Access control method, device and terminal deviceTechnical field
The invention belongs to gate inhibition's technical field more particularly to a kind of access control methods, device and terminal device.
Background technique
With the development of intelligent identification technology, more and more intelligent identification technologies are used in access control system, such asFace recognition technology.The access control system for possessing intelligent identification technology usually requires system for customization, or needs in original doorThe intelligent recognition function for being just able to achieve access control system is modified on the hardware configuration of access control system.
However, the access control system for either re-replacing customization is still transformed in original access control system, all needExpend certain hardware cost and time cost (replacement or transformation of access control system need the regular hour).
Summary of the invention
In view of this, the embodiment of the invention provides access control method, device and terminal device, to solve the prior artIn how to realize intelligent identification technology with access control system the problem of fusion under the premise of controlling hardware cost.
The first aspect of the embodiment of the present invention provides a kind of access control method, comprising:
The identity information of visitor is identified, if the identity information of the visitor generates trigger signal by identification verifying;
Second wireless singal is generated according to the trigger signal and the information of the first wireless signal prestored, wherein described theOne wireless signal is the radiofrequency signal that user's operation access control system issues;
The second wireless singal is sent to the access control system, the access control system is controlled and executes door opening action.
The second aspect of the embodiment of the present invention provides a kind of access control device, comprising:
Trigger signal generation unit, the identity information of visitor for identification, if the identity information of the visitor passes through identificationVerifying, then generate trigger signal;
Second wireless singal generation unit, for raw according to the trigger signal and the information of the first wireless signal prestoredAt second wireless singal, wherein first wireless signal is the radiofrequency signal that user's operation access control system issues;
Transmission unit controls the access control system and holds for the second wireless singal to be sent to the access control systemRow door opening action.
The third aspect of the embodiment of the present invention provides a kind of terminal device, including memory, processor and is stored inIn the memory and the computer program that can run on the processor, when the processor executes the computer programIt realizes such as the step of the access control method.
The fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storageMedia storage has computer program, and the step such as the access control method is realized when the computer program is executed by processorSuddenly.
Existing beneficial effect is the embodiment of the present invention compared with prior art: in the embodiment of the present invention, due to working as visitorWhen by identification verifying, the first wireless signal for simulating original access control system generates second wireless singal, access controlSystem executes door opening action, i.e., under the premise of not destroying original access control system by the simulation of wireless signal by intelligent recognition skillArt is merged with existing access control system, therefore intelligent identification technology and access control system can be realized while controlling hardware costFusion, and eliminate replacement or be transformed access control system time cost.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior artNeeded in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention someEmbodiment for those of ordinary skill in the art without creative efforts, can also be attached according to theseFigure obtains other attached drawings.
Fig. 1 is the implementation process schematic diagram of the first access control method provided in an embodiment of the present invention;
Fig. 2 is the implementation process schematic diagram of second of access control method provided in an embodiment of the present invention;
Fig. 3 is the schematic diagram of access control device provided in an embodiment of the present invention;
Fig. 4 is the schematic diagram of terminal device provided in an embodiment of the present invention.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposedBody details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specificThe present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricityThe detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " instruction is described specialSign, entirety, step, operation, the presence of element and/or component, but be not precluded one or more of the other feature, entirety, step,Operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this present specification merely for the sake of description specific embodimentAnd be not intended to limit the application.As present specification and it is used in the attached claims, unless onOther situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and the appended claims isRefer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quiltBe construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to trueIt is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In addition, term " first ", " second " etc. are only used for distinguishing description, and should not be understood as in the description of the present applicationIndication or suggestion relative importance.
Embodiment one:
Fig. 1 shows the flow diagram of the first access control method provided by the embodiments of the present application, and details are as follows:
In S101, the identity information of visitor is identified, if the identity information of the visitor generates touching by identification verifyingIt signals.
When having detected visitor close to access control system, such as pass through infrared sensor or imaging sensor etc., detectionTo have visitor close to when, the automatic identity information for obtaining visitor, and the identity information of visitor is identified.If the body of visitorPart information then generates trigger signal by identification verifying, which is the finger for the radiofrequency signal that triggering generation access control is openedEnable signal.
