Identity verification method and device
Technical Field
The present application relates to the field of information identification, and in particular, to an identity verification method and apparatus.
Background
With the rapid development of internet information technology, it is becoming more and more common for each service provider to develop users and provide services for users through a network. However, in the process of developing a user and providing a service for the user through a network, each service party generally faces a problem that it is impossible to determine the authenticity of the user identity, that is, it is impossible to determine whether the identity information input by the user is the real information of the user (for example, whether the identity information is valid, whether the information of another person is falsely used, etc.), so that the service often faces various risks.
Currently, the authenticity of user information is judged mainly by searching for other information matching the identity card number in an identity information base based on the identity card number input by a user, and judging whether the searched other information is consistent with corresponding information input by the user, such as a name, a mobile phone number and the like, if so, the identity information input by the user is considered to be real, otherwise, the identity information input by the user is considered to be unreal. However, in practical implementation, many user information stored in the identity information base is not information of users with real names, for example, for many users, only mobile phone numbers, registered account numbers, nicknames, and the like are stored, and when the identity numbers input by the users cannot be matched, other information corresponding to the identity numbers cannot be obtained from the identity information base, and further, the identities of the users cannot be verified.
Therefore, the existing identity verification method has certain limitation, and the identity of the user cannot be verified under the condition that the identity card number input by the user cannot be matched.
Disclosure of Invention
The embodiment of the application provides an identity verification method and an identity verification device, which are used for solving the problem that the existing identity verification method has certain limitation and cannot verify the identity of a user under the condition that the identity number input by the user cannot be matched.
An embodiment of the present application provides an identity verification method, including:
receiving a plurality of identity attribute information input by a user;
configuring at least one identity attribute information set based on the identity attribute information, binding all identity attribute information belonging to the same identity attribute information set together based on a stored user identity information base to perform first security detection, and obtaining a security coefficient of each identity attribute information set in the identity attribute information set; each identity attribute information set comprises at least two identity attribute information; and,
based on a stored user identity information base, respectively and independently carrying out second security detection on at least one identity attribute information in the identity attribute information to obtain a risk coefficient of each identity attribute information in the identity attribute information;
and determining the identity verification result of the user based on the obtained security coefficient of each identity attribute information set in the at least one identity attribute information set and the obtained risk coefficient of each identity attribute information in the at least one identity attribute information set.
Optionally, the first security detection comprises a first validity detection and/or a first fraud detection; wherein the safety coefficient is positively correlated with the result of performing the first validity check and negatively correlated with the result of performing the first fraud check; the second security detection comprises a second validity detection and/or a second fraud detection; wherein the risk coefficient is positively correlated with the result of the second validity check and positively correlated with the result of the second abuse check.
Optionally, the performing, based on the stored user identity information library, second security detection on at least one of the plurality of identity attribute information separately to obtain a risk coefficient of each of the at least one identity attribute information includes:
respectively and independently performing second security detection on each identity attribute information in the identity attribute information based on a stored user identity information base to obtain a risk coefficient of each identity attribute information in the identity attribute information;
the determining, based on the obtained security coefficient of each of the at least one identity attribute information set and the obtained risk coefficient of each of the at least one identity attribute information set, a result of identity verification for the user includes:
determining each safety identity attribute information set from the configured identity attribute information sets based on the obtained safety coefficient of each identity attribute information set, wherein the safety coefficient of each safety identity attribute information set is greater than a set threshold value;
removing the identity attribute information corresponding to each determined safety identity attribute information set from the identity attribute information input by the user to obtain each piece of non-safety identity attribute information;
searching the risk coefficient of each piece of non-safety identity attribute information from the risk coefficient of each piece of identity attribute information in the plurality of pieces of identity attribute information;
and determining the identity verification result of the user based on the security coefficient of each secure identity attribute information set and the risk coefficient of each non-secure identity attribute information set.
