Privacy-protecting mobile phone returning incentive method, equipment and storage medium

文档序号:487950 发布日期:2022-01-04 浏览:2次 中文

阅读说明:本技术 一种隐私保护的手机归还激励方法、设备及储存介质 (Privacy-protecting mobile phone returning incentive method, equipment and storage medium ) 是由 马登极 王志文 吴思进 于 2021-11-02 设计创作,主要内容包括:本发明属于计算机技术领域,尤其涉及一种隐私保护的手机归还激励方法、设备及储存介质。利用智能合约技术,注册手机账户地址,基于手机账户地址和归还者的酬金领取地址并自动执行交易来转移酬金,利用归还设备作为归还手机的中介,构建无需第三方担保的信任,同时利用找回程序展示酬金,无需电话沟通,免除电话商议过程的同时将酬金进行记录,避免归还者临场加价的行为,通过归还设备归还手机也避免了归还者收取酬金拒不归还的行为,酬金预先存入手机账户地址以确保机主支付酬金,本方案的激励方法通过酬金激励归还手机的行为并且通过区块链技术结合归还设备解决了归还时的信任问题。(The invention belongs to the technical field of computers, and particularly relates to a mobile phone returning incentive method and device with privacy protection and a storage medium. The method includes the steps of registering a mobile phone account address by using an intelligent contract technology, obtaining an address based on the mobile phone account address and a reward of a return person and automatically executing a transaction to transfer the reward, constructing trust without being guaranteed by a third party by using return equipment as an intermediary for returning the mobile phone, displaying the reward by using a return program without telephone communication, recording the reward while avoiding a telephone negotiation process, avoiding an action of real-time pricing of the return person, avoiding an action of refusing return of the reward by the return equipment from returning the mobile phone, and storing the reward in the mobile phone account address in advance to ensure that a owner pays the reward.)

1. A mobile phone returning incentive method with privacy protection is characterized by comprising the following steps:

the roles of the method include: the system comprises a block chain system, a retrieving program installed on the mobile phone, a returning person, a mobile phone owner and returning equipment;

the block chain system is provided with a mobile phone retrieving contract, the mobile phone retrieving contract allows an owner to register a mobile phone account address, the mobile phone retrieving contract is provided with a receiving tree and a second knowledge proof circuit, the receiving tree is used for storing a receiving hash, the mobile phone account address is stored in a retrieving program, the retrieving program is used for locking the mobile phone and displaying retrieving information set by the owner when the mobile phone is lost, and the retrieving device comprises a data synchronization module used for synchronizing the block chain system information; the mobile phone locking module is used for locking or unlocking the returned mobile phone; the address identification module is used for identifying the mobile phone account address in the retrieving program; the transaction issuing module is used for sending the return transaction of the mobile phone and signing the return transaction; the zero knowledge circuit module is used for generating a first zero knowledge proof based on a first public input and a first private input of a return person and publishing the first public input and the first zero knowledge proof;

the method comprises the following steps:

the lost first mobile phone receives a lost instruction sent by the owner and enters a lost mode, the recovery program locks the first mobile phone and displays recovery information set by the owner on a screen, and the recovery information comprises a first reward amount;

the owner transfers the recovery address of the mobile phone recovery contract into a second reward through the mobile phone account address based on the mobile phone recovery contract and attaches a recovery hash, and the recovery hash is generated by the owner locally based on a recovery password;

the method comprises the steps that a returning person puts a first mobile phone into returning equipment, first zero knowledge certification information used for drawing a second reward by the returning person is input through a zero knowledge circuit module, the first zero knowledge certification information comprises a first public input and a first private input, the first public input comprises a first reward amount and a first drawing hash, the first private input comprises a first random number, the first random number is selected locally by the returning person, and the first drawing hash is obtained by carrying out hash operation on the first reward amount and the first random number;

a mobile phone locking module of the return equipment locks the first mobile phone placed in the return equipment;

the address identification module of the return equipment identifies the mobile phone account address stored in the first mobile phone retrieving program;

