Disclosure of Invention
The application provides a control method, a device, a vehicle and a storage medium of an automobile trunk, which are used for solving the technical problems that in the related art, the anti-interference capability is poor, frequent capturing and judging images are needed, the power consumption is high, the service life of equipment is influenced, and meanwhile, the risk of leakage of user information exists.
An embodiment of a first aspect of the present application provides a control method for a trunk of an automobile, including the steps of: acquiring face images of each user to be unlocked within a preset range; calculating the facial feature value of each user to be unlocked according to the facial image of each user to be unlocked, and generating the facial mark of each user to be unlocked according to the facial feature value of each user to be unlocked; and sending the facial identifier of each user to be unlocked to a server, receiving a matching result obtained by the server by searching in a preset login certificate database by utilizing the facial identifier, and opening a trunk of the vehicle when the matching result is matching.
According to the technical means, the face identification of each user to be unlocked can be obtained according to the face image of the user to be unlocked, the login certificate database is matched based on the server, and when the matching result is the matching, the trunk of the vehicle is opened, so that the trunk is unlocked in a contactless manner, the intelligent level of the vehicle is increased, and the risk of local leakage of face information of the user can be avoided.
Optionally, in one embodiment of the present application, before sending the facial identifier of each user to be unlocked to the server, the method further includes: acquiring a face image of an unlockable user; calculating the facial feature value of the user capable of unlocking according to the facial image of the user capable of unlocking; generating the face identification of the user capable of unlocking according to the face characteristic value, sending the face identification to the server so that the server generates a login certificate associated with the face identification, and storing the encrypted associated login certificate into a preset login certificate database.
According to the technical means, the embodiment of the application can generate the login certificate at the cloud end, and complete the identification by utilizing the encrypted login certificate and the facial identification, so that the method is safe and controllable, the information security risk caused by the disclosure of the face information of the user is avoided, and the privacy of the user is protected.
Optionally, in one embodiment of the present application, before the capturing the person image of each user to be unlocked within the preset range, the method further includes: detecting whether the current state of the vehicle meets a preset trunk opening condition; and when the vehicle is detected to meet the preset trunk opening condition, controlling the vehicle to enter a face image scanning mode.
According to the technical means, the embodiment of the application can avoid the problem of high power consumption caused by frequent identification of the acquisition equipment.
Optionally, in one embodiment of the present application, before acquiring the face image of each user to be unlocked within the preset range, the method further includes: acquiring the duration time of at least one user in the preset range; and when the continuous direct current time is greater than or equal to a preset time length, judging that the at least one user is the user to be unlocked.
According to the technical means, the embodiment of the application can reduce the false recognition probability caused by environmental interference and reduce the frequency of capturing the human face.
Optionally, in one embodiment of the present application, before the capturing the person image of each user to be unlocked within the preset range, the method further includes: detecting whether the vehicle starts a face starting function of an automobile trunk or not; and when the face opening function is detected to be started, the trunk is allowed to be started when the matching result is that the face is matched.
According to the technical means, the embodiment of the application can avoid the problem of excessively high power consumption caused by frequent identification or invalid identification of the acquisition equipment, and simultaneously save the electric quantity.
Optionally, in one embodiment of the present application, after acquiring the face image of each user to be unlocked within the preset range, the method further includes: judging whether a face identifier corresponding to the face image is stored or not; if the facial identifier corresponding to the facial image is stored, acquiring at least one facial identifier of the user to be unlocked from the local storage device, and if not, calculating a facial feature value.
According to the technical means, the facial marker can be stored locally, repeated facial feature value calculation is not needed, and calculation force is saved.
An embodiment of a second aspect of the present application provides a control device for a trunk of an automobile, including: the acquisition module is used for acquiring face images of each user to be unlocked within a preset range; the first calculation module is used for calculating the facial feature value of each user to be unlocked according to the facial image of each user to be unlocked and generating the facial mark of each user to be unlocked according to the facial feature value of each user to be unlocked; and the first control module is used for sending the facial identifier of each user to be unlocked to the server, receiving a matching result obtained by the server by searching in a preset login certificate database by utilizing the facial identifier, and opening a trunk of the vehicle when the matching result is matching.
