Summary of the invention
The purpose of the application is to provide a kind of business function implementation method, can solve how to improve industry to a certain extentThe technical issues of safety for function of being engaged in.Present invention also provides a kind of business function realize system, block chain node device andComputer readable storage medium.
To achieve the goals above, the application provides the following technical solutions:
A kind of business function implementation method, applied in the either block chain node of block catenary system, comprising:
The Intelligent target contract that user client is called is obtained, intelligent contract is to intelligence made of target service function packageIt can contract;
Recalls information corresponding to the calling process of the Intelligent target contract is recorded, the recalls information is registered in areaIn block chain.
Preferably, before the Intelligent target contract that the acquisition user client is called, the method also includes:
Obtain the real-time behavior fingerprint of the user client input;
Judge whether the real-time behavior fingerprint is consistent with default behavior fingerprint, if so, executing the acquisition user visitorThe step of Intelligent target contract that family end is called.
Preferably, the method also includes:
Judge whether to meet the execution condition for executing default behavior fingerprint, refer to if so, executing the default behavior automaticallyLine;
Wherein, the default behavior fingerprint includes the default calling sequence of the intelligent contract.
Preferably, before the Intelligent target contract that the acquisition user client is called, the method also includes:
Whether the identity for verifying the user client is legal, if so, executing what the acquisition user client was calledThe step of Intelligent target contract.
Preferably, described to record the target intelligence after the Intelligent target contract that the acquisition user client is calledBefore recalls information corresponding to the calling process of energy contract, the method also includes:
Judge whether the user client has the permission for calling the Intelligent target contract, if so, described in executingThe step of recording recalls information corresponding to the calling process of the Intelligent target contract.
Preferably, before the Intelligent target contract that the acquisition user client is called, the method also includes:
According to preset format by business function encapsulation at corresponding intelligent contract.
Preferably, recalls information corresponding to the calling process for recording the Intelligent target contract, specifically includes:
Recalls information corresponding to the calling process of the Intelligent target contract, the default lattice are recorded according to preset formatFormula includes: the mark of the user client, allocating time, the Intelligent target contract.
A kind of business function realization system, applied in the either block chain node of block catenary system, comprising:
First obtains module, and for obtaining the Intelligent target contract of user client calling, intelligent contract is to target industryIntelligence contract made of function package of being engaged in;
Cochain module, for recording recalls information corresponding to the calling process of the Intelligent target contract, by the tuneIt is registered in block chain with information.
Preferably, the system also includes:
Second obtain module, for it is described first obtain module obtain user client call Intelligent target contract itBefore, obtain the real-time behavior fingerprint of the user client input;
First judgment module, for judging whether the real-time behavior fingerprint is consistent with default behavior fingerprint, if so, mentioningShow the step of the first acquisition module executes the Intelligent target contract that the acquisition user client is called.
Preferably, the system also includes:
Second judgment module meets the execution condition for executing default behavior fingerprint for judging whether, if so, holding automaticallyThe row default behavior fingerprint;
Wherein, the default behavior fingerprint includes the default calling sequence of the intelligent contract.
Preferably, the system also includes:
Authentication module is tested before obtaining the Intelligent target contract that module obtains user client calling for described firstWhether the identity for demonstrate,proving the user client is legal, if so, prompt described first, which obtains module, executes the acquisition user visitorThe step of Intelligent target contract that family end is called.
Preferably, the system also includes:
Second judgment module, for it is described first obtain module obtain user client call Intelligent target contract itAfterwards, before the cochain module records recalls information corresponding to the calling process of the Intelligent target contract, judge the useWhether family client has the permission for calling the Intelligent target contract, if so, the cochain module is prompted to execute the noteThe step of recording recalls information corresponding to the calling process of the Intelligent target contract.
Preferably, the system also includes:
Package module is pressed before obtaining the Intelligent target contract that module obtains user client calling for described firstAccording to preset format by business function encapsulation at corresponding intelligent contract.
Preferably, the cochain module specifically includes:
Upper chain element, for recording the letter of calling corresponding to the calling process of the Intelligent target contract according to preset formatBreath, the preset format includes: the mark of the user client, allocating time, the Intelligent target contract.
