Processing method and device for online verification plug-in and electronic equipment

文档序号:190841 发布日期:2021-11-02 浏览:31次 中文

阅读说明:本技术 在线校验插件的处理方法、装置以及电子设备 (Processing method and device for online verification plug-in and electronic equipment ) 是由 张元君 张凡 夏海涛 姚钊 于 2021-07-28 设计创作,主要内容包括:本申请提供了一种在线校验插件的处理方法、装置以及电子设备,涉及数据处理技术领域,缓解了医疗机构数据管理效率较低的技术问题,该方法包括:获取接入方提供的验证数据;根据验证数据检测接入方是否验证通过;如果接入方验证通过,则根据接入方ID找到对应的代理ID,并向代理ID发送对应的Token加密密钥,并利用RSA私钥对发送的Token加密密钥进行签名;监测Token加密密钥是否发送校验请求,如果发送校验请求,则利用RSA公钥校验签名;如果签名验证通过,则更新Token加密密钥;利用更新后的Token加密密钥提取Token,并对Token进行校验,如果Token验证通过,则接收响应结果数据。(The application provides a processing method and device for an online verification plug-in and an electronic device, relates to the technical field of data processing, and solves the technical problem that the data management efficiency of a medical institution is low, and the method comprises the following steps: acquiring verification data provided by an access party; detecting whether the access party passes the verification according to the verification data; if the access party passes the verification, finding the corresponding proxy ID according to the access party ID, sending the corresponding Token encryption key to the proxy ID, and signing the sent Token encryption key by using an RSA private key; monitoring whether the Token encryption key sends a verification request or not, and if the Token encryption key sends the verification request, verifying the signature by using an RSA public key; if the signature passes the verification, updating the Token encryption key; and extracting the Token by using the updated Token encryption key, verifying the Token, and receiving response result data if the Token passes verification.)

1. A processing method for checking a plug-in online is applied to a gateway device, wherein a plurality of gateway devices correspond to a plurality of devices, and the method comprises the following steps:

acquiring verification data provided by an access party; wherein the authentication data comprises an access party ID;

detecting whether the access party passes the verification according to the verification data;

if the access party passes the verification, finding a corresponding proxy ID according to the access party ID, sending a corresponding Token encryption key to the proxy ID, and signing the sent Token encryption key by using an RSA private key; the RSA private key is a private key based on an RSA encryption algorithm;

monitoring whether the Token encryption key sends a verification request or not, and if the verification request is sent, verifying the signature by using an RSA public key; the RSA public key is a public key based on an RSA encryption algorithm;

updating the Token encryption key if the signature verification passes; and extracting the Token by using the updated Token encryption key, verifying the Token, and receiving response result data if the Token passes verification.

2. The method for processing the online verification plug-in according to claim 1, wherein if the access party passes the verification, the step of finding the corresponding proxy ID according to the access party ID, sending the corresponding Token encryption key to the proxy ID, and signing the sent Token encryption key by using an RSA private key further comprises:

if the access party passes the verification, searching the corresponding configuration ID according to the access party ID, finding the corresponding agent ID according to the configuration ID, and sending the corresponding Token encryption key to the agent ID.

3. The method for processing an online verification plug-in as claimed in claim 1, wherein the step of monitoring whether the Token encryption key sends a verification request, and if the verification request is sent, verifying the signature by using an RSA public key further comprises:

if the signature verification fails, the Token encryption key is not updated.

4. The method for processing the online verification plug-in of claim 1, further comprising:

if the Token verification fails, returning information that the verification fails according to a reverse original path, and receiving response result data that the verification fails.

5. The method for processing an online verification plug-in according to claim 1, wherein the step of detecting whether the access party passes the verification according to the verification data further comprises:

and if the access party fails in verification, returning information that the verification fails according to a reverse original path, and re-detecting the verification data.

6. The method for processing an online verification plug-in as claimed in claim 1, wherein the verification data comprises any one or more of the following:

hospital name, resource name, accessible range, callback address.

7. The method for processing an online verification plug-in according to claim 1, wherein the step of extracting Token by using the updated Token encryption key, verifying the Token, and receiving response result data if the Token is verified, further comprises:

and if the Token verification passes, forwarding the verification data, and displaying a verification process on a graphical user interface.

