Program running method, program shell adding method and device

文档序号:7912 发布日期:2021-09-17 浏览:25次 中文

阅读说明:本技术 一种程序运行方法、程序加壳方法及设备 (Program running method, program shell adding method and device ) 是由 袁欣驰 于 2020-03-17 设计创作,主要内容包括:本申请实施例公开了一种程序运行方法、程序加壳方法及设备,用于实现在不同的场景下对目标程序具有不同的运行权限的目的。所述方法包括:第一设备获取用户触发的运行第一程序的请求,根据所述请求获取第一程序和场景信息,所述第一程序包括第一程序头、第一壳程序和目标程序,所述场景信息包括系统信息、时间信息和所述目标程序的版本信息中的一项或多项;所述第一设备从所述第一程序头中获取所述第一壳程序的地址,并根据所述第一壳程序的地址运行所述第一壳程序,所述第一壳程序用于确定所述场景信息是否满足预设条件;当所述场景信息满足所述预设条件时,所述第一设备运行所述目标程序。(The embodiment of the application discloses a program running method, a program shell adding method and equipment, which are used for achieving the purpose of having different running authorities for a target program in different scenes. The method comprises the following steps: the method comprises the steps that first equipment obtains a request for running a first program triggered by a user, and obtains the first program and scene information according to the request, wherein the first program comprises a first program header, a first shell program and a target program, and the scene information comprises one or more items of system information, time information and version information of the target program; the first device acquires an address of the first shell program from the first program header, and runs the first shell program according to the address of the first shell program, wherein the first shell program is used for determining whether the scene information meets a preset condition; and when the scene information meets the preset condition, the first device runs the target program.)

1. A program execution method, comprising:

the method comprises the steps that first equipment obtains a request for running a first program triggered by a user, and obtains the first program and scene information according to the request, wherein the first program comprises a first program header, a first shell program and a target program, and the scene information comprises one or more items of system information, time information and version information of the target program;

the first device acquires an address of the first shell program from the first program header, and runs the first shell program according to the address of the first shell program, wherein the first shell program is used for determining whether the scene information meets a preset condition;

and when the scene information meets the preset condition, the first device runs the target program.

2. The method of claim 1, further comprising:

the first equipment acquires a verification code input by a user;

the first shell program is used for determining whether the scene information meets a preset condition, and the running of the target program when the scene information meets the preset condition comprises the following steps:

the first shell program is used for sending the verification code to a server and receiving a verification result of the server on the verification code; and when the verification result is that the verification is passed and the scene information meets the preset condition, the target program is operated.

3. The method according to claim 1 or 2, characterized in that the method further comprises:

the first equipment acquires a user identifier;

the first shell program is further configured to determine the preset condition according to the user identifier.

4. The method of claim 1, wherein the first device obtains a user-triggered request to run a first program, and obtaining the first program according to the request comprises:

the first equipment acquires a request for running a second program triggered by a user, and acquires the second program and a password according to the request, wherein the second program comprises a second program head, a second shell program and the first program;

and the first device acquires the address of the second shell program from the second program header, and runs the second shell program according to the address of the second shell program, wherein the second shell program is used for verifying the password and obtaining the first program after the password passes verification.

5. A program shelling method, said method comprising:

the method comprises the steps that a second device obtains a target program and a first shell program, wherein the first shell program is used for determining whether scene information meets a preset condition or not and running the target program when the preset condition is met, and the scene information comprises one or more of system information, time information and version information of the target program;

the second device generates a first program according to the target program and the first shell program, wherein the first program comprises a first program header, the first shell program and the target program, and the first program header comprises an address of the first shell program;

and the second equipment sends the first program to the first equipment.

6. The method of claim 5, wherein the first shell is further configured to determine the preset condition according to the user identifier.

7. The method of claim 5 or 6, wherein the second device sending the first program to the first device comprises:

the second equipment acquires a second shell program, and the second shell program is used for verifying the password and running the first program when the password passes the verification;

the second device generates a second program according to the second shell program and the first program, wherein the second program comprises a second program header, a second shell program and the first program, and the second program header comprises an address of the second shell program;

the second device sends the second program to the first device.