Optionally, the identity information of the identification visitor, comprising:
Pass through the knowledge of any one or any two kinds and combination of the above in recognition of face, fingerprint recognition, speech recognitionOther mode, identifies the identity information of visitor.
Obtain the identity informations such as human face image information, finger print information or voice messaging of visitor, and by recognition of face,The identity information of the identification methods such as fingerprint recognition or speech recognition identification visitor.Specifically, these identity informations are passed through pre-If algorithm (such as feature extraction algorithm) be compared with the identity information library prestored, or these identity informations are inputted pre-If neural network model identified, if the identity information of the visitor can be found in the identity information library prestored, orPerson then proves that the identity information of the visitor passes through verifying by the identification of preset neural network model.Optionally, in the knowledgeBefore the identity information of other visitor, typing in advance and the identity information for storing authorization visitor.
It can identify visitor's only with any one identification method in recognition of face, fingerprint recognition, speech recognitionIdentity information, or visitor is identified using any two kinds in these types of identification method and two or more combined identification methodsIdentity information further increase the safety of access control system to reinforce the reliability of authentication.
Optionally, before the identity information of the identification visitor, further includes:
The selection instruction for receiving user, selects current identification method.
User described here is the personnel for possessing access control system administration authority, and user can select according to actual needsCurrent identification method.By taking the access control system of enterprise as an example, usually, gate inhibition is only open to interior employee, in order to improve gate inhibitionThe safety of system, user can choose recognition of face, fingerprint recognition, speech recognition while combined identification method, Lai TigaoThe safety of access control system;When enterprise's Open Day (having external staff visiting), since the finger print information of external staff, voice are believedBreath can not obtain typing in advance, and image information is relatively easy to obtain, therefore can shift to an earlier date what the specified authorization of typing enteredThe image information of external staff, and the identification method of recognition of face is only selected, allow specified external staff that can also pass through identificationVerifying enters.
Optionally, the identity information of the identification visitor, if the identity information of the visitor is generated by identification verifyingTrigger signal, comprising:
The identity information of visitor is obtained, and the identity information of the visitor is uploaded to intelligent recognition server;
The recognition result information that the intelligent recognition server returns is received, and institute is judged according to the recognition result informationWhether the identity information for stating visitor passes through identification verifying;
If the identity information of the visitor generates trigger signal by identification verifying.
The identity informations such as facial image, fingerprint or the voice of visitor are obtained, and the identity information of the visitor is passed through into objectNetworking (Internet of Things, IOT) communication modes are uploaded to intelligent recognition server.Internet of Things (Internet ofThings, IOT) communication modes may include wired (such as Serial Port Line), wireless (such as Zigbee, WiFi) communication modes orThe identity information of the visitor is uploaded to intelligent recognition server, for intelligence by the transmission mode of existing IOT cloud platform by personIt can identify that server carries out identity information identification verifying.
The recognition result information that intelligent recognition server returns is received, specific field list can be used in recognition result informationShow and be proved to be successful or the recognition result of authentication failed, such as indicate to be proved to be successful with 0, use 1 indicates authentication failed, according to receptionThe recognition result information arrived, judges whether the identity information of visitor passes through identification verifying.If the identity information of current visitor passes throughIdentification verifying, then generate trigger signal.
In S102, second wireless singal is generated according to the trigger signal and the information of the first wireless signal prestored,Wherein first wireless signal is the radiofrequency signal that user's operation access control system issues.
Existing access control system is usually constructed with remote control equipment, and (user refers to access control system administrative staff, example to user hereSuch as the foreground personnel of enterprise) by manually controlling remote control equipment, radiofrequency signal is issued, with the unlatching of access control system.HereFirst wireless signal refers to the radiofrequency signal that user's operation access control system issues, such as original access control system is distantSignal is controlled, i.e. the first wireless signal is the radiofrequency signal that existing access control system is original, is issued by user's manual handling equipment.ThisIn second wireless singal refer to according to intelligent recognition result automatic trigger generate with first wireless signal have it is identicalThe wireless signal of feature (such as identical frequency, wave character, encoded information).