8. The processing device for checking the plug-in online is applied to a gateway device, a plurality of gateway devices correspond to a plurality of devices, and the device comprises:

the acquisition module is used for acquiring the verification data provided by the access party; wherein the authentication data comprises an access party ID;

the detection and verification module is used for detecting whether the access party passes the verification according to the verification data;

the signature module is used for finding out a corresponding proxy ID according to the access party ID if the access party passes the verification, sending a corresponding Token encryption key to the proxy ID, and signing the sent Token encryption key by utilizing an RSA private key; the RSA private key is a private key based on an RSA encryption algorithm;

the monitoring request module is used for monitoring whether the Token encryption key sends a verification request or not, and if the verification request is sent, the signature is verified by using an RSA public key; the RSA public key is a public key based on an RSA encryption algorithm;

a data receiving module, configured to update the Token encryption key if the signature verification passes; and extracting the Token by using the updated Token encryption key, verifying the Token, and receiving response result data if the Token passes verification.

9. An electronic device comprising a memory and a processor, wherein the memory stores a computer program operable on the processor, and wherein the processor implements the steps of the method of any of claims 1 to 7 when executing the computer program.

10. A computer readable storage medium having stored thereon computer executable instructions which, when invoked and executed by a processor, cause the processor to execute the method of any of claims 1 to 7.

Technical Field

The present application relates to the field of data processing technologies, and in particular, to a method and an apparatus for processing an online verification plug-in, and an electronic device.

Background

At present, electronic auditors are widely applied to various medical institutions, and by introducing professional medication rule bases and manual auditing flows of pharmacists and strictly controlling the dispensing process of the pharmacists, the electronic auditors are important methods for exposing the abuse problem of drugs and eliminating the drug safety attacks, can ensure reasonable drug use and safe drug use of people, and can reduce the contradiction between doctors and patients. However, there are multiple versions of data management systems in medical institutions such as hospitals due to data security concerns, which causes management confusion among different versions, and affects the efficiency of data management of medical institutions.

Disclosure of Invention

The invention aims to provide a processing method and device for an online verification plug-in and electronic equipment, so as to relieve the technical problem of low data management efficiency of a medical institution.

In a first aspect, an embodiment of the present application provides a method for processing an online verification plug-in, where the method is applied to a gateway device, and a plurality of gateway devices correspond to a plurality of pieces of equipment, and the method includes:

acquiring verification data provided by an access party; wherein the authentication data comprises an access party ID;

detecting whether the access party passes the verification according to the verification data;

if the access party passes the verification, finding a corresponding proxy ID according to the access party ID, sending a corresponding Token encryption key to the proxy ID, and signing the sent Token encryption key by using an RSA private key; the RSA private key is a private key based on an RSA encryption algorithm;

monitoring whether the Token encryption key sends a verification request or not, and if the verification request is sent, verifying the signature by using an RSA public key; the RSA public key is a public key based on an RSA encryption algorithm;

updating the Token encryption key if the signature verification passes; and extracting the Token by using the updated Token encryption key, verifying the Token, and receiving response result data if the Token passes verification.

In a possible implementation, the step of finding a corresponding proxy ID according to the access party ID if the access party passes the verification, sending a corresponding Token encryption key to the proxy ID, and signing the sent Token encryption key by using an RSA private key further includes:

if the access party passes the verification, searching the corresponding configuration ID according to the access party ID, finding the corresponding agent ID according to the configuration ID, and sending the corresponding Token encryption key to the agent ID.

In a possible implementation, the step of finding a corresponding proxy ID according to the access party ID if the access party passes the verification, sending a corresponding Token encryption key to the proxy ID, and signing the sent Token encryption key by using an RSA private key further includes:

if the access party passes the verification, searching the corresponding configuration ID according to the access party ID, finding the corresponding agent ID according to the configuration ID, and sending the corresponding Token encryption key to the agent ID.

In one possible implementation, the method further includes:

if the Token verification fails, returning information that the verification fails according to a reverse original path, and receiving response result data that the verification fails.

In a possible implementation, the step of detecting whether the access party is authenticated according to the authentication data further includes:

and if the access party fails in verification, returning information that the verification fails according to a reverse original path, and re-detecting the verification data.

In one possible implementation, the verification data includes one or more of:

hospital name, resource name, accessible range, callback address.

In one possible implementation, the step of extracting Token by using the updated Token encryption key, checking the Token, and receiving response result data if the Token verification passes, further includes:

and if the Token verification passes, forwarding the verification data, and displaying a verification process on a graphical user interface.

