Summary of the invention
In order to overcome above-mentioned deficiency in the prior art, the purpose of the application is a kind of domain name management method of, is applied toIn DNS management system for issue micro services domain name update message publisher node, domain name management system further include withThe first micro services and the second micro services that the publisher node is in communication with each other, which comprises
Obtain the domain name of the first micro services;
The domain name of first micro services is sent to the second micro services;
It detects whether the domain name for having through the first micro services, the second micro services of first micro services can not be accessed;
If there is the second micro services that can not access first micro services, then repeat first micro servicesDomain name be sent to second micro services and whether detection second micro services can be by the domains of first micro servicesName accesses the step of first micro services.
Optionally, the step of domain name by first micro services is sent to the second micro services includes, according to describedThe domain name of first micro services issues update message, so that second micro services obtain the domain name of first micro services and accessThe domain name of first micro services.
Optionally, the original state before the domain name for receiving first micro services is stored in second micro servicesInformation, it is described if there is the second micro services that can not access first micro services, then it repeats described first in incognitoThe domain name of business is sent to second micro services and whether detection second micro services can be by first micro servicesDescribed in domain name access the step of the first micro services before include,
It is sent to second micro services and restores information, so that the domain-name information in second micro services restores to describedOriginal state.
Optionally, before the step of domain name by first micro services is sent to the second micro services, the method is alsoIncluding,
The first bitmap data is obtained, the value characterization of each bit of first bitmap data is corresponding with the bitWhether the second micro services need to access first micro services;
The domain name for detecting whether to have through the first micro services, can not access the second micro services of first micro servicesThe step of include,
The second bitmap data is obtained, the value characterization of each bit of second bitmap data is corresponding with the bitWhether accessible first micro services of second micro services;
Second bitmap data is compared with first bitmap data, is judged to need to access described first micro-With the presence or absence of the second micro services that can not access first micro services in second micro services of service;
If second bitmap data is consistent with first bitmap data, there is no the domains by the first micro servicesName, can not access the second micro services of first micro services;
If second bitmap data is not consistent with first bitmap data, there is the domain for passing through the first micro servicesName, can not access the second micro services of first micro services.
The another object of the application is to provide a kind of domain name management method, a kind of domain name management method, applied to domain nameIn management system for issue micro services domain name update message publisher node, domain name management system further include with it is describedThe first micro services and the second micro services that publisher node is in communication with each other, which comprises
Obtain the domain name of the first deleted micro services;
The domain name of the first deleted micro services is sent to second micro services;
Detect whether that all second micro services have all deleted the domain name of first micro services;
If there is the second micro services of no domain name for deleting first micro services, then repeats and deleted describedThe domain name for the first micro services removed is sent to second micro services, detects whether that all second micro services have all been deletedThe step of domain name of first micro services.
The another object of the application is to provide a kind of domain name management method, be applied to including publisher node, first in incognitoThe DNS management system of business and the second micro services, the publisher node and first micro services, second micro services are mutualCommunication;
The publisher node obtains the domain name of the first micro services;
Second micro services obtain the domain name of first micro services from publisher node;
Second micro services detect whether can be by the domain name access of first micro services first micro services;
Whether second micro services will characterize can be by the domain name access of first micro services first micro servicesStatus data is sent to the publisher node;
The publisher node detects whether exist through the domain names of the first micro services, can not access the of first micro servicesTwo micro services;
If there is the second micro services that can not access first micro services, then the publisher node is repeated by instituteThe domain name for stating the first micro services is sent to the second micro services to the publisher node and detects whether exist through the first micro servicesDomain name, the step of the second micro services of first micro services can not be accessed.
Optionally, it is described before second micro services obtain the step of domain name of first micro services from publisher nodeMethod further includes,
The publisher node sends update message, so that second micro services obtain described first from the publisher nodeThe domain name of micro services;
Second micro services obtain the step of domain name of first micro services from publisher node and include,
Second micro services obtain the domain name of first micro services according to the update message from the publisher node.