a transaction issuing module of the returning device constructs a mobile phone returning transaction based on the mobile phone account address and the first receiving hash, signs the mobile phone returning transaction, and sends the mobile phone returning transaction to the blockchain system;

the mobile phone returning contract receives the mobile phone returning transaction, the first getting hash is verified based on the amount of the second reward and the first random number input by the first secret, and the first getting hash is stored in a getting tree if the verification is passed;

a data synchronization module of the return equipment synchronizes the return hash attached to the reward;

the mobile phone locking module of the return device sets the retrieval hash as an unlocking hash of the first mobile phone;

the owner inputs the recovery password at the recovery device and recalculates the recovery hash, the recovery device verifies whether the recalculated recovery hash is consistent with the unlocking hash, and if so, the recovery device unlocks the first mobile phone;

the method comprises the steps that a restorer initiates a zero-knowledge proof transaction, the zero-knowledge proof transaction comprises a second public input and a second private input, the second public input comprises a receiving root hash, the amount of a second reward and a cancelling hash, the second private input comprises a first receiving hash, a first receiving tree path and a first random number, the cancelling hash is obtained by performing hash operation on the first receiving hash, the first receiving tree path is path data of the first receiving hash in a receiving tree, the second public input and the second private input generate a second zero-knowledge proof through a second zero-knowledge circuit based on execution of the zero-knowledge proof transaction, a block chain system verifies the second zero-knowledge proof, and the restorer receives the second reward corresponding to the first receiving hash if the verification is passed.

2. The privacy-preserving mobile phone returning incentive method according to claim 1, wherein the returning device further comprises a positioning module for generating location information of the returning device, the mobile phone returning transaction constructed by the transaction issuance module is also accompanied with the location information of the returning device, and the location information of the returning device is sent to the mobile phone account address based on the execution of the mobile phone returning transaction.

3. A computer device, characterized by one or more processors;

a memory for storing one or more programs,

the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in claim 1 or 2.

4. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to claim 1 or 2.

Technical Field

The invention belongs to the technical field of computers, and particularly relates to a mobile phone returning incentive method and device with privacy protection and a storage medium.

Background

The role of mobile phones in daily life has become more and more important. The loss of the mobile phone can cause risks to various social accounts and payment accounts, and also can cause loss of personal information such as personal photos and the like. Once the mobile phone is lost, the influence on various aspects of the life of the user is great. In the prior art, a traditional mode of searching for mobile phone signals or appearances is considered, and even if a block chain is combined, photo-like information is only registered and broadcast searching is carried out. However, if the picked up person does not want to return, the user cannot obtain the lost mobile phone. Therefore, at present, most of the situations are that people who lose the mobile phone are picked up, and the mobile phone is often waited for the owner to make a call actively so as to be contacted with the owner. However, sometimes, a person who partially finds out a mobile phone is unwilling to return the mobile phone to a loser without compensation, but wants to pay a fee, and if the fee is not paid, the person can still shut down the mobile phone or even try to crack the password of the mobile phone.

However, in reality, there are many cases where a return person of a mobile phone suddenly changes the divination price on the originally agreed reward to seek higher reward, or does not want to return the mobile phone after receiving the reward, or the owner does not want to pay the reward after obtaining the mobile phone.

In fact, the lost mobile phone has value not only for one mobile phone but also for information and data of a large number for the owner, and for the pickers, the mobile phone is at most only a second-hand mobile phone, and because some existing mobile phones have lost modes, the mobile phone is directly locked, the pickers cannot use the mobile phone, and the mobile phone can be a brick in the hands of the pickers, whether an incentive method for returning the mobile phone can be provided, whether the mobile phone pickers become mobile phone returning persons is encouraged, and the trust problem between the owner and the returning persons can be better solved.

Disclosure of Invention

In order to solve the above problems, the present invention provides a method, a device, and a storage medium for motivating a cell phone to return based on a block chain, which can motivate a cell phone to return, obtain a certain reward, and solve the trust problem between a return person and a phone owner.