Optionally, the separately performing, based on the stored user identity information library, second security detection on at least one of the plurality of identity attribute information, includes:
determining each safety identity attribute information set from the configured identity attribute information sets based on the obtained safety coefficient of each identity attribute information set, wherein the safety coefficient of each safety identity attribute information set is greater than a set threshold value;
removing identity attribute information contained in each determined safety identity attribute information set from the identity attribute information input by the user to obtain each piece of non-safety identity attribute information, and respectively and independently carrying out second safety detection on each piece of obtained non-safety identity attribute information;
determining a result of identity verification of the user based on the obtained security coefficient of each identity attribute information set and the risk coefficient of each identity attribute information, including:
and determining the identity verification result of the user based on the security coefficient of each secure identity attribute information set and the risk coefficient of each non-secure identity attribute information set.
Optionally, the determining a result of identity verification of the user based on the security coefficient of each secure identity attribute information set and the risk coefficient of each non-secure identity attribute information includes:
determining a safety score of each safety identity attribute information set based on the safety coefficient of each safety identity attribute information set and the importance set for each safety identity attribute information set; and,
determining a non-safe score of each piece of non-safe identity attribute information based on the risk coefficient of each piece of non-safe identity attribute information and the importance degree set for each piece of non-safe identity attribute information;
determining a result of identity verification for the user based on the determined safe score for each set of safe identity attribute information and the determined unsafe score for each set of unsafe identity attribute information.
Optionally, the determining a security score of each security identity attribute information set based on the security coefficient of each security identity attribute information set and the importance set for each security identity attribute information set includes:
for each safety identity attribute information set, determining the product of the safety coefficient and the importance of the safety identity attribute information set as the safety score of the safety identity attribute information set;
determining a non-secure score for each non-secure identity attribute information based on the risk factor for each non-secure identity attribute information and the importance set for each non-secure identity attribute information, comprising:
and for each piece of non-secure identity attribute information, determining the product of the risk coefficient and the importance of the non-secure identity attribute information after multiplication as the non-secure score of the non-secure identity attribute information.
Optionally, determining a result of identity verification for the user based on the determined safe score for each set of safe identity attribute information and the determined non-safe score for each set of non-safe identity attribute information, comprises:
adding the determined safety scores of each safety identity attribute information set to obtain a first sum; and are
Adding the determined unsafe scores of the unsafe identity attribute information to obtain a second sum;
and determining the difference value of the first sum value and the second sum value as an identity credibility score after identity verification is carried out on the user.
Optionally, each configured identity attribute information set includes two identity attribute information; or,
configuring a plurality of identity attribute information sets, wherein each identity attribute information set corresponds to one identity attribute information number; and each two pieces of identity attribute information belong to at most one safety identity attribute information set.
An embodiment of the present application provides an identity verification device, including:
the receiving module is used for receiving a plurality of identity attribute information input by a user;
the first detection module is used for configuring at least one identity attribute information set based on the identity attribute information, binding all identity attribute information belonging to the same identity attribute information set together for first security detection based on a stored user identity information base, and obtaining a security coefficient of each identity attribute information set in the identity attribute information set; each identity attribute information set comprises at least two identity attribute information; and,
the second detection module is used for respectively and independently carrying out second safety detection on at least one identity attribute information in the identity attribute information based on a stored user identity information base to obtain a risk coefficient of each identity attribute information in the identity attribute information;
and the determining module is used for determining the identity verification result of the user based on the obtained security coefficient of each identity attribute information set in the at least one identity attribute information set and the obtained risk coefficient of each identity attribute information in the at least one identity attribute information set.
The basic idea of the embodiment of the application is that binding detection and single detection are respectively carried out on identity attribute information input by a user, and the result of identity verification of the user is determined based on the results of the binding detection and the single detection, so that the limitation of a scene that identity card numbers must be matched is avoided, and the use scene is expanded; in addition, the embodiment of the application makes full use of the correlation characteristics and the independent characteristics of various identity attribute information, and can accurately detect the authenticity of the user identity information.
Drawings
Fig. 1 is a flowchart of an identity verification method according to an embodiment of the present application;
fig. 2 is a flowchart of an identity verification method according to a second embodiment of the present application;
FIG. 3 is a schematic diagram showing the results of the first security inspection and the second security inspection;
fig. 4 is a flowchart of an identity verification method according to a third embodiment of the present application;
fig. 5 is a schematic structural diagram of an identity verification apparatus according to a fourth embodiment of the present application.
