Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that "/" in this context means "or", for example, A/B may mean A or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. "plurality" means two or more than two.
It should be noted that, in the embodiments of the present invention, words such as "exemplary" or "for example" are used to indicate examples, illustrations or explanations. Any embodiment or design described as "exemplary" or "e.g.," an embodiment of the present invention is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
In a scenario where a user needs to perform privacy protection on content in an interface (recorded as an interface to be protected) displayed last before a screen is locked by the terminal, the privacy content in the protected interface or all content in the interface to be protected may not be displayed after the screen is unlocked by the terminal, so as to perform privacy protection on the content in the interface to be protected.
The terminal in the embodiment of the present invention may be a terminal having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present invention are not limited in particular.
The following describes a software environment applied by the method for protecting privacy according to the embodiment of the present invention, taking an android operating system as an example.
Fig. 1 is a schematic diagram of an architecture of a possible android operating system according to an embodiment of the present invention. In fig. 1, the architecture of the android operating system includes 4 layers, which are respectively: an application layer, an application framework layer, a system runtime layer, and a kernel layer (specifically, a Linux kernel layer).
The application program layer comprises various application programs (including system application programs and third-party application programs) in an android operating system.
The application framework layer is a framework of the application, and a developer can develop some applications based on the application framework layer under the condition of complying with the development principle of the framework of the application. For example, applications such as a system setup application, a system chat application, and a system camera application. And the third-party setting application, the third-party camera application, the third-party chatting application and other application programs.
The system runtime layer includes libraries (also called system libraries) and android operating system runtime environments. The library mainly provides various resources required by the android operating system. The android operating system running environment is used for providing a software environment for the android operating system.
The kernel layer is an operating system layer of an android operating system and belongs to the bottommost layer of an android operating system software layer. The kernel layer provides kernel system services and hardware-related drivers for the android operating system based on the Linux kernel.
Taking an android operating system as an example, in the embodiment of the present invention, a developer may develop a software program for implementing the method for protecting privacy, which is provided by the embodiment of the present invention, based on the system architecture of the android operating system shown in fig. 1, so that the method for protecting privacy may run based on the android operating system shown in fig. 1. Namely, the processor or the terminal device can implement the method for protecting privacy provided by the embodiment of the invention by running the software program in the android operating system.
The following describes the method for protecting privacy according to an embodiment of the present invention in detail with reference to the flowchart of the method for protecting privacy shown in fig. 2. Wherein, although a logical order of methods of protecting privacy provided by embodiments of the present invention is shown in a method flow diagram, in some cases, the steps shown or described may be performed in an order different than here. For example, the method of protecting privacy illustrated in fig. 2 may include S201 and S202:
s201, under the condition that the terminal is in a screen locking state, the terminal receives input of target password information.
Specifically, the input may be an unlocking operation for unlocking the screen by the user, and the target password information is input by the user through the unlocking operation.
Optionally, the terminal provided in the embodiment of the present invention is in a screen lock state, which may be a state where the terminal is in a screen lock interface display state. The screen locking interface can prompt a user of a screen unlocking mode of the terminal, such as unlocking modes of biological characteristic information, character password information, image password information or key password information. The biometric information may be fingerprint information of a user, face feature information, or iris feature information of a human eye, and the like, which is not limited in the embodiment of the present invention.
Optionally, the terminal provided in the embodiment of the present invention is in a screen lock state, which may be that a screen of the terminal is in a screen off state. At this time, the mode of the terminal to unlock the screen may be biometric information or key password information.
It should be noted that, in the first application scenario of the embodiment of the present invention, the preset password information may include preset unlocking password information, where the preset unlocking password information is used to instruct the terminal to unlock the screen.
The target password information may include biometric information, character password information, image password information, or key password information input by a user.
Similarly, the preset password information (e.g., the preset unlocking password information) may include preset biometric information, preset character password information, preset image password information, or key password information.
Of course, the preset unlocking password information may further include information indicating a start position and/or a movement trajectory of the preset unlocking operation.
Similarly, the target password information may further include information indicating a start position and/or a movement trajectory of the unlocking operation input by the user.
In the following, the method for protecting privacy provided by the embodiment of the present invention is described by taking an example that the preset unlocking password information includes preset face feature information.
