Disclosure of Invention
An object of embodiments of the present invention is to provide an account information processing method, an account information processing apparatus, a computer readable medium, and an electronic device, which overcome the above problems at least to some extent.
Additional features and advantages of the invention will be set forth in the detailed description which follows, or may be learned by practice of the invention.
According to a first aspect of the embodiments of the present invention, there is provided an account information processing method, including:
acquiring authentication information of a login user, and authenticating the login user through the authentication information;
if the authentication is passed, acquiring first account information opened by the login user;
opening a target account for the login user through identity information in the first account information to determine second account information corresponding to the target account;
and sending the second account information to the login user so that the login user can use the target account.
In an exemplary embodiment of the present invention, the opening a target account for the login user through identity information in the first account information to determine second account information corresponding to the target account includes:
authenticating the identity of the login user based on the first account information;
and if the identity authentication of the login user passes, opening the target account through the identity information in the first account information to obtain the second account information.
In an exemplary embodiment of the present invention, the authenticating the login user based on the first account information includes:
acquiring a certificate image uploaded by the login user;
and comparing the certificate image with a target certificate contained in the first account information, and if the certificate image is matched with the target certificate, determining that the identity authentication of the login user is passed.
In an exemplary embodiment of the present invention, after acquiring the certificate image uploaded by the login user, the method further includes:
collecting a head image of the login user;
and comparing the head image with the certificate image, and if the head image is matched with the certificate image, determining that the identity authentication of the login user is passed.
In an exemplary embodiment of the invention, the method further comprises:
and comparing the head image with a preset image characteristic, and if the head image is matched with the preset image characteristic, determining that the identity authentication of the login user is passed.
In an exemplary embodiment of the present invention, the acquiring information of the first account opened by the login user includes:
and acquiring first account information bound with the authentication information.
In an exemplary embodiment of the present invention, the first account corresponding to the first account information and the target account are of different account types.
According to a second aspect of the embodiments of the present invention, there is provided an account information processing apparatus, which may include an authentication module, an information acquisition module, an account opening module, and an information sending module, wherein:
the authentication module is used for acquiring authentication information of a login user and authenticating the login user through the authentication information;
the information acquisition module is used for acquiring the first account information opened by the login user if the authentication is passed;
the account opening module is used for opening a target account for the login user through the identity information in the first account information so as to determine second account information corresponding to the target account;
and the information sending module is used for sending the second account information to the login user so that the login user can use the target account.
In an exemplary embodiment, the account provisioning module may include an authentication unit and an account acquisition unit, wherein:
the identity authentication unit is used for authenticating the identity of the login user based on the first account information;
and the account acquisition unit is used for opening the target account through the identity information in the first account information to acquire the second account information if the identity verification of the login user passes.
In an exemplary embodiment, the identity verification unit may include an image acquisition unit and an image comparison unit, wherein:
the certificate acquisition unit is used for acquiring a certificate image uploaded by the login user;
and the certificate comparison unit is used for comparing the certificate image with the target certificate contained in the first account information, and if the certificate image is matched with the target certificate, the identity verification of the login user is determined to be passed.
In an exemplary embodiment, the apparatus may further include a head image acquisition unit and an image matching unit, wherein:
the head image acquisition unit is used for acquiring a head image of the login user;
and the image matching unit is used for comparing the head image with the certificate image, and if the head image is matched with the certificate image, the identity authentication of the login user is determined to be passed.
In an exemplary embodiment, the apparatus further includes a feature matching unit, configured to compare the head image with a preset image feature, and if the head image matches the preset image feature, determine that the identity of the login user is verified.
In an exemplary embodiment, the information obtaining module may be specifically configured to obtain the first account information bound to the authentication information.
In an exemplary embodiment, the first account corresponding to the first account information and the target account are of different account types.
According to a third aspect of embodiments of the present invention, there is provided a computer-readable medium on which a computer program is stored, the program, when executed by a processor, implementing the account information processing method according to the first aspect of the embodiments described above.