Specifically, according to trigger signal, the generation of automatic trigger second wireless singal.The wherein generation of second wireless singalThe specific information needed according to the first wireless signal prestored, the information of first wireless signal prestored include first wirelessCharacteristic information of signal, such as frequency, wave character, encoded information etc..
Optionally, second wireless communication is generated according to the trigger signal and the information of the first wireless signal prestored describedBefore number, further includes: in the first wireless signal of the acquisition, be decoded to first wireless signal, storage decoding obtainsThe first wireless signal information, comprising:
The first wireless signal is obtained, first wireless signal is decoded, the first wireless communication that storage decoding obtainsNumber information.
Can be when access control system to merge intelligent identification technology for the first time, access control system administrative staff pass through the devices such as remote controlerThe first wireless signal for issuing access control system manually, captures first wireless signal, and to first wireless signal at this timeIt is decoded, obtains the characteristic informations such as frequency, wave character, the encoded information of the first wireless signal, and by first wireless communicationNumber information stored.
Optionally, described state obtains the first wireless signal, is decoded to first wireless signal, and storage decoding obtainsThe first wireless signal information, comprising:
The first wireless signal is captured, first wireless signal is decoded, the first wireless communication that storage decoding obtainsNumber information, wherein the information of first wireless signal includes the modulation system, centre frequency and base band of the first wireless signalCode information;
Accordingly, described that second wireless communication is generated according to the trigger signal and the information of the first wireless signal prestoredNumber, comprising:
According to the trigger signal and the modulation system of first wireless signal, centre frequency and base band code information,The base band code is modulated according to the modulation system to the centre frequency, second wireless singal is generated.
The first wireless signal is captured, first wireless signal is decoded, the information of first wireless signal is obtained,It can specifically be realized by following two step:
A: scanning first wireless signal, obtains the modulation system and centre frequency f of first wireless signal0。
This step is mainly the processing carried out on frequency domain to the first wireless signal.Initial frequency and the end of scanning are set firstOnly frequency, since initial frequency, according to preset step value set gradually each frequency point in frequency range to the first wireless signal intoRow scanning.When scanning the first wireless signal, received signal strength indicator information (Received Signal can be generatedStrength Indication, RSSI), it is identical as the frequency of the first wireless signal in the scan frequency of local frequency, that is, currentWhen, RSSI output amplitude highest, therefore by the way which corresponding RSSI of scanning frequency point by first wireless signal is scanned frequently, judgedIt is worth highest, then the frequency point is the centre frequency f of the first wireless signal0.Simultaneously by scanning available first wireless signalSpectrogram, may determine that the modulation system of first wireless signal, such as frequency shift keying (Frequency- according to the spectrogramShift keying, FSK), the modulation systems such as amplitude shift keying ASK (Amplitude-shift keying, ASL).
Since the time is about several milliseconds to usual run-down (from initial frequency to termination frequency), and access control system is originalFirst wireless signal emits duration more than several hundred milliseconds, therefore successively scanning can get the first wireless signalThe spectrum signatures information such as modulation system, centre frequency.Optionally, the initial frequency of the scanning of setting is about 200MHZ, terminates frequencyRate may be about 600MHZ.Due to usual access control system the radiofrequency signal i.e. frequency of the first wireless signal be 315MHZ orPerson 433MHZ etc., therefore the range for the initial frequency and termination frequency being arranged includes these common radiofrequency signal frequency ranges, energyEnough spectrum signature information that is more acurrate, obtaining first wireless signal more quickly.
B: with the centre frequency f got0For current scan frequency, first wireless signal is scanned again, and obtaining shouldThe base band code information of first wireless signal.
