Summary of the invention
At least one of to solve the above-mentioned problems, the application provides a kind of electronic identity voucher generation method, comprising:
The encryption message that terminal is sent is received, the encryption message includes multiple information factors, and each information factor passes throughEncryption formation is carried out to the identity information of registration user, and the cipher mode of at least two information factors is different, it is describedIdentity information includes ID card information;
The encryption message is decrypted, each information factor is obtained;
Electronic identity voucher is generated according to all information factors, and using the authentication code and biological characteristic of registration user's typingInformation stores the electronic identity as key encryption.
In certain embodiments, the ID card information include: address name, user's gender, certificate card number, certificate it is effectivePhase, finger print information and identity card DN code, and/or,
The biological information to be formed by encoding to facial image progress base64.
In certain embodiments, the electronic identity voucher is two dimensional code mark.
In certain embodiments, further includes:
The ID card information is authenticated, determines whether the ID card information is correct;And/or
Further include:
Receive the authentication code of registration user's typing.
In certain embodiments, the identity information further includes reserved customer information.
In certain embodiments, a kind of electronic identity voucher generation method, comprising:
Multiple identity informations of registration user are obtained, the identity information includes ID card information;
The information factor that encryption forms corresponding number is carried out to each identity information using at least one cipher mode;
The information factor is packaged as encryption message and is sent to server, so that the server is to the encryption messageIt is decrypted to obtain each information factor, and then generates electronic identity voucher according to all information factors, wherein the electronics bodyPart voucher is encrypted using the authentication code and biological information of registration user's typing as key.
In certain embodiments, the ID card information include: address name, user's gender, certificate card number, certificate it is effectivePhase, finger print information and identity card DN code;And/or the biological information is by carrying out base64 coding to facial imageIt is formed.
In certain embodiments, the electronic identity voucher is two dimensional code mark.
In certain embodiments, further includes:
The authentication code of typing registration user.
In certain embodiments, the identity information further includes reserved customer information.
The application also provides a kind of for generating the server of electronic identity voucher, comprising:
Message receiving module is encrypted, the encryption message that terminal is sent is received, the encryption message includes multiple information factors,Each information factor carries out encryption formation by an identity information to registration user, and at least two information factors plusClose mode is different, and the identity information includes ID card information;
Deciphering module is decrypted the encryption message, obtains each information factor;
Electronic identity voucher generation module generates electronic identity voucher according to all information factors, and using registration userThe authentication code and biological information of typing store the electronic identity as key encryption.
In certain embodiments, the ID card information include: address name, user's gender, certificate card number, certificate it is effectivePhase, finger print information and identity card DN code, and/or,
The biological information to be formed by encoding to facial image progress base64.
In certain embodiments, the electronic identity voucher is two dimensional code mark.
In certain embodiments, further includes:
Just whether ID card information authentication module authenticates the ID card information, determine the ID card informationReally;And/or
Further include:
Authentication code receiving module receives the authentication code of registration user's typing.
In certain embodiments, the identity information further includes reserved customer information.
The application also provides a kind of for generating the terminal of electronic identity voucher, comprising:
Identity information acquisition module, obtains multiple identity informations of registration user, and the identity information includes identity card letterBreath;
Encrypting module carries out the information that encryption forms corresponding number to each identity information using at least one cipher modeThe factor;
Message sending module is encrypted, the information factor is packaged as encryption message and is sent to server, so that the clothesBusiness device is decrypted to obtain each information factor to the encryption message, so according to all information factors generation electronic identity withCard, wherein the electronic identity voucher is encrypted using the authentication code and biological information of registration user's typing as key.
In certain embodiments, the ID card information include: address name, user's gender, certificate card number, certificate it is effectivePhase, finger print information and identity card DN code;And/or the biological information is by carrying out base64 coding to facial imageIt is formed.
In certain embodiments, the electronic identity voucher is two dimensional code mark.
In certain embodiments, further includes:
Authentication code recording module, authentication code described in typing.
In certain embodiments, the identity information further includes reserved customer information.
The application also provides a kind of computer equipment, including memory, processor and storage on a memory and can locatedThe step of computer program run on reason device, the processor realizes method as described above when executing described program.
The application also provides a kind of computer readable storage medium, is stored thereon with computer program, the computer programThe step of method as described above is realized when being executed by processor.
