Disclosure of Invention
Embodiments of the present invention provide an identity information verification method, apparatus, device, and storage medium, to solve the defects in the prior art, and enable a service side to improve the efficiency of configuring the service when using the identity verification service.
In a first aspect, an embodiment of the present invention provides an identity information verification method, including:
acquiring identity information forwarded by a service side server through an identity verification server, wherein the identity information is acquired from a first identity verification request initiated by a client;
generating an access token by the identity verification server according to the identity information, and sending the access token to a service side server for forwarding to the client;
receiving a second identity verification request initiated by the client through the identity verification server, wherein the second identity verification request carries an access token and a biological characteristic to be verified;
verifying the access token and determining the type of an operating system to which the client belongs through the identity verification server;
calling a verification service unit corresponding to the type of the operating system through the identity verification service terminal, and processing the second identity verification request to determine an identity verification result;
and feeding back the affiliated identity verification result to the client through the identity verification server.
In a second aspect, an embodiment of the present invention further provides an identity information verification method, applied to a client, including:
generating a first identity verification request in the process of operating the service function, wherein the first identity verification request comprises identity information to be verified;
sending the first identity verification request to a service side server, so that the service side server forwards the first identity verification request to the identity verification server;
receiving an access token fed back by the service side server, wherein the access token is generated by the identity verification server according to the identity information;
carrying the access token and the biological characteristics to be verified in a second identity verification request, and sending the second identity verification request to the identity verification server, wherein the second identity verification request is marked with the operating system type of the client, so as to request the identity verification server to call a verification service unit corresponding to the operating system type according to the operating system type of the client, and process the second identity verification request;
and receiving the identity verification result fed back by the identity verification server.
In a third aspect, an embodiment of the present invention further provides an identity information verification apparatus, configured in an identity verification server, including:
the system comprises an information acquisition module, a service side server and a service side, wherein the information acquisition module is used for acquiring identity information forwarded by the service side server, and the identity information is acquired from a first identity verification request initiated by a client;
the information integration module is used for generating an access token according to the identity information and sending the access token to a service side server for forwarding to the client;
the information receiving module is used for receiving a second identity verification request initiated by the client, wherein the second identity verification request carries an access token;
the information checking module is used for checking the access token and determining the type of the operating system to which the client belongs;
the information calling module is used for calling the verification service unit corresponding to the type of the operating system and processing the second identity verification request to determine an identity verification result;
and the information feedback module is used for feeding back the affiliated identity verification result to the client through the service side server.
In a fourth aspect, an identity information verification apparatus configured in a client includes:
the information request module is used for generating a first identity verification request in the process of operating the service function, wherein the first identity verification request comprises identity information to be verified;
the first information sending module is used for sending the first identity verification request to a service side server so that the service side server forwards the first identity verification request to the identity verification server;
the first information receiving module is used for receiving an access token fed back by the service side server, wherein the access token is generated by the identity verification server according to the identity information;
the information sending module II is used for carrying the access token and the biological characteristics to be verified in a second identity verification request and sending the second identity verification request to the identity verification server, wherein the type of the operating system to which the client belongs is identified in the second identity verification request, so that the identity verification server is requested to call a verification service unit corresponding to the type of the operating system according to the type of the operating system to which the client belongs, and the second identity verification request is processed;
and the information receiving module II is used for receiving the identity verification result fed back by the service side server.
In a fifth aspect, an embodiment of the present invention further provides a computer device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor executes the program to implement the identity information verification method according to any one of the embodiments.
In a sixth aspect, an embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements any one of the identity information verification methods in the embodiments of the present invention.
According to the embodiment of the invention, the method for automatically identifying the corresponding system version can be used for solving the problem that different business side ends (an Android end, an iOS end and a webpage end) need to be respectively connected with the identity verification services in different environments when the business side server side configures the identity verification services through the current system environment requested by the identity verification server side to the client side, and the effect of improving the efficiency of the business side server side when the business side server side configures the identity verification services is realized.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of an identity verification method according to an embodiment of the present invention, where the embodiment is applicable to a situation that a user needs to perform a biometric verification to a service-side server through a client to ensure security of a current operation.
