Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, the method for eliminating malicious advertisements includes:
101. acquiring target information of a mobile advertisement carrier to be identified in a preset area at a preset frequency; the target information includes: picture information and character information corresponding to the mobile advertisement carrier;
102. analyzing and obtaining matching information corresponding to all advertisements on the mobile advertisement carrier according to the target information of the current mobile advertisement carrier; the matching information is information related to corresponding advertisements;
103. judging whether all advertisements of the current mobile advertisement carrier contain malicious advertisements or not according to matching information corresponding to all advertisements on the current mobile advertisement carrier; and if the malicious advertisements are contained, invalidating the malicious advertisements of the current mobile advertisement carrier according to the matching information corresponding to the malicious advertisements of the current mobile advertisement carrier.
In the invention, the picture information and the character information on the mobile advertisement carrier are obtained, and the matching information on the mobile advertisement carrier and the advertisement is obtained according to the analysis of the picture information and the character information. And judging whether the mobile advertisement carrier contains the malicious advertisement or not according to the matching information. When the mobile advertisement carrier contains the malicious advertisement, the partner is informed to shield the malicious advertisement.
Further, the acquiring target information of the mobile advertisement carrier to be identified in a preset area at a predetermined frequency specifically includes:
1011. identifying a mobile advertisement carrier in a preset area at a preset frequency;
taking a shared bicycle as an example, in a predetermined area, objects similar to the shared bicycle in the area are identified at intervals of a predetermined time. Of course, the shared vehicle is only used as an example of the embodiment of the present invention, and other mobile advertisement carriers such as a shared vehicle are within the scope of the present invention.
After judging that the current mobile advertisement carrier is the mobile advertisement carrier to be identified:
1012. shooting the whole picture of the mobile advertisement carrier;
and taking pictures of all the shared bicycles in the preset area.
1013. Preprocessing the whole picture of the mobile advertisement carrier to obtain picture information and character information of the mobile advertisement carrier;
the method comprises the steps of firstly carrying out intelligent recognition on photos of a shared bicycle, and extracting picture information capable of representing images and character information capable of representing characters after primary screening. The picture information comprises a two-dimensional code.
The target information also comprises address information corresponding to a preset area;
after the current mobile advertisement carrier is judged to be the mobile advertisement carrier to be identified, the method further comprises the following steps:
1014. acquiring address information of a preset area;
when the shared bicycle is identified, address information of a predetermined area where the shared bicycle exists is acquired first. The address information may be detailed address information obtained by GPS or may be represented by a terminal number of the imaging terminal. For example, in a public network, each photographing terminal is fixed, and the terminal number of each photographing terminal represents a photographing area for which the terminal is responsible.
Furthermore, the analyzing and obtaining matching information corresponding to all advertisements on the mobile advertisement carrier according to the target information of the current mobile advertisement carrier specifically includes:
1021. acquiring target information of a current mobile advertisement carrier;
by different communication means, for example: IP broadband, 4G, wireless communication, and the like, transmit target information.
1022. Extracting advertisement information of all advertisements on the mobile advertisement carrier from picture information and character information of the current mobile advertisement carrier; the advertisement information includes: content information representing the corresponding advertisement propaganda content and contact information corresponding to advertisement display;
the content information comprises advertisement words, trademarks and the like, and the contact information comprises: contact the phone and the two-dimensional code.
1023. Matching advertisement information of all advertisements on the current advertisement carrier with address information of a preset area where the advertisements are located and current time to form corresponding matching information for storage;
after the advertisement information is packaged, address information and current time are marked. If subdivided, the contact categories are also labeled. In the present invention, the contact category can be divided into a telephone contact and a two-dimensional code contact.
1024. And providing the matching information corresponding to all the advertisements on the current advertisement carrier for a user to manage and check, and transmitting the matching information corresponding to all the advertisements on the current advertisement carrier to the data analysis unit.
If the contact information on the current mobile carrier is a contact telephone, whether the corresponding advertisement is a malicious advertisement can be directly judged through the corresponding content information; if the contact information on the current mobile carrier is the two-dimensional code, the address information corresponding to the preset area can be used for assisting in judging whether the corresponding advertisement is a malicious advertisement.
