Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein, but rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the exemplary embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the present disclosure. One skilled in the relevant art will recognize, however, that the aspects of the disclosure may be practiced without one or more of the specific details, or with other methods, components, devices, steps, etc. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
The terms "a," "an," "the," and "said" are used in this specification to denote the presence of one or more elements/components/etc., the terms "comprising" and "having" are used in an open-ended fashion and mean that there may be additional elements/components/etc. in addition to the listed elements/components/etc., and the terms "first" and "second" etc. are used merely as labels, and are not limiting in number of their objects.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities.
Aiming at the problems in the related art, the disclosure provides a right adaptation method. Fig. 1 shows a flow chart of a rights adaptation method, which, as shown in fig. 1, comprises at least the following steps:
S110, acquiring work order information and work order states, wherein the work order states comprise work order effect, work order change and work order failure.
And S120, determining unlocking authority of the intelligent door lock in the work order information according to the work order information and the work order state.
And S130, unlocking the intelligent door lock according to the unlocking authority.
In the exemplary embodiment of the disclosure, the unlocking authority of the corresponding intelligent door lock is determined according to the work order information and the work order state so as to unlock, so that complicated authority application process and abuse of unlocking authority are avoided, the management, transportation and construction and other intelligent control processes of the ODN outdoor passive box facility are optimized while the safety of the ODN outdoor passive box facility and the communication service borne by the optical fiber cable are ensured, the management and maintenance time is greatly shortened, the operation and maintenance efficiency is improved, the broadband service opening of a user is also accelerated, and the service quality is improved.
The steps of the rights adaptation method are described in detail below.
In step S110, the work order information and the work order status including work order validation, work order change, and work order failure are acquired.
In the exemplary embodiment of the present disclosure, the work order information may include information of an optical distribution facility intelligent door lock ID (Identity), an operator, corresponding operation account information, and the like, which is not particularly limited.
The work order validation can be in processing, the work order failure can be work order completion, withdrawal, order withdrawal and the like, and the work order change can be work order transfer and dispatch operator change.
In step S120, unlocking authority of the intelligent door lock in the work order information is determined according to the work order information and the work order state.
In an exemplary embodiment of the present disclosure, after the work order information and the work order state are acquired, unlocking authority of the corresponding smart door lock may be determined according to the work order information and the work order state.
In an alternative embodiment, fig. 2 shows a flow chart of a method for determining unlocking authority of an intelligent door lock, as shown in fig. 2, the method may at least include the step of matching a corresponding operation account with the intelligent door lock according to the work order information when the work order state is the work order in step S210.
Under the condition that the work order state is that the work order is effective, an operation account corresponding to the name of an operator in the work order information can be obtained, and the operation account is further matched with the intelligent door lock I D information of the work order information so as to determine the intelligent door lock.
In step S220, alarm information corresponding to the intelligent door lock is obtained, and unlocking authority of the intelligent door lock is determined according to the operation account and the alarm information.
In an alternative embodiment, the alarm information comprises low-power alarm information and door lock control abnormal information.
The low-power warning information can be information representing that the power of the intelligent door lock is too low, and the door lock control abnormal information can be information representing that the intelligent door lock control module is abnormal or other communication is abnormal.
In an alternative embodiment, the operation accounts comprise application accounts and system accounts, unlocking authorities comprise background unlocking authorities, application unlocking authorities and emergency unlocking authorities, the background unlocking authorities are matched with the application accounts and the system accounts, the application unlocking authorities are matched with the application accounts, and the emergency unlocking authorities are matched with the application accounts.
The Application account may be an account registered by an APP (Application) method, and the system account may be an account registered by a PC (Personal Computer ) method in a Web (World Wide Web) method, but is not limited to the Web method.
The background unlocking authority can remotely unlock the intelligent door lock, the authority can be matched with a system account and an application account, the application unlocking authority can unlock the intelligent door lock by using Bluetooth, the authority is only matched with the application account, the emergency unlocking authority can unlock the intelligent door lock by using a Bluetooth authorized electronic key, and the authority is only matched with the application account.
In an alternative embodiment, fig. 3 is a flowchart of a method for further determining unlocking authority of the intelligent door lock, as shown in fig. 3, where the method may at least include the step of determining that the unlocking authority of the intelligent door lock is a background unlocking authority when the operation account is a system account and no alarm information is provided in step S310.
When no alarm exists, the account is a system account, the background unlocking authority is authorized, and feedback is performed.
In step S320, when the operation account is an application account and there is no alarm information, it is determined that the unlocking authority of the intelligent door lock is a background unlocking authority and an application unlocking authority.