The method provided by the embodiment is suitable for being executed by an identity verification system, and the identity verification system comprises an identity verification server, a service side server and a client. The service side server is a server providing service for the client, for example, providing service such as electronic shopping, information push, entertainment game and the like; the client is software installed in the user terminal for the user to operate the business function, and in order to ensure the identity safety of the user in the business service process, identity verification needs to be performed based on the identity information and the biological characteristics of the user. The identity verification server is specifically used for executing the identity verification function.
The embodiment may be specifically executed by an identity verification server, and the method specifically includes the following steps:
s110, the identity information forwarded by the service side server is obtained through the identity verification server, wherein the identity information is obtained from a first identity verification request initiated by the client.
The identity verification Service terminal may be a Software as a Service (SaaS) platform, and is dedicated to performing biometric verification and identity verification. For example, identification of the identity of an individual is performed by identifying physiological and behavioral characteristics of a living being. For example, the method can be face nuclear feature detection, and the face nuclear is a process of comparing a living body picture successfully detected by a living body with an identity card head portrait in a public security library. The SaaS is a software service that provides a software service to a service provider who has a demand for the service through a network.
In the process of providing business services for the client by the business-side server, the identity verification requirement is generated as required, for example, when account login or electronic payment is performed, the identity verification may be required. At this time, the user may initiate a first identity verification request at the client side, where the first identity verification request is an identity verification request that the user sends to the service side server for the first time. And the service side server side forwards the first identity request to the identity verification server side. Wherein the identity information comprises at least one of: the name and the identity card number of the client to be verified, and other information indicating the user identity.
Specifically, the user inputs the identity information in the user interaction interface of the client, which at least includes: the service side server transmits the received information to the identity verification server, the service side server and the identity verification server can be connected through an intranet, and the identity verification server acquires the user identity information transmitted by the service side server.
And S120, generating an access token by the identity verification server according to the identity information, and sending the access token to a service side server for forwarding to the client.
The access token is a security certificate verified by the access identity, and may have a time validity period, and the time validity period may be self-defined, and may be set to ten minutes, for example. The setting of the validity period of the access token can be achieved by adding a time stamp.
Optionally, the generating, by the identity verification server, an access token according to the identity information includes: and converting the identity information according to a set token generation algorithm through the identity verification server to generate the access token.
Specifically, the identity verification server generates an access token with a validity period according to the identity information acquired from the service side server, where the information in the access token at least includes: the user name, the user identity card number, the account number and the service type which are distributed to the service side by the identity verification server side and the like.
Alternatively, the token generation Algorithm may be a Message Digest Algorithm 5 (MD 5), or may be a Hash-based Message Authentication Code (HMAC).
Specifically, the identity verification server generates a segment of character string with validity period by setting a token generation algorithm on the identity information (i.e. user name and user identity card number) and other information such as service type and the like allocated to an account number of a service side by the identity verification server, and sends the access token to the service side server, the service side server receives the access token and forwards the access token to the client, and after the sending is successful, the client receives a string with validity period, i.e. the access token.
S130, receiving a second identity verification request initiated by the client through the identity verification server, wherein the second identity verification request carries an access token and a biological feature to be verified.
The second identity verification request is a second identity verification request initiated by the client to the identity verification server, the identity verification server receives the second identity verification request initiated by the client, and the second identity verification request carries an access token and a biological feature to be verified, wherein the access token and the biological feature to be verified are sent to the client by the service side. The biometric feature to be verified may be any biometric feature of the user, typically a feature that uniquely identifies a natural person, and may include at least one of: face, iris, voice, and fingerprint.
Optionally, the second identity verification request may be specifically initiated based on a user interaction interface script file.
Specifically, after the client acquires the access token sent by the service side server, the client uses the access token to initiate a second request for verifying the identity, and the second request for verifying the identity is acquired by the identity verification server. When a second identity verification request is initiated, the access token sent to the client by the service side server is carried, in the second verification request, the client carrying the access token is directly initiated to the identity verification server, and meanwhile, the request carries the biological characteristics to be verified of the current user. The second identity verification request may be initiated based on a user interaction interface script file, in which a system type information identifier of the currently requested client is carried.
S140, the access token is checked and the type of the operating system to which the client belongs is determined through the identity verification server. .