The invention adopts the following technical scheme.

In a first aspect, a privacy-protected mobile phone returning incentive method is provided, which includes the following steps:

the roles of the method include: the system comprises a block chain system, a retrieving program installed on the mobile phone, a returning person, a mobile phone owner and returning equipment;

the block chain system is provided with a mobile phone retrieving contract, the mobile phone retrieving contract allows an owner to register a mobile phone account address, the mobile phone retrieving contract is provided with a receiving tree and a second knowledge proof circuit, the receiving tree is used for storing a receiving hash, the mobile phone account address is stored in a retrieving program, the retrieving program is used for locking the mobile phone and displaying retrieving information set by the owner when the mobile phone is lost, and the retrieving device comprises a data synchronization module used for synchronizing the block chain system information; the mobile phone locking module is used for locking or unlocking the returned mobile phone; the address identification module is used for identifying the mobile phone account address in the retrieving program; the transaction issuing module is used for sending the return transaction of the mobile phone and signing the return transaction; the zero knowledge circuit module is used for generating a first zero knowledge proof based on a first public input and a first private input of a return person and publishing the first public input and the first zero knowledge proof;

the method comprises the following steps:

the lost first mobile phone receives a lost instruction sent by the owner and enters a lost mode, the recovery program locks the first mobile phone and displays recovery information set by the owner on a screen, and the recovery information comprises a first reward amount;

the owner transfers the recovery address of the mobile phone recovery contract into a second reward through the mobile phone account address based on the mobile phone recovery contract and attaches a recovery hash, and the recovery hash is generated by the owner locally based on a recovery password;

the method comprises the steps that a returning person puts a first mobile phone into returning equipment, first zero knowledge certification information used for drawing a second reward by the returning person is input through a zero knowledge circuit module, the first zero knowledge certification information comprises a first public input and a first private input, the first public input comprises a first reward amount and a first drawing hash, the first private input comprises a first random number, the first random number is selected locally by the returning person, and the first drawing hash is obtained by carrying out hash operation on the first reward amount and the first random number;

a mobile phone locking module of the return equipment locks the first mobile phone placed in the return equipment;

the address identification module of the return equipment identifies the mobile phone account address stored in the first mobile phone retrieving program;

a transaction issuing module of the returning device constructs a mobile phone returning transaction based on the mobile phone account address and the first receiving hash, signs the mobile phone returning transaction, and sends the mobile phone returning transaction to the blockchain system;

the mobile phone returning contract receives the mobile phone returning transaction, the first getting hash is verified based on the amount of the second reward and the first random number input by the first secret, and the first getting hash is stored in a getting tree if the verification is passed;

a data synchronization module of the return equipment synchronizes the return hash attached to the reward;

the mobile phone locking module of the return device sets the retrieval hash as an unlocking hash of the first mobile phone;

the owner inputs the recovery password at the recovery device and recalculates the recovery hash, the recovery device verifies whether the recalculated recovery hash is consistent with the unlocking hash, and if so, the recovery device unlocks the first mobile phone;

the method comprises the steps that a restorer initiates a zero-knowledge proof transaction, the zero-knowledge proof transaction comprises a second public input and a second private input, the second public input comprises a receiving root hash, the amount of a second reward and a cancelling hash, the second private input comprises a first receiving hash, a first receiving tree path and a first random number, the cancelling hash is obtained by performing hash operation on the first receiving hash, the first receiving tree path is path data of the first receiving hash in a receiving tree, the second public input and the second private input generate a second zero-knowledge proof through a second zero-knowledge circuit based on execution of the zero-knowledge proof transaction, a block chain system verifies the second zero-knowledge proof, and the restorer receives the second reward corresponding to the first receiving hash if the verification is passed.

Preferably, the returning device further includes a positioning module, configured to generate location information of the returning device, the mobile phone returning transaction constructed by the transaction issuing module is also accompanied with the location information of the returning device, and the location information of the returning device is sent to the mobile phone account address based on execution of the mobile phone returning transaction.

