferring accounts is transferred accounts
Behavior whether there is risk.
Specifically, in one embodiment of this specification, by account dimensional information (such as registration information, money of the initiator that transfers accounts
Golden situation, common ground etc.), the transaction dimension information (such as buying seller transaction information, trading activity) for the initiator that transfers accounts and turn
Account features (such as fund state, common, the complained record of history, history be punished record etc.) of account beneficiary etc. are integrated into
Feature is portrayed, and is described by the feature of strategy in air control system, variable, and judgement is transferred accounts the risk of fraud degree of behavior,
And itself risk class of transfer accounts initiator and beneficiary of transferring accounts, final judgement transfer accounts behavior with the presence or absence of risk.
It is exemplified below with multiple and different application scenarios:
1, for example party A-subscriber transfers accounts to party B-subscriber, A and party B-subscriber's history no deal, through risk judgment, beneficiary party B-subscriber
It the use of equipment is equipment of the history in blacklist, and the record for thering is fraud to complain in the recent period, judging the pen to transfer accounts, there are risk of fraud.
2, for example party A-subscriber transfers accounts to party B-subscriber, and party B-subscriber is nearly two weeks new registration accounts, and consumes without daily life
(paying under line, Taobao's transaction, class etc. of paying the fees of calling a taxi or live), through risk judgment, A continuously transfers accounts strokes wholesale fund to B,
These are transferred accounts, and there are risk of fraud.
3, for example party A-subscriber transfers accounts to party B-subscriber, and daily party A-subscriber is consumed under line, there is take-away, calls a taxi and Taobao is remembered
Record, and common address, in certain school dormitory building, which transfers accounts party A-subscriber in turns with high-risk printed words such as remarks of transferring accounts " * * brush is single "
Account remarks because student is the single people at highest risk of brush, and brushes list itself and there is higher risk of fraud, through risk judgment, transfer accounts to exist and take advantage of
Cheat risk.
4, for example party A-subscriber transfers accounts to party B-subscriber, some phone number of remarks of transferring accounts, through risk judgment, the cell-phone number
Code is related to connection mobile phone in fiduciary loan class risk of fraud case for nearly one month, and party B-subscriber has loan in the recent period class is relevant and takes advantage of
Swindleness report, through judging, this is transferred accounts, and there are risk of fraud.
Further, when determining that confirmation transfers accounts behavior there are when risk by carrying out risk to behavior of transferring accounts, behavior of transferring accounts
Initiator itself do not recognize also oneself to be spoofed.Therefore, in one embodiment of this specification, when determining to transfer accounts behavior
There are when risk, prompting message is exported to the initiator for the behavior of transferring accounts.
Further, in practical application scene, if money transfer arrives account immediately, since " initiation transfer accounts behavior " is arrived
There are interval times between " monitoring money transfer ", then " monitoring money transfer " operation is performed, money transfer has just been arrived
In the account of the payee that transfers accounts.This just considerably increases the difficulty of implementation of " monitoring money transfer " operation, or even can directly lead
" monitoring money transfer " operation is caused to cannot achieve.
Therefore, for the ease of realization " monitoring money transfer " operation, in one embodiment of this specification, the behavior of transferring accounts is to prolong
When to account, that is, after the behavior of transferring accounts is initiated, money transfer scratched from promoter account of transferring accounts after be not to immediately pass to transfer accounts
Beneficiary account, but beneficiary account of transferring accounts just is gone to after a preset duration (during delay) can be waited.It is corresponding, prolonging
When to account delay during, judge whether there is indicating risk information of transferring accounts.
Specifically, bank or Third-party payment platform provide delay and arrive account option in one embodiment of this specification, transfer accounts
Promoter is when initiating to transfer accounts behavior, if having selected delay to account option, the behavior of transferring accounts initiated is delay to account.
Further, it is contemplated that freezing of funds is a kind of effective fund guarantee means.Therefore, it transfers accounts to simplify monitoring
Fund operation, when indicating risk information is transferred accounts in presence, freezes money transfer in one embodiment of this specification.