Optionally, it is described before second micro services obtain the step of domain name of first micro services from publisher nodeMethod further includes,
The publisher node obtains the first bitmap data, and the value of each bit of first bitmap data characterizes and shouldWhether corresponding second micro services of bit need to access first micro services;
The publisher node detects whether exist through the domain names of the first micro services, can not access the of first micro servicesThe step of two micro services includes,
The publisher node obtains the second bitmap data, and the value of each bit of second bitmap data characterizes and shouldWhether accessible first micro services of corresponding second micro services of bit;
Second bitmap data is compared the publisher node with first bitmap data, judges needing to visitIn the second micro services for asking first micro services, if there are the second micro services that can not access first micro services
If second bitmap data is consistent with first bitmap data, there is no the domains by the first micro servicesName, can not access the second micro services of first micro services;
If second bitmap data is not consistent with first bitmap data, there is the domain for passing through the first micro servicesName, can not access the second micro services of first micro services.
The another object of the application is to provide a kind of domain name supervising device, applied in DNS management system for issuingThe publisher node of the domain name update message of micro services, domain name management system further include being in communication with each other with the publisher nodeFirst micro services and the second micro services, described device include obtaining module, sending module and detection module;
The domain name for obtaining module and being used to obtain the first micro services;
The sending module is used to the domain name of first micro services being sent to the second micro services;
The detection module can not access first micro services for detecting whether in the presence of the domain name for passing through the first micro servicesThe second micro services, and
When in the presence of the second micro services that can not access first micro services, repeat first micro servicesDomain name is sent to second micro services and whether detection second micro services can be by the domain names of first micro servicesThe step of accessing first micro services.
The another object of the application is to provide a kind of DNS management system, and domain name management system includes publisher nodeWith the first micro services and the second micro services being in communication with each other with the publisher node, the publisher node is for issuing domain name updateMessage, domain name management system is for method described in any of the above item.
In terms of existing technologies, the application has the advantages that
The embodiment of the present application obtains the domain name of the first micro services by publisher node, and by the domain name of first micro servicesBe sent to the second micro services, thus obtain each second micro services whether can by the domain name access of first micro services thisOne micro services are to determine whether in the presence of the second micro services that can not access first micro services, and in the presence of can not access described theIt when the second micro services of one micro services, re-executes, the domain name of first micro services is sent to the second micro services, to obtainWhether each second micro services can be by the domain name access of first micro services first micro services to determine whether there are nothingsMethod accesses the step of the second micro services of first micro services, in this way, just enabling to the second micro services accessible describedOne micro services, so as to so that the consistency of data is not lost and guaranteed to data in business operation.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present applicationIn attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment isSome embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is implementedThe component of example can be arranged and be designed with a variety of different configurations.
Therefore, the detailed description of the embodiments herein provided in the accompanying drawings is not intended to limit below claimedScope of the present application, but be merely representative of the selected embodiment of the application.Based on the embodiment in the application, this field is commonTechnical staff's every other embodiment obtained without creative efforts belongs to the model of the application protectionIt encloses.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang YiIt is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.
In the description of the present application, it is also necessary to which explanation is unless specifically defined or limited otherwise, term " setting "," installation ", " connected ", " connection " shall be understood in a broad sense, for example, it may be fixedly connected, may be a detachable connection or oneConnect to body;It can be mechanical connection, be also possible to be electrically connected;It can be directly connected, it can also be indirect by intermediaryIt is connected, can be the connection inside two elements.For the ordinary skill in the art, on being understood with concrete conditionState the concrete meaning of term in this application.
Fig. 1 is please referred to, Fig. 1 is the structural schematic diagram of DNS management system provided by the embodiments of the present application, domain name pipeReason system includes publisher node 100, the first micro services and the second micro services 200.Publisher node 100, the first micro services and secondMicro services 200 can be in communication with each other.Publisher node 100 is used to obtain the domain name delta data of the first micro services, and in incognito by firstThe domain name variable condition of business is sent to the second micro services 200.
Fig. 2 is referred to, the publisher node 100 is configured with domain name supervising device 110, memory 120,130 and of processorCommunication unit 140.The memory 120, processor 130 and each element of communication unit 140 are between each other directly or indirectlyIt is electrically connected, to realize the transmission or interaction of data.For example, these elements can pass through one or more communication bus between each otherOr signal wire is realized and is electrically connected.Domain name managing device 110 includes at least one can be with software or firmware (firmware)Form be stored in the memory 120 or be solidificated in the operating system (operating system, OS) of the proxy serverIn software function module.The processor 130 is for executing the executable module stored in the memory 120, such as instituteState software function module included by domain name supervising device 110 and computer program etc..
