Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. The components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The financial supervision mode in the related art is easy to cause the phenomenon that a supervision authority and a financial institution are in communication, so that the risk of tampering financial data exists, and the problems of low communication efficiency and poor timeliness exist when the national financial institution is supervised.
Based on the above, the embodiment of the invention provides a method, a device and electronic equipment for supervising transactions on a blockchain, and the technology can be applied to monitoring scenes of transactions on the blockchain, especially to monitoring scenes of transactions on different blockchains by users. For the convenience of understanding the embodiments of the present invention, a detailed description will be first given of a method for supervising transactions on a blockchain disclosed in the embodiments of the present invention, as shown in fig. 1, where the method includes the following steps:
step S102, user information of the target user is obtained from the target blockchain.
The target blockchain may be any of a blockchain using a rildle as a payment protocol, a blockchain using a stillar as a payment protocol, other self-built public chains, or a federated chain. The rille is typically an open source, distributed payment protocol, and the stillar is typically a blockchain-based payment protocol that can be used to pay transaction fees and can act as a bridge to enable users to conduct transactions between multiple currencies. The self-built public chain can be a public blockchain established by a user according to own requirements, namely, the blockchain which can be read by anyone worldwide, can be used for sending transactions and can be effectively confirmed by the transactions and can be used for participating in the consensus verification process of the public, and as a substitute of centralized or quasi-centralized trust, the security of the public blockchain combines economic rewards and encrypted digital verification in a manner of POW (Proof of Work) and POS (Proof of authority) and the like, and follows the general principle that the economic rewards available to everyone from the public are proportional to the contribution to the consensus process. The federated chain is generally referred to as a blockchain whose consensus process is controlled by preselected nodes.
In particular implementations, the blockchain may allow everyone to read, may be limited to only participants to read, or may be a mixture of both. For example, the root hash of a blockchain and its API (Application Programming Interface, application program interface) are exposed to the outside, which may allow the outside world to make a limited number of queries and obtain state information for blockchains that may be considered partially decentralized, where the blockchain is partially decentralized. The alliance chain is feasible in many industries, such as the current logistics industry, the earliest tap enterprises in the industry take the establishment of the logistics block chain, then all enterprises in the industry join in succession to form the alliance chain of the logistics industry together, each enterprise runs a node on the alliance chain, and to enable each block on the alliance chain to be effective, 51% or more of nodes corresponding to the enterprises are obtained for confirmation, and all the joined nodes run in an effective or limited decentralised mode in the alliance chain.
The target user is any one of users registered on the target blockchain, wherein the user may register on an APP (Application) of a web page or a terminal device (e.g., a mobile phone, a tablet computer, etc.). In the registering process or after the registering is completed, a user is required to submit personal information and company information through the webpage or the APP of the terminal equipment so that the webpage or the SDK (Software Development Kit ) corresponding to the APP of the terminal equipment can import the personal information and the company information into a target blockchain, wherein the personal information can comprise information such as names, identity cards, passport numbers, birth dates, nationalities, professions and the like, and the company information can comprise details such as company names, business registration numbers, business addresses, registration addresses, business properties, directors and stakeholders. Specifically, the above-described user information includes personal information and company information.
In some embodiments, the target blockchain is further provided with an active database, and the active database stores user information established by means of marketing centers, third-party promotion, business department form filling, account opening verification and the like, so that part of data in the user information of the target user can be acquired from the active database, thereby improving the user information and being beneficial to monitoring the users on the blockchain.
Step S104, judging whether the target user is a legal user according to the user information, wherein the legal user is a user with financial service transaction authority.
According to the name, the identification card number or the company name of the target user in the user information, whether the target user is a legal user can be judged. In specific implementation, a blacklist can be pre-established, information such as a name, an identity card number or a company name of a user is stored in the blacklist, the user in the blacklist is a user related to illegal transaction (such as illegal funding and the like), the user does not have authority to conduct financial business transaction on a target blockchain, then whether the name, the identity card number or the company name of the target user is in the blacklist is checked, if yes, the target user is determined to be an illegal user, and if not, the target user is determined to be a legal user. Financial transactions on the blockchain include items buying and selling, transferring, borrowing, and loaning, among others.