This step is mainly the processing to the first wireless signal in the time domain.With frequency identical with the first radio signal frequencyRate, i.e. the centre frequency f got in step A0For scan frequency, the number for obtaining the first wireless signal in preset time t is compiledCode rule, obtains base band code information.Optionally, which can be according to the centre frequency f got0It determines.InFrequency of heart f0Cycle T=1/f of available first wireless signal0, due to need to only obtain in the first wireless signal a cycleInformation can be obtained by the base band code information of the first wireless signal, thus preset time t can be set to slightly larger than T whenBetween, or t=nT is enabled, wherein n can be the arbitrary value in 2~10.
A, B obtain first wireless communications such as the modulation system, centre frequency, base band code of the first wireless signal through the above stepsNumber information after, these information are stored.
When detecting trigger signal, according to the modulation system, centre frequency and base band code of the first wireless signal of storageInformation etc. modulates the base band code of storage into first wireless signal according to the modulation system of the first wireless signal of storageFrequency of heart obtains the second wireless singal for having the same signal characteristic information with the first wireless signal, that is, the second nothing generatedLine signal is equivalent to the duplicate of the first wireless signal.
In S103, the second wireless singal is sent to the access control system, the access control system execution is controlled and opensDoor movement.
Visitor is sent to access control system by the second wireless singal that automated intelligent after identification verifying generates, second nothingLine signal is identical as the function of original first wireless signal of access control system.Access control system either receives original user handThe second wireless singal generated after intelligent recognition in the first wireless signal or the embodiment of the present invention that dynamic operation issues, can ringThe control of induction signal executes door opening action.
In the embodiment of the present invention, due to simulating the first of original access control system when visitor is by identification verifyingWireless signal generates second wireless singal, and access control system executes door opening action, i.e., before not destroying original access control systemPut and merged intelligent identification technology with existing access control system by the simulation of wireless signal, thus can control hardware atThis while, realizes merging for intelligent identification technology and access control system, and eliminates replacement or be transformed the time of access control systemCost.
Embodiment two:
Fig. 2 shows the flow diagrams of second of access control method provided by the embodiments of the present application, and details are as follows:
In S201, the identity information of visitor is identified, if the identity information of the visitor generates touching by identification verifyingIt signals.
S201 is identical as the S101 in a upper embodiment in the present embodiment, referring specifically to the phase of S101 in a upper embodimentDescription is closed, is not repeated herein.
Optionally, before the step S201, further includes:
If having detected visitor's visiting, the prompt information of typing identity information is issued;
Record the identity information of visitor's typing.
Currently whether there is visitor's visiting by infrared sensor of the human body or imaging sensor detection, if having detected visitorVisiting, then issue the prompt information of typing identity information.Such as designated position is emitted in a manner of text importing or voiceThe prompt information of man face image acquiring, fingerprint typing or voice input is carried out, to indicate visitor's typing identity information.Work as visitorWhen carrying out identity information typing according to prompt, the identity information of visitor's typing is received and recorded.
In S202, second wireless singal is generated according to the trigger signal and the information of the first wireless signal prestored,Wherein first wireless signal is the radiofrequency signal that user's operation access control system issues.
S202 is identical as the S102 in a upper embodiment in the present embodiment, referring specifically to the phase of S102 in a upper embodimentDescription is closed, is not repeated herein.
In S203, the second wireless singal is sent to the access control system, the access control system execution is controlled and opensDoor movement.
S203 is identical as the S103 in a upper embodiment in the present embodiment, referring specifically to the phase of S103 in a upper embodimentDescription is closed, is not repeated herein.
In S204, the identity information and visiting time information of the visitor are stored.
The identity information for the visitor that will acquire and the visiting time information of the visitor carry out corresponding storage, such as can be withThe form of tables of data establishes corresponding relationship, to inquire the visiting record of visitor later.It is alternatively possible to according to the visit gotThe information such as facial image, fingerprint or the voice of visitor, match the name or number (such as employee number) of the visitor prestored, willMatched name or number is corresponding with visiting time stores, so that the visiting of quick search visitor later records.Optionally, instituteStating visitor is the interior employee for having shifted to an earlier date the enterprise of typing identity information, and matched name or number is corresponding with visiting timeAfter storage, Attendance Sheet is automatically generated, records the attendance situation of interior employee.