When no alarm exists, the account is an application account, the background unlocking authority and the application unlocking authority are authorized, and feedback is carried out.
In step S330, when the operation account is a system account and there is an alarm message, it is determined that the unlocking authority of the intelligent door lock is a background unlocking authority, an application unlocking authority and an emergency unlocking authority.
When an alarm exists, the account is a system account, and a corresponding application account is additionally opened for the system account so as to authorize all unlocking authorities including emergency unlocking authorities and feed back the unlocking authorities.
In step S340, when the operation account is an application account and there is alarm information, it is determined that the unlocking authority of the intelligent door lock is a background unlocking authority, an application unlocking authority and an emergency unlocking authority.
When an alarm exists, the account is an application account, and all unlocking authorities including emergency unlocking authorities are authorized and fed back.
In the present exemplary embodiment, the unlocking authority of the intelligent door lock is determined according to the operation account and the alarm information, and the unlocking authority of the account is also in effect immediately while the work order is in effect, so that the fussy authority application process is avoided, the situation that the electronic key is used for unlocking at will is avoided, and the security of the intelligent door lock is improved.
In an alternative embodiment, fig. 4 is a flowchart of another method for determining unlocking authority of the intelligent door lock, as shown in fig. 4, where the method may at least include the step of matching a corresponding previous operation account, a current operation account, and the intelligent door lock according to the work order information when the work order state is a work order change in step S410.
Under the condition that the work order state is work order change, a last operation account corresponding to the name of a last operator in the work order information and a current operation account corresponding to the name of a transferred operator can be obtained, and the current operation account and intelligent door lock ID information of the work order information are further matched to determine an intelligent door lock.
In step S420, the unlocking authority of the previous operation account for the intelligent door lock is cancelled, and the unlocking authority of the current operation account for the intelligent door lock is determined.
After the last operation account and the current operation account are determined, unlocking authority of the last operation account of the original operator can be canceled, and the unlocking authority of the changed current operation account of the operator to the intelligent door lock is authorized to be transferred and fed back.
The unlocking right of the current operation account to the intelligent door lock can be determined according to the mode shown in fig. 3, and will not be described herein.
In the embodiment, when the work order is changed, the unlocking authority of the corresponding account number can be automatically cancelled and changed, the work order is closely attached to the state and the information of the work order, and the instantaneity of the unlocking authority change and the safety of the intelligent door lock are improved.
In an alternative embodiment, fig. 5 shows a flow chart of a method for canceling unlocking authority, as shown in fig. 5, where the method may at least include the step of matching the corresponding operation account and the intelligent door lock according to the work order information when the work order state is the work order failure in step S510.
When the work order state is the work order failure, an operation account corresponding to the name of an operator in the work order information can be obtained, and the operation account is further matched with the intelligent door lock ID information of the work order information to determine the intelligent door lock.
In step S520, the unlocking authority of the operation account to the intelligent door lock is canceled.
After the operation account and the intelligent door lock are determined, unlocking authority of the original operation account of the operator to the intelligent door lock can be canceled, and feedback is carried out.
In the embodiment, when the work order fails, the unlocking authority of the corresponding account number can be automatically cancelled, the work order is closely attached to the state and the information of the work order, and the instantaneity of unlocking authority cancellation and the safety of the intelligent door lock are improved.
In step S130, the intelligent door lock is unlocked according to the unlocking authority.
After determining the unlocking right, the unlocking right may be sent to unlock the intelligent door lock.
The following describes the rights adaptation method in the embodiments of the present disclosure in detail with reference to an application scenario.
Fig. 6 shows a schematic architecture diagram of a rights adaptation system in an application scenario, where the rights adaptation system includes a door access management module 610, a mobile terminal application 620, an electronic key 630, and an outdoor optical distribution facility 640, as shown in fig. 6.
The door access management module 610 is used for realizing management of intelligent door locks of optical wiring facilities, and mainly comprises the implementation of facility management, operation account management, various worksheet functions, unlocking functions and the like. Also, the access control module 610 is implemented by software.
The access control module 610 further includes an account management module 611, a rights adaptation module 612, a work order variability analysis module 613, an alarm module 614, and a background unlocking module 615.
Specifically, the account management module 611 manages the accounts related to the intelligent door lock operation of the optical distribution facility in a unified manner, including a system account logged in by a PC computer mode and an application account logged in by an APP mode. The account management module 611 acquires unlocking authority information of the account from the authority adaptation module 612. After the authorized account is logged in, the account management module 611 sends information related to the unlocking authority of the account to the background unlocking module 615, or the application unlocking module 621, or the authorization transfer module 622, so as to unlock the intelligent door lock.
