Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with this specification specific embodiment
And technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application
A part of the embodiment, instead of all the embodiments.The embodiment of base in this manual, those of ordinary skill in the art are not having
Every other embodiment obtained under the premise of creative work is made, shall fall in the protection scope of this application.The application is each
"and/or" in a embodiment indicates at least one of both front and backs.
As shown in Figure 1, one embodiment of this specification provides a kind of risk control method 100 based on guarantee, the party
Method can be executed by the server of transaction platform, be included the following steps:
S102: the transaction request that trade user is initiated is received.
Wherein, which enjoys secured value-added service, and the guarantee value-added service is used to be the trade user
Transaction tender guarantee.Specifically, trade user corresponds to secured user, and the guarantee user is for mentioning the trade user
For assuring and being verified to the guaranteed transaction of trade user.
In this specification embodiment, guarantee user is generally configured with higher credit grade, for example, can pass through the sign of Central Bank
Report and/or sesame credit score are believed to limit the qualification of guarantee user.Optionally, in one embodiment, guarantee user can
Trade user is independently chosen to be, for example, trade user can be chosen and select the higher good friend of oneself credit grade or be selection
Guarantee user of the interior employee of transaction platform as oneself.
Above-mentioned guarantee value-added service can be a kind of service that transaction platform is supplied to trade user, execute in the embodiment
Before, transaction platform can push the service to trade user, if user selects to use, subsequent user is initiating transaction request
When can be executed according to the step of embodiment.
In practical applications, transaction platform provide above-mentioned guarantee value-added service can be charge either it is free, e.g., press
The moon/season/year charges, or free experience in limited time, or permanently free etc..If being appreciated that above-mentioned guarantee
Value-added service is chargeable service, then can create profit for transaction platform;If above-mentioned guarantee value-added service is free service, can
To provide the user with better trading experiencing, the brand influence of transaction platform is promoted, promotes the fund security sense of user, is increased
Usage rate of the user.
In general, above-mentioned trade user is usually the initiator of trading activity, above-mentioned trading activity can be transfer accounts, remit money,
It does shopping (including physical item and virtual objects) etc., is illustrated so that trading activity is to transfer accounts as an example below: specifically for example, user
When first is transferred accounts by account first into the account second of user's second, user's first needs to execute a series of operation by transaction platform,
Such as, it inputs or chooses the name on account of account second, input transfer amounts, select to be as a child to arrive account, input to account or 24 in real time
Password and/or progress fingerprint authentication, user's first execute the process of aforesaid operations, and the server of transaction platform can be detected correlation
This operation, i.e. the transaction request initiated of user's first for receiving of server.
S104: being based on preset risk identification model, carries out risk identification to the corresponding trading activity of transaction request.
Model training can be carried out in advance before embodiment execution, to obtain above-mentioned risk identification model, the risk
The trading activity that identification model can be used to trade user carries out risk identification.
The input of above-mentioned risk identification model includes but is not limited to following part or whole:
1) whether the common address mac (or common end device) of trade user and/or the common address ip are replaced.It can manage
Solution, if the address mac and the address ip of this trading activity and the common address mac and the common address ip are different, trading activity
Risk class it is higher.
2) whether the operating habit of trade user occurs significant change.For example, the transaction row several times before trade user
To each mean that line is paid, and this selects to pay using password, then the risk class of trading activity is higher.
3) whether trade user has carried out payment cipher modification before initiating transaction application, if so, trading activity
Risk class is higher.
4) whether trade user has carried out gesture password/face ID/ unlocked by fingerprint verifying, if not having, trading activity
Risk class is higher.
5) whether this trading activity is strange link of the trade user based on click and initiates, if so, trading activity
Risk class it is higher.
In a specific embodiment, above-mentioned risk identification model may is that risk to the recognition result of trading activity
Transaction or arm's length dealing.It is specific for example, risk identification model can for different trading activity output 0~1 risk it is general
Rate value, threat probability values are bigger, and the risk class for indicating trading activity is higher, for example, the corresponding risk probability of above-mentioned arm's length dealing
Value section can be [0,0.4];The corresponding threat probability values section of above-mentioned risk trade can be (0.4,1].