In a second aspect, a processing apparatus for checking a plug-in online is provided, where the processing apparatus is applied to a gateway apparatus, and a plurality of gateway apparatuses correspond to a plurality of devices, and the apparatus includes:

the acquisition module is used for acquiring the verification data provided by the access party; wherein the authentication data comprises an access party ID;

the detection and verification module is used for detecting whether the access party passes the verification according to the verification data;

the signature module is used for finding out a corresponding proxy ID according to the access party ID if the access party passes the verification, sending a corresponding Token encryption key to the proxy ID, and signing the sent Token encryption key by utilizing an RSA private key; the RSA private key is a private key based on an RSA encryption algorithm;

the monitoring request module is used for monitoring whether the Token encryption key sends a verification request or not, and if the verification request is sent, the signature is verified by using an RSA public key; the RSA public key is a public key based on an RSA encryption algorithm;

a data receiving module, configured to update the Token encryption key if the signature verification passes; and extracting the Token by using the updated Token encryption key, verifying the Token, and receiving response result data if the Token passes verification.

In a third aspect, an embodiment of the present application further provides an electronic device, which includes a memory and a processor, where the memory stores a computer program that is executable on the processor, and the processor implements the method of the first aspect when executing the computer program.

In a fourth aspect, this embodiment of the present application further provides a computer-readable storage medium storing computer-executable instructions, which, when invoked and executed by a processor, cause the processor to perform the method of the first aspect.

The embodiment of the application brings the following beneficial effects:

the processing method, the device and the electronic equipment for the online verification plug-in can acquire verification data provided by an access party, wherein the verification data comprises an access party ID, whether the access party passes the verification or not is detected according to the verification data, if the access party passes the verification, a corresponding proxy ID is found according to the access party ID, a corresponding Token encryption key is sent to the proxy ID, and the sent Token encryption key is signed by utilizing an RSA private key, wherein the RSA private key is a private key based on an RSA encryption algorithm; monitoring whether the Token encryption key sends a verification request or not, if the verification request is sent, verifying the signature by using an RSA public key, wherein the RSA public key is a public key based on an RSA encryption algorithm, and if the signature verification is passed, updating the Token encryption key; and further extracting the Token by using the updated Token encryption key, verifying the Token, and receiving response result data if the Token passes verification. In this scheme, through setting up online check-up plug-in platform, can bring many-sided information into unified system management module for it is more convenient to manage, and the controllability is stronger, and the maintenance cost is lower, further protects flow safety and data safety, strengthens hospital's management confidence, is favorable to the smooth implementation of the platform of examining below under the multi-scene, has alleviated the lower technical problem of medical institution data management efficiency.

In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.

Drawings

In order to more clearly illustrate the detailed description of the present application or the technical solutions in the prior art, the drawings needed to be used in the detailed description of the present application or the prior art description will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.

Fig. 1 is a schematic flowchart of a processing method for checking a plug-in online according to an embodiment of the present disclosure;

fig. 2 is an overall platform schematic diagram of a processing method for an online verification plug-in according to an embodiment of the present application;

fig. 3 is a schematic structural diagram of a processing device for online verification of a plug-in according to an embodiment of the present disclosure;

fig. 4 shows a schematic structural diagram of an electronic device provided in an embodiment of the present application.

Detailed Description

To make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the present application will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.

The terms "comprising" and "having," and any variations thereof, as referred to in the embodiments of the present application, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements but may alternatively include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.

At present, an electronic auditor function is used as a general function, the electronic auditor function cannot be directly used by a platform but is embedded into an HIS system for use, but related codes are directly embedded into the HIS system, so that some invasive interference can be caused to the HIS system, and the compatibility problem of the HIS system is caused; moreover, there may be some differences between different HIS systems, and additional code needs to be developed and maintained in order to ensure that all HIS systems are normal.

Secondly, based on the consideration of data security, the hospital isolates the network as an internal network and an external network, and cannot deploy the electronic auditing party function to the external network (such as a WeChat platform or other internet application scenes), and because codes cannot be deployed uniformly, management confusion among different versions is caused, continuous upgrading is realized, and the correctness of the auditing party process is influenced.

Based on this, the embodiment of the application provides a processing method for checking the plug-in online, and the technical problem of low data management efficiency of a medical institution can be solved through the method.