Wherein, the memory 120 may be, but not limited to, (the Random Access of random access memory 120Memory, RAM), read-only memory 120 (Read Only Memory, ROM), programmable read only memory 120(Programmable Read-Only Memory, PROM), 120 (Erasable of erasable read-only memoryProgrammable Read-Only Memory, EPROM), (the Electric Erasable of electricallyerasable ROM (EEROM) 120Programmable Read-Only Memory, EEPROM) etc..Wherein, memory 120 is for storing program, the processor130 after receiving and executing instruction, and executes described program.The communication unit 140 is used to establish the publication by network 300Communication connection between node 100 and the first micro services or the second micro services 200, and for being received and dispatched by the network 300Data.
Referring to figure 3., Fig. 3 is a kind of flow chart of domain name management method applied to DNS management system shown in FIG. 1,Below by the method includes each step be described in detail.
Step S110, publisher node 100 obtain the domain name of the first micro services.
It is to increase, become that the present embodiment, which is used to obtain the newest domain name of the first micro services and characterizes the domain name of the first micro services,More or deleted domain name updating type, when the first micro services are the micro services newly increased, i.e., when micro services are online, firstThe domain name of micro services is the domain name of first micro services newly increased, and the domain name updating type of the first micro services is to increase class;WhenFirst micro services change, and the domain name of the first micro services becomes another domain name, the domain name of the first micro services from a domain nameFor the domain name after the switching of the first micro services, the domain name updating type of the first micro services is change class.When the first micro services be removed,The corresponding domain name of the first micro services is the domain name of the first micro services when first micro services remove, first when the first micro services removeThe domain name change type of micro services is to delete class.Optionally, the present embodiment is also used to obtain IP address, the i.e. domain of the first micro servicesThe IP address of name and the first micro services.When the first micro services are the micro services newly increased, i.e., when micro services are online, first in incognitoThe address of business is the IP address of first micro services newly increased;When the first micro services migrate, the domain name of the first micro servicesAnother domain name is become from a domain name, the IP address of the first micro services is the IP address after switching.When the first micro services are movedIt removes, the corresponding IP address of the first micro services when the first micro services remove is the IP address of the first micro services.
It, can be by the domain name of the first micro services more after publisher node 100 obtains the domain name of the first micro services in the present embodimentIt is newly serviced to the skyDNS of publisher node 100, so that publisher node 100 can parse correctly.That is, according to firstThe domain name of micro services and first micro services domain name updating types update the skyDNS service of publisher nodes 100, when theThe domain name updating type of one micro services is just to increase this first in incognito in the skyDNS service of publisher node 100 when increasing classThe domain name of business just will in the skyDNS service of publisher node 100 when the domain name updating type of the first micro services is change classThe corresponding domain name of first micro services replaces the domain name of first micro services.When the domain name updating type of the first micro services is to delete classWhen, the domain name of first micro services is just deleted in the skyDNS service of publisher node 100.
Step S120, second micro services 200 obtain the domain name of the first micro services from publisher node 100.
The present embodiment obtains the domain name of the first micro services for the second micro services 200 from publisher node 100, or for theTwo micro services 200 obtain the domain name of the first micro services and the IP address of the first micro services from publisher node 100.
In the present embodiment, the first micro services are the corresponding micro services of domain name for occurring to update and (increase, change or delete),When the domain name updating type of the first micro services is to increase class or update class, the second micro services 200 are to complete a businessProcess in, need to access the micro services of the first micro services;When the domain name updating type of the first micro services is to delete class, secondMicro services 200 are the micro services for executing the business at the time of before the domain name of the first micro services is deleted recently and needing to access.
Optionally, in the present embodiment, before step S120, the publisher node 100 can detecte to be saved with the publicationThe third micro services that point 100 is in communication with each other, obtain the second micro services 200, wherein third micro services include from third micro servicesSecond micro services 200.Optionally, third micro services also may include the 4th micro services, and the 4th micro services are the first micro services pairThe domain name answered before changing after, handle do not needed in the business access the first micro services micro services.That is, third is in incognitoThe second micro services 200 can be only included in business, can also include the second micro services 200, and including the 4th micro services.