S106: if recognition result indicates trading activity, there are security risks, carry out to the guarantee user of trade user
Guarantee is reminded.
Wherein, guarantee user is for tendering guarantee to trade user and verifying to the guaranteed transaction of trade user.
Certainly, in other examples, if risk identification model is arm's length dealing to the recognition result of trading activity,
It then can permit above-mentioned trading activity, reminded it is also possible to initiate guarantee to guarantee user, the effect which reminds is only
It is that trading activity has occurred in the corresponding trade user of prompt guarantee user.
Guarantee prompting is carried out to guarantee user in the step, specifically can be and sent into the mobile phone or mailbox of guarantee user
Indicating risk information, and it is supplied to whether guarantee user allows the option of above-mentioned trading activity.
Above-mentioned indicating risk information may include: the name, transaction amount, the name of transaction acceptance side, load of trade user
The name at warranty family, assures amount of guarantee upper limit of user etc., can also include trading activity in indicating risk information certainly
Risk class score value, for example, risk class score value section is 0~100, the bigger wind for indicating trading activity of risk class score value
Dangerous higher grade.
Optionally, safety verification can also be carried out to trade user before S106, use in this way, S106 can be in transaction
In the case that family safety verification passes through, guarantee prompting is carried out to the guarantee user.Above-mentioned safety verification is known for example including face
Not Yan Zheng, fingerprint recognition verifying etc..
It is appreciated that above-mentioned send guarantee prompting guarantee in certain magnitude for bothering the accuracy rate under rate to guarantee user
Lower progress, for example, risk class score value section is 0~100, in some embodiments, only when risk of trading activity etc.
Guarantee prompting (bothering rate height) is carried out to guarantee user when grade score value is greater than 40;In further embodiments, only when transaction is gone
For risk class score value be greater than 60 when to guarantee user carry out guarantee prompting (it is medium to bother rate);In further embodiments,
Guarantee prompting (it is low to bother rate) only is carried out to guarantee user when the risk class score value of trading activity is greater than 80.
In general, bothering, rate is higher, and the safety of transaction is higher, but user experience will receive certain influence, the embodiment
It can select optimal to bother rate between transaction security and user experience.
S108: the verification result based on guarantee user feedback, it is determined whether allow trading activity.
Optionally, in a specific embodiment, if receive it is described guarantee user feedback confirmation as a result, if permit
Perhaps above-mentioned trading activity continues;And/or if receiving the negative decision of the guarantee user feedback, terminate the friendship
It is easy to be, certainly, the reason of terminating trading activity can also be shown in trade user side while terminating trading activity, that is, carried on a shoulder pole
Warranty family does not allow this trading activity.
This specification embodiment here it is shown that abovementioned steps S108 a kind of specific implementation.It should be understood, of course, that step
Rapid S108 can also realize in other manners, this specification embodiment to this with no restriction.
In this specification embodiment, having identified trading activity by risk identification model, there are security risks, at this point,
Assure that user still can be with feedback acknowledgment as a result, i.e. guarantee user allows above-mentioned trading activity.In order to cause to assure the weight of user
Depending on avoiding the maloperation of guarantee user, promoting the safety of trading activity, this specification embodiment can also be in process of exchange
Multiple guarantee prompting is carried out to guarantee user, repeatedly the verification result of guarantee prompting feedback is to confirm to allow trading activity for this
In the case of, then allow above-mentioned trading activity.
The risk control method based on guarantee that this specification embodiment provides, in the transaction for receiving trade user initiation
After request, risk identification is carried out to trading activity based on risk identification model, if recognition result instruction trading activity has peace
Full blast danger then carries out guarantee prompting to guarantee user, and the verification result based on guarantee user feedback determines whether above-mentioned friendship
It is easy to be.This specification embodiment increases guarantee due to carrying out risk identification to trading activity by risk identification model
The safety verification link of user, can greatly reduce the probability for usurping transaction or fraudulent trading, improve the safety of transaction.