Still further, the sending the matching information corresponding to the malicious advertisement of the current mobile advertisement carrier to the partner enables the partner to eliminate the malicious advertisement of the current mobile advertisement carrier, and the method specifically includes:
1031. grading the malicious advertisements of the current mobile advertisement carrier according to the degree of harm according to matching information corresponding to the malicious advertisements of the current mobile advertisement carrier; the levels of malicious advertisements include: personal and business levels;
1032. if the malicious advertisement of the current mobile advertisement carrier belongs to the personal level, contacting a malicious advertisement responsible person of the personal level according to matching information corresponding to the malicious advertisement of the personal level, and commanding the responsible person to invalidate the corresponding malicious advertisement;
1033. if the malicious advertisements of the current mobile advertisement carrier belong to the enterprise level, sending matching information corresponding to the malicious advertisements of the enterprise level to each platform department or law enforcement department to shield the malicious advertisements of the enterprise level;
1034. if the individual-level malicious advertisements are still valid within a predetermined time period, the individual-level malicious advertisements are raised to the enterprise level.
In the invention, after the malicious advertisement at the personal level is judged, the responsible person of the malicious advertisement is automatically contacted, and the responsible person is responsible for invalidating and eliminating the contact way (contact telephone and two-dimension code) on the malicious advertisement. After the malicious advertisement at the enterprise level is judged, directly contacting a related platform (a telecom operator, a payment platform and the like) or a law enforcement department, and invalidating a contact way (a contact telephone and a two-dimensional code) on the malicious advertisement; and alert the responsible malicious advertising at the enterprise level through the relevant platform or law enforcement. Therefore, the act of posting a malicious advertisement can be reduced.
Still further, the providing the matching information corresponding to all the advertisements on the current advertisement carrier to the user for management and viewing, and transmitting the matching information corresponding to all the advertisements on the current advertisement carrier to the data analysis unit specifically includes:
10241. providing matching information corresponding to all advertisements on the current advertisement carrier for a user to check;
10242. providing matching information corresponding to all advertisements on the current advertisement carrier to a user for modification, deletion or remarking;
10243. and transmitting the matching information corresponding to all the advertisements on the current advertisement carrier which are viewed, modified, deleted or remarked by the user to the data analysis unit.
The above technical solutions of the embodiments of the present invention are described in detail below with reference to application examples:
as shown in fig. 3, a malicious advertisement elimination method according to an embodiment of the present invention includes:
s101, capturing a single sharing bicycle suspicious object by video monitoring, and triggering an intelligent identification program to start;
s102, monitoring lens zooming, amplifying suspected objects, comparing special identifiers of multiple parts, and judging whether the bicycle is a shared bicycle or not;
if yes, entering S103; if not, returning to S101;
s103, further amplifying the target image, shooting to obtain a digital high-definition image (picture information and character information) of a specific part, and uploading the digital high-definition image to a background after processing;
s104, storing the high-definition images after the high-definition images are transmitted, identifying and extracting key malicious advertisement information through software, and recording the key malicious advertisement information into a database;
s105, analyzing in a database set, and classifying the malicious advertisement information according to frequency, presentation form and harm;
and S106, transmitting the malicious advertisement information to the advertisement individuals, relevant platform departments and law enforcement departments for processing.
Wherein, S101 to S102 are product identification stages, the monitoring camera has a wide viewing angle, and scene information is collected and stored according to time and place. If the bicycle product is judged not to be the bicycle product, the information is discarded, and if the bicycle product is judged to be the bicycle product, the advertisement identification step is carried out.
S103 to S104 are advertisement identification stages, the monitoring camera is narrow in visual angle, high-definition images are collected, information is intelligently identified, primary screening processing is conducted, and effective information is transmitted to the server side.
S105 to S106 are information reporting stages, at this time, the information is transmitted to a server, data analysis is carried out in the background, and the information is respectively reported to individuals, platform departments or law enforcement departments according to categories to inform the individuals, the platform departments or the law enforcement departments of carrying out related processing.
As shown in fig. 4, a malicious advertisement elimination method according to another embodiment of the present invention includes:
s101, capturing a suspicious object of a shared bicycle by using a movable camera; related information of the shared bicycle two-dimensional code platform is obtained in advance;
s102, after the suspected object is the shared bicycle, the mobile camera is enabled to align a certain two-dimensional code on the shared bicycle for scanning;
s103, judging whether the current two-dimensional code is a legal two-dimensional code on the shared bicycle; if yes, returning to S102, and scanning the next two-dimensional code; if not, entering S104;
s104, sending matching information of the malicious advertisements corresponding to the current two-dimensional codes to a background, and triggering an alarm;
s105, analyzing in a background database set, and grading the harmfulness of the malicious advertisements according to the occurrence frequency and the presentation form;
and S106, transmitting the malicious advertisement information to the advertisement individuals, relevant platform departments and law enforcement departments for processing.
