Voice voting method, voting content verification method and system thereof
阅读说明:本技术 语音投票方法、投票内容验证方法及其系统 (Voice voting method, voting content verification method and system thereof ) 是由 徐惠 于 2019-11-13 设计创作,主要内容包括:本说明书中的实施例提供了语音投票方法、投票内容验证方法及其系统。其中,用户可以通过语音投票系统进行语音投票,投票内容被上传至区块链存证系统,进而用户可以通过投票内容验证系统对目标投票内容进行验证。(Embodiments in this specification provide a voice voting method, a voting content verification method, and a system thereof. The user can perform voice voting through the voice voting system, voting content is uploaded to the block link verification system, and the user can verify the target voting content through the voting content verification system.)
1. A voice voting method, comprising:
acquiring a voice instruction of a user, wherein the voice instruction is related to voting;
obtaining first voting information based on the voice instruction, wherein the first voting information reflects the voting content of the user;
and uploading the first voting information and/or the mapping value thereof to a block chain deposit and verification system.
2. The voice voting method according to claim 1, wherein the first voting information comprises at least one of identification information of a voting object, a vote count, identification information of the user, a voting time, a voting channel, and a source file of the voice instruction.
3. The voice voting method according to claim 1, wherein the method further comprises:
judging whether the voiceprint information corresponding to the voice command is consistent with the voiceprint information of the target user;
and if not, no first voting information of the user is obtained.
4. The voice voting method according to claim 1, wherein the obtaining first voting information based on the voice instruction comprises:
carrying out voice recognition on the voice command to obtain a recognition result;
generating a confirmation voice based on the recognition result;
playing the confirmation voice;
and in response to obtaining a confirmation instruction of the user, obtaining the first voting information based on the identification result.
5. The voice voting method according to claim 1, wherein the method further comprises:
responding to a voice instruction to indicate the user to change the voting result, and obtaining second voting information based on the voice instruction, wherein the second voting information reflects the change condition of the user to the voting content;
and uploading the second voting information and/or the mapping value thereof to the blockchain credit system.
6. The voice voting method according to claim 5, wherein the second voting information comprises at least one of identity information of the user, a change time, a change channel, a source file of voice instructions related to the change, and a voting change result.
7. A voice voting method according to claim 1 or 5, wherein the mapping value comprises a hash value.
8. A voice voting system, wherein the system comprises:
the voice instruction acquisition module is used for acquiring a voice instruction of a user, and the voice instruction is related to voting;
a first voting information obtaining module, configured to obtain first voting information based on the voice instruction, where the first voting information reflects voting content of the user;
and the first evidence storing module is used for uploading the first voting information and/or the mapping value thereof to the block chain evidence storing system.
9. The voice voting system according to claim 8, wherein the first voting information comprises at least one of identification information of a voting object, a vote count, identification information of the user, a voting time, a voting channel, and a source file of the voice instruction.
10. The voice voting system of claim 8, wherein the system further comprises a voiceprint validation module to:
judging whether the voiceprint information corresponding to the voice command is consistent with the voiceprint information of the target user;
and if not, indicating the first voting information acquisition module not to acquire the first voting information of the user.
11. The voice voting system of claim 8, wherein the first voting information obtaining module is further configured to:
carrying out voice recognition on the voice command to obtain a recognition result;
generating a confirmation voice based on the recognition result;
playing the confirmation voice;
and in response to obtaining a confirmation instruction of the user, obtaining the first voting information based on the identification result.
12. The voice voting system of claim 8, wherein the system further comprises:
the second voting information obtaining module is used for responding to a voice instruction to indicate the user to change the voting result, and obtaining second voting information based on the voice instruction, wherein the second voting information reflects the change condition of the user to the voting content;
and the second evidence storing module is used for uploading the second voting information and/or the mapping value thereof to the block chain evidence storing system.
13. The voice voting system of claim 12, wherein the second voting information comprises at least one of identity information of the user, a change time, a change channel, a source file of voice instructions related to the change, and a voting change result.
14. A voice voting system according to claim 8 or 12, wherein the mapping value comprises a hash value.
15. A voice voting apparatus comprising at least one processor and at least one memory device, the memory device being adapted to store instructions which, when executed by the at least one processor, carry out the method of any one of claims 1 to 7.