Optionally, in one embodiment of the present application, further includes: the first acquisition module is used for acquiring face images of the user which can be unlocked; the second calculation module is used for calculating the facial feature value of the user capable of unlocking according to the facial image of the user capable of unlocking; and the association module is used for generating the facial mark of the user capable of unlocking according to the facial feature value, sending the facial mark to the server so that the server generates an associated login certificate with the facial mark, and storing the encrypted associated login certificate into a preset login certificate database.
Optionally, in one embodiment of the present application, further includes: the first detection module is used for detecting whether the current state of the vehicle meets a preset trunk opening condition or not; and the second control module is used for controlling the vehicle to enter a face image scanning mode when the vehicle is detected to meet the preset trunk opening condition.
Optionally, in one embodiment of the present application, further includes: the second acquisition module is used for acquiring the duration time of at least one user in the preset range; and the judging module is used for judging that the at least one user is the user to be unlocked when the continuous direct current time is greater than or equal to the preset time length.
Optionally, in one embodiment of the present application, further includes: the second detection module is used for detecting whether the vehicle starts a face opening function of the trunk of the automobile or not; and the third control module is used for allowing the trunk to be opened when the matching result is matching when the face opening function is detected to be opened.
Optionally, in one embodiment of the present application, further includes: the judging module is used for judging whether the face identification corresponding to the face image is stored or not; and the matching module is used for acquiring at least one facial identifier of the user to be unlocked from the local storage equipment when the facial identifier corresponding to the facial image is stored, and otherwise, calculating the facial feature value.
An embodiment of a third aspect of the present application provides a vehicle including: the control system comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor executes the program to realize the control method of the automobile trunk as described in the embodiment.
A fourth aspect of the present application provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements a method of controlling a trunk of a vehicle as above.
The embodiment of the application has the beneficial effects that:
(1) According to the embodiment of the application, the facial identification of each user to be unlocked can be obtained according to the facial image of the user to be unlocked, and then the matching of the login certificate database is carried out based on the server, and when the matching result is the matching, the trunk of the vehicle is opened, so that the contactless unlocking of the trunk is realized, and meanwhile, the risk of local leakage of the facial information of the user can be avoided;
(2) According to the embodiment of the application, the frequency of capturing the face can be reduced by recognizing the face information of the user in a non-inductive way, meanwhile, the environment interference is overcome, the trunk of the automobile is unlocked more simply and quickly, the use experience of the user is greatly improved, and the intelligent level of the vehicle is improved.
Additional aspects and advantages of the application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the application.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative and intended to explain the present application and should not be construed as limiting the application.
The following describes a control method, a device, a vehicle and a storage medium of an automobile trunk according to an embodiment of the present application with reference to the accompanying drawings. Aiming at the technical problems that in the related technology mentioned in the background technology center, the anti-interference capability is poor, frequent image capturing and judging are needed, the power consumption is high, the service life of equipment is influenced, and meanwhile, the risk of user information leakage exists, the application provides a control method of an automobile trunk. Therefore, the technical problems that in the related technology, the anti-interference capability is poor, frequent image capturing and judging are needed, the power consumption is high, the service life of equipment is influenced, and meanwhile, the risk of user information leakage exists are solved.
Specifically, fig. 1 is a schematic flow chart of a control method of an automobile trunk according to an embodiment of the present application.
As shown in fig. 1, the control method of the trunk of the automobile comprises the following steps:
In step S101, face images of each user to be unlocked within a preset range are acquired.