In the above embodiment, the monitoring camera used may be a mobile camera (a vehicle-mounted camera, a handheld camera, or the like). In this embodiment, the monitoring camera is taken as an example, and the use of other camera terminals is also within the protection scope of the present invention.
As shown in fig. 2, the malicious advertisement elimination system according to the present invention includes:
the system comprises a monitoring unit 1, a processing unit and a processing unit, wherein the monitoring unit 1 is used for acquiring target information of a mobile advertisement carrier to be identified in a preset area at a preset frequency; the target information includes: picture information and character information corresponding to the mobile advertisement carrier;
the data processing unit 2 is used for analyzing and obtaining matching information corresponding to all advertisements on the mobile advertisement carrier according to the target information of the current mobile advertisement carrier; the matching information is information related to corresponding advertisements;
the data analysis unit 3 is used for judging whether all the advertisements of the current mobile advertisement carrier contain malicious advertisements or not according to the matching information corresponding to all the advertisements on the current mobile advertisement carrier; and if the malicious advertisements are contained, invalidating the malicious advertisements of the current mobile advertisement carrier according to the matching information corresponding to the malicious advertisements of the current mobile advertisement carrier.
The monitoring unit 1 includes: an inner subunit 11 and an outer subunit 12, the inner subunit 11 comprising:
the identification module 111 is used for identifying the mobile advertisement carriers in a preset area at a preset frequency by the identification module;
the shooting module 112 is used for shooting the whole picture of the mobile advertisement carrier after judging that the current mobile advertisement carrier is the mobile advertisement carrier to be identified;
the preprocessing module 113 is configured to preprocess the whole picture of the mobile advertisement carrier to obtain picture information and text information of the mobile advertisement carrier;
the target information also comprises address information corresponding to a preset area;
the monitoring unit further comprises:
and the positioning module 114 is configured to obtain address information of the preset area after determining that the current mobile advertisement carrier is the mobile advertisement carrier to be identified.
The monitoring unit 1 can dynamically capture the advertisement image on the surface of the bicycle and intelligently identify the advertisement information for preprocessing. The internal subunit 11 further comprises:
a Linux development board integration module 115 and a temperature and humidity detection module 116;
the Linux development board integration module 115 is a module for integrating other devices to process information uniformly, supports a USB interface drive, supports a GPIO plug-in, and supports application deployment of python, java and c + + language development;
the shooting module 112 is a high-definition camera, is inserted into the Linux development board integrated module 115, and is a camera with Linux-driven UVC standard, and the camera has a specification of 200 and 3000 ten thousand pixels, and meets a specification of 1920 × 1080 video.
In the present embodiment, the high-definition camera used may also be a mobile camera (a vehicle-mounted camera, a handheld camera, or the like). If the mobile camera is a mobile camera, the mobile camera does not need to be plugged into the Linux development board integrated module 115, and only needs to be wirelessly connected with other modules in the monitoring unit 1. In the embodiment, a high-definition camera is taken as an example, and the use of other camera terminals is also within the protection scope of the invention.
The positioning module 114 is inserted into the Linux development board integration module; the module is a positioning module which is provided with a Linux drive and is compatible with a GPS and a Beidou system, has low power consumption and meets the positioning accuracy of 5-10 m.
The preprocessing module 113 is an image recognition preprocessing system, and performs deduplication on the whole picture photographed by the photographing module 112, recognizes specific numeric and text information, and forms recognizable advertisement data according to the position and time information.
The temperature and humidity detection module 116 is a temperature and humidity measurement module for monitoring temperature and humidity information inside the unit 1, and the temperature and humidity detection module 116 is communicated with the Linux development board integration module 115.
The external subunit 12 comprises: a power supply module 121, a waterproof lightning protection module 122 and a standby power supply module 123;
the power supply module 121 is a power supply for providing 3.3V or 5V dc power to the internal subunit 11, and the power supply module 121 is connected to the internal subunit 11;
the waterproof lightning protection module 122 is a waterproof lightning protector, is electrically connected with the internal subunit 11, and can automatically cut off a working power supply when water enters the water treatment module to prevent lightning from striking the monitoring unit 1;
the standby power module 123 is an uninterruptible power supply device that can automatically store and supply power and is connected with the power supply module 121 in series.
