Disclosure of Invention
An object of some embodiments of the present application is to provide a method, an apparatus, a storage medium, and an electronic device for detecting the safety of a collection frequency, where the data collection frequency can be monitored in real time, quickly and efficiently in the process of data collection, and whether the collection frequency is safe and reasonable is confirmed, so that the collection frequency with a practical error is effectively avoided, and the occurrence of a situation that a collected data sample is wrong or a collected terminal is down is caused, thereby reducing the loss caused when the collected terminal performs data collection.
In a first aspect, some embodiments of the present application provide a method of acquisition frequency security detection, comprising: acquiring interactive data flow between an acquisition end and an acquired end, wherein the interactive data flow comprises a first flow from the acquisition end to the acquired end and a second flow from the acquired end to the acquisition end; acquiring the data acquisition frequency and the data acquisition state of the interactive data flow; and confirming whether the data acquisition frequency is safe or not according to the data acquisition state.
According to the method and the device, whether the data acquisition frequency is safe or not is confirmed through the data acquisition state of the interactive data flow of the acquisition end and the acquired end in real time, real-time, rapid and efficient monitoring of the data acquisition frequency is achieved, whether the acquisition frequency is safe and reasonable or not is confirmed, the acquisition frequency with practical errors is effectively avoided, the situation that the acquired data sample is wrong or the acquired end is down is caused, and therefore loss caused when the acquired end performs data acquisition is reduced.
In some embodiments, the determining whether the data acquisition frequency is safe according to the data acquisition status includes: if the data acquisition state is successful, judging whether the data acquisition frequency is safe or not according to the data acquisition frequency and a preset frequency threshold; if the data acquisition state is failed, the data acquisition frequency is unsafe.
According to the method and the device, the safety of the data acquisition frequency is confirmed by comparing the real-time data acquisition frequency with the preset frequency threshold under the condition that the data acquisition state is successful, the data acquisition frequency can be ensured to be safe and reasonable under the condition that the data acquisition is successful, and then the collected end can be ensured to work safely and normally.
In some embodiments, the preset frequency threshold includes an upper threshold and a lower threshold, wherein the determining, according to the data acquisition frequency and the preset frequency threshold, whether the data acquisition frequency is safe includes: if the data acquisition frequency is not greater than the upper threshold and not less than the lower threshold, confirming that the data acquisition frequency is safe; and if the data acquisition frequency is greater than the upper threshold or the data acquisition frequency is less than the lower threshold, confirming that the data acquisition frequency is unsafe.
According to the method and the device, whether the real-time data acquisition frequency is in the range of the upper limit threshold value and the lower limit threshold value or not is confirmed, whether the data acquisition frequency is safe or not is confirmed, data acquisition can be ensured to be carried out in the bearable range of the acquired end, and the situation that the acquired end is down and cannot work normally, and data acquisition is interrupted or abnormal is avoided.
In some embodiments, after said confirming that said data acquisition frequency is unsafe, said method further comprises: and generating a safety warning log corresponding to the data acquisition frequency, and displaying the safety warning log to a user so as to remind the user.
According to the method and the device, after the data acquisition frequency is confirmed to be unsafe, a safety warning log can be automatically generated for the user, so that on one hand, the user can be reminded of avoiding using the frequency when the user subsequently acquires the data, and on the other hand, the user can timely adjust the data acquisition frequency, and data acquisition errors or interruption are avoided.
In some embodiments, the acquiring the interactive data traffic between the collecting end and the collected end includes: receiving request data flow sent by the acquisition end, wherein the first flow is the request data flow for requesting data acquisition of the acquired end; and receiving a second flow sent by the acquired end aiming at the request data flow, wherein the second flow is the response data flow of the acquired end to the request.
According to the method and the device, the request data flow and the response data flow are obtained through receiving the data flow sent by the acquisition end and the acquired end in the process of interaction between the acquisition end and the acquired end, and then accurate data acquisition states and data acquisition frequencies can be obtained.
In some embodiments, the acquiring the data collection frequency and the data collection state of the interactive data traffic includes: analyzing the request data flow to obtain the data acquisition frequency; and analyzing the response data flow to obtain the data acquisition state.
According to the method and the device, the request data flow and the response data flow are analyzed, so that the data acquisition frequency and the data acquisition state with high accuracy can be obtained in real time.