Further, in one embodiment of this specification, the behavior of transferring accounts be delay to account when, in delay to during account,
When existing, when transferring accounts indicating risk information, termination delay freezes money transfer to account operation.
Further, in practical application scene, freezing of funds operation is not indefinite.It is received in supervising platform
Risk trade is reported a case to the security authorities after information, can be investigated the behavior of transferring accounts (for example, promoter's confirmation, the investigation with the behavior of transferring accounts turn
Promoter and payee of account behavior etc.), determine whether the behavior of transferring accounts is confirmed as fraud, and finally will confirm that knot
Fruit feeds back to bank or Third-party payment platform.Specifically, when the supervising platform confirmation behavior of transferring accounts is fraud, Xiang Yin
The feedback risk identification instruction of capable or Third-party payment platform;When supervising platform confirms that behavior of transferring accounts is not fraud, to
Bank or Third-party payment platform feedback risk cancel instruction.In one embodiment of this specification, after freezing money transfer, root
Opportunity and the additional funding operation of deblocking of funds are determined according to the feedback of supervising platform.
Further, in one embodiment of this specification, after money transfer is frozen, supervising platform is come from when receiving
Risk identification instruction when, money transfer is returned to the initiator for the behavior of transferring accounts by defrosting money transfer.
Further, in one embodiment of this specification, after money transfer is frozen, supervising platform is come from when receiving
Risk when cancelling instruction, defrosting money transfer transfers accounts money transfer the beneficiary to the behavior of transferring accounts.
Further, in one embodiment of this specification, after money transfer is frozen, freeze in duration default, such as
Fruit had both been not received by risk and has cancelled instruction or be not received by risk identification instruction, and defrosting money transfer turns money transfer
Account gives the beneficiary for behavior of transferring accounts.
Specifically, as shown in figure 4, in an application scenarios:
S410 judges whether there is indicating risk information of transferring accounts;
If there is no indicating risk information of transferring accounts, then return step S410, it is straight to continue to monitor indicating risk information of transferring accounts
Risk judgment validity period to behavior of currently transferring accounts terminates;
If there is indicating risk information of transferring accounts, S420 is thened follow the steps, freezes money transfer;
S430, judgement are currently indicated with the presence or absence of risk identification;
When there are risk identification instruction, step S431 is executed, money transfer is returned to row of transferring accounts by defrosting money transfer
For initiator;
When indicating there is currently no risk identification, step S440 is executed, risk is judged whether there is and cancels instruction;
When cancelling instruction there are risk, step S441 is executed, defrosting money transfer transfers accounts money transfer to row of transferring accounts
For beneficiary;
When there is currently no risk cancel indicate when, execute step S450, judging freezing of funds whether to expire, (fund is frozen
Whether the duration of knot, which reaches to preset, is freezed duration);
If freezing of funds does not expire, return step S430;
If freezing of funds expires, step S441 is executed.
Further, it is contemplated that in practical application scene, it is certain judgement transfer accounts behavior there are the case where risk be erroneous judgement,
The behavior of transferring accounts not is fraud.In order to reduce freezing of funds and deblocking of funds operation as far as possible, in this specification
It in one embodiment, is being delayed under the application scenarios to account, when the behavior of transferring accounts is there are when risk, money transfer is not being carried out immediately
Freeze, but waits the feedback information of supervising platform first.
Specifically, in one embodiment of this specification, the operation for monitoring the money transfer for behavior of transferring accounts includes:
When existing, when transferring accounts indicating risk information, maintaining to be delayed operates to account and waits the feedback information of supervising platform;
Corresponding fund monitoring strategies are taken according to the feedback information of supervising platform.
Further, in one embodiment of this specification, corresponding fund is taken to supervise according to the feedback information of supervising platform
Controlling tactful process includes:
During delay, when receiving the risk identification instruction from supervising platform, money transfer is returned to and is turned
The initiator of account behavior;
And/or during delay, when receiving the risk cancellation instruction from supervising platform, tied during delay
Money transfer is transferred accounts the beneficiary to the behavior of transferring accounts when beam;
And/or before terminating during delay, if be both not received by, risk cancelled instruction or to be not received by risk true
Recognize instruction, freezes money transfer.
