Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
The embodiment of the disclosure provides a message re-access method and device used when the information of an access notification bar fails. The method comprises a process of caching the associated information of the message and a process of revisiting through the associated information. The process of caching the associated information of the message comprises the step of determining a page corresponding to the message when the operation of accessing the message in the notification bar is triggered by a user, wherein the page corresponding to the message is loaded in a specified application program. And caching the associated information of the message while executing the instruction of jumping to the page. If the jump instruction fails to be executed, re-accessing according to the associated information, specifically detecting whether a user starts a specified application program; and if the user starts the appointed application program, reading the associated information, and loading the page in the appointed application program according to the associated information.
FIG. 1 schematically illustrates anexemplary system architecture 100 to which a method of accessing notification bar messages may be applied, according to an embodiment of the disclosure. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, thesystem architecture 100 according to this embodiment may includeterminal devices 101, 102, 103, anetwork 104 and aserver 105. Thenetwork 104 serves as a medium for providing communication links between theterminal devices 101, 102, 103 and theserver 105.Network 104 may include various connection types, such as wired and/or wireless communication links, and so forth.
The user may use theterminal devices 101, 102, 103 to interact with theserver 105 via thenetwork 104 to receive or send messages or the like. Theterminal devices 101, 102, 103 may have installed thereon various communication client applications, such as a shopping-like application, a web browser application, a search-like application, an instant messaging tool, a mailbox client, and/or social platform software, etc. (by way of example only).
Theterminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
Theserver 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using theterminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the method for accessing a notification bar message provided by the embodiment of the present disclosure may be generally executed by theserver 105. Accordingly, the means for accessing notification bar messages provided by embodiments of the present disclosure may be generally disposed inserver 105. The method for accessing notification bar messages provided by the embodiments of the present disclosure may also be performed by a server or a server cluster that is different from theserver 105 and is capable of communicating with theterminal devices 101, 102, 103 and/or theserver 105. Accordingly, the device for accessing the notification bar message provided by the embodiment of the present disclosure may also be disposed in a server or a server cluster different from theserver 105 and capable of communicating with theterminal devices 101, 102, 103 and/or theserver 105. Alternatively, the method for accessing the notification bar message provided by the embodiment of the present disclosure may also be executed by theterminal device 101, 102, or 103, or may also be executed by another terminal device different from theterminal device 101, 102, or 103. Accordingly, the apparatus for accessing the notification bar message provided by the embodiment of the present disclosure may also be disposed in theterminal device 101, 102, or 103, or in another terminal device different from theterminal device 101, 102, or 103.
For example, the association information of the message may be originally stored in any one of theterminal devices 101, 102, or 103 (for example, but not limited to, the terminal device 101), or may be stored on an external storage device and may be imported into theterminal device 101. Then, theterminal device 101 may locally perform the method for accessing a notification bar message provided by the embodiment of the present disclosure, or transmit the associated information of the message to another terminal device, a server, or a server cluster, and perform the method for accessing a notification bar message provided by the embodiment of the present disclosure by another terminal device, a server, or a server cluster that receives the associated information of the message.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Fig. 2 schematically illustrates an application scenario of a method of accessing a notification bar message according to an embodiment of the present disclosure. Commonly, somepush messages 201, 202, 203 and 204 are shown in the notification bar of the handset. The push messages may be hot news messages pushed by some social applications or notification messages pushed by some tool applications, and the specific types of thepush messages 201, 202, 203, and 204 are not limited in the present application.
When a user wants to view a message, the user typically clicks on the message in the notification bar, and then jumps to the application that pushed the message, and loads the page in the application that presented the message. In this process, there may be a phenomenon of access failure. For example, the calling end fails, and when jumping to the corresponding application program, the application program is not successfully started. Or for example, after the jump to the application program is successful, an exception occurs in the process of loading the page, so that the page corresponding to the message cannot be accessed finally. Typically, after a user clicks on a message in a notification bar, the message disappears in the notification bar. Thus, the user cannot re-access the message.