The type of the operating system to which the client belongs is the type of the operating system used by the terminal equipment where the client is located currently. The operating system type can be an iOS system, an android system or a webpage system.
Specifically, after receiving a second identity verification request which is initiated by the client and carries an access token, the identity verification server starts to verify and analyze the access token, and after the verification is passed, the identity verification server obtains the type of the operating system to which the client belongs by analyzing the file of the user interaction script interface.
Specifically, the verifying and analyzing the access token may specifically be performed by using a parity check method or an MD5 digest algorithm, and after the verification is passed, the access token information is compared with information, such as a person and a service type, recorded in the identity information verification server database, and after the comparison is passed, the user interaction interface script file is analyzed to obtain the current operating system environment to which the current client belongs.
S150, calling a verification service unit corresponding to the type of the operating system through the identity verification service terminal, and processing the second identity verification request to determine an identity verification result.
The verification service unit is a unit for verifying identity verification information of a client to be verified, and specifically can be an iOS identity verification unit, an Android identity verification unit and a webpage identity verification unit. Each verification service unit can be an independent functional plug-in, and plug-ins of different operating system types can be configured according to requirements.
Optionally, after the identity verification service terminal calls an identity verification service unit corresponding to the type of the operating system to which the client belongs, identity information of the client to be verified is obtained and identity verification is performed, the identity verification process may be performed by comparing the identity information with information in a database of the identity information verification service terminal, or by calling a third party library to perform information comparison.
And S160, feeding back the identity verification result to the client through the service side server by the identity verification server.
Wherein, the identity verification result is fed back to the client through the service side server by the identity verification server, which comprises: and feeding back the identity verification result to the service side server side in the form of an access token through the identity verification server side. For example, the identity information verification result is "pass" or "fail", and the "pass" and "fail" can be represented by the character strings "0" and "1", respectively, and the identity verification server connects the character string of the identity information verification result and the character string of the access token and transmits them together to the service side server. After receiving the information sent by the identity verification server, the service side server only analyzes and extracts the identity verification result and feeds back the identity verification result to the client.
According to the technical scheme, the current system environment requested by the client is automatically identified and acquired by the identity verification server, the problem that different ends of the service side are required to be respectively connected with the identity verification services of different environments when the identity verification service is configured by the service side server is solved, and the effect that the efficiency of the service side server is improved when the identity verification service is configured is achieved.
Example two
Fig. 2 is a flowchart of an identification method of an identity verification service system according to a second embodiment of the present invention, which is detailed based on the above-described embodiment, where in this embodiment, the second identity verification request is initiated based on a user interaction interface script file, and accordingly, determining, by the identity verification service, an operating system type to which the client belongs includes: and analyzing the UA identification field of the user agent from a second identity verification request file sent by the user interaction interface script file through the identity verification server to acquire the type of the operating system. As shown in fig. 2, the method comprises the following specific steps:
s210, the identity information forwarded by the service side server is obtained through the identity verification server, wherein the identity information is obtained from a first identity verification request initiated by the client.
S220, generating an access token through the identity verification server according to the identity information, and sending the access token to a service side server for forwarding to the client.
And S230, receiving a second identity verification request initiated by the client through the identity verification server, wherein the second identity verification request carries an access token and a biological characteristic to be verified.
Wherein the second identity verification request is initiated based on a user interaction interface script file.
The user interaction script interface file is a program code applied to the client, the script file comprises a function program capable of acquiring equipment information, and the equipment information is the equipment information of a user who uses the identity verification service through the client at present. The device information includes at least a system type of the device.
Specifically, the second identity verification request carries the access token and the biometric feature to be verified, the request is initiated based on the user interaction interface script file, the device information of the user is obtained through the user interaction interface script file, for example, the system type of the user device may be obtained, and the user may make a request to any verification service unit corresponding to the system type. The second identity verification request is received by the identity verification server.
S240, analyzing the UA identification field of the user agent from the second identity verification request file sent by the user interaction interface script file through the identity verification server to obtain the type of the operating system.
