Disclosure of Invention
The invention aims to provide a vehicle anti-theft method and a system thereof so as to improve the safety and the convenience of a vehicle anti-theft system.
In a first aspect, an embodiment of the present invention provides a vehicle anti-theft method, including:
the method comprises the steps that the vehicle-mounted equipment obtains a dynamic characteristic graph of the mobile terminal, performs characteristic analysis on the dynamic characteristic graph to obtain secondary dynamic verification data, and calculates according to the secondary dynamic verification data and a preset first algorithm to obtain a first calculation result; the dynamic characteristic graph is generated by the mobile terminal according to primary dynamic verification data provided by the server and a preset second algorithm, and the primary dynamic verification data is generated by the server according to verification request information sent by the mobile terminal and a preset third algorithm;
the vehicle-mounted equipment sends the first calculation result to a server;
the vehicle-mounted equipment receives a verification result sent by the server and cancels the vehicle anti-theft system according to the verification result; and the verification result is a matching result obtained by the server generating a second calculation result according to the primary dynamic verification data and a preset first algorithm and matching the first calculation result with the second calculation result.
Preferably, the step of generating the dynamic feature pattern by the mobile terminal according to the primary dynamic verification data provided by the server and a preset second algorithm specifically includes:
the mobile terminal sends verification request information to the server;
the mobile terminal receives primary dynamic verification data sent by the server;
the mobile terminal acquires an enterprise background graph and generates a characteristic shape according to primary dynamic verification data and a preset second algorithm;
and the mobile terminal adds the characteristic shape to the enterprise background graph to obtain a dynamic characteristic graph.
Preferably, the method further comprises:
when the server matches the first calculation result with the second calculation result to obtain a matching result with the first calculation result and the second calculation result consistent with each other, the server binds the user information with the information of the vehicle-mounted equipment sending the first calculation result and sends the verification result to the vehicle-mounted equipment and the mobile terminal; wherein the authentication request information includes user information;
and when the server matches the first calculation result with the second calculation result to obtain a matching result with inconsistent first calculation result and second calculation result, the server sends the verification result to the vehicle-mounted equipment and the mobile terminal.
Preferably, the deactivating of the vehicle theft prevention system according to the verification result includes:
when the verification result is that the first calculation result is consistent with the second calculation result, the vehicle-mounted equipment releases the vehicle anti-theft system, and the mobile terminal outputs prompt information for prompting that the verification is passed on the user interface according to the verification result;
and when the verification result is that the first calculation result is inconsistent with the second calculation result, the vehicle-mounted equipment maintains the locking of the vehicle anti-theft system, and the mobile terminal outputs prompt information for prompting that the verification fails on the user interface according to the verification result and provides an option for sending a verification request again.
Preferably, the step of generating, by the server, the primary dynamic verification data according to the verification request information sent by the mobile terminal and a preset third algorithm specifically includes:
the server receives verification request information sent by the mobile terminal; wherein the authentication request information includes user information;
the server judges whether user information consistent with the user information in the verification request information exists in a plurality of pieces of user information which are stored in advance and successfully registered, if so, primary dynamic verification data is generated according to a preset third algorithm, and if not, the primary dynamic verification data is not generated.
In a second aspect, an embodiment of the present invention provides an on-board device, configured to implement the vehicle anti-theft method provided in the first aspect, where the on-board device includes:
the graphic processing unit is used for acquiring a dynamic characteristic graphic of the mobile terminal, performing characteristic analysis on the dynamic characteristic graphic to obtain secondary dynamic verification data, and calculating according to the secondary dynamic verification data and a preset first algorithm to obtain a first calculation result; the dynamic characteristic graph is generated by the mobile terminal according to primary dynamic verification data provided by the server and a preset second algorithm, and the primary dynamic verification data is generated by the server according to verification request information sent by the mobile terminal and a preset third algorithm;
the information receiving and sending unit is used for sending the first calculation result to the server and receiving a verification result sent by the server; and
the unlocking unit is used for unlocking the vehicle anti-theft system according to the verification result; and the verification result is a matching result obtained by the server generating a second calculation result according to the primary dynamic verification data and a preset first algorithm and matching the first calculation result with the second calculation result.