In some prior art, a user may install a third-party management application on the mobile terminal to manage messages in the notification bar. And setting the management application program to acquire the history messages in the notification bar, so that the user can search the management application program for the messages with failed access. The premise for implementing the method is that the third-party application program needs to have the authority of accessing other application programs. Therefore, the method may have the possibility of acquiring the personal privacy of the user, and has poor security and is easy to cause unnecessary loss to the user.
In the prior art, the method for realizing the re-access of the notification bar message on the premise of not depending on the third-party application program is provided, so that the safety of the access process is improved, the success rate of the user for accessing the message is also ensured, the capability of the user for re-accessing the message is improved, and the sticky effect of the application program is enhanced.
FIG. 3 schematically illustrates a flow diagram of a method of accessing a notification bar message according to an embodiment of the disclosure.
As shown in fig. 3, the method includes operations S301 to S304.
In operation S301, in response to an operation that a user triggers to access a message in a notification bar, a page corresponding to the message is determined, and the page corresponding to the message is loaded in a specified application program.
In operation S302, an instruction to jump to a page is executed, and association information of the message is cached.
The present application does not limit the specific content of the associated information, and only the corresponding explanation is made here. For example, the association information may be the message itself, i.e. the device temporarily synchronously caches the message in some memory while executing the instruction to jump to the page. For another example, the associated information may be a page address corresponding to the message, that is, while executing the instruction to jump to the page, the device temporarily and synchronously caches the page address corresponding to the message in a certain memory. For another example, the link information may be a short message code containing information about the message, i.e. the device temporarily synchronously caches the short message code in a certain memory while executing the instruction to jump to the page. For another example, the link information may be a two-dimensional code containing information related to the message, that is, the device temporarily and synchronously caches the two-dimensional code in a certain memory while executing an instruction to jump to a page.
The associated information referred to in operation S302 is information according to which the message is accessed, and may be in any form, and the specific content and the specific format of the associated information in the present application are not limited.
In operation S303, if the execution of the instruction fails, it is detected whether the user starts a specific application.
In operation S304, if the user starts the designated application, the associated information is read, and the page is loaded in the designated application according to the associated information.
In the embodiment of the present disclosure, after the instruction for jumping to the loaded page of the application program fails to be executed, if the user still wants to access the message, the application program is usually restarted to search for the message. At this time, the device can automatically read the association information cached in the memory in the background, identify the page corresponding to the message contained in the association information, reload the page, and finally complete the revisit of the message.
Generally, after a user starts an application, the device actively detects whether there is cached association information. However, the purpose of the user to start the application program is not necessarily to access the message corresponding to the associated information. Therefore, after it is determined that the cached association information is detected, that is, before the page corresponding to the association information is loaded, a prompt needs to be sent to the user to inquire whether the user needs to access the page, and after the confirmation information is received, the page is loaded. And if the rejected information is received, the application program can be normally opened for the user to use.
Through the implementation of the method and the device, when the message is accessed for the first time, the associated information of the message is cached, so that even if the access fails, the re-access to the message can be realized by restarting the application program. The re-access process does not depend on a third-party application program, so that the problems of unnecessary safety, privacy and other hidden dangers are avoided, the re-access information capacity of the user is improved, and the application sticky effect is enhanced.
FIG. 4A schematically illustrates a flow diagram of a method of accessing a notification bar message, according to another embodiment of the present disclosure.
As shown in fig. 4A, the method further includes operations S401 to S403.
In operation S401, an original message is acquired before the original message received in the notification bar.
In operation S402, the original message is encrypted, and a short message code is generated, through which a page corresponding to the original message can be accessed.
In operation S403, the original message and the short message code are sent to the notification bar, the original message is received by the notification bar and then converted into a message in the notification bar, and the short message code is used as the association information.