In the actual implementation process, the face image of each user to be unlocked in the preset range can be acquired through the acquisition device, such as a camera, wherein the preset range can be set correspondingly by a person skilled in the art according to the size of a vehicle type, the precision of the acquisition device, the environment where the vehicle is located, such as the distance between a trunk and a wall of the vehicle, and the like, and the embodiment of the application is not limited in detail.
Optionally, in one embodiment of the present application, before acquiring the person image of each user to be unlocked within the preset range, the method further includes: detecting whether the current state of the vehicle meets a preset trunk opening condition; and when the vehicle is detected to meet the preset trunk opening condition, controlling the vehicle to enter a face image scanning mode.
As a possible implementation manner, the embodiment of the application can detect whether the current state of the vehicle meets the preset trunk opening condition, for example, by using the acquisition device, the camera or the radar, determine the distance between the vehicle and the rear obstacle, and when the distance between the vehicle and the rear obstacle allows the trunk to be opened, control the vehicle to enter the face image scanning mode, thereby avoiding meaningless recognition by the acquisition device and causing overhigh power consumption.
Optionally, in one embodiment of the present application, before acquiring the face image of each user to be unlocked within the preset range, the method further includes: acquiring the duration time of at least one user in a preset range; and when the continuous direct current time is greater than or equal to the preset time length, judging that at least one user is the user to be unlocked.
In some embodiments, because there may be a situation that a person passes behind the vehicle when the vehicle is parked, in order to avoid frequent invalid recognition, the embodiments of the present application may acquire a duration of at least one user in a preset range based on the acquisition device, and determine that the at least one user is a user to be unlocked when the duration of the direct current is greater than or equal to a preset duration, thereby reducing a probability of false recognition caused by pedestrian interference and reducing a frequency of capturing a face.
It should be noted that the preset duration may be set by the vehicle owner or a person skilled in the art according to the actual situation, which is not particularly limited herein.
Optionally, in one embodiment of the present application, before acquiring the person image of each user to be unlocked within the preset range, the method further includes: detecting whether a vehicle starts a face starting function of an automobile trunk or not; when the face opening function is detected to be started, the trunk is allowed to be started when the matching result is that the face is matched.
In the actual execution process, the embodiment of the application can allow the automobile trunk to be opened when the matching result is matched after the automobile starts the face opening function of the automobile trunk, thereby avoiding frequent recognition of the acquisition equipment or invalid recognition, resulting in overhigh power consumption and saving electric quantity.
Optionally, in one embodiment of the present application, after acquiring a face image of each user to be unlocked within a preset range, the method further includes: judging whether a face identifier corresponding to the face image is stored or not; if the facial identifier corresponding to the facial image is stored, acquiring at least one facial identifier of the user to be unlocked from the local storage device, otherwise, calculating a facial feature value.
Specifically, after face images of each user to be unlocked within a preset range are collected, face identification retrieval associated with the face images of the user can be carried out in local vehicle-mounted terminal data, and when the associated face identification is retrieved at the local vehicle-mounted terminal, the face identification can be extracted, so that the follow-up cloud uploading is facilitated to carry out login certificate generation; otherwise, when the associated face identification is not retrieved, the embodiment of the application can calculate the face characteristic value aiming at the collected face image of the user, thereby being convenient for generating the face identification subsequently.
In step S102, a facial feature value of each user to be unlocked is calculated according to the facial image of each user to be unlocked, and a facial identifier of each user to be unlocked is generated according to the facial feature value of each user to be unlocked.
As a possible implementation manner, the embodiment of the application can convert the face image into the face feature value through the face recognition model after acquiring the face image of each user to be unlocked, generate the face identification of each user to be unlocked according to the face feature value of each user to be unlocked, and store the generated face identification in the local vehicle-mounted terminal after associating the generated face identification with the face image of the user to be unlocked.
In the embodiment of the application, the Face identifier can be defined as the Face ID, so that the identity of the user to be unlocked can be identified through the Face ID.
In step S103, the facial identifier of each user to be unlocked is sent to the server, the matching result obtained by the server searching in the preset login certificate database by using the facial identifier is received, and when the matching result is matching, the trunk of the vehicle is opened.