8. A first device, characterized in that the first device comprises: a processor and a memory, the memory for storing a computer program or instructions, the processor for invoking the computer program or instructions stored in the memory to cause the first device to perform the method of any of claims 1-4.

9. A second device, characterized in that the second device comprises: a processor and a memory, the memory for storing a computer program or instructions, the processor for invoking the computer program or instructions stored in the memory to cause the second device to perform the method of any of claims 5-7.

10. A computer-readable storage medium comprising instructions which, when executed on a computer, cause the computer to perform the method of any one of claims 1-7.

Technical Field

The present application relates to the field of computers, and in particular, to a program running method, a program shell adding method, and a device.

Background

Information security is increasingly important in the current era, and in the field of information security, setting the authority of running programs for users is very critical. The conventional technology performs authority control by a system through a Discrete Access Control (DAC). That is, the corresponding relationship between the user identifier and the program with and/or without access authority is preset, and the operation authority of the program is controlled according to the corresponding relationship.

However, in this way, a user has either permission or no permission to access one program, so this way is not suitable for the case where the user has operation permission in some scenes and has no operation permission in other scenes for the same program.

Disclosure of Invention

The embodiment of the application provides a program running method, a program shell adding method and device, which are used for achieving the purpose of having different running authorities for a target program in different scenes.

In a first aspect, an embodiment of the present application provides a program running method, where the method includes the following steps: the method comprises the steps that a first device obtains a request for running a first program triggered by a user, and obtains the first program and scene information according to the request, wherein the first program comprises a first program header, a first shell program and a target program, and the scene information comprises one or more items of system information, time information and version information of the target program. The target program is a program which limits the use authority of the user under certain conditions. The first device obtains an address of the first shell program from the first program header, and runs the first shell program according to the address of the first shell program, wherein the first shell program is used for determining whether the scene information meets a preset condition. And when the scene information meets the preset condition, the first device runs the target program. The first shell program of the first program is used for verifying whether the scene information meets the preset condition, and the first program can be executed after the scene information passes the verification, so that the purpose that the user has different operation permissions on the target program in different scenes is achieved.

Optionally, in order to verify the validity of the user, the method further includes: the first device obtains a verification code input by a user. Correspondingly, the first shell program is configured to determine whether the scene information satisfies a preset condition, and when the preset condition is satisfied, the running the target program includes: the first shell program is used for sending the verification code to a server and receiving a verification result of the server on the verification code; and when the verification result is that the verification is passed and the scene information meets the preset condition, the target program is operated. When the verification result is that the verification is passed, the user is a legal user; if the verification is not passed, the user is an illegal user, and the purpose of verifying the user validity is achieved.

Optionally, the method further includes: the first device obtains a user identification. The first shell program is further configured to determine the preset condition according to the user identifier. The user identifier is used to identify a user, and different users have different user identifiers, that is, different users may have different permissions. The user identifier is, for example, a name, an account number, and the like of the user, and the application is not particularly limited.

Optionally, the obtaining, by the first device, a request for running a first program triggered by a user, where the obtaining, according to the request, the first program includes: the first equipment acquires a request for running a second program triggered by a user, and acquires the second program and a password according to the request, wherein the second program comprises a second program head, a second shell program and the first program; and the first device acquires the address of the second shell program from the second program header, and runs the second shell program according to the address of the second shell program, wherein the second shell program is used for verifying the password and obtaining the first program after the password passes verification. Because the second shell program in the second program is used for verifying the password, and the first program can be run only after the password passes the verification, the purpose of ensuring the safety of the first program can be realized while the purpose of having different running authorities for the target program under different scenes for the user is realized.