In the embodiment of the disclosure, in order to further improve the security of the access process and prevent an external program from illegally tampering the message in the notification bar, the application program sends the original message to the notification bar to perform encryption processing, so as to generate the short message code, thereby ensuring that the user can access the correct page.
Before the notification bar receives the original message sent by the application program, the original message is obtained and encrypted to generate a short message code, and finally the original message and the short message code are sent to the notification bar together. After the original message is sent to the notification bar, the original message is converted into a message conforming to the display format of the notification bar, and the short message code is temporarily stored in the notification bar as associated information. Preferably, the short message code is not displayed in the notification bar, but is associated with the corresponding message.
And after the associated information is the short message code, executing a command of jumping to the page, and caching the associated information of the message, specifically executing the command of jumping to the page, and caching the short message code. And if the user starts the specified application program, reading the associated information, and loading the page in the specified application program according to the associated information, specifically, if the user starts the specified application program, reading the short message code, and loading the page corresponding to the original message in the specified application program according to the short message code.
In particular, caching the short message code may be caching the short message code in a clipboard. After the application program is restarted and the short message code in the clipboard is read, the security of the short message code needs to be further detected to prevent the information in the clipboard from being illegally tampered by an external program. Therefore, if the user starts the designated application program, the short message code is read, and the page corresponding to the original message is loaded in the designated application program according to the short message code, specifically, if the user starts the designated application program, the text information in the clipboard is acquired; judging whether the text format of the text information accords with the text format of the short message code; and if the text format of the text message conforms to the text format of the short message code, reading the short message code, and loading the page corresponding to the original message in the specified application program according to the short message code.
The technical personnel in the field can reasonably design the text format of the short message code so as to reduce the risk of tampering and improve the accuracy of identifying illegal text information. For example, the detected text format may be the length of the text message, and it is checked whether the text length of the text message in the clipboard is consistent with the text length required by the short message code. As another example, the detected text format may be a special identifier in the text message, and whether the special identifier of the text message in the clipboard is modified compared to the special identifier required by the short message code is detected. For another example, the detected text format may be a text composition structure in the text message, and whether the text composition structure of the text message in the clipboard is consistent with the text composition structure required by the short message code is detected.
According to the embodiment of the disclosure, the encrypted short message code is generated based on the original message sent by the application program, so that the safety of page access is improved. Even after the original message is sent to the notification bar and is illegally tampered, the user is not influenced to access the correct page. Meanwhile, after the short message code is read, the text format of the short message code is still subjected to validity detection again, so that the short message code in the clipboard is prevented from being tampered. The safety of the user access process is ensured through various means, and the access experience of the user is improved.
As an alternative embodiment, security detection may also be performed on the application program that sent the original message, and whether the application program is a legitimate application program is determined. If the application program is an illegal application program, the original message is directly intercepted, and subsequent operation is not performed. If the application program is a legal application program, the subsequent operations of acquiring the original message, encrypting the original message to generate a short message code and the like are executed. The specific method of security detection may be to perform white list setting, and add known legitimate applications to the white list. Or detecting the historical operation behavior of the application program, and judging the application program without illegal operation behavior as a legal application program, and the like.
FIG. 4B schematically illustrates a flow diagram of a method of accessing a notification bar message, according to another embodiment of the present disclosure.
As shown in FIG. 4B, executing the jump to page instruction includes operations S404-S407.
In operation S404, a page is acquired.
In operation S405, determining whether the page is in the white list, and if the page is in the white list, performing operation S406; if the page is not in the white list, operation S407 is performed.
In operation S406, the instruction is executed.
In operation S407, a prompt for access risk is issued.
In the embodiment of the disclosure, the white list detection is performed on the accessed page, so that the security of the access is ensured. Since there is a risk of tampering when the message is displayed behind the notification bar. Although the user sees no change in the message in the notification bar, the page corresponding to the message may have been tampered with as another illegitimate page. Therefore, the first step of executing the instruction to jump to the page is to acquire the page and determine whether the page is in the white list. If the page is in the white list, the page is a page which can be normally accessed; and if the page is not in the white list, warning information is sent to the user, and the fact that the access is at risk is shown.
