Authentication control method and system for user identity identification card

文档序号:196619 发布日期:2021-11-02 浏览:29次 中文

阅读说明:本技术 用户身份识别卡的鉴权控制方法和系统 (Authentication control method and system for user identity identification card ) 是由 胡昌玮 张元冰 袁世强 于 2021-09-13 设计创作,主要内容包括:本发明实施例提供一种用户身份识别卡的鉴权控制方法和系统,该方法通过在移动终端部署鉴权控制应用程序,使得移动终端能够在鉴权控制应用程序指示下调用设置于该移动终端中的用户身份识别卡的应用协议数据单元指令,并通过应用协议数据单元指令携带的鉴权控制信息控制用户身份识别卡执行鉴权过程,使得用户身份识别卡的鉴权过程可由移动终端部署的鉴权控制应用程序来控制,防止用户身份识别卡在鉴权过程中泄露重要信息,进而提高了鉴权过程中的安全性和保密性。(The embodiment of the invention provides an authentication control method and an authentication control system for a user identity identification card, wherein the method is characterized in that an authentication control application program is deployed on a mobile terminal, so that the mobile terminal can call an application protocol data unit instruction of the user identity identification card arranged in the mobile terminal under the instruction of the authentication control application program, and the authentication control information carried by the application protocol data unit instruction controls the user identity identification card to execute an authentication process, so that the authentication process of the user identity identification card can be controlled by the authentication control application program deployed on the mobile terminal, the user identity identification card is prevented from leaking important information in the authentication process, and the safety and the confidentiality in the authentication process are further improved.)

1. An authentication control method of a user identity card is characterized in that the method is applied to a mobile terminal, the user identity card is arranged in the mobile terminal, and an authentication control application program is deployed in the mobile terminal, the method comprises the following steps:

the mobile terminal calls an application protocol data unit instruction of the user identity identification card under the instruction of the authentication control application program, wherein the application protocol data unit instruction carries authentication control information;

the mobile terminal sends the application protocol data unit instruction to the user identification card, and the authentication control information is used for controlling the authentication process of the user identification card.

2. The method of claim 1, wherein the invoking of the application protocol data unit instruction of the subscriber identity card comprises:

and the mobile terminal acquires an access key and calls the application protocol data unit instruction according to the access key.

3. The method according to claim 1 or 2, wherein before the invoking of the application protocol data unit instruction of the subscriber identity card, the method further comprises:

and the mobile terminal acquires the authentication state and the authentication key of the user identity identification card at a service end under the instruction of the authentication control application program, and executes the next step when the authentication state is not authenticated.

4. An authentication control method for a user identification card is applied to the user identification card, and is characterized by comprising the following steps:

receiving an application protocol data unit instruction sent by a mobile terminal, wherein the application protocol data unit instruction carries authentication control information, and the application protocol data unit instruction is an application protocol data unit instruction of the user identity identification card called by the mobile terminal under the instruction of an authentication control application program;

and executing an authentication process according to the authentication control information.

5. The method of claim 4, wherein the authentication control information comprises an authentication time period;

the executing the authentication process according to the authentication control information comprises:

and the authentication process is completed through the authentication request sent by the mobile terminal in the authentication time period according to the authentication request.

6. The method of claim 4 or 5, further comprising:

and receiving an access key sent by a server, and sending the access key to a mobile terminal so that the mobile terminal calls an application protocol data unit instruction of the user identity identification card according to the access key after acquiring the access key.

7. An authentication control system for a subscriber identity module card, comprising: the mobile terminal comprises a mobile terminal and a user identity identification card, wherein the user identity identification card is arranged in the mobile terminal, and the mobile terminal is provided with an authentication control application program;

the mobile terminal calls an application protocol data unit instruction of the user identity identification card under the instruction of the authentication control application program, wherein the application protocol data unit instruction carries authentication control information;

the mobile terminal sends the application protocol data unit instruction to the user identity identification card;

and the user identity identification card receives an application protocol data unit instruction sent by the mobile terminal and executes an authentication process according to the authentication control information.