The unlocking operation of the user can be the operation of controlling the camera of the terminal to move, so that the terminal can acquire the face feature information of the user through the camera, and the target password information comprises the face feature information.
At this time, the target password information conforms to the preset password information, that is, the target password information conforms to the preset unlocking password information. Specifically, the face feature information included in the target password information conforms to the face biometric feature information in the preset unlocking password information.
It should be noted that, when one piece of face feature information conforms to another piece of face feature information, it means that the two pieces of face feature information are the same, or the similarity between the two pieces of face feature information is higher than a certain threshold.
It should be noted that, in the method for protecting privacy provided in the embodiment of the present invention, description of other preset unlocking password information may refer to the above description of the preset unlocking password information including the preset face feature information, and details are not described in the embodiment of the present invention.
In addition, the terminal provided by the embodiment of the invention can be provided with a touch screen and a fingerprint identifier. The operation (i.e., the unlocking operation) for inputting the target password information to the terminal by the user may be a touch screen operation or a fingerprint operation. The touch screen operation may be touch operations such as a pressing operation, a long pressing operation, a sliding operation, a clicking operation, a floating operation (an operation of a user near the touch screen) and the like of the touch screen of the terminal by the user; the fingerprint operation can be fingerprint operation such as sliding fingerprint, long-time pressing fingerprint, single-click fingerprint and double-click fingerprint of the fingerprint identifier of the terminal by the user. Specifically, the unlocking operation mode in the embodiment of the present invention is not limited, and may be any realizable mode.
S202, if the target password information accords with the preset password information, the terminal unlocks the screen and displays a target interface.
Specifically, the target interface may be an interface other than the interface to be protected in the interface of the terminal, or the target interface is an interface after the interface to be protected is subjected to the fuzzy processing, and the interface to be protected is an interface displayed last before the terminal locks the screen. For example, the interface to be protected is an interface of a desktop or a foreground running application program when the terminal locks a screen.
The target password information accords with preset password information, and the fact that a user who carries out unlocking operation on the terminal currently has the authority of unlocking the terminal is indicated.
It can be understood that the interface displayed last before the terminal locks the screen may include the user's privacy information, that is, the interface to be protected may include the user's privacy information. The private information of the user may include a private picture, a private video, a private text, or a private application program. For example, the privacy text is an amount that can be an account number of the user, and the like.
Specifically, when all the contents in the interface to be protected include the privacy information of the user, the target interface may be an interface other than the interface to be protected in the interface of the terminal; and when part of content in the interface to be protected contains the privacy information of the user, the target interface is the interface subjected to fuzzy processing on the interface to be protected.
Optionally, the terminal performs fuzzy processing on the interface to be protected, and may perform scrambling processing or mosaic-like fuzzy processing on the content containing the privacy information in the interface to be protected.
Exemplarily, as shown in fig. 3, a schematic diagram of an interface displayed by a terminal according to an embodiment of the present invention is provided.Interface 301 in fig. 3 shows the interface displayed last beforeterminal 30 locks the screen, andinterface 301 is the interface of application 1. Theinterface 302 in fig. 3 is the interface displayed first after the terminal 30 unlocks the screen, and theinterface 302 is the desktop of the terminal 30. Obviously, theinterface 302 displayed by the terminal 30 after unlocking the screen is not the interface of the application 1, that is, the content in theinterface 301 is not included in theinterface 302.
It should be noted that, with the method for protecting privacy provided in the embodiment of the present invention, when the terminal unlocks the screen, the interface displayed last before the terminal locks the screen (i.e., the interface to be protected) may be processed, so that the interface displayed after the terminal unlocks the screen is an interface other than the interface to be protected in the interface of the terminal, or an interface after the interface to be protected is subjected to the fuzzy processing; therefore, the interface displayed first after the terminal unlocks the screen does not contain the privacy information of the user. Therefore, the problem that privacy of a user is leaked when the terminal unlocks the screen can be solved.
In a possible implementation manner, in a second application scenario of the method for protecting privacy provided in the embodiment of the present invention, the preset password information may include preset unlocking password information and preset additional password information. The additional encryption information is used for indicating the terminal to display the target interface after unlocking the screen.