Similarly, if the page access is performed through the associated information, the white list detection is also required. Specifically, if the user starts a specified application program, reading the associated information to obtain a page corresponding to the message; judging whether the page is in a white list or not; if the page is in the white list, loading the page in the specified application program; and if the page is not in the white list, sending out prompt information of the access risk.
The white list can be set by any scheme according to the actual requirement by the person skilled in the art to improve the security of the access. Similarly, the access to the page may also be limited by setting a black list, which is not specifically limited by the present application.
As an alternative embodiment, the method further comprises clearing the cached association information after the instruction is successfully executed or the page is successfully loaded. If the instruction for jumping to the page is successfully executed, which indicates that the user has successfully accessed the page, the cached associated information can be cleared, and the occupancy rate of the memory is reduced. If the instruction of jumping to the page fails to be executed, the page is loaded successfully through the associated information, and the page is also indicated to be accessed successfully by the user, the cached associated information can be removed, and the occupancy rate of the memory is reduced. After the page corresponding to the interested message is successfully accessed, the associated information of the message can be regarded as the historical message which can not be used any more, so that the associated information is cleared, unnecessary space occupation in a memory is reduced, and the operation efficiency is improved.
FIG. 5 schematically illustrates a block diagram of an apparatus for accessing notification bar messages, in accordance with an embodiment of the present disclosure.
As shown in fig. 5, theapparatus 500 includes adetermination module 510, a jump andcache module 520, adetection module 540, and a read andload module 540.
The determiningmodule 510 is configured to determine, in response to an operation that a user triggers to access a message in the notification bar, a page corresponding to the message, where the page corresponding to the message is loaded in a specified application program.
A jump andcache module 520, configured to execute an instruction to jump to a page and cache information associated with a message.
The detectingmodule 530 is configured to detect whether the user starts the specified application program if the instruction fails to be executed.
And the reading andloading module 540 is configured to, if the user starts the specified application program, read the associated information, and load the page in the specified application program according to the associated information.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any number of the determiningmodule 510, the jumping andcaching module 520, the detectingmodule 540, and the reading andloading module 540 may be combined in one module/unit/sub-unit to be implemented, or any one of the modules/units/sub-units may be split into a plurality of modules/units/sub-units. Alternatively, at least part of the functionality of one or more of these modules/units/sub-units may be combined with at least part of the functionality of other modules/units/sub-units and implemented in one module/unit/sub-unit. According to an embodiment of the present disclosure, at least one of the determiningmodule 510, the jumping andcaching module 520, the detectingmodule 540, and the reading andloading module 540 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or may be implemented in any one of three implementations of software, hardware, and firmware, or in a suitable combination of any several of them. Alternatively, at least one of the determiningmodule 510, the jumping andcaching module 520, the detectingmodule 540, and the reading andloading module 540 may be at least partially implemented as a computer program module, which when executed, may perform a corresponding function.
Referring to fig. 6A-6B, the method shown in fig. 5 will be further described with reference to specific embodiments.
FIG. 6A schematically illustrates a block diagram of an apparatus for accessing notification bar messages, according to another embodiment of the present disclosure.
As shown in fig. 6A, theapparatus 500 further comprises:
an obtainingmodule 550, configured to obtain the original message before the original message received by the notification bar.
And agenerating module 560, configured to encrypt the original message, generate a short message code, and access a page corresponding to the original message through the short message code.
The sendingmodule 570 is configured to send the original message and the short message code to the notification bar, where the original message is received by the notification bar and then converted into a message in the notification bar, and the short message code is used as the association information.
In the embodiment of the present disclosure, after the association information is specifically a short message code, the skip and cache module is further specifically configured to execute a command for skipping to a page, and cache the short message code. The reading and loading module is further specifically configured to read the short message code if the user starts the specified application program, and load the page corresponding to the original message in the specified application program according to the short message code.