16. A voting content verification method, comprising:
obtaining a voice instruction, wherein the voice instruction indicates a verification request aiming at target voting content;
inquiring target voting information and/or a mapping value thereof from a block chain credit card system based on the voice instruction, wherein the target voting information corresponds to the target voting content;
verifying the targeted voting content based at least on the query result.
17. The method of claim 16, wherein the method further comprises:
judging whether the voiceprint information corresponding to the voice command is consistent with the voiceprint information of the target user;
and if not, the target voting content is not verified any more.
18. The method of claim 16, wherein the querying a blockchain credit system for target voting information and/or mapping values thereof based on the voice instruction comprises:
determining a corresponding block address based on target voting content in the voice command;
acquiring the target voting information and/or mapping values thereof from a block chain credit system based on the block addresses;
the verifying the targeted voting content based on at least the query result comprises:
comparing the target voting content and/or the mapping value thereof with the target voting information and/or the mapping value thereof;
if the comparison result is consistent, determining that the target voting content is not changed; and if the comparison result is inconsistent, determining that the target voting content is changed.
19. The method of claim 16, wherein the querying a blockchain credit system for target voting information and/or mapping values thereof based on the voice instruction comprises:
traversing a tile in the tile chain credence system to query the target voting information and/or a mapping value thereof based on the target voting content and/or the mapping value thereof;
the verifying the targeted voting content based on at least the query result comprises:
if the query result indicates that the target voting information and/or the mapping value exist, determining that the target voting content is not changed; and if the query result indicates that the target voting information and/or the mapping value do not exist, determining that the target voting content is changed.
20. The method of claim 16, wherein the mapping value comprises a hash value.
21. A voting content verification system, comprising:
the voice instruction acquisition module is used for acquiring a voice instruction, and the voice instruction indicates a verification request aiming at the target voting content;
the query module is used for querying target voting information and/or a mapping value thereof from the block chain credit card system based on the voice command, wherein the target voting information corresponds to the target voting content;
and the verification module is used for verifying the target voting content at least based on the query result.
22. The system of claim 21, wherein the system further comprises a voiceprint validation module to:
judging whether the voiceprint information corresponding to the voice command is consistent with the voiceprint information of the target user;
and if not, the target voting content is not verified any more.
23. The system of claim 21, wherein the query module is further to:
determining a corresponding block address based on target voting content in the voice command;
acquiring the target voting information and/or mapping values thereof from a block chain credit system based on the block addresses;
the verification module is further to:
comparing the target voting content and/or the mapping value thereof with the target voting information and/or the mapping value thereof;
if the comparison result is consistent, determining that the target voting content is not changed; and if the comparison result is inconsistent, determining that the target voting content is changed.
24. The system of claim 21, wherein the query module is further to:
traversing a tile in the tile chain credence system to query the target voting information and/or a mapping value thereof based on the target voting content and/or the mapping value thereof;
the verification module is further to:
if the query result indicates that the target voting information and/or the mapping value thereof exist, determining that the target voting content is not changed; and if the query result indicates that the target voting information and/or the mapping value thereof do not exist, determining that the target voting content is changed.
25. The system of claim 21, wherein the mapping value comprises a hash value.
26. A voting content validation apparatus comprising at least one processor and at least one memory device, the memory device being configured to store instructions which, when executed by the at least one processor, carry out the method according to any one of claims 16 to 20.
Technical Field
The embodiment of the specification relates to the technical field of information, in particular to a voice voting method, a voting content verification method and a system thereof.
Background
With the development of technology, people can participate in voting without going out of home by virtue of a terminal and a network. The technical development facilitates the voting mode of people, but the authenticity of the voting information is still not negligible. For example, if someone forges or falsifies the voting information, the fairness of the voting results is affected.
It is currently desirable to provide a convenient and reliable voting scheme.
Disclosure of Invention
One of embodiments of the present specification provides a voice voting method, including: acquiring a voice instruction of a user, wherein the voice instruction is related to voting; obtaining first voting information based on the voice instruction, wherein the first voting information reflects the voting content of the user; and uploading the first voting information and/or the mapping value thereof to a block chain deposit and verification system.