Detailed Description
The basic idea of the embodiment of the application is to perform binding detection and single detection on identity attribute information input by a user respectively, and determine a result of identity verification on the user based on the results of the binding detection and the single detection. For example, if a plurality of identity attribute information of one identity attribute information set are used by the same user for a plurality of times, it indicates that the identity attribute information set has higher security, i.e. higher authenticity; for a single identity attribute information, if the other information of the secure user matched with the identity attribute information in the identity information base is inconsistent with the corresponding information input by the user (for example, in the identity information base, the name corresponding to the identity card number input by the user is a1, the mobile phone number is B1, the name actually input by the user is a2, and the mobile phone number is B2), it indicates that the identity attribute information is highly likely to be falsely used.
Based on the above thought, the embodiment of the present application proposes the following technical solutions. The embodiments of the present application will be described in further detail with reference to the drawings attached hereto.
Example one
As shown in fig. 1, a flowchart of an identity verification method provided in an embodiment of the present application includes the following steps:
s101: a plurality of identity attribute information input by a user is received.
Here, the plurality of identity attribute information input by the user may include: identity card number, name, mobile phone number, address, mailbox, address, etc.
S102: configuring at least one identity attribute information set based on the identity attribute information, binding all identity attribute information belonging to the same identity attribute information set together based on a stored user identity information base to perform first security detection, and obtaining a security coefficient of each identity attribute information set in the identity attribute information set; wherein, each identity attribute information set comprises at least two identity attribute information.
In a specific implementation, a plurality of identity attribute information input by a user are configured into a plurality of identity attribute information sets, and each identity attribute information in each identity attribute information set is bound together to perform first security detection, that is, information of the same user, which is matched with each identity attribute information in the identity attribute information set, is searched from a user identity information base to perform first security detection, where the first security detection may include first validity detection and/or first popularity detection; wherein the safety coefficient is positively correlated with the result of performing the first validity check and negatively correlated with the result of performing the first imposition degree check. For example, if there is information of the same user that matches the identity attribute information set, and it can be derived from the information that the frequency of use of the identity attribute information set in the last period of time is high, and it can be derived that the validity of the identity attribute information set is high, then the security coefficient obtained after performing the first security detection on the identity attribute information set is high, and conversely, if there is no information of the same user that matches the identity attribute information set, then it is considered that the validity of the identity attribute information set is low, then the security coefficient obtained after performing the first security detection on the identity attribute information set is low; for another example, the identity attribute information set includes a mailbox and a name, and based on information in the identity information base, the key field in the mailbox is a field shared by multiple mailboxes (for example, the mailbox is AAA4, and the identity information base records mailboxes of AAA1, AAA2, and AAA 3), and the name is a superimposed word without a last name (for example, happy), which indicates that the popularity of the identity attribute information set is higher, and the security coefficient obtained after performing the first security check on the identity attribute information set is lower.
S103: and respectively and independently carrying out second security detection on at least one identity attribute information in the identity attribute information based on a stored user identity information base to obtain a risk coefficient of each identity attribute information in the identity attribute information.
In specific implementation, the single identity attribute information is respectively subjected to second security detection, and the second security detection may include second validity detection and/or second fraudulent use detection; wherein the risk coefficient is positively correlated with the result of the second validity test and positively correlated with the result of the second abuse test; for example, if it is detected that the frequency of the latest use of certain identity attribute information is high, it indicates that the validity of the identity attribute information is high; however, based on the identity attribute information, if other information corresponding to the identity attribute information found in the identity information base is inconsistent with the corresponding information input by the user, the popularity of the identity attribute information is considered to be higher. For example, it is detected in the identity information base that the identity card number input by the user 1 has been frequently used recently, but if the name, shipping address, and the like of the user 2 who uses the identity card number recorded in the identity information base do not match the name, shipping address, and the like input by the user 1, it is considered that the risk coefficient of the identity attribute information is high, indicating that the user 1 is likely to falsely use the identity card number of the user 2.
S104: and determining the identity verification result of the user based on the obtained security coefficient of each identity attribute information set in the at least one identity attribute information set and the obtained risk coefficient of each identity attribute information in the at least one identity attribute information set.