The skip and cache module is further specifically configured to cache the short message code in the clipboard. After the application program is restarted and the short message code in the clipboard is read, the security of the short message code needs to be further detected to prevent the information in the clipboard from being illegally tampered by an external program. Therefore, the reading and loading module comprises a first obtaining unit, which is used for obtaining the text information in the clipboard if the user starts the specified application program; the first judging unit is used for judging whether the text format of the text information conforms to the text format of the short message code; and the reading and loading unit is used for reading the short message code if the text format of the text message conforms to the text format of the short message code, and loading the page corresponding to the original message in the specified application program according to the short message code.
FIG. 6B schematically illustrates a block diagram of an apparatus for accessing notification bar messages, according to another embodiment of the present disclosure.
As shown in fig. 6B, the jump andcache module 520 includes:
a second obtainingunit 5201 is configured to obtain a page.
Thesecond determination unit 5202 is configured to determine whether the page is in a white list.
Anexecution unit 5203 is configured to execute the instruction if the page is in the white list.
The firstprompt unit 5204 is configured to send a prompt message of the access risk if the page is not in the white list.
Similarly, if the page access is performed through the associated information, the white list detection is also required. For example, the reading andloading module 540 includes a first reading unit, and if the user starts a specific application program, the application reads the associated information to obtain a page corresponding to the message; the third judging unit is used for judging whether the page is in the white list or not; the loading unit is used for loading the page in the specified application program if the page is in the white list; and the second prompting unit is used for sending out the prompting information of the access risk if the page is not in the white list.
As an alternative embodiment, theapparatus 500 further includes a clearing module, configured to clear the cached association information after the instruction is successfully executed or the page is successfully loaded.
It should be noted that, a device part for accessing the notification bar message in the embodiment of the present disclosure corresponds to a method part for accessing the notification bar message in the embodiment of the present disclosure, and the description of the device part for accessing the notification bar message specifically refers to the method part for accessing the notification bar message, and is not described herein again.
Fig. 7 schematically shows a block diagram of an electronic device adapted to implement the above described method according to an embodiment of the present disclosure. The electronic device shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 7, anelectronic device 600 according to an embodiment of the present disclosure includes aprocessor 601, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from astorage section 608 into a Random Access Memory (RAM) 603.Processor 601 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. Theprocessor 601 may also include onboard memory for caching purposes.Processor 601 may include a single processing unit or multiple processing units for performing different actions of a method flow according to embodiments of the disclosure.
In theRAM 603, various programs and data necessary for the operation of thesystem 600 are stored. Theprocessor 601, the ROM602, and theRAM 603 are connected to each other via abus 604. Theprocessor 601 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM602 and/orRAM 603. It is to be noted that the programs may also be stored in one or more memories other than the ROM602 andRAM 603. Theprocessor 601 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the present disclosure,system 600 may also include an input/output (I/O)interface 605, input/output (I/O)interface 605 also connected tobus 604. Thesystem 600 may also include one or more of the following components connected to the I/O interface 605: aninput portion 606 including a keyboard, a mouse, and the like; anoutput portion 607 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; astorage section 608 including a hard disk and the like; and acommunication section 609 including a network interface card such as a LAN card, a modem, or the like. Thecommunication section 609 performs communication processing via a network such as the internet. Thedriver 610 is also connected to the I/O interface 605 as needed. Aremovable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on thedrive 610 as necessary, so that a computer program read out therefrom is mounted in thestorage section 608 as necessary.
According to embodiments of the present disclosure, method flows according to embodiments of the present disclosure may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through thecommunication section 609, and/or installed from theremovable medium 611. The computer program, when executed by theprocessor 601, performs the above-described functions defined in the system of the embodiments of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to an embodiment of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium. Examples may include, but are not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM602 and/orRAM 603 described above and/or one or more memories other than the ROM602 andRAM 603.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.