It is understood that the additional encryption information may also include preset biometric information, preset character password information, preset image password information, or key password information. Of course, the preset additional password information may further include information indicating a start position and/or a movement track of an operation (denoted as an operation of turning on the privacy) of inputting the additional password information by the user.
It is emphasized that the preset unlocking password information and the preset additional password information are different.
Illustratively, the preset additional password information provided by the embodiment of the present invention includes information indicating a double-click operation of the volume up key by the user. Similarly, the target password information may further include information indicating a double-click operation of the volume up key by the user.
It is to be understood that the user's unlocking operation and privacy-opening operation indicated in the target password information may be input by the user at the same time, or may be input by the user separately within a time period less than a certain time threshold.
In the second application scenario provided in the embodiment of the present invention, when the target password information received from the user conforms to the preset password information, the terminal may first display the target interface after unlocking the screen subsequently.
It should be noted that, in the second application scenario provided in the embodiment of the present invention, when the unlocking password information received by the terminal conforms to the preset unlocking password information and the received additional password information conforms to the preset additional password information, the terminal may first display a target interface that does not include the privacy information of the user after the subsequent unlocking screen. And when the unlocking password information received by the terminal accords with the preset unlocking password information and additional password information input by a user is not received, the terminal firstly displays the interface displayed last before the terminal locks the screen after the subsequent unlocking screen without processing the interface. Therefore, unnecessary operation when the terminal unlocks the screen can be avoided, and the flexibility of protecting the privacy of the user when the terminal unlocks the screen is improved.
In a possible implementation manner, the interface to be protected is an interface in a target application, and at this time, the target application is an application that runs in the foreground when the terminal locks the screen. Specifically, S202 provided in the above embodiment may be replaced with S202 a:
s202a, if the target password information accords with the preset password information and the target application program accords with the preset application program, the terminal unlocks the screen and displays the target interface.
It should be noted that the type of the preset application program may be a chat type, a payment type, or a game type. In addition, the identifier of the preset application program is in a preset white list.
The preset white list may be set by a user through a system in the terminal or by a third party in the terminal. Wherein, the identifier of a preset application program can uniquely indicate the preset application program.
Optionally, the preset white list may be obtained by the terminal from a network side, for example, obtained from a server.
It should be noted that, with the method for protecting privacy provided by the embodiment of the present invention, the terminal can determine whether the application program running in the foreground when the screen of the terminal is locked is the application program that the user needs to protect privacy. Therefore, the terminal avoids processing the application program which does not need privacy protection when the screen is subsequently unlocked, unnecessary operation when the screen is unlocked by the terminal can be avoided, and the flexibility of protecting the privacy of the user when the screen is unlocked by the terminal is further improved.
In a possible implementation manner, the target interface may be a desktop of the terminal. Specifically, the method for protecting privacy provided by the embodiment of the present invention may further include, after S201 and before S202, S203 or S203a, or may further include, after S201 and before S202a, S203 or S203 a:
and S203, the terminal closes the target application program.
And S203a, the terminal switches the target application program to a background to run.
It can be understood that after the terminal closes the target application program or switches the target application program to background operation, the target interface is a desktop, and the desktop does not include all contents in the interface of the target application program.
In addition, the target interface may be an interface of the interface to be protected after the fuzzy processing. Specifically, the method for protecting privacy provided by the embodiment of the present invention may further include, after S201 and before S202, S203b, or may further include, after S201 and before S202a, S203 b:
and S203b blurring the interface to be protected by the terminal.
It is understood that S203, S203a and S203b provided in the embodiment of the present invention may be respectively a processing rule. For example, "the terminal closes the target application" is recorded as processing rule 1, "the terminal switches the target application to the background operation" is recorded as processing rule 2, and "the terminal fuzzily processes the interface to be protected" is recorded as processing rule 3.
Optionally, the terminal may set a preset application program according to the type of the application program and the identifier of the application program, and may set a preset processing rule for each preset application program.
Optionally, the preset application programs with the same type correspond to the same processing rule; alternatively, a predetermined application corresponds to a processing rule.
For example, the preset application program of the chat type corresponds to the processing rule 2, and the preset application program of the payment type corresponds to the processing rule 3. The preset application identified as "bank a" corresponds to the above processing rule 1.