The rights adaptation module 612 may analyze the worksheet and the alarm condition to intelligently match, authorize, or cancel unlocking rights of the account to the target smart door lock and return the results to the account management module 611.
In addition, the rights adaptation module 612 divides different unlocking rights according to different unlocking modes to match the system account and the application account. And after the account is logged in, unlocking the target intelligent door lock in a specific unlocking mode according to unlocking authority.
The work order variability analysis module 613 obtains the work order generated from the OSS (Operation Support Systems, operation support system) or the door lock management module. The work order information and work order status are synchronously sent to the rights adaptation module 612 at the time of work order generation or status change.
The work order information can comprise information of an intelligent door lock ID of the optical distribution facility and information of an operator, corresponding operation account information and the like, work order effectiveness can be in processing, work order failure can be work order completion, withdrawal, order withdrawal and the like, and work order change can be work order transfer and dispatch operator change.
The alert module 614 provides relevant alert information to the rights adaptation module 612. If the intelligent door lock has low electric quantity or abnormal door lock control and other alarms, the intelligent door lock can be used as the premise of the authorization of the emergency unlocking authority of the electronic key.
After the right is adapted and authorized, unlocking is realized through a background unlocking module 615, an application unlocking module 621 or an authorization transfer module 622.
The background unlocking module 615 may be an account with unlocking authority, and after the system account and the application account are logged in, the background unlocking module 615 obtains the unlocking authority information of the account from the account management module 611, and remotely opens the intelligent door lock through a wireless network.
The mobile terminal application 620 implements management and operation functions on the optical distribution facility intelligent door lock through the APP.
The mobile terminal application 620 includes an application unlocking module 621 and an authorization transfer module 622. The application unlocking module 621 and the authorization transfer module 622 are also both implemented in software.
The application unlocking module 621 may be an application account login APP with unlocking authority, the account management module 611 sends account unlocking authority information to the application unlocking module 621, and the background unlocking module 615 is accessed through a wireless network to unlock the intelligent door lock remotely, or the intelligent door lock is unlocked in a short range by using a terminal bluetooth.
The authorization transfer module 622 may be an account login APP with emergency unlocking authority, and after acquiring account unlocking authority information from the account management module 611, transfers authorization to the electronic key 630 through bluetooth, and uses the electronic key 630 to unlock the optical distribution facility door lock.
In an emergency situation, the electronic key 630 transfers unlocking authority to the electronic key to unlock the intelligent door lock.
The outdoor optical distribution facility 640 includes an intelligent door lock, which is installed on the ODN outdoor optical distribution facility, and is implemented by hardware and software, so that management and security of the optical distribution facility can be realized.
Fig. 7 is a flow chart illustrating the rights adapting method in the application scenario, as shown in fig. 7, in step S710, the work order change analysis module acquires the work order and its status from the OSS or the door lock management module.
The work order information may include information of the optical distribution facility intelligent door lock ID and the operator, corresponding operation account information, and the like, which is not particularly limited in the present exemplary embodiment.
The work order validation can be in processing, the work order failure can be work order completion, withdrawal, order withdrawal and the like, and the work order change can be work order transfer and dispatch operator change.
In step S720, the rights adaptation module obtains the work order information from the work order change analysis module, and matches the work order operator account and door lock information in combination with the account management module.
Under the condition that the work order state is that the work order is effective, an operation account corresponding to the name of an operator in the work order information can be obtained, and the operation account is further matched with the intelligent door lock I D information of the work order information so as to determine the intelligent door lock.
In step S730, in combination with the alarm module, it is determined whether the intelligent door lock has a low-power alarm or is an abnormal alarm for door lock control.
And acquiring alarm information corresponding to the intelligent door lock, and determining unlocking authority of the intelligent door lock according to the operation account and the alarm information.
The low-power warning information can be information representing that the power of the intelligent door lock is too low, and the door lock control abnormal information can be information representing that the intelligent door lock control module is abnormal or other communication is abnormal.
The operation accounts comprise application accounts and system accounts, unlocking authorities comprise background unlocking authorities, application unlocking authorities and emergency unlocking authorities, wherein the background unlocking authorities are matched with the application accounts and the system accounts, the application unlocking authorities are matched with the application accounts, and the emergency unlocking authorities are matched with the application accounts.
The application account can be an account logged in through an APP mode, and the system account can be an account logged in through a PC.