8. A computer device, comprising: at least one processor and memory;

the memory stores computer-executable instructions;

the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the method of authentication control of a subscriber identity card according to any of claims 1-3 or 4-6.

9. A computer-readable storage medium, wherein the computer-readable storage medium stores computer-executable instructions, and when a processor executes the computer-executable instructions, the method for controlling authentication of a subscriber identity module card according to any one of claims 1 to 3 or 4 to 6 is implemented.

10. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the authentication control method of a subscriber identity card according to any of claims 1-3 or 4-6.

Technical Field

The embodiment of the invention relates to the technical field of identity authentication, in particular to an authentication control method and system for a user identity identification card.

Background

The rapid development of mobile network communication technology greatly improves the communication level of people. Network users can use the network to make video calls, voice chats, make calls, send short messages, etc. Generally, before using a network, a user needs to handle a Subscriber Identity Module (SIM) card in a network operator, and then perform network login authentication on the SIM, after the authentication is passed, the authority of accessing the SIM card to the network is opened, and the user can access a signal network by using the SIM card, and data information in the process of using the SIM card by the user is also stored in the SIM card.

In the related art, each SIM card corresponds to an International Mobile Subscriber Identity (IMSI) and an authentication key. After a user installs an SIM card into a mobile terminal, the mobile terminal is started and then directly reads series information in the SIM card and sends an authentication request to the SIM card to request the SIM to start authentication, in the authentication process, the SIM sends the authentication request to a network terminal, the network terminal generates a random number, then an authentication result SRES and a call encryption key are calculated by utilizing an IMSI and the authentication key stored in the SIM, meanwhile, the SIM card terminal also generates the authentication result SRES and the call encryption key according to the random number generated by the network terminal, the IMSI and the authentication key, and if the calculation results of the network terminal and the SIM are the same, the authentication is successful. After the authentication is successful, the user can log on the network to use the network.

However, in the authentication method, the authentication can be completed only by interaction between the SIM card and the network, and the authentication process cannot be controlled, so that important information is easily leaked in the authentication process, and the security and confidentiality of the authentication process are reduced.

Disclosure of Invention

The embodiment of the invention provides an authentication control method and an authentication control system for a user identity identification card, which are characterized in that an authentication control application program is deployed on a mobile terminal, so that the mobile terminal can call an application protocol data unit of the user identity identification card arranged in the mobile terminal under the instruction of the authentication control application program, and the user identity identification card can execute an authentication process according to authentication control information, so that the problems of low safety and confidentiality in the authentication process in the prior art are solved.

A first aspect of an embodiment of the present invention provides an authentication control method for a user identification card, which is applied to a mobile terminal, where the mobile terminal is provided with the user identification card therein, and the mobile terminal is deployed with an authentication control application program, and the method includes:

the mobile terminal calls an application protocol data unit instruction of the user identity identification card under the instruction of the authentication control application program, wherein the application protocol data unit instruction carries authentication control information;

the mobile terminal sends the application protocol data unit instruction to the user identification card, and the authentication control information is used for controlling the authentication process of the user identification card.

Optionally, the invoking the application protocol data unit instruction of the user identification card includes:

and the mobile terminal acquires an access key and calls the application protocol data unit instruction according to the access key.

Optionally, before the invoking of the application protocol data unit instruction of the user identification card, the method further includes:

and the mobile terminal acquires the authentication state and the authentication key of the user identity identification card at a service end under the instruction of the authentication control application program, and executes the next step when the authentication state is not authenticated.

A second aspect of the embodiments of the present invention provides an authentication control method for a user identification card, which is applied to the user identification card, and the method includes:

receiving an application protocol data unit instruction sent by a mobile terminal, wherein the application protocol data unit instruction carries authentication control information, and the application protocol data unit instruction is an application protocol data unit instruction of the user identity identification card called by the mobile terminal under the instruction of an authentication control application program;

and executing an authentication process according to the authentication control information.