In addition, trade user enjoys secured value-added service in this specification embodiment, if above-mentioned guarantee value-added service is
Chargeable service then can create more profits for transaction platform;It, can be to use if above-mentioned guarantee value-added service is free service
Family provides better trading experiencing, promotes the brand influence of transaction platform, promotes the fund security sense of user, and it is glutinous to increase user
Degree.
Above-described embodiment 100 is to execute relevant operation during trading activity, can be intercepted in abbreviation thing.It is optional
Ground can also be accurate to the progress of the risk class of trading activity qualitative after the end of above-described embodiment 100, referred to as subsequent fixed
Property.This it is subsequent qualitatively according to include but is not limited to the complaint of trade user, risk identification model again identify that result and
Assure the complaint etc. of user.
If subsequent qualitative above-mentioned trading activity is named as risk trade behavior, for example, above-mentioned trading activity is qualitative
To be to usurp transaction or fraudulent trading, then embodiment of the method 100 further includes following steps: being determined based on above-mentioned guarantee value-added service
The compensation mechanism of trading activity;Wherein, which includes that abatement is paid or compensated, and the amount of compensation is rised in value less than the guarantee
Default amount in service;Determine whether to compensate the trading activity based on the compensation mechanism.
It is appreciated that above-mentioned trading activity is identified there are security risk, but assure that user still allows for above-mentioned friendship
It is easy to be because can be regarded as at this time repeatedly remind carry out trading activity, transaction platform can carry out abatement appropriate or
Person is few compensation, and concrete details can make an appointment in above-mentioned guarantee value-added service.
Optionally, before the S102 of above-described embodiment 100 receives the transaction request that trade user is initiated, the method 100
It can also include the following steps: to push the guarantee value-added service to the trade user;The trade user is received to described
The confirmation of guarantee value-added service is as a result, and establish the trade user and the incidence relation for assuring user.
Optionally, before Xiang Suoshu trade user pushes the guarantee value-added service, the method also includes: described in determining
The sense of security demand levels of trade user;Wherein, if described include: to the trade user push guarantee value-added service
The sense of security demand levels of the trade user are higher than first threshold, then push the guarantee increment clothes to the trade user
Business.
The embodiment can carry out model training before executing in advance, obtain sense of security demand levels identification model, the peace
Full sense demand levels identification model can predict the sense of security demand levels of trade user.Sense of security demand levels identification model
Input feature vector for example may include: the text of sense of security questionnaire and the text of public sentiment, for example, whether user in microblogging,
The publication such as forum browsed speech relevant with the sense of security.
It optionally, can also include following step before carrying out guarantee prompting to guarantee user in several above-mentioned embodiments
It is rapid: risk identification is carried out to the guarantee user;Wherein, if described carry out guarantee to remind including: institute to the guarantee user
The risk class of guarantee user is stated lower than second threshold, then guarantee prompting is carried out to the guarantee user.The embodiment is to load
Warranty family carries out risk identification, and preventing guarantee user is swindle user, to further increase the safety of trading activity.
The risk control method provided by the above embodiment based on guarantee for the present invention will be described in detail, below with reference to one
Specific embodiment is illustrated, as shown in Fig. 2, the embodiment 200 includes the following steps:
S202: the sense of security demand levels of trade user are determined.
The embodiment can carry out model training before executing in advance, obtain sense of security demand levels identification model, the peace
Full sense demand levels identification model can predict the sense of security demand levels of trade user.
If the sense of security demand levels of trade user are greater than or equal to first threshold, S204 is executed, i.e., is used to transaction
Family push guarantee value-added service;
If the sense of security demand levels of trade user are lower than above-mentioned first threshold, terminate process.
The embodiment carries out the identification of sense of security demand levels to trade user, and recommendation is oriented to it, promotes service
Adopt rate (or receptance).It is appreciated that in other examples, it can also be without S202, i.e., to transaction platform
The common trade user of whole push guarantee value-added service.
S204: guarantee value-added service is pushed to trade user.
If trade user selection receives the guarantee value-added service, can be in subsequent execution S206;
If trade user refuses the guarantee value-added service, terminate process.
S206: the transaction request that trade user is initiated is received.