Step S106, if the target user is a legal user, transaction information and asset information of the target user are obtained from a preset database, and a risk index of the target user is determined according to the transaction information, wherein the risk index is used for indicating the risk degree of the transaction information.
The preset database may be a database storing transaction information, asset information, personal information, and company information of the target user on the target blockchain. When the target user is a legal user, the target user can normally conduct financial business transaction on the target blockchain, and meanwhile, the target blockchain can acquire transaction information and asset information from a preset database to determine a risk index of the target user according to the transaction information, wherein the transaction information comprises transaction party names, product data, service types, transaction geographic positions, delivery channels and the like, and the transaction party names comprise names of the target user and names of transaction objects.
The risk index may indicate the risk level of the transaction information corresponding to the target user, and generally, the higher the risk index is, the higher the risk possibility is. In the concrete implementation, if the transaction object is an illegal user, the illegal phenomenon exists in the transaction product or service type, the transaction geographic position is a suspicious region or the delivery channel is not legal, and the like, the risk index of the target user is high.
In some embodiments, if the target user is an illegitimate user (i.e., the target user is in a blacklist), it may be desirable to freeze the target user's assets on the target blockchain and inhibit or limit the financial transactions on the target blockchain.
Step S108, if the risk index of the target user is greater than or equal to a preset index threshold, generating a suspicious transaction report corresponding to the target user based on the asset information.
The preset index threshold is a value set by a developer according to service requirements, and the value can be any value. The asset information includes asset sources, asset balances, asset change records, and the like. If the risk index of the target user is greater than or equal to the preset index threshold, judging whether the asset source is legal or not, if not, generating a suspicious transaction report corresponding to the target user, and sending the suspicious transaction report to a designated mailbox or faxing the suspicious transaction report to a designated telephone number and the like. The suspicious transaction report stores user information, transaction information, risk index and other information of the target user.
The method for supervising the transaction on the blockchain comprises the steps of firstly obtaining user information of a target user from the target blockchain, judging whether the target user is a legal user according to the user information, obtaining transaction information and asset information of the target user from a preset database if the target user is the legal user, determining risk indexes of the target user according to the transaction information, wherein the risk indexes are used for indicating the risk degree of the transaction information, and generating suspicious transaction reports corresponding to the target user based on the asset information if the risk indexes of the target user are larger than or equal to a preset index threshold. According to the method, the transaction of the target user is regulated according to the user information, the transaction information and the asset information of the target user through the blockchain technology, and as the information on the blockchain is more public and transparent, the risk of data tampering is effectively reduced, and the target blockchain is connected with the transnational blockchain, so that the synchronous regulation of transnational financial institutions can be realized, and the timeliness of the regulation is improved.
The embodiment of the invention also provides another transaction supervision method on the blockchain, which is realized on the basis of the method of the embodiment, wherein the method mainly describes a specific process (realized by the following steps S204-S208) for judging whether a target user is a legal user according to user information, and the method comprises the following steps of:
Step S202, user information of a target user is acquired from a target blockchain.
Step S204, judging whether the user information of the target user is complete according to the preset information options in the target block chain, if not, executing step S206, and if so, executing step S208.
The preset information options may be content that needs to be contained in the user information set by the developer according to the regulatory requirement, and when the user information contains all the content corresponding to the preset information, it is determined that the user information is complete. In specific implementation, the preset information options include name, identification number, passport number, date of birth, transaction meaning, real benefit owner (who can select to fill), company name, business registration number, business address, registration address, business nature, details of board and stakeholder.
Step S206, notifying the target user to supplement the user information, and executing step S210.
If the user information does not contain any content of the preset information options (options except optional filling), determining that the user information of the target user is incomplete, and sending an information supplementing instruction to the terminal equipment corresponding to the target user at the moment to inform the target user of supplementing the user information, wherein the information supplementing instruction carries the content of the preset information options which the target user needs to supplement.
Step S208, judging whether the user name in the user information appears in the preset blacklist, if so, executing step S216, otherwise, executing step S214.