In the embodiment of the present invention, due to simulating the first of original access control system when visitor is by identification verifyingWireless signal generates second wireless singal, and access control system executes door opening action, i.e., before not destroying original access control systemPut and merged intelligent identification technology with existing access control system by the simulation of wireless signal, thus can control hardware atThis while, realizes merging for intelligent identification technology and access control system, and eliminates replacement or be transformed the time of access control systemCost.Meanwhile the identity information by storing visitor every time and visiting time information, can conveniently after carry out visiting historyThe inquiry of record is also convenient for enterprise and carries out staff attendance record.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each processExecution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limitIt is fixed.
Embodiment three:
Fig. 3 shows a kind of structural schematic diagram of access control device provided by the embodiments of the present application, for ease of description,Illustrate only part relevant to the embodiment of the present application:
The access control device includes: trigger signal generation unit 31, second wireless singal generation unit 32, transmission unit33.Wherein:
Trigger signal generation unit 31, the identity information of visitor for identification, if the identity information of the visitor passes through knowledgeIt does not verify, then generates trigger signal.
When having detected visitor close to access control system, such as pass through infrared sensor or imaging sensor etc., detectionTo have visitor close to when, the automatic identity information for obtaining visitor, and the identity information of visitor is identified.If the body of visitorPart information then generates trigger signal by identification verifying, which is the finger for the radiofrequency signal that triggering generation access control is openedEnable signal.
Optionally, the trigger signal generation unit 31 includes:
First identification module, for by recognition of face, fingerprint recognition, in speech recognition any one or any twoThe identification method of kind and combination of the above, identifies the identity information of visitor.
Optionally, the trigger signal generation unit 31 includes uploading module, judgment module and trigger signal generation module:
Uploading module is uploaded to intelligent recognition for obtaining the identity information of visitor, and by the identity information of the visitorServer.
Judgment module, the recognition result information returned for receiving the intelligent recognition server, and according to the identificationResult information judges whether the identity information of the visitor passes through identification verifying.
Trigger signal generation module, if the identity information for the visitor generates trigger signal by identification verifying.
Second wireless singal generation unit 32, for the information according to the trigger signal and the first wireless signal prestoredSecond wireless singal is generated, wherein first wireless signal is the radiofrequency signal that user's operation access control system issues.
Existing access control system is usually constructed with remote control equipment, and (user refers to access control system administrative staff, example to user hereSuch as the foreground personnel of enterprise) by manually controlling remote control equipment, radiofrequency signal is issued, with the unlatching of access control system.HereFirst wireless signal refers to the radiofrequency signal that user's operation access control system issues, such as original access control system is distantSignal is controlled, i.e. the first wireless signal is the radiofrequency signal that existing access control system is original, is issued by user's manual handling equipment.ThisIn second wireless singal refer to according to intelligent recognition result automatic trigger generate with first wireless signal have it is identicalThe wireless signal of feature (such as identical frequency, waveform, encoded information).
Transmission unit 33 controls the access control system for the second wireless singal to be sent to the access control systemExecute door opening action.
Visitor is sent to access control system by the second wireless singal that automated intelligent after identification verifying generates, second nothingLine signal is identical as the function of original first wireless signal of access control system.Access control system either receives original user handSecond wireless singal after intelligent recognition generates in the first wireless signal or the embodiment of the present invention that dynamic operation issues, can ringThe control of induction signal executes door opening action.
Optionally, the access control device further include:
Prompt unit, if issuing the prompt information of typing identity information for having detected visitor's visiting;Record visitorThe identity information of typing.
Optionally, the access control device further include:
First wireless signal acquiring unit is decoded first wireless signal for the first wireless signal of acquisition,The information for the first wireless signal that storage decoding obtains.
Optionally, the first wireless signal acquiring unit includes:
Decoder module is captured, for capturing the first wireless signal, first wireless signal is decoded, storage decodingThe information of the first obtained wireless signal, wherein the information of first wireless signal includes the modulation methods of the first wireless signalFormula, centre frequency and base band code information.