For example, the security coefficients of each security identity attribute information set may be directly added, and then the risk coefficient of each individual identity attribute information may be subtracted to obtain the identity reliability score after the identity of the user is verified.
In a specific implementation, the credibility score may be directly output as an identity verification result (for example, the identity verification result is notified to a service party requesting to obtain the credibility score), or a result for the user after performing identity verification may be determined based on the identity credibility score, for example, the user passes identity verification, fails identity verification, and rejects a service request of the user.
Example two
As shown in fig. 2, a flowchart of an identity verification method provided in the second embodiment of the present application includes the following steps:
s201: a plurality of identity attribute information input by a user is received.
S202: configuring at least one identity attribute information set based on the identity attribute information, binding all identity attribute information belonging to the same identity attribute information set together based on a stored user identity information base to perform first security detection, and obtaining a security coefficient of each identity attribute information set in the identity attribute information set; wherein, each identity attribute information set comprises at least two identity attribute information.
S203: and respectively and independently carrying out second security detection on each identity attribute information in the identity attribute information based on a stored user identity information base to obtain a risk coefficient of each identity attribute information in the identity attribute information.
S204: and determining each safety identity attribute information set from the configured identity attribute information sets based on the obtained safety coefficient of each identity attribute information set, wherein the safety coefficient of each safety identity attribute information set is greater than a set threshold value.
In the specific implementation, there are two ways to configure the identity attribute information set:
the first method is as follows: configuring each identity attribute information set to contain two identity attribute information;
in this way, each identity attribute information set is respectively subjected to first security detection, namely pairwise binding detection is carried out on each identity attribute information set, and each identity attribute information set is an identity attribute information pair. As shown in fig. 3, a schematic diagram is shown for showing results after the first security detection and the second security detection, in the diagram, a user a obtains more security identity attribute information sets after the first security detection, a user B obtains a minimum user C, and two identity attribute information existing in the user C do not exist in any security identity attribute information set and belong to non-security identity attribute information. In the figure, a connecting line between two pieces of identity attribute information indicates that the two pieces of identity attribute information form a safety identity attribute information set, numbers on the connecting line represent safety coefficients of the safety identity attribute information set, and numbers beside a single piece of identity attribute information represent risk coefficients of the identity attribute information.
The second method comprises the following steps: configuring a plurality of identity attribute information sets, wherein each identity attribute information set corresponds to one identity attribute information number; and each two pieces of identity attribute information belong to at most one safety identity attribute information set.
In order to satisfy the condition that every two identity attribute information belong to at most one security identity attribute information set, when the identity attribute information set is specifically configured and the security identity attribute information set is determined, one of the following modes can be adopted:
1) and aiming at the number of each kind of identity attribute information, respectively executing: configuring each identity attribute information set under the number of identity attribute information based on the obtained identity attribute information; for each identity attribute information set, respectively carrying out first information security detection on each identity attribute information set to obtain each first security identity attribute information set; and sequentially screening each second security identity attribute information set from the obtained first security identity attribute information sets according to the sequence of the number of the contained identity attribute information from large to small, so that every two identity attribute information in each screened second security identity attribute information set belong to at most one second security identity attribute information set, and taking the screened second security identity attribute information sets as finally determined security identity attribute information sets.
Alternatively, the following are adopted:
2) carrying out first information security detection on identity attribute information sets with the number of N of identity attribute information to obtain each security identity attribute information set with the number of N of identity attribute information, wherein N is a positive integer greater than or equal to 3; and configuring an identity attribute information set containing N-1 identity attribute information number based on each identity attribute information which does not belong to any one safety identity attribute information set to obtain each safety identity attribute information set containing N-1 identity attribute information number, updating N to be N-1, and returning to the step of carrying out first information safety detection on the identity attribute information set containing N identity attribute information number.
S205: removing the identity attribute information corresponding to each determined safety identity attribute information set from the identity attribute information input by the user to obtain each piece of non-safety identity attribute information; and searching the risk coefficient of each piece of non-safety identity attribute information from the risk coefficient of each piece of identity attribute information in the plurality of pieces of identity attribute information.
S206: and determining the identity verification result of the user based on the security coefficient of each secure identity attribute information set and the risk coefficient of each non-secure identity attribute information set.