In specific implementation, a preset blacklist may be established, where information such as a name, an identification card number, or a company name of a user is stored in the preset blacklist, and the user in the blacklist is a user related to illegal transaction, that is, an illegal user.
Step S210, judging whether the complementary complete user information sent by the target user is received in the appointed time, if yes, executing step S208, otherwise, executing step S212.
Step S212, terminating the business of the target user on the target blockchain and generating a suspicious transaction report corresponding to the target user.
After notifying the target user of supplementing the user information, if the target blockchain receives the complete user information which is sent by the target user through the terminal in the appointed time, whether the user name (corresponding to the name of the user) in the user information appears in the preset blacklist or not needs to be judged so as to determine whether the target user is a legal user or not. If the target blockchain does not receive the supplementary complete user information sent by the target user or does not receive any information in the appointed time, the target blockchain can also be understood as stopping the service of the target user on the target blockchain when the target user refuses the supplementary information, generating a suspicious transaction report corresponding to the target user, and sending the suspicious transaction report to an appointed mailbox or faxing the suspicious transaction report to an appointed telephone number and the like.
Step S214, obtaining the transaction information and the asset information of the target user from a preset database, determining the risk index of the target user according to the transaction information, and executing step S218.
In specific implementation, the target blockchain can be connected with a blockchain based on the rillle protocol, a blockchain based on the still protocol and a alliance chain through a cross-chain gateway, and the transaction information and the asset information of the target user in the preset database can be acquired through the target blockchain, the blockchain based on the rillle protocol, the blockchain based on the still protocol and the alliance chain. It is also understood that the transaction information and asset information of the target user stored in the preset data may be obtained from the target blockchain or may be obtained from the blockchain based on the rillle protocol, the blockchain based on the still protocol and the alliance chain through the cross-chain gateway of the target blockchain. The transaction information and the asset information of the user acquired by the method are more comprehensive, are favorable for comprehensively evaluating the risk index of the target user, and realize cross-chain supervision of the target user.
Step S216, the funds of the target user are frozen, the business of the target user on the target blockchain is terminated, and a suspicious transaction report corresponding to the target user is generated.
Step S218, if the risk index of the target user is greater than or equal to a preset index threshold, a suspicious transaction report corresponding to the target user is generated based on the asset information.
If the user name in the user information appears in the preset blacklist, determining that the target user is an illegal user, at this time, acquiring transaction information and asset information of the target user from a preset database, and determining a risk index of the target user according to the transaction information. If the user name does not appear in the preset blacklist, the target user is determined to be a legal user, and the target user can conduct normal financial business transaction on the target blockchain.
The transaction supervision method on the blockchain comprises the steps of firstly obtaining user information of a target user from the target blockchain, judging whether the user information of the target user is complete according to preset information options in the target blockchain, if the user information is not complete, notifying the target user of supplementing the user information, if the user information is complete, judging whether a user name in the user information appears in a preset blacklist, if the user name appears in the preset blacklist, terminating a service of the target user on the target blockchain, generating a suspicious transaction report corresponding to the target user, if the user name does not appear in the preset blacklist, obtaining transaction information and asset information of the target user from a preset database, determining risk indexes of the target user according to the transaction information, and if the risk indexes of the target user are larger than or equal to preset index thresholds, generating the suspicious transaction report corresponding to the target user based on the asset information. The method effectively prevents the phenomenon that the data is tampered in the centralized database through the transparent and non-tamperable characteristics of the blockchain technology, ensures the safety of the data, can track the fund flow and the transaction dynamics of a target user in real time, and can realize real-time monitoring even though the capital is transnational due to the butt joint of chains between two countries, thereby ensuring the safety of the transaction on the blockchain.
The embodiment of the invention also provides another transaction supervision method on the blockchain, which is realized on the basis of the method of the embodiment, and the method mainly describes a specific process of determining the risk index of the target user according to the transaction information (realized by the following step S308), and a specific process of generating a suspicious transaction report corresponding to the target user based on asset information (realized by the following steps S312-S318) if the risk index of the target user is greater than or equal to a preset index threshold, as shown in FIG. 3, wherein the method comprises the following steps:
step S302, user information of a target user is acquired from a target blockchain.