According to a fourth aspect of embodiments of the present invention, there is provided an electronic apparatus, including: one or more processors; a storage device, configured to store one or more programs, which when executed by the one or more processors, cause the one or more processors to implement the account information processing method according to the first aspect of the foregoing embodiments.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
in the technical solutions provided by some embodiments of the present invention, on one hand, the target account is opened through the first account information that the user has opened, so that the time for handling the target account under the subscriber line can be saved, the user operation is more convenient, and the user experience can be improved; and, time cost can be reduced, thereby improving account opening efficiency. On the other hand, the second account information for the target account is determined by using the information of the first account, so that the utilization rate of the account information can be improved. On the other hand, the cost of opening the account by the user can be reduced, and further, the diversification of the account information is favorably improved; meanwhile, the online trading volume is favorably improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known methods, devices, implementations or operations have not been shown or described in detail to avoid obscuring aspects of the invention.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
First, a system architecture for implementing an account information processing method is provided in an exemplary embodiment of the present disclosure. Referring to fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send request instructions or the like. The terminal devices 101, 102, 103 may have various communication client applications installed thereon, such as a shopping application, a web browser application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for shopping-like websites browsed by users using the terminal devices 101, 102, 103. The backend management server may analyze and perform other processing on the received data such as the product information query request, and feed back a processing result (for example, target push information, product information — just an example) to the terminal device.
Note that, the account information processing method provided in the embodiment of the present disclosure is generally executed by the server 105, and accordingly, the account information processing apparatus is generally provided in the terminal device 101.
Based on the system architecture, the exemplary embodiment of the present disclosure provides an account information processing method. As shown in fig. 2, the account information processing method may include the steps of:
s210, acquiring authentication information of a login user, and authenticating the login user through the authentication information;
s220, if the authentication is passed, acquiring first account information opened by the login user;
s230, opening a target account for the login user through identity information in the first account information to determine second account information corresponding to the target account;
s240, the second account information is sent to the login user so that the login user can use the target account.
According to the account information processing method of the exemplary embodiment, on one hand, the target account is opened through the first account information opened by the user, so that the time for offline handling of the user can be saved, the operation of the user is more convenient, and the user experience can be improved; and, time cost can be reduced, thereby improving account opening efficiency. On the other hand, the second account information for the target account is determined by using the information of the first account, so that the utilization rate of the account information can be improved. On the other hand, the cost of opening the account by the user can be reduced, and further, the diversification of the account information is favorably improved; meanwhile, the online trading volume is favorably improved.
Hereinafter, each step of the present exemplary embodiment is explained in detail.
Referring to fig. 2, in step S210, authentication information of a login user is obtained, and the login user is authenticated through the authentication information.
In the present exemplary embodiment, the authentication information is information for verifying the identity of the login user; identification information, such as an identification number, a mobile phone number and the like, when a user logs in the system can be included; the system may also include account information used by the login user to log in the system, such as a user name and a password, which is not particularly limited in this embodiment. If the login user logs in for the first time, a form can be displayed for the login user to fill in authentication information, so that the authentication information is obtained and the login user is registered by using the authentication information; if the login user is a registered user, the identification information of the login user can be acquired as the authentication information, or the authentication information corresponding to the identification information is acquired from the system database according to the identification information of the login user.
After the authentication information of the login user is acquired, the authentication information can be used for authenticating the login user, so that whether the authentication information is real and effective is verified. If the authentication is passed, the login user has the authority to access the system, and if the authentication is not passed, the login user does not have the authority to access the system. For example, it can be verified whether the identity card number and name in the authentication information are real; or, sending a short message verification code to the mobile phone number contained in the authentication information to verify whether the mobile phone number is held by the login user; and whether the authentication information is true or valid can be verified through the digital signature corresponding to the authentication information. In other embodiments of the present disclosure, the login user may be authenticated by other verification methods, for example, whether the password in the authentication information is consistent with the password stored in the database is verified, which all fall within the protection scope of the present disclosure.
In step S220, if the authentication is passed, the first account information opened by the login user is obtained.
If the authentication of the login user passes, the login user has the access right, and the system can be accessed to obtain the target account. The first account information opened by the login user can be acquired according to the authentication information of the login user. The first account information may include all data related to the first account, such as a bank card number, a cardholder name, a cardholder identification number, a cardholder photograph, etc.; the first account may refer to an account bound with the authentication information, through which a user may conduct transactions, such as deposits, investments, and the like. For example, the first account information of the login user may be a bank savings account, so that the user may deposit money through the account, and after the authentication of the login user is passed, a target account may be determined for the login user by using the first account information, so that the login user may use the target account for consumption.