A kind of block chain node device, comprising:
Memory, for storing computer program;
Processor realizes the step of as above any business function implementation method when for executing the computer programSuddenly.
A kind of computer readable storage medium is stored with computer program in the computer readable storage medium, describedThe step of as above any described business function implementation method is realized when computer program is executed by processor.
A kind of business function implementation method provided by the present application, applied in the either block chain node of block catenary system,The Intelligent target contract that user client is called is obtained, Intelligent target contract is intelligently to close to made of target service function packageAbout;Recalls information corresponding to the calling process of Intelligent target contract is recorded, recalls information is registered in block chain.The applicationA kind of business function implementation method provided, the Intelligent target contract that block catenary system acquisition user client is called, and targetIntelligent contract is namely target service function to be realized in block catenary system to intelligence contract made of target service function packageThe operation of energy records recalls information corresponding to the calling process of Intelligent target contract later, recalls information is registered in blockIn chain, due to the tractability of block catenary system, after recalls information cochain, Intelligent target can be traced back to by block catenary systemThe calling process of contract namely target service function and is used in the prior art so as to realize the right-safeguarding of target service functionFamily calls the business function stored in underlying database to realize that corresponding service is compared, and can improve business function to a certain extentThe safety of energy.A kind of business function provided by the present application realizes system, block chain node device and computer-readable storage mediumMatter also solves the problems, such as relevant art.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, completeSite preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based onEmbodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every otherEmbodiment shall fall in the protection scope of this application.
This application involves block chain technologies, in order to make it easy to understand, below will be to block chain in the embodiment of the present application(Block Chain) is simply introduced, and block chain is distribution disclosed in all block chain nodes to access serverThe data structure of storage includes several blocks (Block).User terminal comprising client can be registered as an areaBlock chain node forms P2P network with other block chain nodes of access block chain server, and block chain data can be stored inP2P network, any one or more block chain nodes of P2P network paralysis, will not result in the loss of block chain data, such areaBlock chain data just have very strong safety, it is ensured that the persistence of data and can not distort.When a block is persisted to areaWhen in block chain data, the block chain node of access server can add the block;Block is according to persistence time sequencingSingly it is added in block chain data, each block other than first block in block chain data will chainIt is connected to its previous block, such block chain data just form a block and link this block, just as a chain oneSample, as soon as the block can not be modified after a block is persisted to block chain data.
In current internet platform, business function applied by user is stored in underlying database, and user provides tuneCorresponding service is realized with the business function stored in underlying database.However, due to the data in underlying database be can be withIt modifies after being logged in by administrator's account, namely the business function being stored in underlying database can be modified,Thus the safety of business function can be made lower, security risk is caused to user.For example, for those with Financial AttributeBusiness function, such as the business function of modification account balance, if being called by attacker, it will cause the losses of assets of user.AndThe safety of business function can be improved in a kind of business function implementation method provided by the present application.
Referring to Fig. 1, Fig. 1 is a kind of first pass figure of business function implementation method provided by the embodiments of the present application.
A kind of business function implementation method provided by the embodiments of the present application, the either block chain link applied to block catenary systemIn point, it may include steps of:
Step S101: obtaining the Intelligent target contract that user client is called, and Intelligent target contract is to target service functionIntelligence contract made of capable of encapsulating.
In practical application, block chain node first obtains the Intelligent target contract of user client calling, Intelligent target contractEffect and type can be determine according to actual needs.Such as when target service function is financial class business function, target intelligenceEnergy contract is just financial class intelligence contract, specifically, corresponding Intelligent target closes when target service function is query functionIt is just about the intelligent contract of realization query function;When target service function is to transfer accounts function, corresponding Intelligent target contractJust the intelligent contract to realize function of transferring accounts;When target service function is that equity fund operates, corresponding Intelligent target is closedIt is just about the intelligent contract etc. of realization equity fund operating function.In concrete application scene, block chain node can receive userThen the call request that client is sent parses the Intelligent target contract for including in call request.In addition, Intelligent target contract canTo preset and be stored in block chain node, it is also possible to what block chain node generated in real time, specifically, block chainNode can also obtain user client call Intelligent target contract before, according to preset format by business function encapsulation atIntelligent contract, for example the target service function of user client input is received, then according to preset format by target service functionIt can be packaged into corresponding Intelligent target contract, it can be refering to existing according to the process that target service function generates Intelligent target contractTechnology, details are not described herein by the application.