The data processing unit 2 includes:
the server module 21 is used for acquiring target information of the current mobile advertisement carrier;
the database module 22 is used for extracting advertisement information of all advertisements on the mobile advertisement carrier from the picture information and the character information of the current mobile advertisement carrier; the advertisement information includes: content information representing the corresponding advertisement propaganda content and contact information corresponding to advertisement display;
matching the advertisement information of all advertisements on the current advertisement carrier with the address information of the preset area where the advertisements are located and the current time to form corresponding matching information for storage;
and the reporting module 23 is configured to provide matching information corresponding to all advertisements on the current advertisement carrier to a user for management and viewing, and transmit the matching information corresponding to all advertisements on the current advertisement carrier to the data analysis unit.
In the embodiment, the server module 21 is computer hardware built into a multi-computer cluster form by an X64-based centros 7 system, and can call data in the database module 22.
The database module 22 is based on an hbase system and a mysql system, the hbase system is used for storing device detection information, and the mysql is used for storing service logic structure information for the server module 21 to call.
The reporting module 23 provides the functions of viewing and managing advertisement information, and providing a multi-platform back-end communication interface for users.
A communication unit 4 is connected between the monitoring unit 1 and the data processing unit 2;
the communication unit 4 is connected with the monitoring unit 1 and the data processing unit 2 through a wired broadband or wireless, and transmits data to the data processing unit 2 in real time.
The communication unit 4 includes an IP broadband access module 41, a 2G/4G wireless network module 42, and a WIFI access module 43.
The IP broadband access module 41 is a circuit board module for connecting the Linux development board integration module 115 to a broadband router for IP communication, and the IP broadband access module 41 is connected to the Linux development board integration module 115;
the 2G/4G wireless network module 42 has the functions of internet communication with an integrated circuit for supporting a Linux drive and a mobile communication network provided with an SIM card; this module is connected with the Linux development board integration module 115;
the WIFI access module 43 is a circuit board module for enabling the Linux development board integration module 115 to connect with a WIFI router for WIFI communication, and the WIFI access module 43 is connected with the Linux development board integration module 115.
The data analysis unit 3 is specifically configured to:
grading the malicious advertisements of the current mobile advertisement carrier according to the degree of harm according to matching information corresponding to the malicious advertisements of the current mobile advertisement carrier; the levels of malicious advertisements include: personal and business levels;
if the malicious advertisement of the current mobile advertisement carrier belongs to the personal level, contacting a malicious advertisement responsible person of the personal level according to matching information corresponding to the malicious advertisement of the personal level, and commanding the responsible person to invalidate the corresponding malicious advertisement;
if the malicious advertisements of the current mobile advertisement carrier belong to the enterprise level, sending matching information corresponding to the malicious advertisements of the enterprise level to each platform department or law enforcement department to shield the malicious advertisements of the enterprise level;
if the individual-level malicious advertisements are still valid within a predetermined time period, the individual-level malicious advertisements are raised to the enterprise level.
The data analysis unit 3 can automatically contact the responsible person of the malicious advertisement, each platform department (telecom operator, payment platform, etc.), and law enforcement department according to the matching information corresponding to the malicious advertisement. This can invalidate the contact on the malicious advertisement; and can remind the malicious advertisement responsible person, thereby reducing the act of posting the malicious advertisement.
The reporting module 23 includes:
the login submodule 231 is configured to provide matching information corresponding to all advertisements on the current advertisement carrier to a user for viewing;
the management submodule 232 is configured to provide matching information corresponding to all advertisements on the current advertisement carrier to a user for modification, deletion, or remarking;
and the reporting sub-module 233 is configured to transmit matching information corresponding to all advertisements on the current advertisement carrier, which are viewed, modified, deleted, or remarked by the user, to the data analysis unit.
The login sub-module 231 registers as a system user by filling in the mobile phone number and the enterprise information, which is a precondition for using and operating the reporting module 23.
The management sub-module 232 is used as an auxiliary option for the system to automatically analyze and report, and has the functions of checking, rejecting, remarking, manually modifying and reporting the advertisement information through the module.
After the user defines the communication ports and protocols of the relevant parties for the first time, the reporting sub-module 233 can collect information periodically and report automatically.
The above technical solutions of the embodiments of the present invention are described in detail below with reference to application examples:
in an environment with public video monitoring, a public monitoring high-definition camera is directly used;
as shown in fig. 5, the malicious advertisement removal system according to the present embodiment;
when a suspected shared bicycle object enters a monitoring range, the identification module 111 is triggered to perform intelligent identification, the shooting module 112 performs multi-time-rate image amplification on the suspected object, characteristic parts of high-definition images are compared, whether the suspected object is a shared bicycle product or not is automatically identified, and the time consumption of the step is about 1 s. If the sharing bicycle is not judged, the identification module 111 is closed, and the sharing bicycle returns to the monitoring mode.