Optionally, after publisher node 100 detects the domain names of third micro services and the first micro services, just to third micro servicesUpdate message is sent, update message includes the domain name of the first micro services and the domain name updating type of the first micro services.When third is micro-After service receives update message, the domain name or first message of first message service are just actively pulled from publisher node 100Domain name, that is, IP address of service.
Further, in this embodiment the update message can be sent out on publisher node 100 in the form of domain name update eventCloth.Third micro services detect domain name update event from publisher node 100 by polling mechanism, when third micro services detect domain nameAfter update event, the domain name of the first micro services is just actively obtained from publisher node 100.In the present embodiment, in third micro services,Including multiple groups, wherein each group includes at least a micro services.Micro services detect that domain name updates in each groupAfter event, the micro services in group are just registered on publisher node 100, when there are the micro services that succeed in registration in groupWhen, other micro services are just no longer registered, at this point, after third micro services detect domain name update event, just actively from hairThe step of domain name of the first micro services is obtained at cloth node 100 is the micro services that succeed in registration in group from publisher node 100Obtain the domain name of the first micro services.
Optionally, in the present embodiment, after publisher node 100 detects the domain name of third micro services and the first micro services, justThe domain name of update message and the first micro services is sent to third micro services.
In the present embodiment, when the acquisition of publisher node 100 needs to access the second micro services 200 of the first micro services, it can incite somebody to actionThe second micro services 200 for needing to access the first micro services generate the first bitmap data, all third micro services can also be generatedFirst bitmap data, wherein the value of each bit in the first bitmap is for characterizing whether each third micro services need to visitAsk the first micro services.
After step S120, the method also includes updating the domain name data of first micro services to skyDNS and service.
Optionally, in the present embodiment, second micro services 200 can be in communication with each other with skyDNS service.Specifically, whenWhen micro services in three micro services form multiple groups, the first micro services are obtained by the micro services to succeed in registration in each groupAfter domain name, the domain name data of first micro services is updated to the corresponding skyDNS of the group and is serviced.Specifically, when first in incognitoThe domain name updating type of business is that when increasing class, it is corresponding the domain name of the first micro services can be increased to the second micro services 200In skyDNS service.It, can be corresponding in the second micro services 200 when the domain name updating type of the first micro services is change classIn skyDNS service, the original domain name of first micro services is replaced with the domain name of the first micro services.When the domain name of the first micro servicesUpdating type is when deleting class, and second micro services 200 obtain the domain name of the first micro services, and by first micro servicesDomain name is sent to skyDNS service, so that the domain name of the first micro services of its storage is deleted in skyDNS service.
Whether step S130, second micro services 200 judge the domain name of the first micro services in second micro servicesIt comes into force on 200.
In the present embodiment, before the step S130, further include the steps that the type for judging the domain name of first micro services.
Specifically, in the present embodiment, when the domain name updating type of the first micro services is change class, the domain of the first micro servicesName comes into force in the second micro services 200 to be referred to, the second micro services 200 are able to access that the first micro services.When the domain of the first micro servicesName updating type is when increasing class or change class, and second micro services 200 detect whether can be by first micro servicesDomain name access first micro services, if second micro services 200 can pass through the domain name access of first micro servicesFirst micro services, then the domain name of first micro services enters into force in second micro services 200.
When the domain name updating type of the first micro services is to delete class, the domain name of the first micro services is in the second micro services 200On come into force and refer to, the domain name of the first micro services is deleted from the second micro services 200, at this point, the second micro services 200 cannot visitAsk the first micro services.For example, can be judged the domain name of the first micro services whether from the second micro services 200 according to following mannerUpper deletion.When second micro services 200 carry out domain name mapping failure to the domain name of the first micro services, the domain name of the first micro services is at thisIt comes into force in second micro services 200;Alternatively, when the corresponding skyDNS of the second micro services 200 is deleted successfully, it is micro- according to characterization firstThe domain name of service the corresponding skyDNS of the second micro services 200 delete successful information judge the domain names of the first micro services thisIt comes into force in two micro services 200.
In the present embodiment, after step S130, the method also includes, according to the domain name of the first micro services third in incognitoWhether come into force in business and generate the second bitmap data, the value of each bit in second bitmap data is micro- for characterizing firstWhether service comes into force in the third micro services.When the domain name updating type of the first micro services is to increase class or change class, rootEach ratio that the first micro services generate the second bitmap data, in second bitmap data whether is able to access that according to third micro servicesThe value of special position is for characterizing whether the third micro services are able to access that first micro services.When the domain name of the first micro services updatesType is to generate the second bitmap according to whether the domain name of the first micro services deletes from the second micro services 200 when deleting classData.