In a second aspect, an embodiment of the present application further provides a program shell adding method, where the method includes: the method comprises the steps that a second device obtains a target program and a first shell program, wherein the first shell program is used for determining whether scene information meets a preset condition or not and running the target program when the preset condition is met, and the scene information comprises one or more of system information, time information and version information of the target program; the second device generates a first program according to the target program and the first shell program, wherein the first program comprises a first program header, the first shell program and the target program, and the first program header comprises an address of the first shell program; and the second equipment sends the first program to the first equipment. The process of generating the first program is a process of adding a shell to the first shell program on the target program, after the shell is added, the first program needs to be operated according to the address of the first shell program in the first program header, and after the operation of the first shell program is finished, whether the target program is operated can be determined according to the operation result. If the operation result of the first shell program is that the scene information does not meet the preset condition, the target program is not operated, so that the purpose of setting the authority for the target program is achieved. Since the scene information is variable, it is possible to provide the purpose that the user has different rights to the target program in different scenes.

Optionally, the first shell program is further configured to determine the preset condition according to the user identifier. The user identifier is used to identify a user, and different users have different user identifiers, that is, different users may have different permissions. The user identifier is, for example, a name, an account number, and the like of the user, and the application is not particularly limited.

Optionally, the sending, by the second device, the first program to the first device includes: the second equipment acquires a second shell program, and the second shell program is used for verifying the password and running the first program when the password passes the verification; the second device generates a second program according to the second shell program and the first program, wherein the second program comprises a second program header, a second shell program and the first program, and the second program header comprises an address of the second shell program; the second device sends the second program to the first device. Since the process of generating the second program is the process of adding the second shell program to the first program. When executing the second program, the second program needs to be executed according to the address of the second program, and the first program can be executed only when the password is verified by the second program; if the second shell program fails to verify the password, the first program cannot be executed. In this way, the security of the first program is ensured, and the first program is prevented from being tampered as much as possible.

In a third aspect, an embodiment of the present application further provides a first device, where the first device includes: a processor and a memory, the memory being configured to store a computer program or instructions, and the processor being configured to call the computer program or instructions stored in the memory, so that the first device performs the program execution method of the first aspect.

In a fourth aspect, an embodiment of the present application further provides a second device, where the second device includes: a processor and a memory, the memory for storing a computer program or instructions, the processor for invoking the computer program or instructions stored in the memory to cause the second device to perform the program shell method of the second aspect described above.

In a fifth aspect, an embodiment of the present application further provides a program running system, where the system includes the first device in the third aspect and the second device in the fourth aspect.

In a sixth aspect, an embodiment of the present application further provides a computer-readable storage medium, which is characterized by including instructions, when executed on a computer, for causing the computer to execute the program execution method of the first aspect or the program loading method of the second aspect.

Drawings

Fig. 1 is a block diagram of a system 100 according to an embodiment of the present disclosure;

fig. 2 is a schematic flowchart of a program running method according to an embodiment of the present application;

fig. 3 is another flowchart of a program running method according to an embodiment of the present application;

fig. 4 is a block diagram of a first device 400 according to an embodiment of the present disclosure;

fig. 5 is a block diagram of a second device 500 according to an embodiment of the present disclosure.

Detailed Description

The embodiment of the application provides a program running method, a program shell adding method and a program shell adding device, which are used for achieving the purpose that a user has different running authorities for the same program in different scenes.

For convenience of understanding, an application scenario of the embodiment of the present application is first described.

Referring to fig. 1, a block diagram of a system 100 according to an embodiment of the present disclosure is shown.

In fig. 1, system 100 includes device 101, device 102, and server 103. The device 101 is connected to the device 102, and the server 103 is connected to the device 102.

The device 101 and the device 102 may be, for example, a terminal device, an access device, a forwarding device, a server, and the like, which is not specifically limited in this application.

A terminal device, also called a User Equipment (UE), a Mobile Station (MS), a Mobile Terminal (MT), a terminal, etc., is a device for providing voice and/or data connectivity to a user, or a chip disposed in the device, such as a handheld device, a vehicle-mounted device, etc., which has wireless connectivity permission. Currently, some examples of terminal devices are: a mobile phone (mobile phone), a tablet computer, a notebook computer, a desktop computer, a handheld computer, a Mobile Internet Device (MID), a wearable device, a Virtual Reality (VR) device, an Augmented Reality (AR) device, a wireless terminal in industrial control (industrial control), a wireless terminal in self driving (self driving), a wireless terminal in remote surgery (remote medical supply), a wireless terminal in smart grid (smart grid), a wireless terminal in transportation safety (transportation safety), a wireless terminal in smart city (smart city), a wireless terminal in smart home (smart home), and the like.