The invention has the following beneficial effects:
A kind of electronic identity voucher generation method, terminal and server provided by the invention pass through the institute in encryption messageThere is the information factor to obtain electronic identity voucher, each information factor is encrypted according to an identity information, and at leastThe cipher mode of two information factors is different, and then one side encryption rule is complicated, is not easy to be stolen, on the other hand, with registrationThe authentication code and biological information of user's typing are as key, when needing to transfer electronic identity voucher, need using certificationCode and biological information decryption, strengthen the safety of electronic identity voucher.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, completeSite preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based onEmbodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every otherEmbodiment shall fall within the protection scope of the present invention.
Fig. 1 shows a kind of credible electronic identity authentication system comprising terminal 1 and server 5.
Terminal 1 and external information collecting device, such as fingerprint capturer, identity card recognizer 2, recognition of face device etc. are evenIt connects, available identity information, such as the address name, user's gender, certificate card number, the certificate that obtain from identity card are effectivePhase, identity card DN code, the finger print information etc. acquired by fingerprint capturer.
Terminal is responsible for carrying out above-mentioned identity information encryption formation encryption message, and encryption message is then sent to serviceDevice, so that server generates electronic identity voucher according to all information factors in encryption message.
It in the embodiment in figure 1, can also include for the storage server 4 of storage, for Ministry of Public Security's authenticationThe authentication server 3 of 8 requests verification of platform, carries out sign test server 7 of signature verification etc..
Further, ciphering process can not execute in server, can execute solution by the encryption equipment being separately providedClose, this will not be repeated here.
Since the above- mentioned information factor is uniquely, according to preset generating algorithm, to can be generated with uniquenessElectronic identity voucher.
Fig. 2 shows the electronic identity voucher generation methods that the application terminal is implemented, and specifically include:
S11: multiple identity informations of registration user are obtained, the identity information includes ID card information;
S12: the information factor that encryption forms corresponding number is carried out to each identity information using at least one cipher mode;
S13: the information factor is packaged as encryption message and is sent to server, so that the server is to the encryptionMessage is decrypted to obtain each information factor, and then generates electronic identity voucher according to all information factors, wherein the electricitySub- identity documents are encrypted using the authentication code and biological information of registration user's typing as key.
It is appreciated that a kind of electronic identity voucher generation method provided by the invention implemented by terminal, is reported by encryptionAll information factors in text obtain electronic identity voucher, and each information factor is encrypted according to an identity information,And the cipher mode of at least two information factors is different, and then one side encryption rule is complicated, is not easy to be stolen, another partyFace is needed when needing to transfer electronic identity voucher using the authentication code and biological information of registering user's typing as keyIt is decrypted using authentication code and biological information, strengthens the safety of electronic identity voucher.
It describes in detail below to electronic identity voucher generation method.
It is appreciated that DN code is the unique identification of identity card, if a citizen possesses multiple identity cards, every identity cardDN code is also all different.
Terminal is encrypted using a variety of cipher modes, specifically, first by all identity informations according to format classification intoRow classification, is then normalized the identity information of classification, uses to the other identity information of every type after normalizationA kind of cipher mode is encrypted.Specifically, being encrypted using information of the dynamic encryption to number format, using following encryptionsThe information of field format is encrypted.
As shown in fig. 6, be illustrated below one specifically the cipher mode to field format data by way of example, it will be appreciated thatFollowing Encryption Algorithm cannot be considered as the limitation to the application Encryption Algorithm.
S71: original field data 1, original field data 2, original field data 3 to original field data N are to encryptInformation field, N represents one or more, and system can calculate the specific value of N automatically.
For a certain original field data N, one of customized set of algorithms M algorithm can be used, it is encrypted.Symmetry algorithm and asymmetric arithmetic can be used in set of algorithms M.Symmetry algorithm includes 3DES, SM4, AES etc., and the key of every kind of algorithm canAccording to configuration requirement by the second, point, when, day, week, the moon, year different cycles carry out dynamic update, asymmetric arithmetic includes SM2, RSADeng.System is that each field N selects a kind of Encryption Algorithm, and generating algorithm sequence from set of algorithms M according to the specific value of NK1K2K3...Kn, Kn indicate a kind of Encryption Algorithm, and sequence of algorithms K1K2K3...Kn is encrypted using national secret algorithm SM4, closeKey supports dynamic to update.The key of above-mentioned symmetry algorithm is always consistent in terminal and server.