In a third aspect, an embodiment of the present invention provides another vehicle-mounted device, including a memory and a processor, where the memory stores computer-readable instructions, and the computer-readable instructions, when executed by the processor, cause the processor to execute the steps of the vehicle anti-theft method provided in the first aspect.
In a fourth aspect, an embodiment of the present invention provides a vehicle anti-theft method, including:
the server receives verification request information sent by the mobile terminal; the authentication request information includes user information;
the server generates primary dynamic verification data according to verification request information sent by the mobile terminal and a preset third algorithm, and sends the primary dynamic verification data to the mobile terminal;
the server receives a first calculation result sent by the vehicle-mounted equipment, generates a second calculation result according to the primary dynamic verification data and a preset first algorithm, and sends a matching result obtained by matching the first calculation result and the second calculation result to the vehicle-mounted equipment as a verification result so that the vehicle-mounted equipment can remove the vehicle anti-theft system according to the verification result;
the first calculation result is obtained by acquiring a dynamic characteristic graph of the mobile terminal by the vehicle-mounted equipment, performing characteristic analysis on the dynamic characteristic graph to obtain secondary dynamic verification data, and calculating according to the secondary dynamic verification data and a preset first algorithm; and the dynamic characteristic graph is generated by the mobile terminal according to the primary dynamic verification data provided by the server and a preset second algorithm.
Preferably, the step of generating the dynamic feature pattern by the mobile terminal according to the primary dynamic verification data provided by the server and a preset second algorithm specifically includes:
the mobile terminal sends verification request information to the server;
the mobile terminal receives primary dynamic verification data sent by the server;
the mobile terminal acquires an enterprise background graph and generates a characteristic shape according to primary dynamic verification data and a preset second algorithm;
and the mobile terminal adds the characteristic shape to the enterprise background graph to obtain a dynamic characteristic graph.
In a fifth aspect, an embodiment of the present invention provides a server, including:
the information receiving unit is used for receiving the verification request information sent by the mobile terminal; the authentication request information includes user information;
the verification data generation unit is used for generating primary dynamic verification data according to verification request information sent by the mobile terminal and a preset third algorithm and sending the primary dynamic verification data to the mobile terminal; and
the verification unit is used for receiving a first calculation result sent by the vehicle-mounted equipment, generating a second calculation result according to the primary dynamic verification data and a preset first algorithm, and sending a matching result obtained by matching the first calculation result and the second calculation result to the vehicle-mounted equipment as a verification result so that the vehicle-mounted equipment can remove the vehicle anti-theft system according to the verification result;
wherein: the first calculation result is obtained by acquiring a dynamic characteristic graph of the mobile terminal by the vehicle-mounted equipment, performing characteristic analysis on the dynamic characteristic graph to obtain secondary dynamic verification data, and calculating according to the secondary dynamic verification data and a preset first algorithm; and the dynamic characteristic graph is generated by the mobile terminal according to the primary dynamic verification data provided by the server and a preset second algorithm.