In general, above-mentioned trade user is usually the initiator of trading activity, above-mentioned trading activity can be transfer accounts, remit money,
It does shopping (including physical item and virtual objects) etc., is illustrated so that trading activity is to transfer accounts as an example below: specifically for example, user
When first is transferred accounts by account first into the account second of user's second, user's first needs to execute a series of operation by transaction platform,
Such as, it inputs or chooses the name on account of account second, input transfer amounts, select to be as a child to arrive account, input to account or 24 in real time
Password and/or progress fingerprint authentication, user's first execute the process of aforesaid operations, and the server of transaction platform can be detected correlation
This operation, i.e. the transaction request initiated of user's first for receiving of server.
S208: being based on preset risk identification model, carries out risk identification to the corresponding trading activity of transaction request.
If recognition result indicates trading activity, there are security risks, carry out safety verification to trade user;And it is handing over
Easy user's safety verification executes S210 in the case where passing through, i.e., sends guarantee to guarantee user and remind.
Certainly, in other examples, if risk identification model is arm's length dealing to the recognition result of trading activity,
It then can permit above-mentioned trading activity, reminded it is also possible to initiate guarantee to guarantee user, the effect which reminds is only
It is that trading activity has occurred in the corresponding trade user of prompt guarantee user.
S210: guarantee reminder message is sent to the guarantee user of trade user.
Wherein, guarantee user is for tendering guarantee to trade user and verifying to the guaranteed transaction of trade user.
The step, which specifically can be, sends mobile phone from indicating risk information to guarantee user or mailbox, and is supplied to guarantee
Whether user allows the option of above-mentioned trading activity.
Optionally, safety verification can also be carried out to trade user before S210, use in this way, S210 can be in transaction
In the case that family safety verification passes through, guarantee prompting is carried out to the guarantee user.
Above-mentioned safety verification, verified for example including recognition of face verifying, fingerprint recognition etc..
It is appreciated that above-mentioned send guarantee prompting guarantee in certain magnitude for bothering the accuracy rate under rate to guarantee user
Lower progress, in general, bothering, rate is higher, and the safety of transaction is higher, but user experience will receive certain influence, the embodiment
It can select optimal to bother rate between transaction security and user experience.
Optionally, can also include the following steps: to carry out risk identification to the guarantee user before S210;In this way,
If S210 can be the risk class of the guarantee user lower than second threshold, guarantee is carried out to the guarantee user and is mentioned
It wakes up.The embodiment carries out risk identification to guarantee user, and preventing guarantee user is swindle user, to further increase transaction
The safety of behavior.
S212: receive the verification result of guarantee user feedback, and above-mentioned transaction is determined whether based on the verification result
Behavior.
In the embodiment if the confirmation for receiving the guarantee user feedback as a result, if allow above-mentioned trading activity to continue
It carries out;And/or
If receiving the negative decision of the guarantee user feedback, the trading activity is terminated, certainly, is handed over terminating
It is easy for while can also show termination transaction the reason of, i.e., guarantee user do not allow this trading activity.
S214: trading activity is carried out qualitative.
If trading activity is named as risk trade behavior, S216 is executed;
If trading activity is named as arm's length dealing behavior, terminate process.
S216: the compensation mechanism of trading activity is determined based on guarantee value-added service, determines whether to carry out based on compensation mechanism
It compensates.
Wherein, which includes that abatement is paid or compensated, and the amount of compensation is less than pre- in the guarantee value-added service
If amount;The trading activity is compensated.
It is appreciated that above-mentioned trading activity is identified there are security risk, but assure that user still allows for above-mentioned friendship
It is easy to be, it trades because can be regarded as repeatedly reminding at this time, it is either few that transaction platform can carry out abatement appropriate
It pays for, concrete details can make an appointment in above-mentioned guarantee value-added service.
The risk control method based on guarantee that this specification embodiment provides, in the transaction for receiving trade user initiation
After request, risk identification is carried out to trading activity based on risk identification model, if recognition result instruction trading activity has peace
Full blast danger then carries out guarantee prompting to guarantee user, and the verification result based on guarantee user feedback determines whether above-mentioned friendship
It is easy to be.This specification embodiment increases guarantee due to carrying out risk identification to trading activity by risk identification model
The safety verification link of user, can greatly reduce the probability for usurping transaction or fraudulent trading, improve the safety of transaction.