Step S102: recalls information is registered in by recalls information corresponding to the calling process of record Intelligent target contractIn block chain.
In practical application, block chain node can record the tune of Intelligent target contract after obtaining Intelligent target contractThe recalls information corresponding to process, and recalls information is registered in block chain.The format of recalls information can be according to realityNeed flexible determination, such as block chain node that can record corresponding to the calling process of Intelligent target contract according to preset formatRecalls information, preset format includes: the mark of user client, allocating time, Intelligent target contract, in addition, in preset formatIt can also include the implementing result etc. of invocation target intelligence contract.Since block chain node is by recalls information cochain, and block chainSystem has trackability, so the calling process can be traced back in block catenary system later, then according to the tune of retrospectJudge whether the user client of safety and invocation target intelligence contract is peace to the Intelligent target contract called with processFull client etc. realizes the protection to Intelligent target contract, namely realizes the protection to target service function.
Optionally, in order to guarantee the safety of Intelligent target contract, whether can be closed by verifying the identity of user clientMethod guarantees come the safety in advance to Intelligent target contract, specifically, block chain node obtains what user client was calledBefore Intelligent target contract, whether the identity for first verifying user client is legal, obtains user client tune if so, executing againThe step of Intelligent target contract.In practical application, block chain node can take static authentication methods to verify target customerWhether the identity at end is legal, for example pre-establishes the corresponding relationship between Intelligent target contract and legitimate user's client, then sentencesWhether the user client of disconnected invocation target intelligence contract belongs to the corresponding relationship, if so, determining that user client identity is closedMethod, if it is not, then determining that user client identity is illegal.Certainly, block chain node can also take dynamic authentication mode to verifyWhether the identity of user client is legal, for example pre-generates the encryption key and solution of the exclusive interdependence of Intelligent target contractKey, and legitimate user's client of block chain node and Intelligent target contract distributes the encryption key and decruption key,Encryption key is obtained with block chain node, for user client obtains decruption key, block chain node will using encryption keyVerification information is encrypted, and encrypted verification information is sent to user client, user client is close with the decryption of itselfThe verification information of encryption is decrypted in key, if verification information can be decrypted, verification information is sent to block chain node, areaBlock chain node receive just indicate after verification information user client identity be it is legal, if failing to decrypt verification information,Then user client is difficult to for correct verification information to be sent to block chain node, and block chain node can determine user clientThe identity at end is illegal.
It optionally,, may be only for certain business functions in the case where the identity of user client is legalAllow to be executed by the user client of specific part namely Intelligent target contract only allows by the user client tune of specific partWith at this point, the application scenarios for allowing to be called by the user client of specific part to realize Intelligent target contract only, block chainAfter node obtains the Intelligent target contract that user client is called, it can first judge whether user client has invocation targetThe permission of intelligent contract, if so, execute again record Intelligent target contract calling process corresponding to recalls information and afterThe step of.In concrete application scene, it can judge whether user client has calling by the public and private key of user clientThe permission of Intelligent target contract, specifically, block chain node pre-establishes intelligent contract and can call the user of intelligent contractCorresponding relationship between the public key of client, the access request after receiving user client private key encryption, closes Intelligent targetAbout, received encrypted access request is decrypted in block chain node public key corresponding to Intelligent target contract, if energySuccessful decryption then determines that user client has the permission for calling the Intelligent target contract.
A kind of business function implementation method provided by the present application is applied in block catenary system, obtains user client tuneIntelligent target contract, Intelligent target contract are to intelligence contract made of target service function package;Record Intelligent targetRecalls information is registered in block chain by recalls information corresponding to the calling process of contract.A kind of business provided by the present applicationFunction realizing method, block catenary system obtains the Intelligent target contract that user client is called, and Intelligent target contract is to meshIntelligence contract made of business function encapsulation is marked, namely realizes the operation of target service function in block catenary system, laterRecalls information corresponding to the calling process of Intelligent target contract is recorded, recalls information is registered in block chain, due to blockThe tractability of catenary system after recalls information cochain, can trace back to Intelligent target contract namely target by block catenary systemThe calling process of business function calls bottom number with user in the prior art so as to realize the right-safeguarding of target service functionIt realizes that corresponding service is compared according to the business function stored in library, the safety of business function can be improved to a certain extent.