The technical scheme at least has the following advantages: in the application process, a user operates the mobile terminal to send verification request information to the server, the server verifies the verification request information according to a set verification mode after receiving the verification request information, if the verification is passed, a primary dynamic verification data is generated by using a preset third algorithm and returned to the mobile terminal, at the moment, the mobile terminal generates a dynamic characteristic graph according to the primary dynamic verification data returned by the server and a preset second algorithm, the vehicle-mounted equipment scans the dynamic characteristic graph of the mobile terminal by using a camera and performs characteristic analysis on the dynamic characteristic graph to obtain a secondary dynamic verification data, a first calculation result is obtained by calculating according to the second dynamic verification data and a preset first algorithm and is sent to the server, after the server receives the first calculation result, the primary dynamic verification data is calculated by using the preset first algorithm to obtain a second calculation result, and verifying, if the first calculation result is consistent with the second calculation result, the verification is passed, the verification result is sent to the mobile terminal and the vehicle-mounted equipment, and the vehicle-mounted equipment unlocks the vehicle anti-theft system according to the verification result. The dynamic characteristic graph of the mobile terminal held by the user is identified through the vehicle-mounted equipment, the dynamic characteristic graph is used as a use certificate for removing the vehicle anti-theft system, and compared with a currently used physical key or a currently used virtual Bluetooth key, the flexibility and the convenience for removing the vehicle anti-theft system can be improved. And the dynamic characteristic graph is generated by the mobile terminal, and a user only needs to interact with the background server through the mobile terminal, so that the condition that the handheld terminal enters an illegal website to cause cheating or virus implantation is avoided.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Detailed Description
Various exemplary embodiments, features and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. In the drawings, like reference numbers can indicate functionally identical or similar elements. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
In addition, in the following detailed description, numerous specific details are set forth in order to provide a better understanding of the present invention. It will be understood by those skilled in the art that the present invention may be practiced without some of these specific details. In some instances, well known means have not been described in detail so as not to obscure the present invention.
An embodiment of the present invention provides a vehicle anti-theft method, which can be applied to vehicle anti-theft of cars, shared bicycles, and the like, where fig. 1 is a flowchart of the method in this embodiment, and referring to fig. 1, the method in this embodiment includes steps S101 to S103:
s101, acquiring a dynamic characteristic graph of a mobile terminal by vehicle-mounted equipment, performing characteristic analysis on the dynamic characteristic graph to obtain secondary dynamic verification data, and calculating according to the secondary dynamic verification data and a preset first algorithm to obtain a first calculation result; the dynamic characteristic graph is generated by the mobile terminal according to primary dynamic verification data provided by the server and a preset second algorithm, and the primary dynamic verification data is generated by the server according to verification request information sent by the mobile terminal and a preset third algorithm;
specifically, the vehicle-mounted device is a device mounted on a vehicle, and is capable of executing the process of steps S101 to S103, and the mobile terminal is, for example, a mobile phone, a tablet computer, a smart watch, or the like.
It can be understood that any encryption algorithm can be selected for the preset first algorithm, the preset second algorithm and the preset third algorithm, so that a unique encryption value can be obtained in the calculation process, and the data consistency verification can be performed after the multi-terminal calculation conversion, which is not specifically limited in this embodiment.
For example, the authentication request information is the identity of the current user, such as a registered user, the identity of which is already authenticated and confirmed, and only the real and valid user can send a request, and the authentication request belongs to the user applying for the use permission from the server.
The server verifies the verification request information according to the mobile terminal, and generates primary dynamic verification data by using a preset third algorithm under the condition that the verification is passed, wherein it needs to be noted that the generation of the primary dynamic verification data is random so as to improve the reliability of theft prevention.
It can be understood that the APP on the mobile terminal and the server have a dedicated network interface, and the user applies for the server through an account number (for example, a binding mobile phone number, an identity card, and the like to determine that the user is a real and valid user) that has been successfully registered on the APP. The verification method comprises two verification steps, wherein the first verification step is that the mobile terminal APP can send verification request information only through an existing account, and the second verification step is that the server verifies and confirms the verification request information uploaded by the mobile terminal APP.
The information stored in the dynamic characteristic graph at least comprises identification generation time, effective time and data content corresponding to one-time dynamic verification data, the data content is stored in a data storage area of the graph, a timestamp is stored in a timestamp storage area of the graph, and the dynamic characteristic graph can be a two-dimensional code graph.