In some embodiments, the analyzing the request data traffic to obtain the data collection frequency includes: acquiring the request data flow received in a preset time; and taking the ratio of the request data flow to the preset time as the data acquisition frequency.
Some embodiments of the present application obtain the data acquisition frequency by acquiring the data flow in the unit time in real time, which is convenient and accurate.
In some embodiments, the analyzing the response data traffic to obtain the data acquisition state includes: acquiring the numerical value of each sampling point in the data acquisition frequency; if the numerical value exists in all the sampling points, the data acquisition state is confirmed to be successful; and if any sampling point in the sampling points does not have the numerical value, confirming that the data acquisition state is failed.
According to the method and the device, whether the data acquisition state is successful or not is judged by confirming the numerical value of each sampling point in the data acquisition frequency, and accurate judgment of the data acquisition frequency can be achieved rapidly.
In some embodiments, the analyzing the response data traffic to obtain the data acquisition state includes: acquiring a return instruction of the acquired end in the response data flow; if the return instruction is successful, confirming that the data acquisition state is successful; and if the return instruction is failed, confirming that the data acquisition state is failed.
Some embodiments of the present application may further confirm the data acquisition status by the return instruction of the acquired end, so as to achieve fast and accurate determination of the data acquisition frequency.
In some embodiments, before the acquiring the interactive data traffic between the collecting end and the collected end, the method further includes: reading configuration parameters, wherein the configuration parameters comprise: the industrial control protocol type and the preset frequency threshold value, and the configuration parameters are obtained by receiving operation instructions of a user.
According to the method and the device, the data flow can be accurately analyzed later by configuring the corresponding industrial control protocol type and the preset frequency threshold which can be borne by the collected end, and meanwhile, the collected end is guaranteed to work normally.
In some embodiments, the acquiring the data collection frequency and the data collection state of the interactive data traffic includes: calling an analysis function of the industrial control protocol type; and analyzing the interactive data flow by utilizing the analysis function to obtain the data acquisition frequency and the data acquisition state.
According to the method and the device, the interactive data flow is analyzed through the analysis function corresponding to the industrial control protocol type, so that the correct analysis of the data flow can be realized, and the more accurate data acquisition frequency and data acquisition state can be obtained.
In a second aspect, some embodiments of the present application provide an apparatus for acquisition frequency security detection, comprising: the flow acquisition module is configured to acquire interactive data flow between an acquisition end and an acquired end, wherein the interactive data flow comprises a first flow from the acquisition end to the acquired end and a second flow from the acquired end to the acquisition end; the parameter acquisition module is configured to acquire the data acquisition frequency and the data acquisition state of the interactive data flow; and the safety detection module is configured to confirm whether the data acquisition frequency is safe according to the data acquisition state.
In a third aspect, some embodiments of the present application provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs a method according to any of the embodiments of the first aspect.
In a fourth aspect, some embodiments of the present application provide an electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor, when executing the program, can implement a method according to any of the embodiments of the first aspect.
In a fifth aspect, some embodiments of the present application provide a computer program product comprising a computer program, wherein the computer program, when executed by a processor, is adapted to carry out the method according to any of the embodiments of the first aspect.
Detailed Description
The technical solutions in some embodiments of the present application will be described below with reference to the drawings in some embodiments of the present application.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only to distinguish the description, and are not to be construed as indicating or implying relative importance.
In the related art, a stable value of data is set when the data is acquired, then the data is acquired at the set acquisition frequency, and then the acquisition frequency is adjusted according to the deviation degree of the acquired data and the stable value. However, the method does not consider the maximum bearing capacity of the collected device when adjusting the collection frequency, so that the obtained collection frequency cannot be ensured to be safe for the collected device, and the collected data at the higher collection frequency is abnormal, so that the finally adjusted collection frequency is wrong.
In view of this, some embodiments of the present application provide a method for detecting the safety of the acquisition frequency, which analyzes the interactive data traffic between the acquisition end and the acquired end to obtain the data acquisition frequency and the data acquisition state, and then determines whether the data acquisition frequency is safe according to the data acquisition state. According to the method and the device, in the process of data acquisition, the data acquisition frequency can be monitored in real time, quickly and efficiently, whether the acquisition frequency is safe and reasonable is confirmed, the acquisition frequency with practical errors is effectively avoided, the acquired data sample is wrong or the acquired data sample is down, and therefore loss caused when the acquired data sample is acquired is reduced.