Step S304, judging whether the target user is a legal user or not according to the user information.
Step S306, if the target user is a legal user, transaction information and asset information of the target user are obtained from a preset database, wherein the transaction information comprises names of both transaction sides, product data, service types, transaction geographic positions and delivery channels.
Step S308, risk judgment is carried out on the names of the two parties of the transaction, the product data, the service type, the geographical position of the transaction and the delivery channel in the transaction information according to the risk index judgment rule on the target blockchain, and the risk index of the target user is determined.
The risk index may indicate the risk level of the transaction information corresponding to the target user, and generally, the higher the risk index is, the higher the risk possibility is. In a specific implementation, if the transaction object is an illegal user, an illegal phenomenon exists in a transaction product or service type, a transaction geographic position is a suspicious region or a delivery channel is not legal, and the like, the risk index of the target user is higher, and generally, the more the information which causes the risk index of the target user to be higher is in the transaction information of the target user, the higher the risk index is.
Step S310, judging whether the risk index of the target user is greater than or equal to a preset index threshold, if yes, executing step S312, otherwise, executing step S318.
Step S312, a transaction auditing application of the transaction information is sent to a designated management layer on the target blockchain.
The designated management layer can be node equipment on a target blockchain corresponding to designated anti-money laundering personnel, the designated anti-money laundering personnel can audit the transaction information of the target user, namely, whether the transaction information is illegal or not is checked manually, if the transaction information is illegal, a transaction audit result of abnormal transaction is returned through the node equipment, the transaction audit result is reported to an anti-money laundering monitoring center, the anti-money laundering monitoring center can recheck the transaction information, if the audit result is abnormal, the business of the target user on the target blockchain is stopped, if the audit result is normal, the transaction information and the audit result are returned to the designated anti-money laundering personnel, so that the designated anti-money laundering personnel can conduct secondary audit on the transaction information, and if the audit result of the designated anti-money laundering personnel is legal, the transaction result of normal transaction is returned through the node equipment.
And step S314, determining the asset source of the target user according to the asset information.
Step S316, judging whether the transaction auditing result is normal and the asset source is legal according to the transaction auditing result and the asset source returned by the appointed management layer, if not, executing step S318, and if so, executing step S320.
Step S318, a suspicious transaction report is generated and sent to a designated location.
Step S320, judging whether the target user updates the user information on the target blockchain, if so, executing step S302, otherwise, executing step S322.
Step S322, the target user normally carries out transaction, and step S320 is executed.
If the transaction auditing result is abnormal, or the source of the asset is illegal, generating a suspicious transaction report corresponding to the target user, and sending the suspicious transaction report to a designated location, wherein the designated location can be a designated mailbox or a designated fax telephone number and the like. If the transaction auditing result is normal transaction and the asset source is legal, the target user can normally conduct transaction on the target blockchain, save the data of the target user, monitor whether the target user updates the user information on the target blockchain, if so, continue to execute step S302 to monitor the transaction of the target user, otherwise, continue to conduct transaction on the target blockchain, and continue to monitor whether the target user updates the user information on the target blockchain.
In some embodiments, after the transaction auditing result is a normal transaction and the asset source is legal, the transaction information of the target user is sent to the node device corresponding to the money back person of the business department on the target blockchain, so that the money back person of the business department modifies, supplements and perfects the transaction information according to the user information of the target user and other on-chain information, and sends the modified, supplemented and perfected transaction information to the designated money back person again for auditing, and then steps S312-S322 are sequentially executed again to monitor the activity of the target user on the target blockchain in real time, thereby more comprehensively monitoring the transaction of the target user on the blockchain.
When the method is specifically implemented, the target blockchain can store user information, transaction information, asset information, risk indexes and suspicious transaction reports corresponding to the target user in real time, and can also store the process and analysis results of the transaction monitoring of the target user, so that all data on the target blockchain are stored and recorded in a distributed mode, the safety of the data information is ensured, and the phenomenon of tampering of the data is prevented.