Optionally, the authentication control information includes an authentication time period;

the executing the authentication process according to the authentication control information comprises:

and the authentication process is completed through the authentication request sent by the mobile terminal in the authentication time period according to the authentication request.

Optionally, the method further includes:

and receiving an access key sent by a server, and sending the access key to a mobile terminal so that the mobile terminal calls an application protocol data unit instruction of the user identity identification card according to the access key after acquiring the access key.

A third aspect of the embodiments of the present invention provides an authentication control system for a user identification card, including: the mobile terminal comprises a mobile terminal and a user identity identification card, wherein the user identity identification card is arranged in the mobile terminal, and the mobile terminal is provided with an authentication control application program;

the mobile terminal calls an application protocol data unit instruction of the user identity identification card under the instruction of the authentication control application program, wherein the application protocol data unit instruction carries authentication control information;

the mobile terminal sends the application protocol data unit instruction to the user identity identification card;

and the user identity identification card receives an application protocol data unit instruction sent by the mobile terminal and executes an authentication process according to the authentication control information.

A fourth aspect of an embodiment of the present invention provides a computer device, including: at least one processor and memory;

the memory stores computer-executable instructions;

the at least one processor executes the computer-executable instructions stored in the memory, so that the at least one processor executes the authentication control method for the user identification card according to the first aspect or the second aspect of the embodiments of the present invention.

A fifth aspect of the embodiments of the present invention provides a computer-readable storage medium, where a computer executing instruction is stored in the computer-readable storage medium, and when a processor executes the computer executing instruction, the method for controlling authentication of a user identity card according to the first aspect or the second aspect of the embodiments of the present invention is implemented.

A sixth aspect of the embodiments of the present invention provides a computer program product, including a computer program, where the computer program, when executed by a processor, implements the method for controlling authentication of a user identity card according to the first aspect or the second aspect of the embodiments of the present invention.

The embodiment of the invention provides an authentication control method of a user identity identification card, which is characterized in that an authentication control application program is deployed on a mobile terminal, so that the mobile terminal can call an application protocol data unit instruction of the user identity identification card arranged in the mobile terminal under the instruction of the authentication control application program, and the application protocol data unit instruction carries authentication control information; therefore, after the mobile terminal sends the application protocol data unit instruction to the user identity identification card, the authentication process of the user identity identification card can be controlled through the application protocol data unit instruction, and the authentication can not be independently completed only through the user identity identification card arranged in the mobile terminal, so that the authentication process of the user identity identification card can be controlled by an authentication control application program deployed by the mobile terminal, and the safety and the confidentiality in the authentication process are further improved.

Drawings

In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.

FIG. 1 is a flow chart illustrating an authentication method of a conventional SIM card;

fig. 2 is a flowchart illustrating an authentication control method for a subscriber identity card according to an exemplary embodiment of the present invention;

fig. 3 is a flowchart illustrating an authentication control method for a subscriber identity card according to another exemplary embodiment of the present invention;

fig. 4 is an architecture diagram illustrating an authentication control system for a subscriber identity card according to an exemplary embodiment of the present invention;

fig. 5 is a schematic structural diagram of a computer device according to an exemplary embodiment of the present invention.

Detailed Description

In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.

The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.

Fig. 1 is a flow chart illustrating an authentication method of a conventional subscriber identity module card. In the related technology, after a user installs an SIM card into a mobile terminal, the mobile terminal automatically reads series information in the SIM card and sends an authentication request to the SIM card after being turned on, in the authentication process, as shown in fig. 1, the SIM sends an authentication request to a network terminal, the authentication request includes IMSI and an authentication key Ki corresponding to the SIM card, the network terminal generates a random number RAND, then calculates an authentication result SRES and a call encryption key Kc by using the IMSI and the authentication key stored in the SIM, and the SIM card terminal also generates an authentication result SRES and a call encryption key Kc according to the random number RAND, the IMSI and the authentication key Ki generated by the network terminal, and if the calculation results of the network terminal and the SIM card are the same, the authentication is successful. After the authentication is successful, the user can log on the network to use the network. However, in the authentication method, the authentication can be completed only by interaction between the SIM card and the network, and the authentication process cannot be controlled, so that important information is easily leaked in the authentication process, and the security and confidentiality of the authentication process are reduced.