Accordingly, the second wireless singal generation unit 32 includes:
Modulation module, for modulation system, the centre frequency according to the trigger signal and first wireless signalWith base band code information, the base band code is modulated according to the modulation system to the centre frequency, second wireless singal is generated.
Optionally, the access control device further include:
Storage unit, for storing the identity information and visiting time information of the visitor.
In the embodiment of the present invention, due to simulating the first of original access control system when visitor is by identification verifyingWireless signal generates second wireless singal, and access control system executes door opening action, i.e., before not destroying original access control systemPut and merged intelligent identification technology with existing access control system by the simulation of wireless signal, thus can control hardware atThis while, realizes merging for intelligent identification technology and access control system, and eliminates replacement or be transformed the time of access control systemCost.
Example IV:
Fig. 4 is the schematic diagram for the terminal device that one embodiment of the invention provides.As shown in figure 4, the terminal of the embodiment is setStandby 4 include: processor 40, memory 41 and are stored in the meter that can be run in the memory 41 and on the processor 40Calculation machine program 42, such as access control program.The processor 40 realizes above-mentioned each door when executing the computer program 42Prohibit the step in control method embodiment, such as step S101 to S103 shown in FIG. 1.Alternatively, the processor 40 executes instituteThe function of each module/unit in above-mentioned each Installation practice, such as module 31 to 33 shown in Fig. 3 are realized when stating computer program 42Function.
Illustratively, the computer program 42 can be divided into one or more module/units, it is one orMultiple module/units are stored in the memory 41, and are executed by the processor 40, to complete the present invention.Described oneA or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used forImplementation procedure of the computer program 42 in the terminal device 4 is described.For example, the computer program 42 can be dividedIt is cut into trigger signal generation unit, second wireless singal generation unit, transmission unit, each unit concrete function is as follows:
Trigger signal generation unit, the identity information of visitor for identification, if the identity information of the visitor passes through identificationVerifying, then generate trigger signal.
Second wireless singal generation unit, for raw according to the trigger signal and the information of the first wireless signal prestoredAt second wireless singal, wherein first wireless signal is the radiofrequency signal that user's operation access control system issues.
Transmission unit controls the access control system and holds for the second wireless singal to be sent to the access control systemRow door opening action.
The terminal device 4 can be raspberry pie, desktop PC, notebook, palm PC and cloud server etc.Calculate equipment.The terminal device may include, but be not limited only to, processor 40, memory 41.Those skilled in the art can manageSolution, Fig. 4 is only the example of terminal device 4, does not constitute the restriction to terminal device 4, may include more or more than illustratingFew component perhaps combines certain components or different components, such as the terminal device can also be set including input and outputStandby, network access equipment, bus etc..
Alleged processor 40 can be central processing unit (Central Processing Unit, CPU), can also beOther general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit(Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processorDeng.
The memory 41 can be the internal storage unit of the terminal device 4, such as the hard disk or interior of terminal device 4It deposits.The memory 41 is also possible to the External memory equipment of the terminal device 4, such as be equipped on the terminal device 4Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodgeDeposit card (Flash Card) etc..Further, the memory 41 can also both include the storage inside list of the terminal device 4Member also includes External memory equipment.The memory 41 is for storing needed for the computer program and the terminal deviceOther programs and data.The memory 41 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each functionCan unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by differentFunctional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completingThe all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can alsoTo be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integratedUnit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function listMember, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above systemThe specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodimentThe part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosureMember and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actuallyIt is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technicianEach specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceedThe scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be withIt realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, instituteThe division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such asMultiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.SeparatelyA bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, deviceOr the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unitThe component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multipleIn network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unitIt is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated listMember both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale orIn use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementationAll or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer programCalculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that onThe step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generationCode can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable mediumIt may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program codeDish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM,Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that describedThe content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practiceSubtract, such as does not include electric carrier signal and electricity according to legislation and patent practice, computer-readable medium in certain jurisdictionsBelieve signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned realityApplying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned eachTechnical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modifiedOr replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should allIt is included within protection scope of the present invention.