In particular implementations, the developer may write the transaction monitoring logic of steps S302-S322 described above or other monitoring logic to the smart contract or to DApp (Decentralized Application, non-centralized application) and deploy the smart contract or DApp on the target blockchain to monitor transactions via blockchain technology. The DApp is the same as the general App principle, but App is a completely decentralised application, DApp is a non-decentralised application, DApp is usually present in the internet in a manner not controlled by any single entity, DApp is usually provided with four elements of code open source, incentive mechanism, non-decentralised consensus and no single point of failure, DApp must be completely open source and capable of autonomous operation, any individual can view the code layer of the application, and DApp data and operation records are usually stored in a non-decentralised blockchain in an encrypted manner to avoid the phenomenon of single point failure or data loss.
According to the transaction supervision method on the blockchain, the logic of transaction supervision can be written into the intelligent contract and deployed on the target blockchain, so that the transaction is monitored through the blockchain technology, meanwhile, the monitoring process and the related data of the target user are stored in all nodes of the blockchain in a distributed mode, the safety of data information is improved, and the target blockchain is connected with the transnational blockchain, so that the synchronous supervision of transnational financial institutions can be realized, and the timeliness of supervision is improved.
Corresponding to the above method embodiment, the embodiment of the present invention provides a transaction supervision device on a blockchain, as shown in fig. 4, including:
The information obtaining module 40 is configured to obtain user information of the target user from the target blockchain.
The validity judging module 41 is configured to judge whether the target user is a legal user according to the user information, where the legal user is a user with a financial service transaction authority.
The risk index determining module 42 is configured to obtain the transaction information and the asset information of the target user from the preset database if the target user is a legal user, and determine a risk index of the target user according to the transaction information, where the risk index is used to indicate a risk degree of the transaction information.
The transaction report generating module 43 is configured to generate a suspicious transaction report corresponding to the target user based on the asset information if the risk index of the target user is greater than or equal to a preset index threshold.
The transaction supervision device on the blockchain firstly acquires user information of a target user from the target blockchain, judges whether the target user is a legal user according to the user information, wherein the legal user is a user with financial service transaction authority, acquires transaction information and asset information of the target user from a preset database if the target user is the legal user, determines a risk index of the target user according to the transaction information, wherein the risk index is used for indicating the risk degree of the transaction information, and generates a suspicious transaction report corresponding to the target user based on the asset information if the risk index of the target user is greater than or equal to a preset index threshold. According to the method, the transaction of the target user is regulated according to the user information, the transaction information and the asset information of the target user through the blockchain technology, and as the information on the blockchain is more public and transparent, the risk of data tampering is effectively reduced, and the target blockchain is connected with the transnational blockchain, so that the synchronous regulation of transnational financial institutions can be realized, and the timeliness of the regulation is improved.
The target blockchain is connected with a blockchain based on the rillle protocol, a blockchain based on the still protocol and a alliance chain through a cross-chain gateway, and transaction information and asset information of a target user in a preset database are acquired through the target blockchain, the blockchain based on the rillle protocol, the blockchain based on the still protocol and the alliance chain.
Further, the legal users comprise users which do not appear in a preset blacklist, and the validity judging module 41 is used for judging whether the user information of the target user is complete according to preset information options in the target blockchain, notifying the target user to supplement the user information if the user information is incomplete, and judging whether the user name in the user information appears in the preset blacklist if the user information is complete.
Further, the device also comprises an information receiving module, wherein the information receiving module is used for judging whether the user name in the user information appears in a preset blacklist or not if the supplementary complete user information sent by the target user is received, and terminating the service of the target user on the target blockchain and generating a suspicious transaction report corresponding to the target user if the supplementary complete user information sent by the target user is not received within a specified time.
Further, the device further comprises a service termination module, wherein the service termination module is used for terminating the service of the target user on the target blockchain and generating a suspicious transaction report corresponding to the target user if the target user is an illegal user, and the illegal user is a user appearing in a preset blacklist.