As shown in fig. 1, some embodiments of the present application provide a system for collecting frequency security detection, which includes a collecting end 100, a collected end 200, and a security detection end 300, where the collecting end, the collected end 200, and the security detection end 300 are connected through a wired or wireless network to implement data communication. The collecting end 100 may send a first flow containing the collected data request information to the collected end 200, and after receiving the first flow, the collected end 200 sends a second flow to the collecting end 100 for the data request information. In the transmission process of the first flow and the second flow, the first flow and the second flow are both transmitted through the safety detection end, the safety detection end 300 receives the first flow and the second flow, so that analysis of the interactive data flow is achieved, a data acquisition state and a data acquisition frequency are obtained, whether the data acquisition frequency is safe or not is further confirmed according to the data acquisition state, a safety alarm log is generated under the unsafe condition, and the safety alarm log is displayed on a visual interface of the safety detection end 300 for a user to check in time.
In some embodiments of the present application, the collected terminal 100 may be a data collection device, where the data collection device may be a mobile terminal device, a non-portable computer terminal with a data collection function, or the like. The collected end 200 may be a server, a numerical control device, or other devices with a function of generating data, etc. The present application is not specifically limited herein.
The implementation of acquisition frequency security detection performed by the security detection end 300 provided in some embodiments of the present application is described below by way of example in conjunction with fig. 2.
Referring to fig. 2, fig. 2 is a flowchart of an acquisition frequency security detection according to some embodiments of the present application, where the method includes:
s210, acquiring interactive data flow between a collection end and a collected end, wherein the interactive data flow comprises a first flow from the collection end to the collected end and a second flow from the collected end to the collection end.
In some embodiments of the present application, S210 may include: receiving request data flow sent by the acquisition end, wherein the first flow is the request data flow for requesting data acquisition of the acquired end; and receiving a second flow sent by the acquired end aiming at the request data flow, wherein the second flow is the response data flow of the acquired end to the request.
For example, in some embodiments of the present application, the request data traffic generated by the acquisition device (as a specific example of the acquisition end) when sending a request to the field device (as a specific example of the acquired end, for example, the field device may be various types of servers, air conditioning systems, traffic track systems, power generation systems, etc.) may reach the field device through the security detection end 300, at which time the security detection end 300 may receive the request data traffic. Similarly, the field device will respond to the request and will generate a response data flow through the safety instrumented terminal 300 to the collection device, where the safety instrumented terminal 300 will receive the response data flow.
In order to achieve accurate analysis of the interactive data traffic and obtain relevant parameters, in some embodiments of the present application, before executing S210, the method for collecting frequency security detection further includes: reading configuration parameters, wherein the configuration parameters comprise: the industrial control protocol type and the preset frequency threshold value, and the configuration parameters are obtained by receiving operation instructions of a user.
For example, in some embodiments of the present application, a user may input an industrial control protocol type (e.g., modbus, serial communication protocol), a function code (e.g., 0x 01), and an upper threshold and a lower threshold of a preset frequency threshold of data to be collected in a visual interface of the security detection end 300. After the security detection end 300 reads the configuration information, it generates a corresponding unique protocol identifier (i.e., a unique protocol identifier corresponding to the industrial control protocol type), a function code structure body, and an acquisition frequency structure body. Wherein, the main variables of the function code structure body include: the function code, the description information, the request analysis function pointer and the response analysis function pointer, wherein the information corresponding to the description information, the request analysis function pointer and the response analysis function pointer is searched and filled by the industrial control protocol analysis plug-in according to the function code in the function code structure body. For example, a function code mechanism is a function code: 0x01, description information: reading a coil value, and requesting an analytic function pointer: a specific function that processes the request, a response resolution function pointer: a specific function of the response is processed. The main variables of the acquisition frequency structure include the minimum acquisition frequency (i.e., lower threshold) and the maximum acquisition frequency (i.e., upper threshold). And finally, transmitting the detection data structure to an industrial control protocol analysis plug-in. It should be noted that, the preset frequency threshold is set according to the actual bearing capacity of the field device, and the bearing capacity may be already tested by the manufacturer when the device leaves the factory.
S220, acquiring the data acquisition frequency and the data acquisition state of the interactive data flow.