The background unlocking authority can remotely unlock the intelligent door lock, the authority can be matched with a system account and an application account, the application unlocking authority can unlock the intelligent door lock by using Bluetooth, the authority is only matched with the application account, the emergency unlocking authority can unlock the intelligent door lock by using a Bluetooth authorized electronic key, and the authority is only matched with the application account.
In step S740, the account is a system account, the background unlocking authority is authorized, and the result is fed back to the account management module.
When no alarm exists, the account is a system account, the background unlocking authority is authorized, and feedback is performed.
In step S750, the account is an APP account, the background unlocking authority and the application unlocking authority are authorized, and the result is fed back to the account management module.
When no alarm exists, the account is an application account, the background unlocking authority and the application unlocking authority are authorized, and feedback is carried out.
In step S760, the account is a system account, the account is added to be an APP account, and the result is fed back to the account management module after authorizing all unlocking rights including the emergency unlocking rights.
When an alarm exists, the account is a system account, and a corresponding application account is additionally opened for the system account so as to authorize all unlocking authorities including emergency unlocking authorities and feed back the unlocking authorities.
In step S770, the account is an APP account, and the authorization includes all unlocking rights in the emergency unlocking rights, and the result is fed back to the account management module.
When an alarm exists, the account is an application account, and all unlocking authorities including emergency unlocking authorities are authorized and fed back.
In step S780, the right adaptation module acquires the work order information from the work order change analysis module, cancels the unlocking right of the original operator account, authorizes the unlocking right of the changed operator account to the work order door lock, and feeds back the result to the account management module.
Under the condition that the work order state is work order change, a last operation account corresponding to the name of a last operator in the work order information and a current operation account corresponding to the name of a transferred operator can be obtained, and the current operation account and intelligent door lock ID information of the work order information are further matched to determine an intelligent door lock.
After the last operation account and the current operation account are determined, unlocking authority of the last operation account of the original operator can be canceled, and the unlocking authority of the changed current operation account of the operator to the intelligent door lock is authorized to be transferred and fed back.
In step S790, the right adaptation module acquires the work order information from the work order change analysis module, cancels the unlocking right of the original operator account, and feeds back the result to the account management module.
When the work order state is the work order failure, an operation account corresponding to the name of an operator in the work order information can be obtained, and the operation account is further matched with the intelligent door lock ID information of the work order information to determine the intelligent door lock.
After the operation account and the intelligent door lock are determined, unlocking authority of the original operation account of the operator to the intelligent door lock can be canceled, and feedback is carried out.
After the account with the authority matching authorization logs in, the account management module sends the information related to the unlocking authority of the account to a background unlocking module, or an application unlocking module or an authorization transfer module so as to unlock the intelligent door lock.
In summary, when the work order state is valid, an account corresponding to the name of an operator of the work order is obtained through the account management module, the account is matched with the ID information of the intelligent door lock in the work order, and the corresponding unlocking authority of the account to the door lock is allocated.
And when the work order state is invalid, canceling unlocking authority of the account on the door lock.
When an operator in the work order changes, unlocking authority of the original account on the door lock is cancelled, and the unlocking authority of the changed operator account on the door lock is authorized.
While the system account or application account is adapted to different unlocking rights. But only under certain alarm conditions will the emergency unlocking rights be granted. The right adaptation module acquires the alarm related condition of the intelligent door lock from the alarm module. Only if the intelligent door lock is out of control or related alarms such as low electric quantity are generated, the emergency unlocking authority is authorized, and random unlocking is limited.
According to the right adaptation method under the application scene, unlocking rights of the corresponding intelligent door lock are determined according to work order information and work order states so as to unlock, complicated rights application process and abuse of unlocking rights are avoided, the safety of ODN outdoor passive box facilities, optical fiber cables and communication services borne by the ODN outdoor passive box facilities is guaranteed, meanwhile, intelligent management and control flows of management, transportation, construction and the like of the ODN outdoor passive box facilities are optimized, management and maintenance time is greatly shortened, operation and maintenance efficiency is improved, and broadband service opening of users is accelerated.
Fig. 8 shows a schematic structural diagram of a rights adapting apparatus, and as shown in fig. 8, the rights adapting apparatus 800 may include an information acquisition module 810, a rights determination module 820, and a door lock unlocking module 830. Wherein:
an information acquisition module 810 configured to acquire work order information and work order status including work order validation, work order change, and work order failure;
A right determining module 820 configured to determine unlocking right of the intelligent door lock in the work order information according to the work order information and the work order state;
The door lock unlocking module 830 is configured to unlock the intelligent door lock according to the unlocking authority.