In step S230, a target account is opened for the login user through the identity information in the first account information, so as to determine second account information corresponding to the target account.
In this example embodiment, the identity information used when the login user applies for the account may be extracted from the first account information. Generally, when a login user applies for first account information, the login user needs to fill in detailed and complete identity information so as to facilitate a bank to establish a customer profile and perform personal credit investigation. Therefore, the first account information may include an identification number, a mobile phone number, a name, and the like, and may also include a job, an industry type, a residential address, and the like of the login user; of course, the first account information further includes other information, such as emergency contact information, and the like, which is not particularly limited in this embodiment. According to the identity information of the login user, a target account can be opened for the login user, and the first account corresponding to the target account and the first account can be accounts of different account types. The accounts can be classified according to their functions, purposes, etc., and multiple account types are determined, for example, the first account may be a bank-class account, the target account may be a bank-class account, and multiple target accounts may be opened.
In an exemplary embodiment, the method may include step S301 and step S302, as shown in fig. 3, wherein:
in step S301, the login user is authenticated based on the first account information. For example, the first account information may include identity information of a login user, the identity information, such as an identity card number, a name, and the like, may be queried from the first account information stored in the database, and the login user may be authenticated using the identity information, for example, an input interface is provided to obtain an identity account number, a name, and the like input by the user, and whether the authentication matches the identity information is obtained; or acquiring the transaction detail information corresponding to the first account information, and determining whether the transaction detail information is abnormal or not. There are various methods for authenticating the login user, and optionally, the method may include step S401 and step S402, as shown in fig. 4, where:
in step S401, a certificate image uploaded by the login user is acquired. In this embodiment, a user operation interface may be provided, an upload interface is provided in the user operation interface, and a certificate image uploaded by a login user is received through the upload interface; or, the camera can be called through the uploading interface to take pictures of the certificate which needs to be uploaded by the user, and the certificate image is obtained. The certificate image may include a certificate identification code, and may also include a personal photo of a login user, and basic personal identification information, for example, the certificate image may be an identification card image, which may include a photo, a name, an address, an identification card number, and the like.
In step S402, the certificate image is compared with a target certificate included in the first account information, and if the certificate image matches the target certificate, it is determined that the identity authentication of the login user passes. Specifically, the first account information may include a target certificate, where the target certificate is an image of a certificate used when the user applies for opening the first account, and after the first account is opened, the image of the certificate may be stored in the database. Further, comparing the certificate image uploaded by the login user with the target certificate stored in the database, wherein the comparison between the certificate image and the target certificate can be performed through an image processing technology, for example, extracting the image characteristics of the two images through a convolutional neural network, and comparing the image characteristics; or, the characters in the certificate image and the target certificate can be extracted by using an OCR technology to obtain various information such as the certificate number, the certificate validity period, the name and the like, so that the extracted information is compared and the like. If the certificate image and the information in the target certificate can be matched with each other, the login user and the user opening the first account are proved to be the same person, and therefore the identity authentication of the login user can be confirmed to be passed.
In addition, in this embodiment, the method may further include step S501 and step S502, as shown in fig. 5, where:
in step S501, a head image of the login user is acquired. The terminal equipment can comprise a camera, and after the login user uploads the certificate image, the camera can be triggered to start to collect the head image of the login user. The head image may include images of various orientations of the head of the logged-in user, and may also include images of different facial expressions; in addition, other images, for example, a head outline feature image, etc., may be included, and this embodiment is not particularly limited thereto.
In step S502, the header image is compared with the certificate image, and if the header image matches the certificate image, it is determined that the authentication of the login user is passed. And comparing the acquired head image with the certificate image, and if the certificate image contains image characteristics matched with the head image, determining that the identity authentication of the login user is passed. For example, if the head image matches a photograph in the identification card image, the identity of the user may be verified as being identical to the identity of the user.