In some embodiments of the present application, S220 may include: calling an analysis function of the industrial control protocol type; and analyzing the interactive data flow by utilizing the analysis function to obtain the data acquisition frequency and the data acquisition state. Analyzing the request data flow to obtain the data acquisition frequency; and analyzing the response data flow to obtain the data acquisition state.
For example, in some embodiments of the present application, since the industrial control protocol types of the field devices are different, it is necessary to parse the interactive data traffic using a parsing function corresponding to the industrial control protocol type. And analyzing by adopting different analysis functions according to the direction of the collected flow. For example, the request data flow is analyzed by using the processing request function to obtain the data acquisition frequency, and the response data flow is analyzed by using the processing response function to obtain the data acquisition state.
In some embodiments of the present application, the request data traffic received within a preset time is acquired; and taking the ratio of the request data flow to the preset time as the data acquisition frequency.
For example, in some embodiments of the present application, the preset time may be set to 1 second, 2 seconds, and so on. And obtaining the number of the acquisition points in the request data flow received within 1 second through the analysis function, and assigning the number of the acquisition points to the acquisition number variable in the analysis result structure body. The number of acquisition points in each second is the data acquisition frequency.
In some embodiments of the present application, the values of the sampling points in the data acquisition frequency are obtained; if the numerical value exists in all the sampling points, the data acquisition state is confirmed to be successful; and if any sampling point in the sampling points does not have the numerical value, confirming that the data acquisition state is failed.
For example, in some embodiments of the present application, whether each sampling point is successful or failed may be determined according to whether the content of each sampling point is a specific value. For example, there are 100 sampling points in the data acquisition frequency, the data acquisition state is successful if each sampling point has a specific value (e.g., 0,1, etc.), and the data acquisition state is failed if at least one sampling point of the 100 sampling points has no specific value. The data acquisition state is then assigned to a response state variable in the parse result structure, where the response state variable may be set to success or failure.
In other embodiments of the present application, a return instruction of the collected end in the response data flow is obtained; if the return instruction is successful, confirming that the data acquisition state is successful; and if the return instruction is failed, confirming that the data acquisition state is failed.
For example, in other embodiments of the present application, the data acquisition status may also be confirmed directly from the command returned by the field device.
And then, obtaining a complete analysis result structure body comprises the steps of collecting a number variable and a response state variable.
S230, confirming whether the data acquisition frequency is safe or not according to the data acquisition state.
For example, in some embodiments of the present application, the security detection end 300 may read the content in the analysis result structure body within a preset period (for example, 1 second), that is, read the number of acquisition points and the response status (that is, the data acquisition status) every 1 second.
In some embodiments of the present application, S230 may include: if the data acquisition state is successful, judging whether the data acquisition frequency is safe or not according to the data acquisition frequency and a preset frequency threshold; if the data acquisition state is failed, the data acquisition frequency is unsafe.
For example, in some embodiments of the present application, the security detection end 300 detects from the read content. When the data acquisition state fails, the fact that the current data acquisition frequency is adopted for data acquisition causes downtime or errors of the field equipment, a specific numerical value of a sampling point cannot be returned normally is indicated, and the current data acquisition frequency is unsafe.
To ensure accuracy of the collected data, in some embodiments of the present application, if the data collection frequency is not greater than the upper threshold and not less than the lower threshold, confirming that the data collection frequency is safe; and if the data acquisition frequency is greater than the upper threshold or the data acquisition frequency is less than the lower threshold, confirming that the data acquisition frequency is unsafe.
Since the accuracy of the acquired data decreases when the data acquisition frequency is high, in some embodiments of the present application, further determination of the data acquisition frequency is also required when the data acquisition state is normal. For example, the data acquisition frequency is 100, the preset frequency threshold is [70, 120], and the data acquisition frequency is within the preset frequency threshold, which indicates that the current data acquisition frequency is safe and reasonable.
In some embodiments of the present application, after said confirming that said data acquisition frequency is unsafe, said method further comprises: and generating a safety warning log corresponding to the data acquisition frequency, and displaying the safety warning log to a user so as to remind the user.
For example, in some embodiments of the present application, in order to inform the user that the collected data is inaccurate or the field device is down easily at the current data collection frequency, the safety detection end 300 may also automatically generate a safety warning log according to the above-mentioned determination request condition and display the safety warning log on the visual interface for the relevant user to view. Wherein the safety warning log comprises: alarm time, industrial control protocol type, function code description information and data acquisition frequency.