In a specific implementation, the transaction information includes a transaction name, product data, a service type, a transaction geographic location and a delivery channel, and the risk index determining module 42 is configured to determine a risk index of the target user by performing risk assessment on the transaction name, the product data, the service type, the transaction geographic location and the delivery channel in the transaction information according to a risk index assessment rule on the target blockchain.
Further, the transaction report generating module 43 is configured to send a transaction auditing application of transaction information to a designated management layer on a target blockchain if a risk index of a target user is greater than or equal to a preset index threshold, determine an asset source of the target user according to the asset information, determine whether to generate a suspicious transaction report according to a transaction auditing result and the asset source returned by the designated management layer, and generate a suspicious transaction report and send the suspicious transaction report to a designated location if the transaction auditing result is abnormal and/or the asset source is illegal.
When the device is concretely implemented, the device further comprises an information updating module, wherein the information updating module is used for monitoring whether the target user updates the user information on the target blockchain if the transaction auditing result is that the transaction is normal and the asset source is legal, and continuously executing the step of acquiring the user information of the target user from the target blockchain if the user information is updated so as to supervise the transaction of the target user.
Further, the device also comprises a data storage module for storing user information, transaction information, asset information, risk indexes and suspicious transaction reports of the target user.
The transaction supervision device on the blockchain provided by the embodiment of the invention has the same implementation principle and technical effects as those of the embodiment of the method, and for the sake of brief description, the corresponding content in the embodiment of the method can be referred to for the part of the embodiment of the device which is not mentioned.
An embodiment of the present invention further provides an electronic device, referring to fig. 5, where the electronic device includes a processor 101 and a memory 100, where the memory 100 stores machine executable instructions that can be executed by the processor 101, and the processor 101 executes the machine executable instructions to implement the transaction supervision method on the blockchain.
Further, the electronic device shown in fig. 5 further includes a bus 102 and a communication interface 103, and the processor 101, the communication interface 103, and the memory 100 are connected through the bus 102.
The memory 100 may include a high-speed random access memory (RAM, random Access Memory), and may further include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other network element is implemented via at least one communication interface 103 (which may be wired or wireless), and may use the internet, a wide area network, a local network, a metropolitan area network, etc. Bus 102 may be an ISA bus, a PCI bus, an EISA bus, or the like. The buses may be classified as address buses, data buses, control buses, etc. For ease of illustration, only one bi-directional arrow is shown in FIG. 5, but not only one bus or type of bus.
The processor 101 may be an integrated circuit chip with signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in the processor 101 or instructions in the form of software. The processor 101 may be a general-purpose processor, including a central Processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), a digital signal processor (DIGITAL SIGNAL Processing, DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable GATE ARRAY (FPGA), a Programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component. The disclosed methods, steps, and logic blocks in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be embodied directly in the execution of a hardware decoding processor, or in the execution of a combination of hardware and software modules in a decoding processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in the memory 100 and the processor 101 reads information in the memory 100 and in combination with its hardware performs the steps of the method of the previous embodiments.
The embodiment of the invention also provides a machine-readable storage medium, which stores machine-executable instructions that, when being called and executed by a processor, cause the processor to implement the transaction supervision method on the blockchain, and the specific implementation can be referred to the method embodiment and will not be repeated herein.
The method, apparatus and computer program product of electronic device for supervising transactions on a blockchain provided in the embodiments of the present invention include a computer readable storage medium storing program codes, where the instructions included in the program codes may be used to execute the method described in the foregoing method embodiment, and specific implementation may refer to the method embodiment and will not be described herein.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, an electronic device, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. The storage medium includes a U disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, an optical disk, or other various media capable of storing program codes.
It should be noted that the foregoing embodiments are merely illustrative embodiments of the present invention, and not restrictive, and the scope of the invention is not limited to the embodiments, and although the present invention has been described in detail with reference to the foregoing embodiments, it should be understood by those skilled in the art that any modification, variation or substitution of some of the technical features of the embodiments described in the foregoing embodiments may be easily contemplated within the scope of the present invention, and the spirit and scope of the technical solutions of the embodiments do not depart from the spirit and scope of the embodiments of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.