Aiming at the defect, the technical scheme of the invention mainly comprises the following steps: by deploying the authentication control Application program at the mobile terminal, the mobile terminal can call an Application Protocol Data Unit (APDU) instruction of a user identity identification card arranged in the mobile terminal under the instruction of the authentication control Application program, and the APDU instruction carries authentication control information; therefore, after the mobile terminal sends the application protocol data unit instruction to the user identity identification card, the authentication process of the user identity identification card can be controlled through the application protocol data unit instruction, and the authentication can not be independently completed only through the user identity identification card arranged in the mobile terminal, so that the authentication process of the user identity identification card can be controlled by an authentication control application program deployed by the mobile terminal, and the safety and the confidentiality in the authentication process are further improved.

Fig. 2 is a flowchart illustrating an authentication control method for a user identification card according to an exemplary embodiment of the present invention, where the present embodiment describes the authentication control method by taking execution of a mobile terminal as an example.

It should be noted that, in this embodiment, a user identity card is disposed in the mobile terminal, and the mobile terminal is deployed with an authentication control application program.

As shown in fig. 2, the method provided by the present embodiment may include the following steps;

s201, the mobile terminal calls an application protocol data unit instruction of the user identity identification card under the instruction of the authentication control application program, and the application protocol data unit instruction carries authentication control information.

In particular, an APDU) is a communication unit between a card reader and an SIM card, an authentication control application deployed by a mobile terminal calls an APDU command of the SIM card, the APDU command includes authentication control information, and an authentication function of the SIM card is triggered by calling an ADPI command of the SIM card, so as to control network capabilities of a terminal user such as making a call, sending a short message, accessing the internet and the like.

S202, the mobile terminal sends the application protocol data unit instruction to the user identity identification card, and the authentication control information is used for controlling the authentication process of the user identity identification card.

Specifically, after the mobile terminal calls the APDU command of the SIM card, the APDU command is sent to the SIM card installed in the mobile terminal, so as to control the authentication of the SIM card.

For example, the mobile phone App may send an APDU command, which requires the SIM card to request network authentication through the mobile phone operating system or the communication module (or the communication module directly communicates with the SIM card through the 7816 interface) within the validity period of 30 minutes, and complete the authentication.

In this embodiment, by deploying the authentication control application program in the mobile terminal, the mobile terminal can call an application protocol data unit instruction of the user identity card arranged in the mobile terminal under the instruction of the authentication control application program, and the application protocol data unit instruction carries authentication control information; therefore, after the mobile terminal sends the application protocol data unit instruction to the user identity identification card, the authentication process of the user identity identification card can be controlled through the application protocol data unit instruction, and the authentication can not be independently completed only through the user identity identification card arranged in the mobile terminal, so that the authentication process of the user identity identification card can be controlled by an authentication control application program deployed by the mobile terminal, and the safety and the confidentiality in the authentication process are further improved.

In one or more possible embodiments, the invoking of the application protocol data unit instruction of the user identification card includes: and the mobile terminal acquires an access key and calls the application protocol data unit instruction according to the access key.

Specifically, the APDU command can be called only by a correct access key, generally, the service end stores the access key of each SIM card, the service end sends the access key to the SIM card, the authentication control APP obtains the access key from the SIM card, and the application protocol data unit command is called according to the access key.

In one or more possible embodiments, before the invoking the application protocol data unit instruction of the user identification card, the method further includes: and the mobile terminal acquires the authentication state and the authentication key of the user identity identification card at a service end under the instruction of the authentication control application program, and executes the next step when the authentication state is not authenticated.