The step of performing feature analysis on the dynamic feature graph to obtain secondary dynamic verification data specifically comprises: and judging the specification and the timestamp of the dynamic feature pattern, wherein the timestamp comprises identification generation time and valid time, if the specification of the dynamic feature pattern does not meet the preset requirement, or the identification generation time and the valid time of the pattern do not meet the time requirement, for example, the identification generation time and the valid time exceed the valid time, the dynamic feature pattern is judged to be an invalid pattern, and if the specification of the dynamic feature pattern meets the preset requirement, image features are further extracted to obtain secondary dynamic verification data. For example, in dynamic changes, since the effective time of the timestamp storage area changes, and the decoding method also changes, the corresponding verification data also follows the synchronous change of the storage area. When the equipment scans the dynamic feature pattern, after the timestamp is confirmed to be normal, the decoding mode is obtained, the features are extracted in different areas according to the current decoding mode, and the verification data is analyzed.
Step S102, the vehicle-mounted equipment sends the first calculation result to a server;
step S103, the vehicle-mounted equipment receives a verification result sent by the server and releases the vehicle anti-theft system according to the verification result; and the verification result is a matching result obtained by the server generating a second calculation result according to the primary dynamic verification data and a preset first algorithm and matching the first calculation result with the second calculation result.
Specifically, in the application process of the method of this embodiment, a user inputs a user information registration account on an APP interface of a mobile terminal to log in, after the login is successful, the mobile terminal is operated to send a verification request message to a server, the server verifies the verification request message according to a set verification method after receiving the verification request message, if the verification is passed, a primary dynamic verification data is generated by using a preset third algorithm and returned to the mobile terminal, at this time, the mobile terminal generates a dynamic feature pattern according to the primary dynamic verification data returned by the server and a preset second algorithm, a vehicle-mounted device scans the dynamic feature pattern of the mobile terminal by using a camera and performs feature analysis on the dynamic feature pattern to obtain a secondary dynamic verification data, and calculates according to the second dynamic verification data and a preset first algorithm to obtain a first calculation result, and sends the first calculation result to the server, and after receiving the first calculation result, the server calculates the primary dynamic verification data by using a preset first algorithm to obtain a second calculation result, verifies the primary dynamic verification data, if the first calculation result is consistent with the second calculation result, the verification is passed, the verification result is sent to the mobile terminal and the vehicle-mounted equipment, and the vehicle-mounted equipment unlocks the vehicle anti-theft system according to the verification result. The dynamic characteristic graph of the mobile terminal held by the user is identified through the vehicle-mounted equipment, the dynamic characteristic graph is used as a use certificate for removing the vehicle anti-theft system, and compared with a currently used physical key or a currently used virtual Bluetooth key, the flexibility and the convenience for removing the vehicle anti-theft system can be improved. And the dynamic characteristic graph is generated by the mobile terminal, and a user only needs to interact with the background server through the mobile terminal, so that the condition that the handheld terminal enters an illegal website to cause cheating or virus implantation is avoided.
In a specific embodiment, the step of generating the dynamic feature pattern by the mobile terminal according to the primary dynamic verification data provided by the server and the preset second algorithm specifically includes the following steps S201 to S204:
step S201, the mobile terminal sends verification request information to a server;
step S202, the mobile terminal receives primary dynamic verification data sent by a server;
step S203, the mobile terminal acquires an enterprise background graph and generates a characteristic shape according to the primary dynamic verification data and a preset second algorithm;
specifically, the enterprise background graphics are enterprise background, such as words, trademarks, logos and other enterprise information;
and S204, adding the characteristic shape to the enterprise background graph by the mobile terminal to obtain a dynamic characteristic graph.
It should be noted that, in this embodiment, by being different from the universal standardized two-dimensional code, the dynamic encryption pattern is used, and the enterprise background pattern defined by the manufacturer can be used, which is beneficial to improving the brand extension of the manufacturer.
In a specific embodiment, the method further comprises:
when the server matches the first calculation result with the second calculation result to obtain a matching result that the first calculation result is consistent with the second calculation result, the server binds the user information with relevant information (vehicle information or vehicle-mounted device information) of the vehicle-mounted device sending the first calculation result, and sends the verification result to the vehicle-mounted device and the mobile terminal; wherein the authentication request information at least comprises user information (for example, account information registered by the user through the APP);
and when the server matches the first calculation result with the second calculation result to obtain a matching result with inconsistent first calculation result and second calculation result, the server sends the verification result to the vehicle-mounted equipment and the mobile terminal.