In addition, trade user enjoys secured value-added service in this specification embodiment, if above-mentioned guarantee value-added service is
Chargeable service then can create profit for transaction platform;If above-mentioned guarantee value-added service is free service, can be mentioned to user
For better trading experiencing, the brand influence of transaction platform is promoted, promotes the fund security sense of user, increases usage rate of the user.
Above instructions part describes the risk control method embodiment based on guarantee in detail, as shown in figure 3, this explanation
Book additionally provides a kind of risk control device based on guarantee, as shown in figure 3, the device 300 includes:
Receiving module 302 can be used for receiving the transaction request of trade user initiation;Wherein, the trade user is enjoyed
Secured value-added service, the guarantee value-added service are used to tender guarantee for the transaction of the trade user;
Risk identification module 304 can be used for based on preset risk identification model, friendship corresponding to the transaction request
Easy is to carry out risk identification;
Assure reminding module 306, there are security risks if can be used for the recognition result instruction trading activity, right
The guarantee user of the trade user carries out guarantee prompting, and the guarantee user is for tendering guarantee to the trade user and right
The guaranteed transaction of trade user is verified;
Transaction modules 308 can be used for the verification result based on the guarantee user feedback, it is determined whether allow the friendship
It is easy to be.
The risk control device based on guarantee that this specification embodiment provides, in the transaction for receiving trade user initiation
After request, risk identification is carried out to trading activity based on risk identification model, if recognition result instruction trading activity has peace
Full blast danger then carries out guarantee prompting to guarantee user, and the verification result based on guarantee user feedback determines whether above-mentioned friendship
It is easy to be.This specification embodiment increases guarantee due to carrying out risk identification to trading activity by risk identification model
The safety verification link of user, can greatly reduce the probability for usurping transaction or fraudulent trading, improve the safety of transaction.
In addition, trade user enjoys secured value-added service in this specification embodiment, if above-mentioned guarantee value-added service is
Chargeable service then can create profit for transaction platform;If above-mentioned guarantee value-added service is free service, can be mentioned to user
For better trading experiencing, the brand influence of transaction platform is promoted, promotes the fund security sense of user, increases usage rate of the user.
Optionally, as one embodiment, transaction modules 308 specifically can be used for
If receive it is described guarantee user feedback confirmation as a result, if allow the trading activity;And/or
If receiving the negative decision of the guarantee user feedback, the trading activity is terminated.
Optionally, as one embodiment, described device 300 further include: processing module is compensated, if being used for the transaction
Behavior is named as risk trade behavior, then the compensation mechanism of the trading activity is determined based on the guarantee value-added service;Its
In, the compensation mechanism includes that abatement is paid or compensated, and the amount of the compensation is less than the default volume in the guarantee value-added service
Degree;Determine whether to compensate the trading activity based on the compensation mechanism.
Optionally, as one embodiment, described device 300 further include: service push processing module can be used for institute
It states trade user and pushes the guarantee value-added service;
Receive the trade user to it is described guarantee value-added service confirmation as a result, and establish the trade user with it is described
Assure the incidence relation of user.
Optionally, as one embodiment, the service pushes processing module, can be also used for determining the trade user
Sense of security demand levels;If the sense of security demand levels of the trade user are higher than first threshold, used to the transaction
Family pushes the guarantee value-added service.
Optionally, as one embodiment, the risk identification module 304 specifically can be used for the guarantee user
Carry out risk identification;If the risk class of the guarantee user is lower than second threshold, the guarantee user is assured
It reminds.
Optionally, as one embodiment, the risk identification module 304, can be also used for the trade user into
Row safety verification;Wherein, the guarantee reminding module 306, can be also used for the feelings passed through in the trade user safety verification
Under condition, guarantee prompting is carried out to the guarantee user.