Specifically, the authentication state and the authentication key of each SIM card are uniformly stored in the server for communication with the SIM card, so that the authentication control process of the SIM card is prevented from being cracked. Therefore, the authentication control APP deployed in the mobile terminal needs to obtain an authentication state and an authentication key corresponding to the SIM card at the service end, and when the authentication state is not authenticated, invokes an APDU instruction of the SIM card, thereby triggering the authentication of the SIM card.

Fig. 3 is a flowchart illustrating an authentication control method for a subscriber identity module card according to another exemplary embodiment of the present invention, where the present embodiment describes the authentication control method by taking an execution of an SIM card as an example.

As shown in fig. 3, the method provided by the present embodiment may include the following steps;

s301, receiving an application protocol data unit instruction sent by a mobile terminal, wherein the application protocol data unit instruction carries authentication control information, and the application protocol data unit instruction is an application protocol data unit instruction of the user identity identification card called by the mobile terminal under the instruction of an authentication control application program.

In particular, an APDU) is a communication unit between a card reader and an SIM card, an authentication control application deployed by a mobile terminal calls an APDU command of the SIM card, the APDU command includes authentication control information, and an authentication function of the SIM card is triggered by calling an ADPI command of the SIM card, so as to control network capabilities of a terminal user such as making a call, sending a short message, accessing the internet and the like.

S302, executing authentication process according to the authentication control information.

Specifically, after the mobile terminal calls the APDU command of the SIM card, the APDU command is sent to the SIM card installed in the mobile terminal, so as to control the authentication of the SIM card.

For example, the mobile phone App may send an APDU command, which requires the SIM card to request network authentication through the mobile phone operating system or the communication module (or the communication module directly communicates with the SIM card through the 7816 interface) within the validity period of 30 minutes, and complete the authentication.

In this embodiment, by deploying the authentication control application program in the mobile terminal, the mobile terminal can call an application protocol data unit instruction of the user identity card arranged in the mobile terminal under the instruction of the authentication control application program, and the application protocol data unit instruction carries authentication control information; therefore, after the mobile terminal sends the application protocol data unit instruction to the user identity identification card, the authentication process of the user identity identification card can be controlled through the application protocol data unit instruction, and the authentication can not be independently completed only through the user identity identification card arranged in the mobile terminal, so that the authentication process of the user identity identification card can be controlled by an authentication control application program deployed by the mobile terminal, and the safety and the confidentiality in the authentication process are further improved.

In one or more possible embodiments, the authentication control information includes an authentication time period; the executing the authentication process according to the authentication control information comprises: and the authentication process is completed through the authentication request sent by the mobile terminal in the authentication time period according to the authentication request.

Specifically, after the mobile terminal is started, the mobile terminal automatically reads the series information of the SIM card, then calls an APDU command through the authentication control APP to send an authentication request to the SIM card, after the SIM card receives the APDU command, the SIM card analyzes the APDU command to obtain an authentication time period in the authentication control information, and the authentication request is passed in the authentication time period to complete the whole authentication process.

It should be noted that the authentication process in this embodiment is similar to the authentication process in the prior art, and will not be described in detail here.

In one or more possible embodiments, the method further comprises: and receiving an access key sent by a server, and sending the access key to a mobile terminal so that the mobile terminal calls an application protocol data unit instruction of the user identity identification card according to the access key after acquiring the access key.

Specifically, the APDU command can be called only by a correct access key, generally, the service end stores the access key of each SIM card, the service end sends the access key to the SIM card, the authentication control APP obtains the access key from the SIM card, and the application protocol data unit command is called according to the access key.

In this embodiment, if the SIM card does not receive the APDU instruction sent by the authentication control App within the limited time, the SIM card rejects all subsequent network authentication. That is to say, the authentication of the SIM card is controlled by the authentication control APP deployed in the mobile terminal, thereby ensuring the security and confidentiality in the authentication process.

Fig. 4 is an architecture diagram illustrating an authentication control system for a subscriber identity card according to an exemplary embodiment of the present invention.