S72: by previous step rule, system to original field data 1, original field data 2, original field data 3 toOriginal field data N is encrypted according to the algorithm that sequence of algorithms K1K2K3...Kn chooses, to sequence of algorithms K1K2K3...KnIt is encrypted.Ciphertext L is spliced into using list separator between data, and list separator is customized character visible or can in systemSee character string.
After each field data completes encryption, electronic identity voucher terminal sends to electronic identity voucher server and instructs, and makesPrivate key is generated in electronic identity voucher server with asymmetric SM2 national secret algorithm, and corresponding public key is returned into electronic identityVoucher terminal.The public and private key that asymmetric SM2 national secret algorithm generates to can press the second, point, when, day, week, the moon, year different cycles it is dynamicState updates.Ciphertext L is encrypted to ciphertext X using the public key that asymmetric SM2 national secret algorithm generates.
S73: carrying out base64 coding to ciphertext X, at the same after base64 coding the front F of bit string, middle part Y or afterThe out-of-order character of portion B supplement safety, safety random ordering character is consistent with the character visible range that base64 is encoded, safety random ordering characterQuantity is 12 multiple, and the out-of-order character string system of the safety of front F, middle part Y or rear portion B can be defined and combine, and according toSystem ultimately produces base64 encoded information format message and is sent.
In some embodiments, the biological information to be formed by encoding to facial image progress base64.
In addition, in certain embodiments, the electronic identity voucher is two dimensional code mark.
Further, the above method further include: the authentication code of typing registration user.
Authentication code is the identifying code of user's typing, and the application is added by combining biological information with authentication codeClose decryption, and then identifying code and biological information acquisition electronic certificate are needed while inputting, improve the safety of electronic certificateProperty.
In certain embodiments, above-mentioned identity information further includes reserved customer information.
By taking banking system as an example, customer information includes existing customer's number, cell-phone number of client etc..
In addition, the above method further includes the steps that authentication: according to the DN code, being transferred from the server of public security departmentCorresponding authentication information is compared with the identity information of reading, if unanimously, authentication passes through.
Fig. 3 shows a kind of electronic identity voucher generation method by server implementation, comprising:
S21: the encryption message that terminal is sent is received, the encryption message includes multiple information factors, each information factorEncryption formation is carried out by an identity information to registration user, and the cipher mode of at least two information factors is different,The identity information includes ID card information;
S22: the encryption message is decrypted, each information factor is obtained;
S23: electronic identity voucher is generated according to all information factors, and using the authentication code and biology of registration user's typingCharacteristic information stores the electronic identity as key encryption.
It is appreciated that a kind of electronic identity voucher generation method provided by the invention implemented by terminal, is reported by encryptionAll information factors in text obtain electronic identity voucher, and each information factor is encrypted according to an identity information,And the cipher mode of at least two information factors is different, and then one side encryption rule is complicated, is not easy to be stolen, another partyFace is needed when needing to transfer electronic identity voucher using the authentication code and biological information of registering user's typing as keyIt is decrypted using authentication code and biological information, strengthens the safety of electronic identity voucher.
It is appreciated that be based on identical inventive concept, in some embodiments, the ID card information include: address name,User's gender, certificate card number, certificate validity period, finger print information and identity card DN code.
Based on identical inventive concept, in some embodiments, the biological information is by carrying out facial imageBase64 encodes to be formed.
Based on identical inventive concept, in some embodiments, the electronic identity voucher is two dimensional code mark.
Based on identical inventive concept, in some embodiments, further includes:
The ID card information is authenticated, determines whether the ID card information is correct.
Authentication information is transferred from public security server by DN code in the embodiment to be authenticated.
Based on identical inventive concept, in some embodiments, further includes:
Receive the authentication code of registration user's typing.
Authentication code is the customized identifying code of user, can be existed in a manner of 6 bit digitals or 8 bit digitals etc..
In the embodiment of the present application, client can be new client or frequent customer, and frequent customer is stored with corresponding in systemsIdentity information, such as fingerprint, face feature and identity card etc..
Terminal and server is described in detail below.
Fig. 4 shows the virtual architecture schematic diagram of terminal, specifically includes: identity information acquisition module 11, obtains registration and usesMultiple identity informations at family, the identity information include ID card information;Encrypting module 12, using at least one cipher mode pairEach identity information carries out the information factor that encryption forms corresponding number;Message sending module 13 is encrypted, by the information factorBe packaged as encryption message and be sent to server so that the server to the encryption message be decrypted to obtain each information becauseSon, and then electronic identity voucher is generated according to all information factors, wherein the electronic identity voucher is using registration user's typingAuthentication code and biological information as key encrypt.