Further, in one embodiment of this specification, after end, money transfer are frozen during delay, work as reception
When indicating to the risk identification from supervising platform, money transfer is returned to the initiator for the behavior of transferring accounts by defrosting money transfer.
Further, in one embodiment of this specification, after end, money transfer are frozen during delay, work as reception
When cancelling instruction to the risk from supervising platform, defrosting money transfer transfers accounts money transfer the beneficiary to the behavior of transferring accounts.
Further, in one embodiment of this specification, after end, money transfer are frozen during delay, default
Freeze in duration, cancels instruction if being both not received by risk or be not received by risk identification instruction, defrosting money transfer,
Money transfer is transferred accounts the beneficiary to the behavior of transferring accounts.
Specifically, as shown in figure 5, in an application scenarios:
S510 judges whether there is indicating risk information of transferring accounts;
If there is no indicating risk information of transferring accounts, then return step S510, it is straight to continue to monitor indicating risk information of transferring accounts
Risk judgment validity period to behavior of currently transferring accounts terminates;
If there is indicating risk information of transferring accounts, step S520 is executed, judges whether delay expires to account;
If delay does not expire to account, step S530 is executed, judgement is currently indicated with the presence or absence of risk identification;
When there are risk identification instruction, step S531 is executed, money transfer is returned to the initiator for the behavior of transferring accounts;
There is currently no when risk identification instruction, step S540 is executed, risk is judged whether there is and cancels instruction;
When cancelling instruction there are risk, step S541 is executed, waiting delay expires to account delay;
When delay expires to account, step S542 is executed, money transfer is transferred accounts the beneficiary to the behavior of transferring accounts;
When cancelling instruction there is currently no risk, return step S520;
If delay expires to account, step S521 is executed, money transfer is freezed;
S550, judgement are currently indicated with the presence or absence of risk identification;
When there are risk identification instruction, step S561 is executed, defrosting money transfer executes step S531;
There is currently no when risk identification instruction, step S570 is executed, risk is judged whether there is and cancels instruction;
When cancelling instruction there are risk, step S562 is executed, defrosting money transfer executes step S542;
There is currently no risk cancel indicate when, execute step S580, judging whether freezing of funds expires, (fund is frozen
Duration whether reach default freeze duration);
If freezing of funds does not expire, return step S550;
If freezing of funds expires, step S562 is executed, defrosting money transfer executes step S542.
Further, the method proposed based on this specification embodiment, this specification embodiment also proposed one kind and transfer accounts
Risk control system.Specifically, as shown in fig. 6, system includes: in one embodiment of this specification
Indicating risk module 610 is configured to judge whether there is indicating risk information of transferring accounts;
Fund monitoring module 620 is configured to monitor the money of transferring accounts for behavior of transferring accounts when indicating risk information is transferred accounts in presence
Gold;
Module of reporting a case to the security authorities 630 is configured to send risk trade report to supervising platform when indicating risk information is transferred accounts in presence
Case information.
Further, based on method of the invention, the invention also provides one kind in the processing of user equipment client information
Equipment, which includes the memory for storing computer program instructions and the processor for executing program instructions,
In, when the computer program instructions are executed by the processor, triggers the equipment and execute method of the present invention.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So
And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer
Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker
Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " is patrolled
Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development,
And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed is most generally used at present
Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also answer
This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages,
The hardware circuit for realizing the logical method process can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing
The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can
Read medium, logic gate, switch, specific integrated circuit (Application Specific Integrated Circuit,
ASIC), the form of programmable logic controller (PLC) and insertion microcontroller, the example of controller includes but is not limited to following microcontroller
Device: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320 are deposited
Memory controller is also implemented as a part of the control logic of memory.It is also known in the art that in addition to
Pure computer readable program code mode is realized other than controller, can be made completely by the way that method and step is carried out programming in logic
Controller is obtained to come in fact in the form of logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and insertion microcontroller etc.
Existing identical function.Therefore this controller is considered a kind of hardware component, and to including for realizing various in it
The device of function can also be considered as the structure in hardware component.Or even, it can will be regarded for realizing the device of various functions
For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when application.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program
Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group
Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by
Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with
In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.