As shown in fig. 4, the system provided in this embodiment includes: the mobile terminal comprises a mobile terminal 401 and a user identity identification card 402, wherein the user identity identification card is arranged in the mobile terminal, and the mobile terminal is provided with an authentication control application program; the mobile terminal calls an application protocol data unit instruction of the user identity identification card under the instruction of the authentication control application program, wherein the application protocol data unit instruction carries authentication control information; the mobile terminal sends the application protocol data unit instruction to the user identity identification card; and the user identity identification card receives an application protocol data unit instruction sent by the mobile terminal and executes an authentication process according to the authentication control information.

Further, the system further comprises: the server 403, where the authentication state and the authentication key of each SIM card are stored in the server, is used to communicate with the SIM card, so as to prevent the authentication control process of the SIM card from being cracked. Therefore, the authentication control APP deployed in the mobile terminal needs to obtain an authentication state and an authentication key corresponding to the SIM card at the service end, and when the authentication state is not authenticated, invokes an APDU instruction of the SIM card, thereby triggering the authentication of the SIM card.

Further, the service end is also used for sending an access key to the SIM card to encrypt the binary short message, the access key is used for accessing an APDU instruction of the SIM card, the mobile terminal obtains the access key, and the APDU instruction of the SIM card is called according to the access key.

In this embodiment, by deploying the authentication control application program in the mobile terminal, the mobile terminal can call an application protocol data unit instruction of the user identity card arranged in the mobile terminal under the instruction of the authentication control application program, and the application protocol data unit instruction carries authentication control information; therefore, after the mobile terminal sends the application protocol data unit instruction to the user identity identification card, the authentication process of the user identity identification card can be controlled through the application protocol data unit instruction, the authentication can not be independently completed only through the user identity identification card arranged in the mobile terminal, and the authentication function can be triggered only after the SIM card receives the APDU instruction sent by the authentication APP deployed by the mobile terminal, so that the authentication process of the user identity identification card can be controlled by the authentication control application program deployed by the mobile terminal, and the safety and the confidentiality in the authentication process are further improved.

The detailed description of the method embodiments above may be referred to for specific functional implementation of each module provided in this embodiment.

Fig. 5 is a schematic structural diagram of a computer device according to an exemplary embodiment of the present invention. As shown in fig. 5, the present embodiment provides a computer apparatus 50 including: at least one processor 501 and memory 502. The processor 501 and the memory 502 are connected by a bus 503.

In a specific implementation, the at least one processor 501 executes the computer-executable instructions stored in the memory 502, so that the at least one processor 501 executes the method in the above-described method embodiments.

For a specific implementation process of the processor 501, reference may be made to the above method embodiments, which implement the similar principle and technical effect, and this embodiment is not described herein again.

In the embodiment shown in fig. 5, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.

The memory may comprise high speed RAM memory and may also include non-volatile storage NVM, such as at least one disk memory.

The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, the buses in the figures of the present application are not limited to only one bus or one type of bus.

Another embodiment of the present application provides a computer-readable storage medium, where computer-executable instructions are stored in the computer-readable storage medium, and when a processor executes the computer-executable instructions, the method for controlling authentication of a user identity card in the above method embodiments is implemented.

Another embodiment of the present application provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the computer program implements the method for controlling authentication of a subscriber identity module card according to the first aspect of the embodiments of the present invention.

The computer-readable storage medium may be implemented by any type of volatile or non-volatile memory device or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk. Readable storage media can be any available media that can be accessed by a general purpose or special purpose computer.

An exemplary readable storage medium is coupled to the processor such the processor can read information from, and write information to, the readable storage medium. Of course, the readable storage medium may also be an integral part of the processor. The processor and the readable storage medium may reside in an Application Specific Integrated Circuits (ASIC). Of course, the processor and the readable storage medium may also reside as discrete components in the apparatus.

Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.

Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

13页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种控制方法、系统、以及相关装置

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!