It should be noted that, with the method for protecting privacy provided in the embodiment of the present invention, since the terminal can support the user to set different processing rules for different application programs, when the terminal subsequently unlocks the screen, the terminal can process the program according to the processing rules preset by the user, and after unlocking the screen, the terminal first displays the interface that is finally displayed before locking the screen. Therefore, the flexibility of protecting the privacy of the user when the terminal unlocks the screen can be further improved.
In a possible implementation manner, the method for protecting privacy provided by the embodiment of the present invention may further include, after the step S201, step S204:
and S204, if the target password information accords with the preset password information and the target application program does not accord with the preset application program, the terminal unlocks the screen and displays an interface to be protected.
It is understood that the target application does not conform to the preset application, indicating that the target application is not a program for which privacy protection is required by the user.
Therefore, according to the method for protecting privacy provided by the embodiment of the invention, when the application program running in the foreground is not a program which requires privacy protection for the user when the screen is locked by the terminal, the terminal does not need to process the application program, and can firstly display the interface displayed last before the screen is locked by the terminal after the screen is unlocked. Therefore, the flexibility of protecting the privacy of the user when the terminal unlocks the screen can be further improved.
Fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention. The terminal 40 shown in fig. 4 includes: a receivingmodule 401 and adisplay module 402; areceiving module 401, configured to receive input of target password information when the terminal 40 is in a screen lock state; adisplay module 402, configured to unlock the screen and display a target interface if the target password information received by the receivingmodule 401 meets preset password information, where the target interface is an interface other than the interface to be protected in the interface of the terminal 40, or the target interface is an interface after the interface to be protected is subjected to the fuzzy processing, and the interface to be protected is an interface displayed last before the terminal 40 locks the screen.
Optionally, the preset password information includes preset unlocking password information and preset additional password information; the preset unlocking password information is used for indicating the terminal 40 to unlock the screen, and the additional password information is used for indicating the terminal 40 to display a target interface behind the unlocking screen.
Optionally, the interface to be protected is an interface in the target application program; thedisplay module 402 is specifically configured to unlock the screen and display a target interface if the target password information received by the receivingmodule 401 matches the preset password information and the target application program matches the preset application program.
Optionally, the target interface is a desktop of the terminal 40; the terminal 40 further includes: a processing module 403; and the processing module 403 is configured to close the target application program or switch the target application program to a background operation before thedisplay module 402 unlocks the screen and displays the target interface.
Optionally, thedisplay module 402 is further configured to, after thereceiving module 401 receives the input of the target password information, if the target password information conforms to the preset password information and the target application program does not conform to the preset application program, unlock the screen and display the interface to be protected by the terminal 40.
According to the terminal provided by the embodiment of the invention, because the terminal can process the interface (namely the interface to be protected) displayed last before the terminal locks the screen when the screen is unlocked, the interface displayed after the terminal unlocks the screen is the interface except the interface to be protected in the interface of the terminal or the interface after the interface to be protected is subjected to fuzzy processing; therefore, the interface displayed first after the terminal unlocks the screen does not contain the privacy information of the user. Therefore, the problem that privacy of a user is leaked when the terminal unlocks the screen can be solved. The terminal 30 and the terminal 40 provided in the embodiments of the present invention can implement each process implemented by the terminal in the above-described method embodiments, and are not described herein again to avoid repetition.
Fig. 5 is a schematic diagram of a hardware structure of a terminal according to an embodiment of the present invention, where the terminal 100 includes, but is not limited to:radio frequency unit 101,network module 102,audio output unit 103,input unit 104,sensor 105,display unit 106,user input unit 107,interface unit 108,memory 109,processor 110, and power supply 111. Those skilled in the art will appreciate that the terminal configuration shown in fig. 5 is not intended to be limiting, and that the terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
Theuser input unit 107 is configured to receive input of target password information when the terminal 100 is in the screen lock state; thedisplay unit 106 is configured to unlock the screen and display a target interface if the target password information received by theuser input unit 107 meets preset password information, where the target interface is an interface other than the interface to be protected in the interface of the terminal 100, or the target interface is an interface after the interface to be protected is subjected to the fuzzy processing, and the interface to be protected is an interface displayed last before the terminal 100 locks the screen.