In some embodiments, the method and the device can search the locally stored facial identifiers after obtaining the facial identifiers of each user to be unlocked, further generate a login request, send the facial identifiers of each user to be unlocked to a server, and after receiving the login request, the server can generate a special login certificate and send the special login certificate to the vehicle-mounted terminal to be matched with the locally stored corresponding facial identifier login certificate, and the terminal initiates an instruction for opening the trunk of the vehicle.
The server can be an intelligent vehicle cloud platform.
Optionally, in one embodiment of the present application, before sending the facial identifier of each user to be unlocked to the server, the method further includes: acquiring a face image of an unlockable user; calculating a face characteristic value of the user capable of being unlocked according to the face image of the user capable of being unlocked; generating a face mark of an unlockable user according to the face characteristic value, sending the face mark to a server, enabling the server to generate a login certificate associated with the face mark, and storing the encrypted associated login certificate into a preset login certificate database.
It may be understood that before the face identification of the user to be unlocked is matched, the embodiment of the application may perform face identification of the user to be unlocked, for example, the user may log in the vehicle-mounted terminal when performing authentication, perform face identification authentication, the vehicle-mounted terminal may acquire a face image of the target user through the front-mounted camera, convert the face image into a face feature value through the face identification model, generate a face identification according to the face feature value, the terminal may bind the user information with the face identification, thereby generating the face identification of the user to be unlocked, store the face identification in the local terminal, upload the face identification to the server, store the face identification of the user after receiving the face identification of the user, generate a face identification association login certificate, and store the face identification association login certificate in a preset login certificate database after encrypting, so as to reduce the probability of information leakage of the user.
It should be noted that the preset login certificate database may be set by those skilled in the art according to actual situations, and is not limited herein.
The working principle of the control method of the trunk of the automobile according to the embodiment of the application will be described in detail with reference to fig. 2.
As shown in fig. 2, taking the intelligent vehicle cloud platform as an example of a server, the embodiment of the application may include the following steps:
s1: user authentication
In order to realize accurate and rapid non-inductive identification face unlocking trunk technology, the embodiment of the application can complete the mapping identification of the user identity according to FaceID and login certificate retrieval and complete the vehicle relation, and authenticate the user.
When a user authenticates, the user can log in the vehicle-mounted terminal, a FaceID registration page is found for authentication, the vehicle-mounted terminal can acquire a face image of a target user through the front-facing camera, the face image is converted into a face characteristic value through the face recognition model, faceID capable of unlocking the user is generated according to the face characteristic value, the terminal can bind the user information with FaceID information, the information is stored in the vehicle-mounted terminal, faceID information is uploaded to the intelligent vehicle cloud platform, a special login certificate is generated through encryption, and the special login certificate is stored.
S2: the vehicle-mounted terminal acquires the relationship between the person and the vehicle
After the real-name authentication of the target vehicle is completed, the vehicle-mounted flow is obtained, and the network connection with the intelligent vehicle cloud platform is successfully established, the vehicle-mounted terminal can send an instruction for obtaining the certificate ID to the intelligent vehicle cloud platform through uploading face information of the user, the intelligent vehicle cloud platform can search the vehicle information of the target vehicle, search all FaceID bound with the vehicle according to the request information and the vehicle information and send the vehicle information to the vehicle-mounted terminal, and the vehicle-mounted terminal encrypts and stores FaceID of the corresponding user and a special login certificate.
S3: non-inductive identification of user face information
After the user completes authentication, the trunk camera of the embodiment of the application can comprise a low power consumption and a normal mode, and the trunk camera is set to be a non-sensing mode by default, wherein the non-sensing mode is characterized in that: the vehicle-mounted trunk camera is in a closed state and still has the capability of scanning the face of a user; the normal mode is a default on scan mode.