Specifically, the operating system type may be obtained by a program code of a User interaction interface script file applied to the client, for example, the operating system type may be obtained by a User Agent (UA) identifier in a browser request header information, obtaining device information of a User using the identity verification service through the client, and determining a system type of a currently requested device, so as to jump to different identity verification units according to system types of different devices.
The operating system type may be an iOS system, an Android system, or a web page system.
Optionally, when the identity verification service is used, different system versions of the service side are required to be docked with identity verification service units of different system versions of the identity verification service side, and the operating system type of the client side is usually acquired by the service side and then the device information is transmitted to the corresponding identity verification service unit. In this embodiment, the client can directly access the identity verification service end in the form of a token, and the identity verification service end provides a method capable of directly obtaining the operating system type of the client and automatically jumping to the corresponding identity verification service unit for verification, without requiring that interfaces of different system versions of the service side service end are respectively accessed to different identity verification service units.
S250, calling a verification service unit corresponding to the type of the operating system through the identity verification service terminal, and processing the second identity verification request to determine an identity verification result;
and S260, feeding back the identity verification result to the client through the service side server by the identity verification server.
According to the technical scheme of the embodiment, the identity verification server acquires the operating system environment of the current client by analyzing the UA identification field in the second identity verification request file sent by the user script file, and completes the function of automatically jumping to different verification units, so that the problem that the service side server needs to be respectively connected with the identity verification service units of different system versions of the identity verification server is solved, and the effect of improving the efficiency of the service side server in configuring the identity verification service is achieved.
EXAMPLE III
Fig. 3 is a flowchart of an identity verification method according to a third embodiment of the present invention, where the embodiment is applicable to a case where a client requests identity information verification, the method may be executed by an identity information verification apparatus, the apparatus may be implemented in a software and/or hardware manner, and the method may be executed by the client, and specifically includes the following steps:
s310, in the process of operating the service function, generating a first identity verification request, wherein the first identity verification request comprises identity information to be verified.
The service function may be a function of an application program, the first identity verification request is a request initiated by the client to the service side server for the first time, and the identity information is personal information of a user using the client;
wherein the identity information comprises at least one of: the name of the person to be verified at the client and the identity card number of the person to be verified at the client.
Optionally, the service function may be, for example, a function that is requested by a user when the client performs a payment scenario. The client generates a request for first identity verification in the process of operating the service function, and the request is processed by the service side server.
S320, sending the first identity verification request to a service side server, so that the service side server forwards the first identity verification request to the identity verification server.
The service side server receives a first identity verification request sent by the client, forwards the received request information sent by the client to the identity verification server, and processes the information by the identity verification server. The identity verification server receives the client user identity information forwarded by the service side server, converts the client user identity information and other information according to a set access token generation algorithm, generates a string of character strings with validity periods and transmits the string to the service side server, and the service side server receives the access token and forwards the string to a client interface.
S330, receiving an access token fed back by the service side server, wherein the access token is generated by the identity verification server according to the identity information.
The client receives an access token fed back by the service side server, wherein the access token is a string of character strings with validity periods generated by the identity verification server according to the identity information of the client user.
And S340, carrying the access token and the biological characteristics to be verified in a second identity verification request, and sending the second identity verification request to the identity verification server, wherein the operating system type of the client is identified in the second identity verification request, so as to request the identity verification server to call a verification service unit corresponding to the operating system type according to the operating system type of the client, and process the second identity verification request.
Wherein the operating system types include: an iOS system, an android system, or a web page system.
And analyzing the UA identification field in the second identity verification request file sent by the user interaction interface script file to acquire the type of the operating system.
Specifically, the second identity verification request is a second request sent by the client carrying the access token, and the second request is received by the identity verification server, where the second identity verification request identifies the operating system type to which the client belongs, so as to request the identity verification server to obtain the operating type of the system according to the operating system type to which the client belongs, and the operating type of the system is obtained by a UA identifier analyzed in a second identity verification request file sent by a user interaction interface script file provided by the face verification server. And after the identity verification obtains the operating system type of the current equipment of the client, calling a verification service unit corresponding to the operating system type to process the second identity verification request.
Specifically, the second identity verification request carries an access token, the identity verification server verifies and analyzes the access token, the identity information and the biological characteristics of the public security database or the third-party database are called after the information comparison is successful, the identity information and the biological characteristics are compared with the biological characteristics of the person to be verified, and the identity verification result of the person to be verified is determined after the comparison is finished.