In some embodiments, terminal and external information collecting device, for example, fingerprint capturer, identity card recognizer,The connection such as recognition of face device.
Based on identical inventive concept, in an embodiment, the ID card information includes: address name, user's gender, cardPart card number, certificate validity period, finger print information and identity card DN code;And/or the biological information passes through to facial imageBase64 is carried out to encode to be formed.
Based on identical inventive concept, in an embodiment, the electronic identity voucher is two dimensional code mark.
Based on identical inventive concept, in an embodiment, terminal further include:
Authentication code recording module, authentication code described in typing.
Based on identical inventive concept, in an embodiment, the identity information further includes reserved customer information.
Fig. 5 shows the concrete structure schematic diagram of server, as shown in figure 5, comprising: encrypt message receiving module 21,The encryption message that terminal is sent is received, the encryption message includes multiple information factors, and each information factor is by using registrationOne identity information at family carries out encryption formation, and the cipher mode of at least two information factors is different, the identity informationIncluding ID card information;Deciphering module 22 is decrypted the encryption message, obtains each information factor;Electronic identity withGeneration module 23 is demonstrate,proved, generates electronic identity voucher according to all information factors, and using the authentication code of registration user's typing and lifeObject characteristic information stores the electronic identity as key encryption.
It is appreciated that server provided by the present application, obtains electronic identity by all information factors in encryption messageVoucher, each information factor are encrypted according to an identity information, and the cipher mode of at least two information factorsDifference, and then one side encryption rule is complicated, is not easy to be stolen, on the other hand, to register the authentication code and biology of user's typingCharacteristic information is as key, when needing to transfer electronic identity voucher, needs to decrypt using authentication code and biological information, addThe strong safety of electronic identity voucher.
Based on identical inventive concept, the ID card information includes: address name, user's gender, certificate card number, certificateValidity period, finger print information and identity card DN code, and/or, the biological information is by carrying out base64 to facial imageCoding is formed.
The electronic identity voucher is two dimensional code mark.
Based on identical inventive concept, further includes:
Just whether ID card information authentication module authenticates the ID card information, determine the ID card informationReally;And/or, further includes:
Authentication code receiving module receives the authentication code of registration user's typing.
Based on identical inventive concept, the identity information further includes reserved customer information.
The generation scene and application scenarios of electronic certificate is illustrated below.
Step S501: when client's arrival bank outlets' sales counter handles registration electronic certificate business, terminal is initiated to read two generation bodiesThe instruction of part card information, client pass through the credible 2 brush China second-generation identity card of card-reading apparatus in cabinet face outside sales counter, and service terminal takes DNAfter the second-generation identification card informations such as code, customer name, identification card number and fingerprint, pass through encryption and generate message, then by dataServer is sent to be handled.
Step S502: server receives the data of terminal request, is analyzed and processed to message, is carried out according to type of messageProcessing.If client is new client, the corresponding customer number of new client is generated, terminal sends the finger of typing electronic certificate authentication codeIt enables, client is passed through by code keyboard typing double probate code, system veritification, client's success typing authentication code.
Step S503 terminal calls portrait living body control, and system obtains qualified facial image and is used for recognition of face, and rightIt carries out base64 coding, while by facial image, Client handset number and the electronic certificate authentication code related data after coding intoRow processing, and it is sent to server, server network handles data, then transmits data to private server 3, Special clothesBusiness device 3 transmits data to Ministry of Public Security's identity authentication platform 8 by network special line and is verified, and verifies successful result original road and returnsReturn to terminal.If client is registered to cross electronic certificate, 5 electronic certificate message processing module 53 of application server is remembered according to systemRecord prompts the actual conditions of client enrollment electronic certificate.If user, there are multiple identity cards, system judges that certificate validity period originatesWhether date or date of expiry are less than the validity period in system in the customer information, such as less than, it is desirable that and client holds new certificate acquiring,Or it is handled again after the customer information of more new system.
Step S504: terminal receives unsuccessful verification as a result, registration electronic certificate success, application server 5 compile clientNumber, the information such as electronic certificate, customer name, passport NO., fingerprint and transaction code be sent to storage server 4 and saved,Wherein, be related to the sensitive datas such as electronic certificate, customer name, passport NO., fingerprint by encryption equipment encryption and decryption handle after again intoRow saves.