In specific implementation, besides the security coefficient and the risk coefficient, different identity attribute information sets and importance of identity attribute information can be considered, for example, the importance of the identity card number is higher than that of identity attribute information such as a name and a mobile phone number due to uniqueness, and for example, the importance of the identity card number + the name of the identity attribute information set is higher than that of an account number + a mailbox.
In a specific implementation, the safety score of each safety identity attribute information set may be determined based on the safety coefficient of each safety identity attribute information set and the importance set for each safety identity attribute information set (for example, for each safety identity attribute information set, the safety score of the safety identity attribute information set is determined by multiplying the safety coefficient and the importance of the safety identity attribute information set by each other); determining a non-safety score of each piece of non-safety identity attribute information based on the risk coefficient of each piece of non-safety identity attribute information and the importance set for each piece of non-safety identity attribute information (for example, for each piece of non-safety identity attribute information, determining the product of the risk coefficient and the importance of the non-safety identity attribute information as the non-safety score of the non-safety identity attribute information); determining a result of identity verification for the user based on the determined safe score for each set of safe identity attribute information and the determined unsafe score for each set of unsafe identity attribute information.
Further, the safety scores of each safety identity attribute information set can be added to obtain a first sum; adding the determined unsafe scores of the unsafe identity attribute information to obtain a second sum; and determining the difference value of the first sum value and the second sum value as an identity credibility score after identity verification is carried out on the user.
In a specific implementation, the second embodiment may be adopted, first, second security detection is performed on each identity attribute information to obtain each risk coefficient, and then, after each piece of non-secure identity attribute information is determined, the risk coefficient of each piece of non-secure identity attribute information is found from each obtained risk coefficient; or, the following third embodiment may also be adopted, first determining each secure identity attribute information set based on the security coefficient of each identity attribute information set, taking the identity attribute information that is not in each secure identity attribute information set as the non-secure identity attribute information, and then performing second security detection on each non-secure identity attribute information to obtain the risk coefficient of each non-secure identity attribute information.
Similar or repeated details of the following third embodiment and second embodiment are not repeated.
EXAMPLE III
As shown in fig. 4, a flowchart of an identity verification method provided in the third embodiment of the present application includes the following steps:
s401: a plurality of identity attribute information input by a user is received.
S402: configuring at least one identity attribute information set based on the identity attribute information, binding all identity attribute information belonging to the same identity attribute information set together based on a stored user identity information base to perform first security detection, and obtaining a security coefficient of each identity attribute information set in the identity attribute information set; wherein, each identity attribute information set comprises at least two identity attribute information.
S403: and determining each safety identity attribute information set from the configured identity attribute information sets based on the obtained safety coefficient of each identity attribute information set, wherein the safety coefficient of each safety identity attribute information set is greater than a set threshold value.
S404: and removing the identity attribute information contained in each determined safety identity attribute information set from the identity attribute information input by the user to obtain each piece of non-safety identity attribute information, and respectively and independently carrying out second safety detection on each piece of obtained non-safety identity attribute information.
S405: determining a safety score of each safety identity attribute information set based on the safety coefficient of each safety identity attribute information set and the importance set for each safety identity attribute information set; and determining a non-safe score of each piece of non-safe identity attribute information based on the risk coefficient of each piece of non-safe identity attribute information and the importance degree set for each piece of non-safe identity attribute information.
S406: determining a result of identity verification for the user based on the determined safe score for each set of safe identity attribute information and the determined unsafe score for each set of unsafe identity attribute information.
Here, the determined safety score of each safety identity attribute information set may be added to obtain a first sum; adding the determined unsafe scores of the unsafe identity attribute information to obtain a second sum; and determining the difference value of the first sum value and the second sum value as an identity credibility score after identity verification is carried out on the user.
Based on the same inventive concept, the embodiment of the present application further provides an identity verification apparatus corresponding to the identity verification method, and as the principle of the apparatus for solving the problem is similar to the identity verification method in the embodiment of the present application, the implementation of the apparatus may refer to the implementation of the method, and repeated details are not repeated.