And S350, receiving the identity verification result fed back by the service side server.
The identity verification result may be an identity verification result requested by the client user, and the verification result may be generated by the identity verification server, transmitted to the service side server, and then forwarded to the customer service side by the service side server.
According to the technical scheme, the type of the client operating system is obtained by directly butting the identity verification server with the client, the function of automatically jumping to different verification units is completed, the problem that the service side server needs to butt the client and receive client information when a second identity verification request is verified is solved, the identity verification units of different operating systems of the identity verification server are respectively butted, and when the second identity verification request is achieved, the service side server does not need to butt the client and the identity verification server, but the identity verification server directly butts the client.
Example four
Fig. 4 is a schematic structural diagram of an identity information verification apparatus according to a fourth embodiment of the present invention. The identity information verification device provided by the embodiment of the invention is configured at the identity verification server, can execute the identity information verification method provided by any embodiment of the invention, and has the corresponding functional module and beneficial effect of the execution method. The device can be implemented in software and/or hardware, and as shown in fig. 4, the identity information verification device specifically includes: the information management system comprises aninformation acquisition module 410, aninformation integration module 420, aninformation receiving module 430, aninformation checking module 440, aninformation calling module 450 and aninformation feedback module 460.
Theinformation obtaining module 410 is configured to obtain identity information forwarded by a service side server, where the identity information is obtained from a first identity verification request initiated by a client;
theinformation integration module 420 is configured to generate an access token according to the identity information, and send the access token to a service side server for forwarding to the client;
aninformation receiving module 430, configured to receive a second identity verification request initiated by a client, where the second identity verification request carries an access token;
aninformation checking module 440, configured to check the access token and determine an operating system type to which the client belongs;
theinformation calling module 450 is configured to call a verification service unit corresponding to the type of the operating system, and process the second identity verification request to determine an identity verification result;
and theinformation feedback module 460 is configured to feed back the identity verification result to the client through the service side server.
Optionally, theinformation integration module 420 is specifically configured to:
and converting the identity information according to a set token generation algorithm through the identity verification server to generate the access token.
Optionally, the identity information includes at least one of: the name of the person to be verified at the client and the identity card number of the person to be verified at the client.
Optionally, theinformation receiving module 430 is specifically configured to:
and analyzing the UA identification field of the user agent from a second identity verification request file sent by the user interaction interface script file through the identity verification server to acquire the type of the operating system.
Optionally, the operating system types include: an iOS system, an android system, or a web page system.
Optionally, theinformation feedback module 460 is specifically configured to:
and feeding back the identity verification result to the service side server side through the access token according to the identity verification result by the identity verification server side.
And feeding back the identity verification result to the client through the service side server.
According to the technical scheme, the current system environment requested by the client is automatically identified and acquired by the identity verification server, the problem that different ends of the service side are required to be respectively connected with the identity verification services of different environments when the identity verification service is configured by the service side server is solved, and the effect that the efficiency of the service side server is improved when the identity verification service is configured is achieved.
EXAMPLE five
Fig. 5 is a schematic structural diagram of an identity information verification apparatus according to a fifth embodiment of the present invention. The identity information verification device provided by the embodiment of the invention is configured at the client, can execute the identity information verification method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method. The device can be implemented in software and/or hardware, and as shown in fig. 5, the identity information verification device specifically includes: the system comprises aninformation request module 510, a firstinformation sending module 520, a firstinformation receiving module 530, a secondinformation sending module 540 and a secondinformation receiving module 550.
Theinformation request module 510 is configured to generate a first identity verification request in a process of running a service function, where the first identity verification request includes identity information to be verified;
the firstinformation sending module 520 is configured to send the first identity verification request to a service side server, so that the service side server forwards the first identity verification request to the identity verification server;
an information receiving module one 530, configured to receive an access token fed back by the service side server, where the access token is generated by the identity verification server according to the identity information;
the secondinformation sending module 540 is configured to carry the access token and the biometric feature to be verified in a second identity verification request, and send the second identity verification request to the identity verification server, where the second identity verification request identifies an operating system type to which the client belongs, so as to request the identity verification server to call a verification service unit corresponding to the operating system type according to the operating system type to which the client belongs, and process the second identity verification request;
the secondinformation receiving module 550 is configured to receive an identity verification result fed back by the service side server;
optionally, the information sending module two is specifically configured to:
the second identity verification request is initiated based on a user interaction interface script file, and the user interaction interface script file comprises a user agent UA identification field analyzed in the sent second identity verification request file and is used for representing and obtaining the type of the operating system.