The scene that client uses electronic certificate is illustrated below.
Step S701: client reaches bank outlets' sales counter, and the mobile device of installation Mobile banking app shows that client nets card twoIt ties up code (electronic certificate), the service terminal that channel accesses 1 site cabinet face 11 reads net card two dimensional code using scanning means, passes through peopleAs living body control shooting facial image photo, and base64 coding is carried out, passes through code keyboard input authentication code, sets of relational dataDress is message, is sent to application server 5.
Step S702: application server 5 splits message, sends the data to encryption equipment 5 and carries out data encrypting and decipheringProcessing splits type of message, customer name, identification card number, certificate validity period, the facial image of base64 coding, base64 volumeFinger print information, Client handset number, net card authentication code, the net of code demonstrate,prove the data of information and each field of transaction code, and request is authenticatedData be sent to sign test server 7 and sign, service-specific is sent by application server 5 by the data after signatureDevice, then Ministry of Public Security's identity authentication platform 8 is accessed by network special line and is verified.Application server 5 receives the verification knot returnedFruit transmits data to sign test server 7 and carries out sign test processing, after the encrypted machine of the data of return encrypts, is saved in storage clothesBusiness device 4, the customer information and Transaction Information of former message are also needed through encryption equipment encrypting storing.Application server 5 is by authentication resultReturn to site service terminal.
Step S703: terminal receive net identification card as a result, system is automatically performed the process of transfer transactions, winding-up.
It is appreciated that the application can simplify bank transaction process, access unified management by all kinds of means is realized, verification process canTo form complete business handling chain of evidence electronic record, powerful measure is provided for verification, retrospect, proof client's actual wishes.The problem of can effectively solve bank client identification safety authentication realizes client in the case where not carrying China second-generation identity card mediumIt also can be the bank safety transacting business the problem of.During banking is handled, reduction and the cumbersome interactive step of client are mentionedRise customer service experience, raising efficiency.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer equipment, specifically, computer is setIt is standby for example can for personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant,Media player, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipmentIn any equipment combination.
Computer equipment specifically includes memory, processor and storage on a memory simultaneously in a typical exampleThe computer program that can be run on a processor is realized when the processor executes described program and is held as described above by clientCapable method, alternatively, the processor realizes the method executed as described above by server when executing described program.
Below with reference to Fig. 7, it illustrates the structural schematic diagrams for the computer equipment for being suitable for being used to realize the embodiment of the present application.
As shown in fig. 7, computer equipment 600 includes central processing unit (CPU) 601, it can be read-only according to being stored inProgram in memory (ROM) 602 is loaded into random access storage device (RAM) from storage section 608) program in 603And execute various work appropriate and processing.In RAM603, also it is stored with system 600 and operates required various program sum numbersAccording to.CPU601, ROM602 and RAM603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected toBus 604.
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathodeThe output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.;And including such as LAN card, the communications portion 609 of the network interface card of modem etc..Communications portion 609 via such as becauseThe network of spy's net executes communication process.Driver 610 is also connected to I/O interface 606 as needed.Detachable media 611, such asDisk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereonComputer program be mounted as needed such as storage section 608.
Particularly, according to an embodiment of the invention, may be implemented as computer above with reference to the process of flow chart descriptionSoftware program.For example, the embodiment of the present invention includes a kind of computer program product comprising be tangibly embodied in machine readableComputer program on medium, the computer program include the program code for method shown in execution flow chart.At thisIn the embodiment of sample, which can be downloaded and installed from network by communications portion 609, and/or from removableMedium 611 is unloaded to be mounted.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any methodOr technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), movesState random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasableProgrammable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devicesOr any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculatesMachine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing thisThe function of each unit can be realized in the same or multiple software and or hardware when application.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program productFigure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructionsThe combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programsInstruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produceA raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for realThe device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spyDetermine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram orThe function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that countingSeries of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer orThe instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram oneThe step of function of being specified in a box or multiple boxes.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludabilityIt include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrapInclude other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic wantElement.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described wantThere is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the applicationForm.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program codeThe shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as programModule.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, groupPart, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, byTask is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be withIn the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodimentDividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system realityFor applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the methodPart explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the artFor, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equalReplacement, improvement etc., should be included within the scope of the claims of this application.