Referring to Fig. 2, Fig. 2 is a kind of second flow chart of business function implementation method provided by the embodiments of the present application.
In order to further increase the safety of business function implementation method provided by the embodiments of the present application, the embodiment of the present applicationThere is provided a kind of business function implementation method can with specifically includes the following steps:
Step S201: obtaining the real-time behavior fingerprint of user client input, and fingerprint of composing a piece of writing in real time includes intelligent contractReal-time calling sequence.
In practical application, due to the diversity for the intelligent contract for including in block chain node, user client is once being adjustedWith may need to call multiple intelligent contracts in the process, or in order to complete some task, user client need to be called a series ofIntelligent contract can seem cumbersome, for streamline operation, the application introduces row if individually calling intelligent contractFor the concept of fingerprint, the calling sequence of behavior fingerprint namely intelligent contract, under complex operations environment, behavior fingerprint can also be wrappedThe time interval between the call operation of two neighboring intelligent contract is included, for example first calls the intelligent contract of opened file folder, 30 secondsThe intelligent contract of selection full text is called afterwards, and the intelligent contract of the selected text of calls copy, is called after 1 minute after 40 secondsThe intelligent contract for closing file executes the intelligent contract for opening another file after 30 seconds, execute after 40 seconds and paste duplicationThe intelligent contract of text etc.;The concrete type of behavior fingerprint can determine according to actual needs, real-time behavior fingerprint namely useThe behavior fingerprint that family client inputs in real time.
Step S202: judge whether real-time behavior fingerprint is consistent with default behavior fingerprint, if so, thening follow the steps S203;Default behavior fingerprint includes the default calling sequence of intelligent contract.
In concrete application scene, block chain after obtaining real-time behavior fingerprint, first judge real-time behavior fingerprint whether in advanceIf behavior fingerprint is consistent, if so, execute subsequent step again, if it is not, then can direct end operation, it is, of course, also possible to there is itHe operates, such as the client for being automatically logged out user account, forbidding user account to log in whithin a period of time, binding to user accountEnd sends alarm etc., presets behavior fingerprint namely preset style of writing fingerprint.Since behavior fingerprint includes the changeability of contentAnd can diversity, by user input real-time behavior fingerprint and preset default behavior fingerprint, can verify user visitorThe identity security at family end.In addition, it is automatic that block chain node can also be arranged in the case where the identity of user client is legalThe trigger condition of process performing fingerprint makes block chain node be automatically performed corresponding one by the trigger condition and behavior fingerprintSequence of maneuvers simplifies the operating process of user client, is that block chain link is logged between 7 points of morning to morning with trigger conditionPoint, or successfully log on to block chain node, behavior fingerprint again after multiple login failure are as follows: querying individual information, after five minutesIt inquires for weather today, if user client meets any one of trigger condition, the automatic querying individual of block chain nodeInformation, and inquire weather today automatically after 5 minutes;Specifically, block chain node judges whether that meeting the default behavior of execution refers toThe execution condition of line, if so, automatic execute default behavior fingerprint.
Step S203: obtaining the Intelligent target contract that user client is called, and Intelligent target contract is to target service functionIntelligence contract made of capable of encapsulating.
Step S204: recalls information is registered in by recalls information corresponding to the calling process of record Intelligent target contractIn block chain.
Present invention also provides a kind of business functions to realize system, with a kind of business function provided by the embodiments of the present applicationIt is able to achieve and corresponds to effect possessed by method.Referring to Fig. 3, Fig. 3 is that a kind of business function provided by the embodiments of the present application is realizedThe structural schematic diagram of system.