In a specific embodiment, said deactivating the vehicle anti-theft system according to said verification result comprises:
when the verification result is that the first calculation result is consistent with the second calculation result, the vehicle-mounted equipment releases the vehicle anti-theft system, and the mobile terminal outputs prompt information for prompting that the verification is passed on the user interface according to the verification result;
and when the verification result is that the first calculation result is inconsistent with the second calculation result, the vehicle-mounted equipment maintains the locking of the vehicle anti-theft system, and the mobile terminal outputs prompt information for prompting that the verification fails on the user interface according to the verification result and provides an option for sending a verification request again.
In a specific embodiment, the step of generating the primary dynamic verification data by the server according to the verification request information sent by the mobile terminal and the preset third algorithm specifically includes the following steps S301 to S302:
step S301, the server receives verification request information sent by the mobile terminal; wherein the authentication request information includes at least user information;
step S302, the server determines whether user information consistent with the user information in the authentication request information exists in the plurality of pieces of user information that are successfully registered and stored in advance, and if so, generates primary dynamic authentication data according to a preset third algorithm, and if not, does not generate the primary dynamic authentication data.
Referring to fig. 2, another embodiment of the present invention provides an on-board device 1, configured to implement the vehicle anti-theft method according to the above embodiment shown in fig. 1, where the on-board device 1 includes:
the graphic processing unit 11 is configured to obtain a dynamic feature graph of the mobile terminal 3, perform feature analysis on the dynamic feature graph to obtain secondary dynamic verification data, and perform calculation according to the secondary dynamic verification data and a preset first algorithm to obtain a first calculation result; the dynamic characteristic graph is generated by the mobile terminal 3 according to primary dynamic verification data provided by the server 2 and a preset second algorithm, and the primary dynamic verification data is generated by the server 2 according to verification request information sent by the mobile terminal 3 and a preset third algorithm;
the information receiving and sending unit 12 is configured to send the first calculation result to the server 2 and receive a verification result sent by the server 2; and
the unlocking unit 13 is used for unlocking the vehicle anti-theft system according to the verification result; the verification result is a matching result obtained by the server 2 generating a second calculation result according to the primary dynamic verification data and a preset first algorithm and matching the first calculation result with the second calculation result.
The above-described system embodiments are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
It should be noted that the system described in the foregoing embodiment corresponds to the method described in the foregoing embodiment, and therefore, portions of the system described in the foregoing embodiment that are not described in detail can be obtained by referring to the content of the method described in the foregoing embodiment, and are not described again here.
Also, the vehicle theft prevention system according to the above embodiment, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in a computer-readable storage medium.
An embodiment of the present invention provides another vehicle-mounted device, including a memory and a processor, where the memory stores computer-readable instructions, and the computer-readable instructions, when executed by the processor, cause the processor to execute the steps of the vehicle anti-theft method according to the above-mentioned embodiment shown in fig. 1.
Of course, the vehicle-mounted device may further have components such as a wired or wireless network interface, a keyboard, and an input/output interface, so as to perform input/output, and the vehicle-mounted device may further include other components for implementing device functions, which are not described herein again.
Illustratively, the computer program may be divided into one or more units, which are stored in the memory and executed by the processor to accomplish the present invention. The one or more units may be a series of computer program instruction segments capable of performing specific functions, which are used for describing the execution process of the computer program in the vehicle-mounted device.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like, the processor is the control center of the vehicle-mounted device, and various interfaces and lines are used to connect various parts of the whole vehicle-mounted device.
The memory may be used to store the computer program and/or unit, and the processor may implement various functions of the in-vehicle device by operating or executing the computer program and/or unit stored in the memory and calling data stored in the memory. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
Another embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the steps of the data verification method of the above-mentioned embodiment.