One of the embodiments of the present specification provides a voice voting system, wherein the system includes: the voice instruction acquisition module is used for acquiring a voice instruction of a user, and the voice instruction is related to voting; a first voting information obtaining module, configured to obtain first voting information based on the voice instruction, where the first voting information reflects voting content of the user; and the first evidence storing module is used for uploading the first voting information and/or the mapping value thereof to the block chain evidence storing system.
One of the embodiments of the present specification provides a voice voting apparatus, which includes at least one processor and at least one storage device, where the storage device is configured to store instructions that, when executed by the at least one processor, implement the voice voting method according to any one of the embodiments of the present specification.
One of embodiments of the present specification provides a voting content verification method, including: obtaining a voice instruction, wherein the voice instruction indicates a verification request aiming at target voting content; inquiring target voting information and/or a mapping value thereof from a block chain credit card system based on the voice instruction, wherein the target voting information corresponds to the target voting content; verifying the targeted voting content based at least on the query result.
One of the embodiments of the present specification provides a voting content verification system, including: the voice instruction acquisition module is used for acquiring a voice instruction, and the voice instruction indicates a verification request aiming at the target voting content; the query module is used for querying target voting information and/or a mapping value thereof from the block chain credit card system based on the voice command, wherein the target voting information corresponds to the target voting content; and the verification module is used for verifying the target voting content at least based on the query result.
One of the embodiments of the present specification provides a voting content verification device, which includes at least one processor and at least one storage device, where the storage device is configured to store instructions, and when the instructions are executed by the at least one processor, the voting content verification device implements the voting content verification method according to any one of the embodiments of the present specification.
Drawings
The present description will be further explained by way of exemplary embodiments, which will be described in detail by way of the accompanying drawings. These embodiments are not intended to be limiting, and in these embodiments like numerals are used to indicate like structures, wherein:
FIG. 1 is a schematic diagram of an application scenario of a voting system according to some embodiments of the present description;
FIG. 2 is an exemplary flow diagram of a voice voting method according to some embodiments of the present description;
FIG. 3 is a flow diagram illustrating a voting content verification method according to some embodiments of the present disclosure;
FIG. 4 is an exemplary block diagram of a voice voting system according to some embodiments of the present description;
fig. 5 is an exemplary block diagram of a voting content verification system, according to some embodiments of the present description.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings used in the description of the embodiments will be briefly described below. It is obvious that the drawings in the following description are only examples or embodiments of the present description, and that for a person skilled in the art, the present description can also be applied to other similar scenarios on the basis of these drawings without inventive effort. Unless otherwise apparent from the context, or otherwise indicated, like reference numbers in the figures refer to the same structure or operation.
It should be understood that "system", "device", "unit" and/or "module" as used herein is a method for distinguishing different components, elements, parts, portions or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this specification and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural, unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements.
Flow charts are used in this description to illustrate operations performed by a system according to embodiments of the present description. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
Embodiments in this specification provide a voice voting method, a voting content verification method, and a system thereof. The user can perform voice voting through the voice voting system, voting content is uploaded to the block link verification system, and the user can verify the target voting content through the voting content verification system. Therefore, the user can conveniently vote and check the vote in a voice mode, and the voting content uploaded to the block chain storage and verification system is not easy to be falsified, so that the related links of vote checking and vote counting can be guaranteed to be more impartial.
Fig. 1 is a schematic diagram of an application scenario of a
As shown in fig. 1, the
For more details on voice voting and voting content verification, reference may be made to fig. 2-5 and their associated descriptions.
The
In some embodiments, terminal devices may include various types of devices having information receiving and/or transmitting capabilities. In some embodiments, the device also supports voice input functionality, e.g., a built-in or connectable voice input unit (such as a microphone). In some embodiments, the
The
In some embodiments, the
The
The
Fig. 2 is an exemplary flow diagram of a voice voting method according to some embodiments of the present description. The
The voice instruction may be a speech spoken by the user in connection with the voting. In some embodiments, the user may customize the content format of the voice command via the
In some embodiments, the voting object may refer to a person, or may refer to other things, depending on the subject of the vote. For example, the voting objects may refer to contestants in a show, contestants in a election campaign, points of discourse with a divergence, favorite (or aversive) books/games/caricatures/songs/food/animals/flowers/seasons, and so on.