Example four
As shown in fig. 5, a schematic structural diagram of an identity verification apparatus provided in the fourth embodiment of the present application includes:
a receiving module 51, configured to receive a plurality of identity attribute information input by a user;
a first detection module 52, configured to configure at least one identity attribute information set based on the plurality of identity attribute information sets, and bind, based on a stored user identity information base, the identity attribute information sets belonging to the same identity attribute information set together to perform a first security detection, so as to obtain a security coefficient of each identity attribute information set in the at least one identity attribute information set; each identity attribute information set comprises at least two identity attribute information; and,
a second detection module 53, configured to perform second security detection on at least one identity attribute information of the multiple identity attribute information separately based on a stored user identity information base, to obtain a risk coefficient of each identity attribute information of the at least one identity attribute information;
a determining module 54, configured to determine a result of identity verification for the user based on the obtained security coefficient of each of the at least one identity attribute information set and the obtained risk coefficient of each of the at least one identity attribute information set.
Optionally, the first security detection comprises a first validity detection and/or a first fraud detection; wherein the safety coefficient is positively correlated with the result of performing the first validity check and negatively correlated with the result of performing the first fraud check; the second security detection comprises a second validity detection and/or a second fraud detection; wherein the risk coefficient is positively correlated with the result of the second validity check and positively correlated with the result of the second abuse check.
Optionally, the second detecting module 53 is specifically configured to:
respectively and independently performing second security detection on each identity attribute information in the identity attribute information based on a stored user identity information base to obtain a risk coefficient of each identity attribute information in the identity attribute information;
the determining module 54 is specifically configured to:
determining each safety identity attribute information set from the configured identity attribute information sets based on the obtained safety coefficient of each identity attribute information set, wherein the safety coefficient of each safety identity attribute information set is greater than a set threshold value; removing the identity attribute information corresponding to each determined safety identity attribute information set from the identity attribute information input by the user to obtain each piece of non-safety identity attribute information; searching the risk coefficient of each piece of non-safety identity attribute information from the risk coefficient of each piece of identity attribute information in the plurality of pieces of identity attribute information; and determining the identity verification result of the user based on the security coefficient of each secure identity attribute information set and the risk coefficient of each non-secure identity attribute information set.
Optionally, the second detecting module 53 is specifically configured to:
determining each safety identity attribute information set from the configured identity attribute information sets based on the obtained safety coefficient of each identity attribute information set, wherein the safety coefficient of each safety identity attribute information set is greater than a set threshold value; removing identity attribute information contained in each determined safety identity attribute information set from the identity attribute information input by the user to obtain each piece of non-safety identity attribute information, and respectively and independently carrying out second safety detection on each piece of obtained non-safety identity attribute information;
the determining module 54 is specifically configured to:
and determining the identity verification result of the user based on the security coefficient of each secure identity attribute information set and the risk coefficient of each non-secure identity attribute information set.
Optionally, the determining module 54 is specifically configured to:
determining a safety score of each safety identity attribute information set based on the safety coefficient of each safety identity attribute information set and the importance set for each safety identity attribute information set; determining a non-safety score of each piece of non-safety identity attribute information based on the risk coefficient of each piece of non-safety identity attribute information and the importance degree set for each piece of non-safety identity attribute information; determining a result of identity verification for the user based on the determined safe score for each set of safe identity attribute information and the determined unsafe score for each set of unsafe identity attribute information.
Optionally, the determining module 54 is specifically configured to:
for each safety identity attribute information set, determining the product of the safety coefficient and the importance of the safety identity attribute information set as the safety score of the safety identity attribute information set;
and for each piece of non-secure identity attribute information, determining the product of the risk coefficient and the importance of the non-secure identity attribute information after multiplication as the non-secure score of the non-secure identity attribute information.
Optionally, the determining module 54 is specifically configured to:
adding the determined safety scores of each safety identity attribute information set to obtain a first sum; adding the determined unsafe scores of the unsafe identity attribute information to obtain a second sum; and determining the difference value of the first sum value and the second sum value as an identity credibility score after identity verification is carried out on the user.
Optionally, each configured identity attribute information set includes two identity attribute information; or,
configuring a plurality of identity attribute information sets, wherein each identity attribute information set corresponds to one identity attribute information number; and each two pieces of identity attribute information belong to at most one safety identity attribute information set.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.