When the vehicle-mounted trunk camera is in a non-sensing mode, and a user is in a preset range (such as within 3 m) of the vehicle-mounted trunk camera, the vehicle-mounted terminal can capture face information of the user to be unlocked through the trunk camera, convert the face information into a face characteristic value through a face recognition model, acquire FaceID of the captured user according to the face characteristic value, perform local retrieval, further initiate a login request to the intelligent vehicle cloud platform, generate a special login certificate after the intelligent vehicle cloud platform receives the login request, send the special login certificate to the vehicle-mounted terminal to match with a corresponding FaceID login certificate stored locally, and open the vehicle trunk after matching is completed.
S4: instruction opens vapour car trunk
The terminal can initiate the instruction of opening the car trunk to the car controller, and the car controller sends drive signal to driving motor, and driving motor received drive signal drives the hydraulic stem that struts the trunk door and rotates forward, opens the trunk door.
According to the control method of the automobile trunk provided by the embodiment of the application, the face identification of each user to be unlocked can be obtained according to the face image of the user to be unlocked, the login certificate database is matched based on the server, and when the matching result is that the login certificate database is matched, the automobile trunk of the automobile is opened, so that the contactless unlocking of the trunk is realized, the intelligent level of the automobile is increased, and the risk of local leakage of the face information of the user can be avoided. Therefore, the technical problems that in the related technology, the anti-interference capability is poor, frequent image capturing and judging are needed, the power consumption is high, the service life of equipment is influenced, and meanwhile, the risk of user information leakage exists are solved.
Next, a control device for a trunk of an automobile according to an embodiment of the present application will be described with reference to the accompanying drawings.
Fig. 3 is a block diagram schematically illustrating a control apparatus for a trunk of an automobile according to an embodiment of the present application.
As shown in fig. 3, the control device 10 of the automobile trunk includes: the system comprises an acquisition module 100, a first calculation module 200 and a first control module 300.
Specifically, the acquisition module 100 is configured to acquire a face image of each user to be unlocked within a preset range.
The first calculating module 200 is configured to calculate a facial feature value of each user to be unlocked according to a facial image of each user to be unlocked, and generate a facial identifier of each user to be unlocked according to the facial feature value of each user to be unlocked.
The first control module 300 is configured to send a facial identifier of each user to be unlocked to the server, receive a matching result obtained by the server by searching in a preset login certificate database using the facial identifiers, and open a trunk of the vehicle when the matching result is matching.
Optionally, in one embodiment of the present application, the control device 10 for a trunk of a vehicle further includes: the device comprises a first acquisition module, a second calculation module and an association module.
The first acquisition module is used for acquiring face images of the unlockable user.
And the second calculation module is used for calculating the face characteristic value of the unlockable user according to the face image of the unlockable user.
And the association module is used for generating a face identifier of the user capable of being unlocked according to the face characteristic value, sending the face identifier to the server, enabling the server to generate an associated login certificate with the face identifier, and storing the encrypted associated login certificate into a preset login certificate database.
Optionally, in one embodiment of the present application, the control device 10 for a trunk of a vehicle further includes: the device comprises a first detection module and a second control module.
The first detection module is used for detecting whether the current state of the vehicle meets the preset trunk opening condition.
And the second control module is used for controlling the vehicle to enter a face image scanning mode when the vehicle is detected to meet the preset trunk opening condition.
Optionally, in one embodiment of the present application, the control device 10 for a trunk of a vehicle further includes: and the second acquisition module and the judgment module.
The second acquisition module is used for acquiring the duration time of at least one user in a preset range.
And the judging module is used for judging that at least one user is the user to be unlocked when the continuous direct current time is greater than or equal to the preset time length.
Optionally, in one embodiment of the present application, the control device 10 for a trunk of a vehicle further includes: the system comprises a second detection module and a third control module.
The second detection module is used for detecting whether the vehicle starts a face opening function of the trunk or not.
And the third control module is used for allowing the trunk to be opened when the matching result is matching when the face opening function is detected to be opened.