A kind of business function provided by the embodiments of the present application realizes system, is applied in block catenary system, may include:
First obtains module 301, and for obtaining the Intelligent target contract of user client calling, Intelligent target contract is pairIntelligence contract made of target service function package;
Cochain module 302, for recording recalls information corresponding to the calling process of Intelligent target contract, by recalls informationIt is registered in block chain.
In a kind of business function realization system provided by the embodiments of the present application, can also include:
Second obtains module, before the Intelligent target contract that module obtains user client calling is obtained for first, obtainsThe real-time behavior fingerprint for taking user client to input;
First judgment module, for judging whether real-time behavior fingerprint is consistent with default behavior fingerprint, if so, prompt theOne, which obtains module, executes the step of obtaining the Intelligent target contract that user client is called.
In a kind of business function realization system provided by the embodiments of the present application, can also include:
Second judgment module meets the execution condition for executing default behavior fingerprint for judging whether, if so, holding automaticallyThe default behavior fingerprint of row;
Wherein, the default calling sequence that behavior fingerprint includes intelligent contract is preset.
In a kind of business function realization system provided by the embodiments of the present application, can also include:
Authentication module, before the Intelligent target contract that module obtains user client calling is obtained for first, verifying is usedWhether the identity of family client is legal, if so, prompt first, which obtains module, executes the target intelligence for obtaining user client callingThe step of energy contract.
In a kind of business function realization system provided by the embodiments of the present application, can also include:
Second judgment module, after the Intelligent target contract that module obtains user client calling is obtained for first, onBefore chain module records recalls information corresponding to the calling process of Intelligent target contract, judge whether user client has tuneWith the permission of Intelligent target contract, if so, prompt cochain module executes corresponding to the calling process of record Intelligent target contractRecalls information the step of.
In a kind of business function realization system provided by the embodiments of the present application, can also include:
Package module, before the Intelligent target contract that module obtains user client calling is obtained for first, according to pre-If format by business function encapsulation at corresponding intelligent contract.
In a kind of business function realization system provided by the embodiments of the present application, cochain module may include:
Upper chain element, for recording recalls information corresponding to the calling process of Intelligent target contract according to preset format,Preset format includes: the mark of user client, allocating time, Intelligent target contract.
Present invention also provides a kind of block chain node device and computer readable storage mediums, all have the application realityEffect is corresponded to possessed by a kind of business function implementation method that example offer is provided.Referring to Fig. 4, Fig. 4 mentions for the embodiment of the present applicationA kind of structural schematic diagram of the block chain node device supplied.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processorFollowing steps are realized when the computer program stored in 402 execution memories 401:
The Intelligent target contract that user client is called is obtained, Intelligent target contract is to form to target service function packageIntelligent contract;
Recalls information corresponding to the calling process of Intelligent target contract is recorded, recalls information is registered in block chain.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processorStep is implemented as follows when the computer subprogram stored in 402 execution memories 401: obtaining the mesh that user client is calledBefore marking intelligent contract, the real-time behavior fingerprint of user client input is obtained;Judge real-time behavior fingerprint whether with default rowIt is consistent for fingerprint, if so, executing the step of obtaining the Intelligent target contract that user client is called.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processorStep is implemented as follows when the computer subprogram stored in 402 execution memories 401: being judged whether to meet to execute and is preset rowFor the execution condition of fingerprint, behavior fingerprint is preset if so, executing automatically;Wherein, presetting behavior fingerprint includes intelligent contractDefault calling sequence.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processorStep is implemented as follows when the computer subprogram stored in 402 execution memories 401: obtaining the mesh that user client is calledBefore marking intelligent contract, whether the identity for verifying user client is legal, obtains the mesh that user client is called if so, executingThe step of marking intelligent contract.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processorStep is implemented as follows when the computer subprogram stored in 402 execution memories 401: obtaining the mesh that user client is calledAfter marking intelligent contract, before recording recalls information corresponding to the calling process of Intelligent target contract, user client is judgedWhether there is the permission of invocation target intelligence contract, if so, executing corresponding to the calling process of record Intelligent target contractThe step of recalls information.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processorStep is implemented as follows when the computer subprogram stored in 402 execution memories 401: obtaining the mesh that user client is calledBefore marking intelligent contract, according to preset format by business function encapsulation at corresponding intelligent contract.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processorStep is implemented as follows when the computer subprogram stored in 402 execution memories 401: recording target intelligence according to preset formatRecalls information corresponding to the calling process of energy contract, preset format includes: mark, allocating time, the target of user clientIntelligent contract.