Optionally, the identity information includes at least one of: the client-side name and the client-side identity card number of the person to be verified; the operating system types include: an iOS system, an android system, or a web page system.
EXAMPLE six
Fig. 6 is a schematic structural diagram of a computer apparatus according to a sixth embodiment of the present invention, as shown in fig. 6, the computer apparatus includes aprocessor 610, amemory 620, aninput device 630, and anoutput device 640; the number ofprocessors 610 in the device may be one or more, and oneprocessor 610 is taken as an example in fig. 6; theprocessor 610, thememory 620, theinput device 630 and theoutput device 640 in the apparatus may be connected by a bus or other means, and fig. 6 illustrates an example of a connection by a bus.
Thememory 620 is used as a computer-readable storage medium for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the identity information verification method in the embodiment of the present invention (for example, theinformation obtaining module 410, theinformation integrating module 420, theinformation receiving module 430, theinformation checking module 440, theinformation invoking module 450, theinformation feedback module 460, theinformation requesting module 510, the information sending module one 520, the information receiving module one 530, the information sending module two 540, and the information receiving module two 550). Theprocessor 610 executes various functional applications of the device and data processing by executing software programs, instructions and modules stored in thememory 620, that is, implements the data migration method described above.
Thememory 620 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal, and the like. Further, thememory 620 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, thememory 620 can further include memory located remotely from theprocessor 610, which can be connected to the device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
Theinput device 630 may be used to receive entered numeric or character information and to generate signal inputs relating to user settings and functional control of the apparatus. Theoutput device 640 may include a display device such as a display screen.
EXAMPLE seven
An embodiment of the present invention further provides a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a method for verifying identity information, where the method is performed by an identity verification server, and the method includes:
acquiring identity information forwarded by a service side server through an identity verification server, wherein the identity information is acquired from a first identity verification request initiated by a client;
generating an access token by the identity verification server according to the identity information, and sending the access token to a service side server for forwarding to the client;
receiving a second identity verification request initiated by the client through the identity verification server, wherein the second identity verification request carries an access token and a biological characteristic to be verified;
verifying the access token and determining the type of an operating system to which the client belongs through the identity verification server;
calling a verification service unit corresponding to the type of the operating system through the identity verification service terminal, and processing the second identity verification request to determine an identity verification result;
and feeding back the affiliated identity verification result to the client through the service side server by the identity verification server.
The computer executable instructions, when executed by a computer processor, are for performing a method of identity information verification, performed by a client, the method comprising:
generating a first identity verification request in the process of operating the service function, wherein the first identity verification request comprises identity information to be verified;
sending the first identity verification request to a service side server, so that the service side server forwards the first identity verification request to the identity verification server;
receiving an access token fed back by the service side server, wherein the access token is generated by the identity verification server according to the identity information;
carrying the access token and the biological characteristics to be verified in a second identity verification request, and sending the second identity verification request to the identity verification server, wherein the second identity verification request is marked with the operating system type of the client, so as to request the identity verification server to call a verification service unit corresponding to the operating system type according to the operating system type of the client, and process the second identity verification request;
and receiving the identity verification result fed back by the service side server.
From the above description of the embodiments, it is obvious for those skilled in the art that the embodiments of the present invention can be implemented by software and necessary general hardware, and certainly can be implemented by hardware, but the former is a better implementation in many cases. Based on such understanding, the technical solutions of the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes several instructions to make a computer device (which may be a personal computer, a server, or a network device) perform the methods described in the embodiments of the present invention.
It should be noted that, in the embodiment of the above search apparatus, each included unit and module are merely divided according to functional logic, but are not limited to the above division as long as the corresponding functions can be implemented; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the embodiment of the invention.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.