Status data is sent to the publisher node 100 by step S140, second micro services 200.
Specifically, when the domain name updating type of the first micro services is to increase class or change class, the third micro servicesWhether characterization can be sent to the publication by the status data of the domain name access of first micro services first micro servicesNode 100.
When the domain name updating type of the first micro services is to delete class, third micro services will characterize the domain name of the first micro servicesThe status data whether deleted from the second micro services 200 is sent to the publisher node 100.
Optionally, in the present embodiment, second bitmap data can be sent to the publisher node 100.
Step S150, the publisher node 100 detect whether second of the domain name Pending The Entry Into Force there are the first micro services in incognitoBusiness 200.
Specifically, when the domain name updating type of the first micro services is to increase class or change class, the publisher node 100It detects whether the domain name for having through the first micro services, the second micro services 200 of first micro services can not be accessed.
When the domain name updating type of the first micro services is to delete class, whether the domain name of the first micro services is micro- from secondIt is deleted in service 200.
Optionally, in the present embodiment, the publisher node 100 can be carried out the first bitmap data and the second bitmap dataCompare, to detect whether the second micro services 200 of the domain name Pending The Entry Into Force there are the first micro services.Specifically, when the first micro servicesDomain name updating type be when increasing class or change class, to detect whether exist through the domain names of the first micro services, can not accessSecond micro services 200 of first micro services.When the domain name updating type of the first micro services is to delete class, detection first is in incognitoWhether the domain name of business has deleted from the second micro services 200.
Fig. 4 is referred to, specifically, the step S150 includes sub-step S151- step S154.
Step S151, the publisher node 100 obtain the second bitmap data, each bit of second bitmap dataValue characterize whether first micro services in corresponding with the bit the second micro services 200 come into force.
Specifically, when the domain name updating type of the first micro services is to increase class or change class, step S151 is, describedPublisher node 100 obtains the second bitmap data, value characterization and the bit pair of each bit of second bitmap dataWhether accessible first micro services of the second micro services 200 answered.
When the domain name updating type of the first micro services is to delete class, step S151 is, the publisher node 100 obtains theThe value of two bitmap datas, each bit of second bitmap data characterizes the second micro services 200 corresponding with the bitWhether the domain name of upper first micro services has deleted.
Step S152, publisher node 100 judge whether there is the second micro services of the domain name Pending The Entry Into Force of the first micro services200。
In the present embodiment, the publisher node 100 compares second bitmap data and first bitmap dataIt is right, judge whether there is the second micro services of the domain name Pending The Entry Into Force of the first micro services.
Specifically, when the domain name updating type of the first micro services is to increase class or change class, step S152 is, describedSecond bitmap data is compared publisher node 100 with first bitmap data, judges needing to access describedIn second micro services 200 of one micro services, if there are the second micro services 200 that can not access first micro services.
When the domain name updating type of the first micro services is to delete class, step S152 is that the publisher node 100 will be describedSecond bitmap data is compared with first bitmap data, judges whether there is the of the domain name for not deleting the first micro servicesTwo micro services 200.
Step S153, if second bitmap data is consistent with first bitmap data, the domain of the first micro servicesName has come into force in all second micro services 200.
When the domain name updating type of the first micro services is to increase class or change class, step S153 is, if described theTwo bitmap datas are consistent with first bitmap data, then there is no by the domain names of the first micro services, can not access this firstSecond micro services 200 of micro services.When the domain name updating type of the first micro services is to delete class, step S153 is, if instituteIt states the second bitmap data to be consistent with first bitmap data, the domain name of the first micro services is deleted from the second micro services 200It removes.
Step S154, if second bitmap data is not consistent with first bitmap data, the first micro servicesDomain name does not come into force in all second micro services 200.
When the domain name updating type of the first micro services is to increase class or change class, step S154 is, if described theTwo bitmap datas are not consistent with first bitmap data, then exist through the domain names of the first micro services, can not access this firstSecond micro services 200 of micro services.When the domain name updating type of the first micro services is to delete class, step S154 is, if instituteIt states the second bitmap data not to be consistent with first bitmap data, whether the domain name of the first micro services is from the second micro servicesIt is deleted on 200.