Optionally, in one embodiment of the present application, the control device 10 for a trunk of a vehicle further includes: the device comprises a judging module and a matching module.
The judging module is used for judging whether the face identification corresponding to the face image is stored or not.
And the matching module is used for acquiring at least one facial identifier of the user to be unlocked from the local storage equipment when the facial identifier corresponding to the facial image is stored, and otherwise, calculating the facial feature value.
It should be noted that the foregoing explanation of the embodiment of the control method of the trunk is also applicable to the control device of the trunk of the embodiment, and will not be repeated here.
According to the control device for the automobile trunk provided by the embodiment of the application, the face identification of each user to be unlocked can be obtained according to the face image of the user to be unlocked, the login certificate database is matched based on the server, and when the matching result is that the login certificate database is matched, the automobile trunk of the automobile is opened, so that the contactless unlocking of the trunk is realized, the intelligent level of the automobile is increased, and the risk of local leakage of the face information of the user can be avoided. Therefore, the technical problems that in the related technology, the anti-interference capability is poor, frequent image capturing and judging are needed, the power consumption is high, the service life of equipment is influenced, and meanwhile, the risk of user information leakage exists are solved.
Fig. 4 is a schematic structural diagram of a vehicle according to an embodiment of the present application. The vehicle may include:
memory 401, processor 402, and a computer program stored on memory 401 and executable on processor 402.
The processor 402 implements the control method of the trunk provided in the above embodiment when executing a program.
Further, the vehicle further includes:
A communication interface 403 for communication between the memory 401 and the processor 402.
A memory 401 for storing a computer program executable on the processor 402.
Memory 401 may comprise high-speed RAM memory or may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
If the memory 401, the processor 402, and the communication interface 403 are implemented independently, the communication interface 403, the memory 401, and the processor 402 may be connected to each other by a bus and perform communication with each other. The bus may be an industry standard architecture (Industry Standard Architecture, abbreviated ISA) bus, an external device interconnect (PERIPHERAL COMPONENT, abbreviated PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, abbreviated EISA) bus, among others. The buses may be divided into address buses, data buses, control buses, etc. For ease of illustration, only one thick line is shown in fig. 4, but not only one bus or one type of bus.
Alternatively, in a specific implementation, if the memory 401, the processor 402, and the communication interface 403 are integrated on a chip, the memory 401, the processor 402, and the communication interface 403 may complete communication with each other through internal interfaces.
Processor 402 may be a central processing unit (Central Processing Unit, abbreviated as CPU), or an Application SPECIFIC INTEGRATED Circuit (ASIC), or one or more integrated circuits configured to implement embodiments of the application.
The embodiment of the application also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the method for controlling a trunk of a vehicle as above.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or N embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present application, "N" means at least two, for example, two, three, etc., unless specifically defined otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and additional implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order from that shown or discussed, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the embodiments of the present application.
Logic and/or steps represented in the flowcharts or otherwise described herein, e.g., a ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or N wires, a portable computer cartridge (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). In addition, the computer readable medium may even be paper or other suitable medium on which the program is printed, as the program may be electronically captured, via optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It is to be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the N steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, may be implemented using any one or combination of the following techniques, as known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like.
Those of ordinary skill in the art will appreciate that all or a portion of the steps carried out in the method of the above-described embodiments may be implemented by a program to instruct related hardware, where the program may be stored in a computer readable storage medium, and where the program, when executed, includes one or a combination of the steps of the method embodiments.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing module, or each unit may exist alone physically, or two or more units may be integrated in one module. The integrated modules may be implemented in hardware or in software functional modules. The integrated modules may also be stored in a computer readable storage medium if implemented in the form of software functional modules and sold or used as a stand-alone product.
The above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, or the like. While embodiments of the present application have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the application, and that variations, modifications, alternatives and variations may be made to the above embodiments by one of ordinary skill in the art within the scope of the application.