Referring to Fig. 5, can also include: in another kind block chain node device provided by the embodiments of the present application and processorThe input port 403 of 402 connections is used for transmission the extraneous order inputted to processor 402;The display being connect with processor 402Unit 404, the processing result for video-stream processor 402 is to the external world;The communication module 405 being connect with processor 402, for realExisting block chain node device and extraneous communication.Display unit 404 can make display etc. for display panel, laser scanning;It is logicalBelieve that communication mode used by module 405 includes but is not limited to mobile high definition chained technology (HML), universal serial bus(USB), high-definition media interface (HDMI), wireless connection: adopting wireless fidelity technology (WiFi), Bluetooth Communication Technology, low-power consumption are blueThe tooth communication technology, the communication technology based on IEEE802.11s.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage mediumCalculation machine program, realizes following steps when computer program is executed by processor:
The Intelligent target contract that user client is called is obtained, Intelligent target contract is to form to target service function packageIntelligent contract;
Recalls information corresponding to the calling process of Intelligent target contract is recorded, recalls information is registered in block chain.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage mediumLoom program is calculated, computer subprogram is implemented as follows step when being executed by processor: obtaining the mesh that user client is calledBefore marking intelligent contract, the real-time behavior fingerprint of user client input is obtained;Judge real-time behavior fingerprint whether with default rowIt is consistent for fingerprint, if so, executing the step of obtaining the Intelligent target contract that user client is called.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage mediumLoom program is calculated, computer subprogram is implemented as follows step when being executed by processor: judging whether to meet to execute and preset rowFor the execution condition of fingerprint, behavior fingerprint is preset if so, executing automatically;Wherein, presetting behavior fingerprint includes intelligent contractDefault calling sequence.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage mediumLoom program is calculated, computer subprogram is implemented as follows step when being executed by processor: obtaining the mesh that user client is calledBefore marking intelligent contract, whether the identity for verifying user client is legal, obtains the mesh that user client is called if so, executingThe step of marking intelligent contract.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage mediumLoom program is calculated, computer subprogram is implemented as follows step when being executed by processor: obtaining the mesh that user client is calledAfter marking intelligent contract, before recording recalls information corresponding to the calling process of Intelligent target contract, user client is judgedWhether there is the permission of invocation target intelligence contract, if so, executing corresponding to the calling process of record Intelligent target contractThe step of recalls information.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage mediumLoom program is calculated, computer subprogram is implemented as follows step when being executed by processor: obtaining the mesh that user client is calledBefore marking intelligent contract, according to preset format by business function encapsulation at corresponding intelligent contract.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage mediumLoom program is calculated, computer subprogram is implemented as follows step when being executed by processor: recording target intelligence according to preset formatRecalls information corresponding to the calling process of energy contract, preset format includes: mark, allocating time, the target of user clientIntelligent contract.
Computer readable storage medium involved in the application includes random access memory (RAM), memory, read-only memory(ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical fieldAny other form of storage medium well known to interior.
A kind of business function provided by the embodiments of the present application realizes system, block chain node device and computer-readable storageThe explanation of relevant portion refers to corresponding part in a kind of business function implementation method provided by the embodiments of the present application in mediumIt is described in detail, details are not described herein.In addition, in above-mentioned technical proposal provided by the embodiments of the present application with correspond to skill in the prior artThe consistent part of art scheme realization principle is simultaneously unspecified, in order to avoid excessively repeat.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to oneEntity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operationThere are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to containLid non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including thoseElement, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipmentIntrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded thatThere is also other identical elements in process, method, article or equipment including the element.
The foregoing description of the disclosed embodiments makes those skilled in the art can be realized or use the application.To thisA variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein canWithout departing from the spirit or scope of the application, to realize in other embodiments.Therefore, the application will not be limitedIt is formed on the embodiments shown herein, and is to fit to consistent with the principles and novel features disclosed in this article widestRange.