The access device may be, for example, a gateway or the like.

The forwarding device may be, for example, a router, a switch, etc.

Referring to fig. 2, the figure is a schematic flowchart of a program running method provided in an embodiment of the present application.

In fig. 2, a program running method provided in the embodiment of the present application includes the following steps:

s101: the second device acquires the target program and the first shell program.

In the embodiment of the present application, the second device may be, for example, the device 101 in the embodiment shown in fig. 1.

In the embodiment of the application, the target program is a program which limits the use authority of a user under certain conditions. The first shell program is used for determining whether the scene information meets a preset condition or not and running the target program when the preset condition is met.

In the embodiment of the application, the scene information is used for judging whether the user has the authority to trigger the running of the target program. The scenario information includes one or more items of system information, time information, version information of the target program, and the like. The system information may be information related to a system on which the first device operates, such as a system version number, a CPU load rate, a memory occupancy rate, and the like. The first device is, for example, device 102 in the embodiment shown in fig. 1. The time information is, for example, a time when the user triggers a request to execute the first program, or a time when the first device transmits scene information to the server, and the like, hereinafter. The version information of the target program includes, for example, a version number, developer information, and the like.

In the embodiment of the application, if the scene information meets the preset condition, the user is allowed to trigger the running of the target program; and if the scene information does not meet the preset condition, indicating that the user does not have the authority to trigger the running of the target program.

For example, the scenario information includes a CPU load rate, and if the CPU load rate is less than or equal to a threshold (for example, 80%), the user may be allowed to trigger the running of the target program in this scenario; conversely, if the CPU load rate is greater than the threshold, the user is not allowed to trigger the running target program in this scenario.

For another example, the context information includes a time when the user triggers the request to run the first program, and then the user may have permission to run the target program when triggering the request within a preset time period (e.g., 9:00am-6:00pm), and may not have permission to run when triggering other time periods.

For another example, the context information includes a version number of the target program, if the version number of the target program is a preset version, the user has a right to run the target program, and if the version number is not the preset version, the user has no right to run the target program.

Optionally, the first shell program is further configured to determine the preset condition according to a User Identifier (UID), where the User Identifier is used to identify a User, and different users have different User identifiers, that is, different users may have different rights. The user identifier is, for example, a name, an account number, and the like of the user, and the application is not particularly limited.

For example, when the scene information triggers a request for the user to run a first program, the first program includes the target program S. The preset time period corresponding to the user A is 9:00am-6:00pm, and the preset time period corresponding to the user B is 8:00pm-8:00 am. That is, the user A is allowed to trigger the running of the target program S in the time period of 9:00am-6:00pm, and the user B is allowed to trigger the running of the target program S in the time period of 8:00pm-8:00 am.

S102: the second device generates a first program from the target program and the first shell program.

The first program comprises a first program header, a first shell program and a target program, wherein the first program header comprises the address of the first shell program. In this embodiment of the present application, the process of generating the first program is a process of adding a shell to the first shell program on the target program, after the shell is added, the first program needs to be executed according to an address of the first shell program in the first program header, and after the first shell program is executed, it may be determined whether to execute the target program according to an execution result. If the operation result of the first shell program is that the scene information does not meet the preset condition, the target program is not operated, so that the purpose of setting the authority for the target program is achieved. Since the scene information is variable, it is possible to provide the purpose that the user has different rights to the target program in different scenes.

S103: the second device sends the first program to the first device.

S104: the first equipment acquires a request for running a first program triggered by a user, and acquires the first program and scene information according to the request.

S105: the first device acquires the address of the first shell program from the first program header of the first program, and runs the first shell program according to the address of the first shell program.

According to the above description, the first shell program is used to determine whether the scene information satisfies the preset condition, and the step of determining whether the scene information satisfies the preset condition is executed when the first shell program is run. Optionally, the first shell program may be further configured to determine the preset condition according to the user identifier. Accordingly, the first device may further obtain the user identifier according to the request for running the first program triggered by the user, and execute the step of determining the preset condition according to the user identifier when running the first shell program.