It should be noted that the content recognition of the voice command mentioned in this specification can be realized by a voice recognition technology. Speech Recognition technology, also known as Automatic Speech Recognition (ASR) technology, aims at converting the lexical content of human Speech into computer-readable input, such as binary codes or character sequences. The method for adopting the voice recognition technology comprises the following steps: linguistic and acoustic based methods, stochastic modeling methods, methods using artificial neural networks, probabilistic syntactic analysis methods, and the like. Taking a random model method as an example, the method mainly adopts the processes of extracting acoustic features, training templates, classifying the templates and matching the templates to identify the voice. In some embodiments, the voice recognition process may be performed by the
In some embodiments, the
In some embodiments, the first voting information may include voting content obtained by speech recognition of the speech instruction, for example, at least one of support (i.e., support/objection), identification information of the voting object, and the number of votes. In some embodiments, the first voting information may further include other voting content, for example, at least one of identification information of the user, a voting time, a voting channel, and a source file of the voice instruction. The first voting information containing various voting contents is helpful for restoring the complete voting event and can achieve the effect of self-checking. Taking the example that the first voting information includes identification information of the voting objects, the number of votes, identification information of the users, voting time, a voting channel and a source file of the voice instruction, the identification information of the voting objects, the number of votes, the identification information of the users, the voting time and the voting channel can be restored by the first voting information, and the source file of the voice instruction running in the first voting information can also check whether the restored voting event is error-free or not.
In some embodiments, the voice voting method may further include a voiceprint verification process. In some embodiments, the voiceprint verification process can be performed by a voiceprint verification module. Specifically, the voiceprint verification module may determine whether voiceprint information corresponding to the voice instruction is consistent with voiceprint information of the target user, if so, instruct the first voting
And step 230, uploading the first voting information and/or the mapping value thereof to the block chain deposit system. In some embodiments,
In some embodiments, the
It will be appreciated that each time the
It should be appreciated that the blockchain has the property of being (difficult) to tamper with, and that data written into the blockchain can serve as a reliable reference to verify the integrity (whether it has been altered) of the associated record of that data. For example, if the
It should be noted that the mapping algorithm mentioned in this specification can use an algorithm in which the output can uniquely identify the input and the difficulty of reverse derivation (i.e., deriving the input from the output) is high. In one aspect, an output can uniquely identify an input, meaning that the input and output are in a one-to-one correspondence. Any change to the input will result in a change in the output, which in turn means that the input has changed and thus the mapped value can be used to verify the integrity of the input. Taking the first voting information as an example, on the other hand, since the mapping algorithm is needed in the verification process, the mapping algorithm used for calculating the mapping value needs to be disclosed, which requires that it is difficult to reversely derive the original information (e.g., the first voting information and the second voting information) as input from the mapping value as output under the condition of the known mapping algorithm, so as to play a role in hiding the original information. In some embodiments, the mapping algorithms mentioned in this specification may all employ hash algorithms, i.e., the mapping values may comprise hash values. For different inputs, the probability that the hash values are the same is extremely low, and the hash values and the inputs can be considered to be in one-to-one correspondence, so that the hash values can be considered to uniquely identify the inputs. Since the length of the hash value is fixed no matter what the length of the input is, writing the hash value into the blockchain can save the storage space of the blockchain credit system, especially when the input (e.g., the first voting information and the second voting information) includes a voice source file with a large memory occupation.
In some embodiments, in response to the voice instruction indicating that the user has a need to change the voting content, the
In some embodiments, the
It should be noted that the generation of the confirmation speech based on the speech recognition result may be realized by a speech synthesis technique. The Speech synthesis technology is a technology for generating artificial Speech by a mechanical and electronic method, and can convert Text information into Speech for playing, which is also called Text To Speech (TTS) technology. In some embodiments, the method of speech synthesis may include a parametric synthesis method, a waveform concatenation method, and so on. The waveform splicing method may include an LPC (linear predictive Coding) synthesis method, a PSOLA (Pitch Synchronized overlay-Add) synthesis method, and the like. In some embodiments, the speech synthesis process may be performed directly by the
Fig. 3 is a flow diagram illustrating a voting content verification method according to some embodiments of the present disclosure. This
at
Where the targeted voting content may be associated with any voting event. For example, the target voting content may include a time when a user votes for a voting object. As another example, the target voting content may indicate a change of the voting result by a certain user. As mentioned previously, the
In some embodiments, the voting content verification system may enter the active state from the sleep state when the
And 320, inquiring target voting information and/or a mapping value thereof from the block chain credit system based on the voice command, wherein the target voting information corresponds to the target voting content. In some embodiments,
In some embodiments, the target voting information may be understood as information associated with target voting content to be verified in a blockchain credit system and at a certain level, and may be used for verifying the target voting content, and the correspondence may be understood as the same or a containment relationship. For example, the target voting information is a part of the target voting content. In some embodiments, the correspondence may also be understood as that the target voting content and the target voting information are associated together by the same block address, and whether the two contents are the same or the inclusion relationship is to be further verified.