If the shared bicycle is judged, the positioning module 114 acquires the terminal number of the shooting module 112, the shooting module 112 further enlarges the image, and simultaneously performs high-definition shooting on key positions (a bicycle basket, a front and back code scanning bar, a front and back bar cushion and the like) which can be shot, acquires a high-definition digital image, finishes multi-group data collection, uploads the high-definition digital image to the preprocessing module 114, and then returns to a monitoring program, which takes about 2 s. The preprocessing module 113 preprocesses the high-definition digital image to obtain the picture information and the text information of the shared bicycle.
In order to reduce the occupation of a processor, a storage space and bandwidth of a public video end, the data acquired for multiple times are intelligently analyzed and processed. And if the image acquired by the first monitoring is completely the same as the image acquired by the second monitoring, comparing the image acquired by the third monitoring, and if the images acquired by the first monitoring are identical to the images acquired by the second monitoring, not performing information identification and stopping the monitoring program for a short time. After a short period of time, if the compared monitored images are the same, the monitoring shutdown time is continuously prolonged until the monitored scene changes, and the monitoring is restarted.
The server module 21 acquires picture information and character information of the shared bicycle, and the terminal number of the photographing module 112. To the database module 22. The database module 22 extracts the advertisement information of all advertisements on the shared bicycle from the picture information and the character information of the shared bicycle; such as advertising words, trademarks, contact phones, two-dimensional codes, etc. Then the database module 22 matches the advertisement information of all advertisements on the shared bicycle with the terminal number of the shooting module 112 and the current shooting time to form corresponding matching information for storage.
The reporting module 23 uploads the matching information of all the advertisements of the shared bicycle to the data analysis unit 3. And the data analysis unit 3 compares the legal advertisements according to the matching information of the advertisements, and judges whether all the advertisements of the shared bicycle have malicious advertisements. And when the malicious advertisements are judged to exist, carrying out hazard grading on the malicious advertisements. The malicious advertisement at the individual level contacts the individual for advertisement invalidation, and the malicious advertisement at the enterprise level contacts a platform or law enforcement department for shielding.
The invention can automatically identify the malicious advertisements, and then can effectively and quickly eliminate the malicious advertisements by a way of informing the partner through the data analysis unit; the manual input can be reduced, and malicious advertisement publishers can be effectively attacked, so that the behavior of the malicious advertisements is fundamentally prevented.
It should be understood that the specific order or hierarchy of steps in the processes disclosed is an example of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged without departing from the scope of the present disclosure. The accompanying method claims present elements of the various steps in a sample order, and are not intended to be limited to the specific order or hierarchy presented.
In the foregoing detailed description, various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments of the subject matter require more features than are expressly recited in each claim. Rather, as the following claims reflect, invention lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby expressly incorporated into the detailed description, with each claim standing on its own as a separate preferred embodiment of the invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. To those skilled in the art; various modifications to these embodiments will be readily apparent, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
What has been described above includes examples of one or more embodiments. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the aforementioned embodiments, but one of ordinary skill in the art may recognize that many further combinations and permutations of various embodiments are possible. Accordingly, the embodiments described herein are intended to embrace all such alterations, modifications and variations that fall within the scope of the appended claims. Furthermore, to the extent that the term "includes" is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term "comprising" as "comprising" is interpreted when employed as a transitional word in a claim. Furthermore, any use of the term "or" in the specification of the claims is intended to mean a "non-exclusive or".
Those of skill in the art will further appreciate that the various illustrative logical blocks, units, and steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate the interchangeability of hardware and software, various illustrative components, elements, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design requirements of the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present embodiments.
The various illustrative logical blocks, or elements, described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor, an Application Specific Integrated Circuit (ASIC), a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other similar configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. For example, a storage medium may be coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC, which may be located in a user terminal. In the alternative, the processor and the storage medium may reside in different components in a user terminal.
In one or more exemplary designs, the functions described above in connection with the embodiments of the invention may be implemented in hardware, software, firmware, or any combination of the three. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media that facilitate transfer of a computer program from one place to another. Storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, such computer-readable media can include, but is not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store program code in the form of instructions or data structures and which can be read by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Additionally, any connection is properly termed a computer-readable medium, and, thus, is included if the software is transmitted from a website, server, or other remote source via a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wirelessly, e.g., infrared, radio, and microwave. Such discs (disk) and disks (disc) include compact disks, laser disks, optical disks, DVDs, floppy disks and blu-ray disks where disks usually reproduce data magnetically, while disks usually reproduce data optically with lasers. Combinations of the above may also be included in the computer-readable medium.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.