S106: and when the scene information meets the preset condition, the first device runs the target program.

Optionally, in order to verify the validity of the user, in this embodiment of the application, the first shell program is further configured to send a verification code to a server (e.g., the server 103 shown in fig. 1), receive a verification result of the verification code by the server, and run the target program when the verification result is that the verification passes and the scene information satisfies the preset condition. Accordingly, the first device needs to acquire the verification code input by the user. In practical application, a user can know the verification code in various ways, for example, the server sends the verification code to the terminal device of the user in advance through mails, short messages, social software and the like. The validation code may be dynamically changing over time, valid for a period of time, beyond which the server validation is invalid. In the embodiment of the application, if the verification code passes the verification, the user is a legal user; if the verification is not passed, the user is judged to be an illegal user. Optionally, the execution flow of the first shell program may be: and firstly, acquiring a verification result of the verification code, and judging whether the scene information meets a preset condition if the verification result is passed.

According to the method and the device for verifying the scene information, the first program is obtained by adding the shell to the target program, the first shell program of the first program is used for verifying whether the scene information meets the preset condition, and the first program can be executed after the scene information passes the verification, so that the purpose that a user has different operation permissions on the target program in different scenes is achieved.

Referring to fig. 3, it is another flowchart of a program running method provided in an embodiment of the present application.

In fig. 3, a program running method provided in the embodiment of the present application includes the following steps:

s201: the second device obtains a target program and a second shell program.

In the embodiment of the present application, the second device may be, for example, the device 101 in the embodiment shown in fig. 1.

In the embodiment of the application, the second shell program is used for verifying the password and running the first program when the password passes the verification. For the description of the first procedure, please refer to the above, and the description thereof is omitted.

In the examples of the present application. The second shell is a decryption algorithm, which may be an asymmetric encryption algorithm, such as RSA (Rivest-Shamir-Adleman), Elliptic Curve Cryptography (ECC), or a symmetric encryption algorithm.

If the asymmetric encryption algorithm is used, the second device may encrypt the first program with the public key and the second shell program may decrypt the encrypted first program according to the private key to obtain the first program.

S202: the second device generates a second program from the second shell program and the first program.

In an embodiment of the present application, the second program includes a second program header, a second shell program, and the first program, and the second program header includes an address of the second shell program.

In the embodiment of the present application, the process of generating the second program is a process of adding the second shell program to the first program. When executing the second program, the second program needs to be executed according to the address of the second program, and the first program can be executed only when the password is verified by the second program; if the second shell program fails to verify the password, the first program cannot be executed. In this way, the security of the first program is ensured, and the first program is prevented from being tampered as much as possible.

S203: the second device sends the second program to the first device.

In the embodiment of the present application, the first device is, for example, the device 102 in the embodiment shown in fig. 1.

S204: the first equipment acquires a request for running the second program triggered by a user, and acquires the second program and the password according to the request.

In the embodiment of the present application, the password may be input by the user or may be pre-stored.

S205: and the first device acquires the address of the second shell program from the second program header and operates the second shell program according to the address of the second shell program.

As mentioned above, the process of running the second shell program is a process of verifying the password, and the first device may continue to run the first program after the verification is passed.

S206: and when the password verification result of the second shell program is passed, the first device acquires the address of the first shell program from the first program header of the first shell program, and operates the first shell program according to the address of the first shell program, wherein the first shell program is used for determining whether the scene information meets the preset condition.

S207: and when the scene information meets the preset condition, the first device runs the target program.

In the embodiment of the present application, the contents of S206 and S207 are the same as those of S105 and S106 described above, so please refer to the above, and the details are not repeated here.

According to the method and the device for processing the first program, the first program is added with the shell to obtain the second program, the second shell program in the second program is used for verifying the password, the first program can be operated after the password passes the verification, and therefore the purpose of guaranteeing the safety of the first program is achieved while the purpose that a user has different operation permissions on the target program in different scenes is achieved.