Please continue to refer to Fig. 3, in third micro services, when there are the second micro services 200 that cannot access the first micro services, weightStep S110- step S150 is executed again.Specifically, in the present embodiment, before repeating step S110- step S150 every time,Rollback mechanism can be used to the multiple micro services for including the second micro services 200, these use the number of the micro services of rollback mechanismOriginal state when according to recovery to no progress domain name update.
The present embodiment is used in the second micro services 200 for needing to access the first micro services, there is that cannot to access first micro-When the second micro services 200 of service, the domain name of first micro services is updated on each node again.In this way, can makeEach second micro services 200 can the first micro services of successful access, and then reduce business procession in data it is inconsistent withAnd situations such as shortage of data.
Referring to figure 5., present invention also provides a kind of domain name supervising device 110, domain name managing device 110 includes extremelyA few operating system (operating that can be stored in the form of software or firmware (firmware) in the memory 120System, OS) in software function module.Described device is applied in DNS management system for issuing the domain name of micro services moreThe publisher node 100 of new information, domain name management system further include be in communication with each other with the publisher node 100 first in incognitoBusiness and the second micro services 200, described device include obtaining module 111, sending module 112 and detection module 113.
The domain name for obtaining module 111 and being used to obtain the first micro services.
The acquisition module 111, can be with reference pair step about the effect for obtaining module 111 for executing step S110The description of S110.
The sending module 112 is used to the domain name of first micro services being sent to the second micro services 200.
The sending module 112 is for executing step S120 and the second micro services 200 being made to execute step S130- stepS140 can be with the description of reference pair step S120 and step S130- step S140 about the effect of sending module 112.
It is first micro- can not to access this for detecting whether exist through the domain names of the first micro services for the detection module 113Second micro services 200 of service, and when in the presence of the second micro services 200 that can not access first micro services, repetition is heldWhether the domain name for being about to first micro services is sent to second micro services 200 and detection second micro services 200The step of first micro services described in domain name access of the energy by first micro services.
The detection module 113, can be with reference pair step about the effect of detection module 113 for executing step S150The description of S150.
In conclusion since there are testing mechanisms for each node itself in the embodiment of the present application, and the domain name of itself is rawEffect situation feeds back to publisher node 100.The situation that can be come into force according to the domain name of all nodes of publisher node 100 is judged wait come into forceWhether domain name is come into force on the node that all expectation domain name datas to be updated come into force to judge whether domain name comes into force, and micro-Agency it is failed it is online in the case where, so that each node is re-started domain name mapping and guarantee that micro code success is online, so as toDomain name is avoided not come into force or situation that loss of data, data caused by the micro code version docked is inconsistent are inconsistent.
In embodiment provided herein, it should be understood that disclosed device and method, it can also be by otherMode realize.The apparatus embodiments described above are merely exemplary, for example, the flow chart and block diagram in attached drawing are shownAccording to device, the architectural framework in the cards of method and computer program product, function of multiple embodiments of the applicationAnd operation.In this regard, each box in flowchart or block diagram can represent one of a module, section or codePoint, a part of the module, section or code includes one or more for implementing the specified logical function executableInstruction.It should also be noted that function marked in the box can also be attached to be different from some implementations as replacementThe sequence marked in figure occurs.For example, two continuous boxes can actually be basically executed in parallel, they sometimes may be usedTo execute in the opposite order, this depends on the function involved.It is also noted that each of block diagram and or flow chartThe combination of box in box and block diagram and or flow chart can be based on the defined function of execution or the dedicated of movementThe system of hardware is realized, or can be realized using a combination of dedicated hardware and computer instructions.
In addition, each functional module in each embodiment of the application can integrate one independent portion of formation togetherPoint, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function moduleIt is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other wordsThe part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meterCalculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be aPeople's computer, proxy server or network equipment etc.) execute each embodiment the method for the application all or part of the steps.And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are depositedThe various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a realityBody or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operationIn any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended toNon-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including thoseElement, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipmentIntrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded thatThere is also other identical elements in process, method, article or equipment including the element.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is anyThose familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all containLid is within the scope of protection of this application.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.