In a second aspect, a computer device is provided, comprising one or more processors;

a memory for storing one or more programs,

the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method as described in the first aspect above.

In a third aspect, there is provided a storage medium storing a computer program which, when executed by a processor, implements the method as described in the first aspect above.

The invention has the advantages that the block chain technology is applied to the scene of losing and returning the mobile phone, the intelligent contract technology is utilized to register the mobile phone account address, the address is taken based on the mobile phone account address and the reward of the returning person and the transaction is automatically executed to transfer the reward, the returning equipment is utilized as the intermediary of returning the mobile phone, the trust without the guarantee of a third party is constructed, the reward is displayed by using the returning program without telephone communication, the reward is recorded while the telephone negotiation process is avoided, the action of on-site pricing of the returning person is avoided, the action that the returning person receives the reward and does not return is also avoided by returning the mobile phone through the returning equipment, the reward is stored in the mobile phone account address in advance to ensure that the mobile phone owner pays the reward, the incentive method of the scheme stimulates the action of returning the mobile phone through the reward and solves the trust problem when returning through the block chain technology and the returning equipment, on the other hand, according to the scheme, the withdrawing hash is set for the reward through the first zero knowledge proof, and the reward is withdrawn through the transaction through the zero knowledge proof, so that the privacy of a return person can be effectively protected, and the block chain address is prevented from tracing the return person.

Drawings

Fig. 1 is a schematic structural diagram of a computer device according to embodiment 2 of the present invention.

Detailed Description

The invention is described in further detail below with reference to specific embodiments and the attached drawing figures. Those skilled in the art will be able to implement the invention based on these teachings. Moreover, the embodiments of the present invention described in the following description are generally only some embodiments of the present invention, and not all embodiments. Therefore, all other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without any creative effort shall fall within the protection scope of the present invention. Unless otherwise specified, the methods described in the examples of the present invention are all those known to those skilled in the art.

Example 1

The embodiment provides a mobile phone returning incentive method with privacy protection, which comprises the following steps:

the roles of the method include: the system comprises a block chain system, a retrieving program installed on the mobile phone, a returning person, a mobile phone owner and returning equipment;

the block chain system is provided with a mobile phone retrieving contract, the mobile phone retrieving contract allows an owner to register a mobile phone account address, the mobile phone retrieving contract is provided with a receiving tree and a second knowledge proof circuit, the receiving tree is used for storing a receiving hash, the mobile phone account address is stored in a retrieving program, the retrieving program is used for locking the mobile phone and displaying retrieving information set by the owner when the mobile phone is lost, and the retrieving device comprises a data synchronization module used for synchronizing the block chain system information; the mobile phone locking module is used for locking or unlocking the returned mobile phone; the address identification module is used for identifying the mobile phone account address in the retrieving program; the transaction issuing module is used for sending the return transaction of the mobile phone and signing the return transaction; the zero knowledge circuit module is used for generating a first zero knowledge proof based on a first public input and a first private input of a return person and publishing the first public input and the first zero knowledge proof;

the method comprises the following steps:

the lost first mobile phone receives a lost instruction sent by the owner and enters a lost mode, the recovery program locks the first mobile phone and displays recovery information set by the owner on a screen, and the recovery information comprises a first reward amount;

the owner transfers the recovery address of the mobile phone recovery contract into a second reward through the mobile phone account address based on the mobile phone recovery contract and attaches a recovery hash, and the recovery hash is generated by the owner locally based on a recovery password;

the method comprises the steps that a returning person puts a first mobile phone into returning equipment, first zero knowledge certification information used for drawing a second reward by the returning person is input through a zero knowledge circuit module, the first zero knowledge certification information comprises a first public input and a first private input, the first public input comprises a first reward amount and a first drawing hash, the first private input comprises a first random number, the first random number is selected locally by the returning person, and the first drawing hash is obtained by carrying out hash operation on the first reward amount and the first random number;