In an exemplary embodiment of the present invention, the determining, according to the work order information and the work order state, unlocking authority of the intelligent door lock in the work order information includes:
When the work order state is that the work order is effective, matching a corresponding operation account and an intelligent door lock according to the work order information;
And acquiring alarm information corresponding to the intelligent door lock, and determining unlocking authority of the intelligent door lock according to the operation account and the alarm information.
In an exemplary embodiment of the present invention, the alarm information includes low battery alarm information and door lock control abnormality information.
In one exemplary embodiment of the invention, the operating accounts include an application account and a system account;
the unlocking authorities comprise background unlocking authorities, application unlocking authorities and emergency unlocking authorities;
The background unlocking authority is matched with the application account and the system account, the application unlocking authority is matched with the application account, and the emergency unlocking authority is matched with the application account.
In an exemplary embodiment of the present invention, the determining unlocking authority of the intelligent door lock according to the operation account and the alarm information includes:
when the operation account is the system account and the alarm information is not available, determining that the unlocking authority of the intelligent door lock is the background unlocking authority;
when the operation account is the application account and the alarm information is not available, determining unlocking authority of the intelligent door lock to be the background unlocking authority and the application unlocking authority;
When the operation account is the system account and the alarm information exists, determining unlocking authority of the intelligent door lock to be the background unlocking authority, the application unlocking authority and the emergency unlocking authority;
And when the operation account is the application account and the alarm information exists, determining unlocking authority of the intelligent door lock to be the background unlocking authority, the application unlocking authority and the emergency unlocking authority.
In an exemplary embodiment of the present invention, the determining, according to the work order information and the work order state, unlocking authority of the intelligent door lock in the work order information includes:
when the work order state is the work order change, matching a corresponding previous operation account, a current operation account and an intelligent door lock according to the work order information;
And canceling unlocking authority of the last operation account to the intelligent door lock, and determining unlocking authority of the current operation account to the intelligent door lock.
In an exemplary embodiment of the present invention, after the acquiring the work order information and the work order status, the method further includes:
when the work order state is that the work order fails, matching a corresponding operation account and an intelligent door lock according to the work order information;
And canceling unlocking authority of the operation account to the intelligent door lock.
The details of the rights adapter 800 are described in detail in the corresponding rights adaptation method, and thus are not described here.
It should be noted that although several modules or units of the rights adapter 800 are mentioned in the detailed description above, this division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
In addition, in an exemplary embodiment of the present disclosure, an electronic device capable of implementing the above method is also provided.
An electronic device 900 according to such an embodiment of the invention is described below with reference to fig. 9. The electronic device 900 shown in fig. 9 is merely an example, and should not be construed as limiting the functionality and scope of use of embodiments of the present invention.
As shown in fig. 9, the electronic device 900 is embodied in the form of a general purpose computing device. The components of the electronic device 900 may include, but are not limited to, the at least one processing unit 910 described above, the at least one storage unit 920 described above, a bus 930 connecting the different system components (including the storage unit 920 and the processing unit 910), and a display unit 940.
Wherein the storage unit stores program code that is executable by the processing unit 910 such that the processing unit 910 performs steps according to various exemplary embodiments of the present invention described in the above-described "exemplary methods" section of the present specification.
The storage unit 920 may include readable media in the form of volatile storage units, such as Random Access Memory (RAM) 921 and/or cache memory 922, and may further include Read Only Memory (ROM) 923.
The storage unit 920 may also include a program/utility 924 having a set (at least one) of program modules 925, such program modules 925 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
The bus 930 may be one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 900 may also communicate with one or more external devices 1100 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 900, and/or with any device (e.g., router, modem, etc.) that enables the electronic device 900 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 950. Also, electronic device 900 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 960. As shown, the network adapter 960 communicates with other modules of the electronic device 900 over the bus 930. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 900, including, but not limited to, microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, a terminal device, or a network device, etc.) to perform the method according to the embodiments of the present disclosure.
In an exemplary embodiment of the present disclosure, a computer-readable storage medium having stored thereon a program product capable of implementing the method described above in the present specification is also provided. In some possible embodiments, the various aspects of the invention may also be implemented in the form of a program product comprising program code for causing a terminal device to carry out the steps according to the various exemplary embodiments of the invention as described in the "exemplary methods" section of this specification, when said program product is run on the terminal device.
Referring to fig. 10, a program product 1000 for implementing the above-described method according to an embodiment of the present invention is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of a readable storage medium include an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable signal medium may include a data signal propagated in baseband or as part of a carrier wave with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.