The following takes an acquisition frequency control device as an example of an acquisition end, and a specific process of acquisition frequency security detection provided in some embodiments of the present application is exemplarily described with reference to fig. 3.
Referring to fig. 3, fig. 3 is a flowchart of a method for acquisition frequency security detection according to some embodiments of the present application. Taking communication between the acquisition frequency control device and the server (as one example of the acquisition end) as an example, an implementation procedure of the method of the safety detection of the acquisition frequency by the safety detection device (as one specific example of the safety detection end) is exemplified.
S310, reading configuration parameters.
For example, as a specific example of the present application, an upper threshold and a lower threshold of an industrial control protocol type, an acquisition function code, and an acquisition frequency (i.e., a preset frequency threshold) are set on a visual interface of the acquisition frequency safety detection device, where the upper threshold is 60 and the lower threshold is 120.
S320, acquiring interactive data flow between the acquisition end and the acquired end.
For example, as a specific example of the present application, traffic data packets generated by the interaction of the acquisition frequency control device with the server (as a specific example of the interaction data traffic) are captured by the DPDK (Intel Data Plane Development Kit, network packet processing system) every one second with a period of 1 second. The traffic data messages include request data messages (as a specific example of request data traffic) and response data messages (as a specific example of response data traffic).
S330, acquiring the data acquisition frequency and the data acquisition state of the interactive data flow.
For example, as a specific example of the present application, a resolution function corresponding to an industrial control protocol type is selected, wherein the resolution function includes a process request resolution function and a response request resolution function. And analyzing the request data message by using the processing request analysis function to obtain the data acquisition frequency, and analyzing the response data message by using the response request analysis function to obtain the data acquisition state. The data acquisition status and the data acquisition frequency can be obtained by referring to the embodiment provided in fig. 2, and the description thereof will not be repeated here. For example, the data acquisition frequency is 100, and the data acquisition status is successful.
S340, judging whether the data acquisition state is successful, if so, executing S350, otherwise, confirming that the data acquisition frequency is unsafe, and executing S360.
For example, as a specific example of the present application, S330 may determine that the data acquisition status is successful, and S350 is performed.
S350, judging whether the data acquisition frequency is within a preset frequency threshold, if so, confirming that the data acquisition frequency is safe, and if not, executing S360.
In some embodiments of the present application, if the data acquisition frequency is within a preset frequency threshold, the data acquisition frequency is confirmed to be safe, otherwise, not safe.
For example, as a specific example of the present application, where the data acquisition frequency 100 is within the range of the preset frequency threshold [60, 120], it is safe and reasonable to characterize the current data acquisition frequency, and no treatment is currently required.
S360, generating a safety warning log corresponding to the data acquisition frequency, and displaying the safety warning log to a user.
For example, as a specific example of the present application, in the case where the data collection frequency is not secure, it is necessary to inform the relevant user, that is, to generate a form of a security warning log, to be displayed on the visual interface. Wherein the safety warning log comprises: warning time, industrial control protocol type, protocol acquisition function code and detailed information of the function code are already data acquisition frequency.
In addition, in other embodiments of the present application, the safety detection device may be applied to an industrial control safety audit product, so that the industrial control safety audit product may have a function of collecting frequency safety detection, and a specific implementation process of the method for collecting frequency safety detection is the same as the principle of the above method embodiment, so that repetition is avoided, and details are not repeated here.
Referring to fig. 4, fig. 4 is a block diagram illustrating an apparatus for acquiring frequency security detection according to some embodiments of the present application. It should be understood that the apparatus for collecting frequency security detection corresponds to the above method embodiments, and can perform the steps related to the above method embodiments, and specific functions of the apparatus for collecting frequency security detection may be referred to the above description, and detailed descriptions thereof are omitted herein as appropriate to avoid redundancy.
The apparatus of fig. 4 for acquisition frequency security detection includes at least one software functional module that can be stored in memory in the form of software or firmware or cured in the apparatus for acquisition frequency security detection, the apparatus for acquisition frequency security detection comprising: a flow acquisition module 410 configured to acquire an interaction data flow between an acquisition end and an acquired end, wherein the interaction data flow includes a first flow from the acquisition end to the acquired end and a second flow from the acquired end to the acquisition end; a parameter acquisition module 420 configured to acquire a data acquisition frequency and a data acquisition status of the interactive data traffic; a security detection module 430 configured to confirm whether the data acquisition frequency is secure based on the data acquisition status.