Specifically, the computer-readable storage medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like.
As shown in fig. 3, another embodiment of the present invention provides a vehicle anti-theft method, including the following steps S401 to S403:
step S401, the server receives verification request information sent by the mobile terminal; the authentication request information includes user information;
step S402, the server generates primary dynamic verification data according to verification request information sent by the mobile terminal and a preset third algorithm, and sends the primary dynamic verification data to the mobile terminal;
step S403, the server receives a first calculation result sent by the vehicle-mounted equipment, generates a second calculation result according to the primary dynamic verification data and a preset first algorithm, and sends a matching result obtained by matching the first calculation result and the second calculation result as a verification result to the vehicle-mounted equipment so that the vehicle-mounted equipment can remove the vehicle anti-theft system according to the verification result;
the first calculation result is obtained by acquiring a dynamic characteristic graph of the mobile terminal by the vehicle-mounted equipment, performing characteristic analysis on the dynamic characteristic graph to obtain secondary dynamic verification data, and calculating according to the secondary dynamic verification data and a preset first algorithm; and the dynamic characteristic graph is generated by the mobile terminal according to the primary dynamic verification data provided by the server and a preset second algorithm.
In an embodiment, the step S403 includes the following steps S501 to S504:
step S501, the mobile terminal sends verification request information to a server;
step S502, the mobile terminal receives primary dynamic verification data sent by the server;
step S503, the mobile terminal acquires an enterprise background graph and generates a characteristic shape according to the primary dynamic verification data and a preset second algorithm;
and step S504, the mobile terminal adds the characteristic shape to the enterprise background graph to obtain a dynamic characteristic graph.
It should be noted that the operation principle of the vehicle anti-theft method according to the foregoing embodiment shown in fig. 3 is the same as that of the vehicle anti-theft method according to the foregoing embodiment shown in fig. 1, and therefore, other details of the vehicle anti-theft method according to the foregoing embodiment shown in fig. 3, which are not described in detail, can be obtained by referring to the vehicle anti-theft method according to the foregoing embodiment shown in fig. 1, and are not described again here.
Referring to fig. 4, an embodiment of the present invention provides a server 2 for implementing the vehicle anti-theft method according to the foregoing embodiment shown in fig. 3, where the server 2 includes:
an information receiving unit 21 for receiving authentication request information sent by the mobile terminal 3; the authentication request information includes user information;
the verification data generating unit 22 is configured to generate primary dynamic verification data according to the verification request information sent by the mobile terminal 3 and a preset third algorithm, and send the primary dynamic verification data to the mobile terminal 3; and
the verification unit 23 is configured to receive a first calculation result sent by the vehicle-mounted device 1, generate a second calculation result according to the primary dynamic verification data and a preset first algorithm, and send a matching result obtained by matching the first calculation result and the second calculation result as a verification result to the vehicle-mounted device 1, so that the vehicle-mounted device 1 cancels the vehicle anti-theft system according to the verification result;
wherein: the first calculation result is obtained by acquiring a dynamic characteristic pattern of the mobile terminal 3 by the vehicle-mounted equipment 1, performing characteristic analysis on the dynamic characteristic pattern to obtain secondary dynamic verification data, and calculating according to the secondary dynamic verification data and a preset first algorithm; the dynamic characteristic graph is generated by the mobile terminal 3 according to the primary dynamic verification data provided by the server 2 and a preset second algorithm.
The above-described system of the above-described embodiment shown in fig. 4 is only an exemplary one, wherein the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
It should be noted that the system of the above-mentioned embodiment shown in fig. 4 corresponds to the method of the above-mentioned embodiment shown in fig. 3, and therefore, the parts of the system of the above-mentioned embodiment shown in fig. 4 that are not described in detail can be obtained by referring to the content of the method of the above-mentioned embodiment shown in fig. 3, and are not described again here.
Also, the system of the above-described embodiment shown in fig. 4, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer-readable storage medium.
Having described embodiments of the present invention, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.