a mobile phone locking module of the return equipment locks the first mobile phone placed in the return equipment;

the address identification module of the return equipment identifies the mobile phone account address stored in the first mobile phone retrieving program;

a transaction issuing module of the returning device constructs a mobile phone returning transaction based on the mobile phone account address and the first receiving hash, signs the mobile phone returning transaction, and sends the mobile phone returning transaction to the blockchain system;

the mobile phone returning contract receives the mobile phone returning transaction, the first getting hash is verified based on the amount of the second reward and the first random number input by the first secret, and the first getting hash is stored in a getting tree if the verification is passed;

a data synchronization module of the return equipment synchronizes the return hash attached to the reward;

the mobile phone locking module of the return device sets the retrieval hash as an unlocking hash of the first mobile phone;

the owner inputs the recovery password at the recovery device and recalculates the recovery hash, the recovery device verifies whether the recalculated recovery hash is consistent with the unlocking hash, and if so, the recovery device unlocks the first mobile phone;

the method comprises the steps that a restorer initiates a zero-knowledge proof transaction, the zero-knowledge proof transaction comprises a second public input and a second private input, the second public input comprises a receiving root hash, the amount of a second reward and a cancelling hash, the second private input comprises a first receiving hash, a first receiving tree path and a first random number, the cancelling hash is obtained by performing hash operation on the first receiving hash, the first receiving tree path is path data of the first receiving hash in a receiving tree, the second public input and the second private input generate a second zero-knowledge proof through a second zero-knowledge circuit based on execution of the zero-knowledge proof transaction, a block chain system verifies the second zero-knowledge proof, and the restorer receives the second reward corresponding to the first receiving hash if the verification is passed.

Further, the returning device further comprises a positioning module for generating the position information of the returning device, the mobile phone returning transaction constructed by the transaction issuing module is also accompanied with the position information of the returning device, and the position information of the returning device is sent to the mobile phone account address based on the execution of the mobile phone returning transaction.

In this embodiment, the lost mobile phone is provided with a blockchain wallet, the retrieving program is integrated in the blockchain wallet, the wallet supports the lost mode, the mobile phone can be locked in the lost mode, and retrieving information set by the mobile phone owner is output to a main screen of a mobile phone lock screen. When the user wins 500 tokens for the first time and does not retrieve the tokens within a certain time, the user can continue to add the tokens, so that the retrieving possibility is increased. The owner is additionally provided with a recovery hash while typing in the reward, wherein the recovery hash is hash (recovery password), and the password is known by the user and used for unlocking the recovery hash and is longer and safer. The two-dimension code information is the public key address of the user wallet, the block chain deploys the mobile phone returning contract, the owner is allowed to register the mobile phone account address, the address is bound with a mobile phone block chain wallet, the owner inputs a reward number of tokens into the retrieval address through a private signature of a mobile phone account address and locks the token, after seeing the retrieval information, the return person is willing to return the mobile phone, finding a returning mobile phone device, inputting the number of tokens of the rewards displayed on a mobile phone screen and a first random number locally generated by the returning person in the returning device, automatically generating a first picking hash by the returning device for inputting, and outputs a first zero knowledge proof, and publishes the token number and the first receiving hash input by the return person as the public input of the first zero knowledge proof and the first zero knowledge proof, the first receiving hash is obtained by carrying out hash operation on a token number input by a returning person and a first random number.

The returning person puts the mobile phone into the returning device, and the returning device locks the mobile phone. And after confirming locking, the returning equipment scans the address of the mobile phone wallet and sends a mobile phone returning transaction, and the transaction is attached with a first zero knowledge certificate and the address of the mobile phone account and is attached with the positioning information of the returning equipment, so that the searching is convenient. And after the return contract receives the return transaction of the mobile phone, searching the reward according to the address of the mobile phone account, performing hash operation on the amount of the reward and a first random number input by a return person to verify the first zero knowledge certificate, storing the first receiving hash into a receiving tree if the verification is passed, and taking the returning hash attached to the reward as the unlocking hash of the mobile phone. The owner gets the mobile phone according to the returning device positioning information, inputs the retrieving password, the retrieving device calculates the hash of the password and verifies whether the hash is consistent with the unlocking hash, if so, the door is opened, and the user takes out the mobile phone.