According to the terminal provided by the embodiment of the invention, because the terminal can process the interface (namely the interface to be protected) displayed last before the terminal locks the screen when the screen is unlocked, the interface displayed after the terminal unlocks the screen is the interface except the interface to be protected in the interface of the terminal or the interface after the interface to be protected is subjected to fuzzy processing; therefore, the interface displayed first after the terminal unlocks the screen does not contain the privacy information of the user. Therefore, the problem that privacy of a user is leaked when the terminal unlocks the screen can be solved.
It should be understood that, in the embodiment of the present invention, theradio frequency unit 101 may be used for receiving and sending signals during a message transmission or call process, and specifically, after receiving downlink data from a base station, the downlink data is processed by theprocessor 110; in addition, the uplink data is transmitted to the base station. Typically,radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, theradio frequency unit 101 can also communicate with a network and other devices through a wireless communication system.
The terminal provides wireless broadband internet access to the user through thenetwork module 102, such as helping the user send and receive e-mails, browse web pages, access streaming media, and the like.
Theaudio output unit 103 may convert audio data received by theradio frequency unit 101 or thenetwork module 102 or stored in thememory 109 into an audio signal and output as sound. Also, theaudio output unit 103 may also provide audio output related to a specific function performed by the terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). Theaudio output unit 103 includes a speaker, a buzzer, a receiver, and the like.
Theinput unit 104 is used to receive an audio or video signal. Theinput Unit 104 may include a Graphics Processing Unit (GPU) 1041 and amicrophone 1042, and theGraphics processor 1041 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on thedisplay unit 106. The image frames processed by thegraphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via theradio frequency unit 101 or thenetwork module 102. Themicrophone 1042 may receive sound and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via theradio frequency unit 101 in case of a phone call mode.
The terminal 100 also includes at least onesensor 105, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of thedisplay panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off thedisplay panel 1061 and/or a backlight when the terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; thesensors 105 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
Thedisplay unit 106 is used to display information input by a user or information provided to the user. TheDisplay unit 106 may include aDisplay panel 1061, and theDisplay panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
Theuser input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal. Specifically, theuser input unit 107 includes atouch panel 1071 andother input devices 1072.Touch panel 1071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 1071 (e.g., operations by a user on or neartouch panel 1071 using a finger, stylus, or any suitable object or attachment). Thetouch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to theprocessor 110, and receives and executes commands sent by theprocessor 110. In addition, thetouch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to thetouch panel 1071, theuser input unit 107 may includeother input devices 1072. Specifically,other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, thetouch panel 1071 may be overlaid on thedisplay panel 1061, and when thetouch panel 1071 detects a touch operation thereon or nearby, thetouch panel 1071 transmits the touch operation to theprocessor 110 to determine the type of the touch event, and then theprocessor 110 provides a corresponding visual output on thedisplay panel 1061 according to the type of the touch event. Although in fig. 5, thetouch panel 1071 and thedisplay panel 1061 are two independent components to implement the input and output functions of the terminal, in some embodiments, thetouch panel 1071 and thedisplay panel 1061 may be integrated to implement the input and output functions of the terminal, and is not limited herein.
Theinterface unit 108 is an interface for connecting an external device to the terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. Theinterface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the terminal 100 or may be used to transmit data between the terminal 100 and the external device.
Thememory 109 may be used to store software programs as well as various data. Thememory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, thememory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
Theprocessor 110 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by operating or executing software programs and/or modules stored in thememory 109 and calling data stored in thememory 109, thereby performing overall monitoring of the terminal.Processor 110 may include one or more processing units; preferably, theprocessor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into theprocessor 110.
The terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to theprocessor 110 through a power management system, so as to manage charging, discharging, and power consumption management functions through the power management system.
In addition, the terminal 100 includes some functional modules that are not shown, and thus, the detailed description thereof is omitted.
Preferably, an embodiment of the present invention further provides a terminal, which includes aprocessor 110, amemory 109, and a computer program stored in thememory 109 and capable of running on theprocessor 110, where the computer program is executed by theprocessor 110 to implement the processes of the foregoing method embodiments, and can achieve the same technical effects, and details are not repeated here to avoid repetition.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the processes of the method embodiments, and can achieve the same technical effects, and in order to avoid repetition, the details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.