In some embodiments, the query module 520 may query the blockchain credit system based on the target voting content in the voice command (e.g., traverse each block to determine whether the voting content exists in the blockchain credit system). In some embodiments, the query module 520 calculates the mapping values of the target voting content based on a preset algorithm, and queries whether the same mapping values exist in the blockchain credit system.
In some embodiments, the
The integrity of the targeted voting content is verified based at least on the query results,
In some embodiments, the verification module 530 may verify the integrity of the targeted voting content based on the query results alone. Specifically, the method comprises the following steps: if the query result indicates that the target voting content and/or the target voting information and/or the mapping value corresponding to the mapping value exist in the block link credit system, determining that the target voting content is not changed and the data is real and complete; and if the query result indicates that the target voting content and/or the target voting content corresponding to the mapping value of the target voting content and/or the mapping value of the target voting content do not exist in the block chain verification system, determining that the target voting content is changed (even completely forged).
In some embodiments, after the query module 520 obtains the target voting information corresponding to the target voting content from the
In some embodiments, the query and verification process described above may be performed by the
In some embodiments, referring to the above-mentioned content related to voiceprint recognition, the voting content verification system 500 may further determine whether the voiceprint information corresponding to the voice command indicating the verification request for the target voting content is consistent with the voiceprint information of the target user, and if not, the integrity of the target voting content is not verified. It can be understood that, when the voiceprint information corresponding to the voice command is inconsistent with the voiceprint information of the target user, neither the query module 520 nor the verification module 530 performs the query step nor the verification step.
It should be noted that the above descriptions regarding the
Fig. 4 is an exemplary block diagram of a
In some embodiments, the voice
In some embodiments, the first voting
In some embodiments, the
In some embodiments, the
In some embodiments, the
In some embodiments, the second voting information obtaining module may be configured to, in response to a voice instruction instructing the user to change the voting result, obtain second voting information based on the voice instruction, where the second voting information reflects a change of the voting content by the user. In some embodiments, the second voting information may include at least one of identity information of the user, a change time, a change channel, a source file of voice instructions related to the change, and a voting change result.
In some embodiments, the second credentialing module can be used to upload the second voting information and/or its mapping value to the blockchain credentialing system. In some embodiments, the mapping value may comprise a hash value.
Fig. 5 is an exemplary block diagram of a voting content verification system 500, shown in accordance with some embodiments of the present description. The system 500 may include a voice instruction acquisition module 510, a query module 520, and a verification module 530.
In some embodiments, the voice instruction retrieving module 510 may be configured to retrieve a voice instruction indicating a verification request for the targeted voting content.
In some embodiments, the query module 520 may be configured to query the blockchain credit system for target voting information and/or mapping values thereof, the target voting information corresponding to the target voting content, based on the voice instruction. In some embodiments, the mapping value may comprise a hash value.
In some embodiments, the verification module 530 may be used to verify the targeted voting content based at least on the query results.
In some embodiments, the query module 520 may be further configured to: determining a corresponding block address based on target voting content in the voice command; and acquiring target voting information and/or mapping values thereof from the blockchain credit system based on the block address. Accordingly, the verification module 530 may be further configured to: comparing the target voting content and/or the mapping value thereof with the target voting information and/or the mapping value thereof; if the comparison result is consistent, determining that the target voting content is not changed; and if the comparison result is inconsistent, determining that the target voting content is changed.