In some embodiments of the present application, the security detection module 430 is at least configured to determine whether the data acquisition frequency is secure according to the data acquisition frequency and a preset frequency threshold if the data acquisition state is successful; if the data acquisition state is failed, the data acquisition frequency is unsafe.
In some embodiments of the present application, the preset frequency threshold includes an upper threshold and a lower threshold, and the security detection module 430 is at least configured to confirm that the data acquisition frequency is secure if the data acquisition frequency is not greater than the upper threshold and not less than the lower threshold; and if the data acquisition frequency is greater than the upper threshold or the data acquisition frequency is less than the lower threshold, confirming that the data acquisition frequency is unsafe.
In some embodiments of the present application, after the security detection module 430, the apparatus for collecting frequency security detection further includes a warning module (not shown in the figure) configured to: and generating a safety warning log corresponding to the data acquisition frequency, and displaying the safety warning log to a user so as to remind the user.
In some embodiments of the present application, the traffic obtaining module 410 is at least configured to receive the requested data traffic sent by the collecting end, where the first traffic is the requested data traffic requesting data collection of the collected end; and receiving a second flow sent by the acquired end aiming at the request data flow, wherein the second flow is the response data flow of the acquired end to the request.
In some embodiments of the present application, the parameter acquisition module 420 is configured at least to acquire the data acquisition frequency and the data acquisition status of the interactive data traffic, and includes: analyzing the request data flow to obtain the data acquisition frequency; and analyzing the response data flow to obtain the data acquisition state.
In some embodiments of the present application, the parameter acquisition module 420 is at least configured to acquire the requested data traffic received within a preset time; and taking the ratio of the request data flow to the preset time as the data acquisition frequency.
In some embodiments of the present application, the parameter acquisition module 420 is at least configured to acquire values for each sampling point in the data acquisition frequency; if the numerical value exists in all the sampling points, the data acquisition state is confirmed to be successful; and if any sampling point in the sampling points does not have the numerical value, confirming that the data acquisition state is failed.
In some embodiments of the present application, the parameter acquisition module 420 is at least configured to acquire a return instruction of the acquired end in the response data traffic; if the return instruction is successful, confirming that the data acquisition state is successful; and if the return instruction is failed, confirming that the data acquisition state is failed.
In some embodiments of the present application, the apparatus for acquiring frequency security detection before the flow acquisition module 410 further includes a configuration module (not shown in the figure) configured at least to: reading configuration parameters, wherein the configuration parameters comprise: the industrial control protocol type and the preset frequency threshold value, and the configuration parameters are obtained by receiving operation instructions of a user.
In some embodiments of the present application, the parameter acquisition module 420 is configured to at least: calling an analysis function of the industrial control protocol type; and analyzing the interactive data flow by utilizing the analysis function to obtain the data acquisition frequency and the data acquisition state.
Some embodiments of the present application also provide a computer readable storage medium having stored thereon a computer program, which when executed by a processor, may implement operations of the method corresponding to any of the above-described methods provided by the above-described embodiments.
Some embodiments of the present application further provide a computer program product, where the computer program product includes a computer program, where the computer program when executed by a processor may implement operations of a method corresponding to any of the foregoing methods provided by the foregoing embodiments.
As shown in fig. 5, some embodiments of the present application provide an electronic device 500, the electronic device 500 comprising: memory 510, processor 520, and a computer program stored on memory 510 and executable on processor 520, wherein processor 520 may implement a method as in any of the embodiments described above when reading the program from memory 510 and executing the program via bus 530.
Processor 520 may process the digital signals and may include various computing structures. Such as a complex instruction set computer architecture, a reduced instruction set computer architecture, or an architecture that implements a combination of instruction sets. In some examples, processor 520 may be a microprocessor.
Memory 510 may be used for storing instructions to be executed by processor 520 or data related to execution of the instructions. Such instructions and/or data may include code to implement some or all of the functions of one or more modules described in embodiments of the present application. The processor 520 of the disclosed embodiments may be configured to execute instructions in the memory 510 to implement the methods shown above. Memory 510 includes dynamic random access memory, static random access memory, flash memory, optical memory, or other memory known to those skilled in the art.
The foregoing is merely exemplary embodiments of the present application and is not intended to limit the scope of the present application, and various modifications and variations may be suggested to one skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principles of the present application should be included in the protection scope of the present application. It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.