In addition, referring to fig. 4, an embodiment of the present application further provides a first device 400, where the first device 400 includes: memory 401, processor 402, and communication interface 403. Wherein the content of the first and second substances,

the memory 401, processor 402 and communication interface 403 are interconnected by a bus 404; the bus 404 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 4, but this does not indicate only one bus or one type of bus.

In a specific embodiment, the processor 401 is configured to obtain a request for running a first program triggered by a user, and obtain the first program and scenario information according to the request, where the first program includes a first program header, a first shell program, and a target program, and the scenario information includes one or more of system information, time information, and version information of the target program; acquiring an address of the first shell program from the first program header, and operating the first shell program according to the address of the first shell program, wherein the first shell program is used for determining whether the scene information meets a preset condition; and when the scene information meets the preset condition, the first device runs the target program. For a detailed processing procedure of the processor 401, please refer to the detailed description of S104-S106 in the embodiment shown in fig. 2 or S204-S207 in the embodiment shown in fig. 3, which is not described herein again.

Communication interface 403 is used to receive data from a first program. For a specific process, please refer to the detailed description of the embodiment shown in fig. 2 or fig. 3, which is not repeated herein.

In addition, referring to fig. 5, an embodiment of the present application further provides a second apparatus 500, where the second apparatus 500 includes: memory 501, processor 502, and communication interface 503. Wherein the content of the first and second substances,

the memory 501, the processor 502, and the communication interface 503 are connected to each other by a bus 504; the bus 504 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 5, but this is not intended to represent only one bus or type of bus.

In a specific embodiment, the processor 501 is configured to obtain a request for running a first program triggered by a user, and obtain the first program and scenario information according to the request, where the first program includes a first program header, a first shell program, and a target program, and the scenario information includes one or more of system information, time information, and version information of the target program; acquiring an address of the first shell program from the first program header, and operating the first shell program according to the address of the first shell program, wherein the first shell program is used for determining whether the scene information meets a preset condition; and when the scene information meets the preset condition, the first device runs the target program. For a detailed processing procedure of the processor 501, please refer to the detailed descriptions of S101 to S103 in the embodiment shown in fig. 2 or S201 to S203 in the embodiment shown in fig. 3, which are not described herein again.

The communication interface 503 is used to transmit the first program. For a specific process, please refer to the detailed description of the embodiment shown in fig. 2 or fig. 3, which is not repeated herein.

The memory 401 and the memory 501 may be a random-access memory (RAM), a flash memory (flash), a read-only memory (ROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), a register (register), a hard disk, a removable hard disk, a CD-ROM, or any other form of storage medium known to those skilled in the art.

The processor 402 and the processor 502 may be, for example, a Central Processing Unit (CPU), a general purpose processor, a Digital Signal Processor (DSP), an application-specific integrated circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. A processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, a DSP and a microprocessor, or the like.

The communication interface 403 and the communication interface 503 may be interface cards, for example, and may be ethernet (ethernet) interfaces or Asynchronous Transfer Mode (ATM) interfaces.

The embodiment of the present application further provides a program running system, which includes the first device 400 in the embodiment shown in fig. 4 and the second device 500 in the embodiment shown in fig. 5.

An embodiment of the present application further provides a computer-readable storage medium, which includes instructions, when executed on a computer, for causing the computer to perform the program execution method executed by the first device 400 or the program loading method executed by the second device 500.

The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.

In the present application, "at least one item(s)" means one or more, "a plurality" means two or more. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple. In the present application "A and/or B" is considered to comprise A alone, B alone, and A + B.

It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.

In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one type of logical module division, and other division manners may be available in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.

The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be obtained according to actual needs to achieve the purpose of the solution of the present embodiment.

In addition, each module unit in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a hardware form, and can also be realized in a software module unit form.

The integrated unit, if implemented as a software module unit and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.

Those skilled in the art will recognize that, in one or more of the examples described above, the functions described in this invention may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.

The above-described embodiments are intended to explain the objects, aspects and advantages of the present invention in further detail, and it should be understood that the above-described embodiments are merely exemplary embodiments of the present invention.

The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

14页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:验证驻留在远程计算设备上的软件

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类