In some embodiments, the query module 520 may be further configured to: and traversing the blocks in the block chain storage and verification system to inquire the target voting information and/or the mapping value of the target voting information. Accordingly, the verification module 530 may be further configured to: if the query result indicates that the target voting information and/or the mapping value thereof exist, determining that the target voting content is not changed; and if the query result indicates that the target voting information and/or the mapping value thereof do not exist, determining that the target voting content is changed.
In some embodiments, the voting content verification system 500 can further include a voiceprint verification module that can be configured to: and judging whether the voiceprint information corresponding to the voice command is consistent with the voiceprint information of the target user, if not, not verifying the target voting content.
It should be understood that the systems shown in fig. 4 and 5 and their modules may be implemented in a variety of ways. For example, in some embodiments, the system and its modules may be implemented in hardware, software, or a combination of software and hardware. Wherein the hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory for execution by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those skilled in the art will appreciate that the methods and systems described above may be implemented using computer executable instructions and/or embodied in processor control code, such code being provided, for example, on a carrier medium such as a diskette, CD-or DVD-ROM, a programmable memory such as read-only memory (firmware), or a data carrier such as an optical or electronic signal carrier. The system and its modules in this specification may be implemented not only by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., but also by software executed by various types of processors, for example, or by a combination of the above hardware circuits and software (e.g., firmware).
It should be noted that the above description of the system and its modules is for convenience only and should not limit the present disclosure to the illustrated embodiments. It will be appreciated by those skilled in the art that, given the teachings of the system, any combination of modules or sub-system configurations may be used to connect to other modules without departing from such teachings. For example, in some embodiments, the first voting
The beneficial effects that may be brought by the embodiments of the present description include, but are not limited to: (1) the voice interaction mode improves the experience of the user in voting and voting content verification; (2) the uplink voting content can not be tampered, so that the uplink voting content can be used as a reliable verification basis, and the fairness of ticket checking and ticket counting is facilitated. It is to be noted that different embodiments may produce different advantages, and in different embodiments, any one or combination of the above advantages may be produced, or any other advantages may be obtained.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be considered merely illustrative and not restrictive of the embodiments herein. Various modifications, improvements and adaptations to the embodiments described herein may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the embodiments of the present specification and thus fall within the spirit and scope of the exemplary embodiments of the present specification.
Also, the description uses specific words to describe embodiments of the description. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the specification is included. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the specification may be combined as appropriate.
Moreover, those skilled in the art will appreciate that aspects of the embodiments of the present description may be illustrated and described in terms of several patentable species or situations, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereof. Accordingly, aspects of embodiments of the present description may be carried out entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.), or by a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the embodiments of the present specification may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
The computer storage medium may comprise a propagated data signal with the computer program code embodied therewith, for example, on baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable combination. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated over any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or any combination of the preceding.
Computer program code required for operation of various portions of the embodiments of the present description may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB.NET, Python, and the like, a conventional programming language such as C, VisualBasic, Fortran2003, Perl, COBOL2002, PHP, ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages, and the like. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or processing device. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
In addition, unless explicitly stated in the claims, the order of processing elements and sequences, use of numbers and letters, or use of other names in the embodiments of the present specification are not intended to limit the order of the processes and methods in the embodiments of the present specification. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware devices, they may also be implemented by software-only solutions, such as installing the described system on an existing processing device or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the specification, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more embodiments of the invention. This method of disclosure, however, is not intended to imply that more features are required than are expressly recited in the claims. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
For each patent, patent application publication, and other material, such as articles, books, specifications, publications, documents, etc., cited in this specification, the entire contents of each are hereby incorporated by reference into this specification. Except where the application is inconsistent or conflicting with the present disclosure, as may be the case with the broadest limitation of the claims that follow (whether present or appended to the present specification). It is to be understood that the descriptions, definitions and/or uses of terms in the accompanying materials of this specification shall control if they are inconsistent or contrary to the descriptions and/or uses of terms in this specification.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present disclosure. Other variations are possible within the scope of the embodiments of the present description. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the specification can be considered consistent with the teachings of the specification. Accordingly, the embodiments of the present description are not limited to only those embodiments explicitly described and depicted herein.
- 上一篇:一种医用注射器针头装配设备
- 下一篇:身份识别方法、装置及计算机可读存储介质