Corresponding preceding text is referred to according to the above-mentioned risk control device 300 based on guarantee of this specification embodiment to say
The process of the risk control method 100 and 200 based on guarantee of bright book embodiment, also, should be filled based on the risk control of guarantee
Each unit/module in 300 and other above-mentioned operation and/or functions are set respectively to realize the risk control side based on guarantee
Corresponding process in method 100 and 200, and identical or equivalent technical effect can be reached, for sake of simplicity, no longer superfluous herein
It states.
Below in conjunction with Fig. 4 detailed description according to the electronic equipment of this specification embodiment.With reference to Fig. 4, in hardware view,
Electronic equipment includes processor, optionally, including internal bus, network interface, memory.Wherein, as shown in figure 4, memory
It may include memory, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-
Volatile memory (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, which may be used also
It can include hardware required for realizing other business.
Processor, network interface and memory can be connected with each other by internal bus, which can be industry
Standard architecture (Industry Standard Architecture, ISA) bus, Peripheral Component Interconnect standard
(Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended
Industry Standard Architecture, EISA) bus etc..The bus can be divided into address bus, data/address bus,
Control bus etc..Only to be indicated with a four-headed arrow in Fig. 4, it is not intended that an only bus or one kind convenient for indicating
The bus of type.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating
Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logical layer
The device of the risk control based on guarantee is formed on face.Processor executes the program that memory is stored, and is specifically used for executing
The operation of the previously described embodiment of the method for this specification.
The method of above-mentioned Fig. 1 to the method, apparatus execution that embodiment illustrated in fig. 2 discloses can be applied in processor, or
Person is realized by processor.Processor may be a kind of IC chip, the processing capacity with signal.During realization,
Each step of the above method can be completed by the integrated logic circuit of the hardware in processor or the instruction of software form.On
The processor stated can be at general processor, including central processing unit (Central Processing Unit, CPU), network
Manage device (Network Processor, NP) etc.;Can also be digital signal processor (Digital Signal Processor,
DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate
Array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or crystalline substance
Body pipe logical device, discrete hardware components.It may be implemented or execute disclosed each method, the step in this specification embodiment
And logic diagram.General processor can be microprocessor or the processor is also possible to any conventional processor etc..Knot
The step of closing method disclosed in this specification embodiment can be embodied directly in hardware decoding processor and execute completion, Huo Zheyong
Hardware and software module combination in decoding processor execute completion.Software module can be located at random access memory, flash memory, read-only
The storage medium of this fields such as memory, programmable read only memory or electrically erasable programmable memory, register maturation
In.The storage medium is located at memory, and processor reads the information in memory, and the step of the above method is completed in conjunction with its hardware
Suddenly.
The method that electronic equipment shown in Fig. 4 can also carry out Fig. 1 to Fig. 2, and realize the risk control method based on guarantee
In the function of Fig. 1 to embodiment illustrated in fig. 2, details are not described herein for this specification embodiment.
Certainly, other than software realization mode, other implementations are not precluded in the electronic equipment of the application, for example patrol
Collect device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is not limited to each patrol
Unit is collected, hardware or logical device are also possible to.
This specification embodiment also provides a kind of computer readable storage medium, is stored on computer readable storage medium
Computer program, the computer program realize each process of above-mentioned each embodiment of the method when being executed by processor, and can reach
To identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, it is such as read-only
Memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation
RAM), magnetic or disk etc..
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is reference according to the method for this specification embodiment, the stream of equipment (system) and computer program product
Journey figure and/or block diagram describe.It should be understood that can be realized by computer program instructions each in flowchart and/or the block diagram
The combination of process and/or box in process and/or box and flowchart and/or the block diagram.It can provide these computer journeys
Sequence instruct to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices processor with
A machine is generated, so that the instruction generation executed by computer or the processor of other programmable data processing devices is used for
Realize the dress for the function of specifying in one or more flows of the flowchart and/or one or more blocks of the block diagram
It sets.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including element
There is also other identical elements in process, method, commodity or equipment.
The above is only embodiments herein, are not intended to limit this application.To those skilled in the art,
Various changes and changes are possible in this application.It is all within the spirit and principles of the present application made by any modification, equivalent replacement,
Improve etc., it should be included within the scope of the claims of this application.