Embodiments of the present invention are further described below with reference to the accompanying drawings.

Fig. 1 is a schematic flowchart of a processing method for checking a plug-in online according to an embodiment of the present application, where the processing method is applied to a gateway device, and multiple gateway devices correspond to multiple devices. As shown in fig. 1, the method includes:

step S110, obtaining the verification data provided by the access party.

Wherein the authentication data comprises an access party ID.

It should be noted that, information including a hospital name, a Token encryption key, Token expiration time refresh, whether to open a WeChat verification option, whether to open a client domain verification option, and the like may be configured, and the configuration ID is automatically generated according to rules; configuring proxy service, including resource name, callback key address, corresponding configuration ID, and proxy ID automatically generated according to rules; and configuring an access party, including an access party ID (automatically generated according to a rule), an access party key (automatically generated according to a rule), a WeChat AppId (automatically obtained by verifying a flow type), a calling terminal type (applet, WeChat webpage and general), an access party name, a callback address, a client domain (automatically obtained by a verification process), an accessible range and a corresponding configuration ID.

And step S120, detecting whether the access party passes the verification according to the verification data.

Authentication is performed by accepting authentication data (e.g., an access party ID, an access party key, etc.) input by the access party.

Step S130, if the access party passes the verification, finding the corresponding proxy ID according to the access party ID, sending the corresponding Token encryption key to the proxy ID, and signing the sent Token encryption key by using the RSA private key.

Wherein, the RSA private key is a private key based on an RSA encryption algorithm; the Token encryption key is a symmetric encryption key, and the decryption key is the same as the encryption key.

It should be noted that, when the access party key is verified to be passed, verification passing information is returned, otherwise, verification failure information is returned. In addition, if the unique code (access party ID) provided by the framework platform can be acquired, whether to perform auxiliary verification on the unique code can be determined according to the configuration information so as to determine whether to perform illegal access for the access party.

Step S140, monitoring whether the Token encryption key sends a verification request, and if the verification request is sent, verifying the signature by using the RSA public key.

Wherein, the RSA public key is a public key based on an RSA encryption algorithm;

it should be noted that, the transmission process of the distributed key data adopts SSL transmission, and uses RSA private key for signature.

By utilizing the RSA private key for signing, the security and the stability of data transmission are enhanced, the risk of data leakage is reduced, meanwhile, the SSL transmission technology is adopted, the data of an access party can be effectively protected from being hijacked and tampered, the process safety and the data safety are further protected, and the smooth implementation of an auditing party platform under multiple scenes is facilitated.

Step S150, if the signature passes the verification, the Token encryption key is updated; and extracting the Token by using the updated Token encryption key, verifying the Token, and receiving response result data if the Token passes verification.

It should be noted that, after the access side invokes the auditor function interface, the data to be sent includes Token and structured processing data (or JSON format). In the process, if the Token fails to be verified, the information of the failed verification is returned according to the reverse original path, otherwise, the corresponding verification result is returned according to the reverse original path.

Through setting up online check-up plug-in platform, can bring many-sided information into unified system management module for it is more convenient to manage, and the controllability is stronger, and the maintenance cost is lower, further protects flow safety and data security, strengthens hospital's management confidence, is favorable to the smooth implementation of the platform of examining below under the multi-scene.

The above steps are described in detail below.

Based on the above step S130, the method may further include the steps of:

step a), if the access party passes the verification, searching the corresponding configuration ID according to the access party ID, finding the corresponding proxy ID according to the configuration ID, and sending the corresponding Token encryption key to the proxy ID.

The corresponding proxy ID is found through the configuration ID, and the corresponding Token encryption key is sent to the proxy ID, so that the control authority is easier, and the data security is effectively ensured.

Based on the step S140, the method may further include the steps of:

and b), if the signature verification is not passed, not updating the Token encryption key.

The access authority can be controlled by verifying the signature, so that the fragmentization of the code version and the fragmentization of the code deployment are avoided, and the simplicity of function extension is improved.

In some embodiments, the method may further comprise the steps of:

and c), if the Token verification fails, returning the information of failing to pass the verification according to the reverse original path, and receiving response result data of failing to pass the verification.

It should be noted that, in this process, when Token fails to be verified, information of verification failure is returned according to the reverse original path, otherwise, a corresponding verification result is returned according to the reverse original path.