The return person initiates zero knowledge proof transaction to collect the reward, the reward of the mobile phone is stored in a contract account and is set with a corresponding collecting hash, namely a first collecting hash based on the return contract of the mobile phone, only a person knowing the collecting hash can collect the reward, namely the reward is transferred into a set address, because the collecting hash needs to be verified, the collecting address of the reward can be hidden, the zero knowledge proof is easy to verify that a transaction presenter, namely the return person knows the first collecting hash through a second zero knowledge proof, the second zero knowledge proof is obtained based on a second zero knowledge circuit through a second public input and a second private input, the second public input comprises a collecting tree root hash, a token number input by the return person and a waste hash, the second private input comprises the first collecting hash, a first collecting tree path and a first random number, and the waste hash is obtained through the first collecting hash, the first receiving tree path is path data of the first receiving hash in the receiving tree, whether a revocation hash exists or not is firstly verified in advance, if the revocation hash exists, the receiving hash is proved to be used, subsequent verification is not needed, if the revocation hash is not used, the receiving tree root hash is obtained through calculation of the first receiving hash and the first receiving tree path in the second private input, the root hash of the receiving tree can be obtained through the receiving tree, the receiving tree is public, therefore, all persons can verify whether the receiving tree root hash is accurate or not, if the calculated root hash of the receiving tree is consistent with public data, the first receiving hash is really on the receiving tree, a returning person has the right to receive remunes corresponding to the first receiving hash, the returning person sets a receiving address, remuneration in a retrieving address of a contract is received to the receiving address, the outside world can only see that someone has provided a zero knowledge proof to prove that he owns the pickup hash and picks the reward but does not know the corresponding pickup address, but can verify the zero knowledge proof.

The scheme of the embodiment applies a block chain technology to a scene of returning lost mobile phone, uses an intelligent contract technology to register a mobile phone account address, takes an address based on the mobile phone account address and a return reward of a return person and automatically executes a transaction to transfer the reward, uses return equipment as an intermediary of returning the mobile phone to construct trust without being guaranteed by a third party, simultaneously uses a return program to display the reward, does not need telephone communication, records the reward while avoiding a telephone negotiation process, avoids the action of on-site pricing of the return person, avoids the action of refusing to return the reward when the return person receives the reward by returning the mobile phone through the return equipment, and prestores the reward into the mobile phone account address to ensure that the mobile phone owner pays the reward, according to the scheme of the embodiment, the withdrawing hash is set for the reward through the first zero knowledge proof, and the reward is withdrawn through the transaction of the zero knowledge proof, so that the privacy of a returning person can be effectively protected, and the block chain address is prevented from tracing the returning person.

Example 2

A computer device, the device comprising: one or more processors; memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform the method of embodiment 1.

A storage medium storing a computer program which, when executed by a processor, implements the method as described in embodiment 1 above.

Fig. 1 is a schematic structural diagram of an apparatus provided in this embodiment.

As shown in fig. 1, as another aspect, the present application also provides a computer apparatus 500 including one or more Central Processing Units (CPUs) 501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM503, various programs and data necessary for the operation of the apparatus 500 are also stored. The CPU501, ROM502, and RAM503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.

The following components are connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, and the like; an output portion 507 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication via a network such as the internet, and the processing driver 510 is also connected to the I/O interface 505 as necessary. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as necessary, so that a computer program read out therefrom is mounted into the storage section 508 as necessary.

In particular, according to the embodiments disclosed in the present application, the method described in the above embodiment 1 may be implemented as a computer software program. For example, embodiments disclosed herein include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method described in any of the embodiments above. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 509, and/or installed from the removable medium 511.

As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described herein.

The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.

The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.

The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

10页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:停车费用的管理方法、装置、终端设备及存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!