Based on the step S120, the method may further include the steps of:

and d), if the access party fails to pass the verification, returning information that the verification fails according to the reverse original path, and detecting the verification data again.

By timely returning the verification result information, the real-time workload can be effectively reduced, and the data management efficiency of the medical institution can be improved.

In some embodiments, the verification data includes one or more of:

hospital name, resource name, accessible range, callback address.

For example, as shown in fig. 2, by incorporating various access party information, authority configuration information, and the like into a unified system management platform, convenience and controllability of data management are improved, hospital maintenance cost is reduced, and implementation workload is reduced.

Based on the step S150, the method may further include the steps of:

and e), if the Token verification is passed, forwarding the verification data, and displaying the verification process on a graphical user interface.

Through the visual display of the verification process, the efficiency of data management is improved, the flow safety and the data safety are protected, and the hospital confidence is enhanced.

Fig. 3 is a schematic structural diagram of a processing device for online verification of a plug-in, which is applied to a gateway device, where a plurality of gateway devices correspond to a plurality of devices. As shown in fig. 3, the processing device 300 for checking the plug-in online includes:

an obtaining module 301, configured to obtain authentication data provided by an access party; wherein the authentication data comprises an access party ID;

a detection and verification module 302, configured to detect whether the access party passes verification according to the verification data;

the signature module 303 is configured to find a corresponding proxy ID according to the access party ID if the access party passes the verification, send a corresponding Token encryption key to the proxy ID, and sign the sent Token encryption key by using an RSA private key; wherein, the RSA private key is a private key based on an RSA encryption algorithm;

a monitoring request module 304, configured to monitor whether the Token encryption key sends a verification request, and if the verification request is sent, verify the signature by using an RSA public key; the RSA public key is a public key based on an RSA encryption algorithm.

A receive data module 305 for updating the Token encryption key if the signature verification passes; and extracting the Token by using the updated Token encryption key, verifying the Token, and receiving response result data if the Token passes verification.

The processing device for the online verification plug-in provided by the embodiment of the application has the same technical characteristics as the processing method for the online verification plug-in provided by the embodiment of the application, so that the same technical problems can be solved, and the same technical effects can be achieved.

As shown in fig. 4, an electronic device 400 provided in an embodiment of the present application includes a processor 402 and a memory 401, where a computer program operable on the processor is stored in the memory, and when the processor executes the computer program, the steps of the method provided in the foregoing embodiment are implemented.

Referring to fig. 4, the electronic device further includes: a bus 403 and a communication interface 404, the processor 402, the communication interface 404 and the memory 401 being connected by the bus 403; the processor 402 is used to execute executable modules, such as computer programs, stored in the memory 401.

The Memory 401 may include a high-speed Random Access Memory (RAM), and may also include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 404 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, and the like can be used.

Bus 403 may be an ISA bus, PCI bus, EISA bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 4, but that does not indicate only one bus or one type of bus.

The memory 401 is used for storing a program, and the processor 402 executes the program after receiving an execution instruction, and the method performed by the apparatus defined by the process disclosed in any of the foregoing embodiments of the present application may be applied to the processor 402, or implemented by the processor 402.

The processor 402 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 402. The Processor 402 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 401, and the processor 402 reads the information in the memory 401 and completes the steps of the method in combination with the hardware.

Corresponding to the protection control method of the asynchronous motor, the embodiment of the application also provides a computer readable storage medium, and the computer readable storage medium stores computer executable instructions, and when the computer executable instructions are called and executed by a processor, the computer executable instructions cause the processor to execute the steps of the processing method of the online verification plug-in.

The processing device of the online verification plug-in provided by the embodiment of the application can be specific hardware on the device or software or firmware installed on the device. The device provided by the embodiment of the present application has the same implementation principle and technical effect as the foregoing method embodiments, and for the sake of brief description, reference may be made to the corresponding contents in the foregoing method embodiments where no part of the device embodiments is mentioned. It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the foregoing systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.

In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.

For another example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.

The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.

In addition, functional units in the embodiments provided in the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.

The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the protection control method for an asynchronous motor according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.

It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus once an item is defined in one figure, it need not be further defined and explained in subsequent figures, and moreover, the terms "first", "second", "third", etc. are used merely to distinguish one description from another and are not to be construed as indicating or implying relative importance.

Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the scope of the embodiments of the present application. Are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

12页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种用户登录认证方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类