In addition, in this embodiment, whether the authentication passes or not may be determined by comparing the collected head image with the preset image feature, and if the collected head image is matched with the preset image feature, the authentication of the login user passes. The head image may include a plurality of frames of images, and the preset image feature may include a change feature of a facial expression, for example, the preset image feature may be a smile, a blink, or the like. For example, when a head image of a logged-in user is collected, an instruction may be sent to enable the user to perform a corresponding action according to the instruction, so as to collect a dynamically changing multi-frame image, analyze whether a feature of the change of the multi-frame image matches a preset image feature corresponding to the instruction, and if the feature of the change of the multi-frame image matches the preset image feature corresponding to the instruction, it may be stated that the logged-in user operates by himself. In addition, the collected dynamic image of the login user can be stored, so that the identity of the login user can be identified in the process of using the target account by the login user.
In addition, in other embodiments of the present disclosure, the identity of the login user may also be verified in other manners, for example, an input port obtains a certificate number input by the user, compares whether the certificate number is consistent with certificate information included in the first account information, and if so, may determine that the identity of the login user passes the authentication, and the like, which all belong to the protection scope of the present disclosure.
Next, in step S302, if the identity authentication of the login user passes, the target account is opened through the identity information in the first account information to obtain the second account information. The login user can open the first account through the identity information, and can also open the target account through the identity information, so that second account information corresponding to the target account is obtained. In the embodiment, the target account is opened without going to a bank business point for system operation, and the target account can be opened for the user application at any time and any place in the time required by the user, so that the method is greatly convenient for the user, the labor cost can be reduced, and the efficiency of opening the account can be improved.
With continued reference to fig. 2, in step S240, the second account information is sent to the login user for the login user to use the target account.
In this embodiment, if the target account is opened for the login user, the generated second account information may be sent to the client corresponding to the login user, the second account information is displayed on the client for the login user to check the information, and the login user may use the target account in various online trading platforms to purchase goods or financial products through the target account, for example, invest through the target account to purchase stocks, funds, and the like. For different banks or different types of accounts, different authentication processes and user identity verification processes can be provided for different banks and different types of accounts on the basis of a common standardized account opening process so as to meet the common requirements of users and banks.
In an exemplary embodiment, the account information processing method may be as shown in fig. 6, and specifically may include the following steps:
in step S601, whether the login account is authenticated by a real name is determined; if the login account is real-name authentication, executing step S602, and if not, executing step S603; in step S602, a bank card bound to a login account is acquired; in step S603, real name authentication is performed; in step S604, the account information corresponding to the bank card is queried through the data interface; in step S605, checking the basic information in the account information; for example, it may be checked whether the bank card number, the identification card number, the mobile phone number, the name in the account information are consistent with those input by the user; if the verification is passed, executing step S606; in step S606, the transaction data in the account information is verified; for example, anti-money laundering checks, whether the user's transaction data is normal through the user's professional transactions, etc.; if the check is passed, performing step S607; in step S607, a certificate image of the user is collected for authentication; for example, the validity period of the certificate can be identified through OCR, the validity period of the certificate is verified, or a user photo in the certificate is verified, and the like; if the verification is passed, executing step S608; in step S608, a user head portrait and facial features are collected, and living body verification is performed; if the verification is passed, step S609 is performed; in step S609, opening a target account through the account information; in step S610, account information corresponding to the target account is displayed. It should be noted that, each step in the present embodiment is described in the foregoing embodiment, and therefore, the description is omitted here.
Further, the present exemplary embodiment also provides an account information processing apparatus, which can be used to execute the account information processing method of the present invention.
As shown in fig. 7, the account information processing apparatus 700 may include an authentication module 710, an information obtaining module 720, an account opening module 730, and an information sending module 740, wherein:
the authentication module 710 is configured to obtain authentication information of a login user, and authenticate the login user through the authentication information;
an information obtaining module 720, configured to obtain information of a first account opened by the login user if the authentication passes;
the account opening module 730 is configured to open a target account for the login user through the identity information in the first account information, so as to determine second account information corresponding to the target account;
the information sending module 740 is configured to send the second account information to the login user, so that the login user uses the target account.
In an exemplary embodiment, the account provisioning module 730 may include an authentication unit and an account acquisition unit, wherein:
the identity authentication unit is used for authenticating the identity of the login user based on the first account information;
and the account acquisition unit is used for opening the target account through the identity information in the first account information to acquire the second account information if the identity verification of the login user passes.
In an exemplary embodiment, the identity verification unit may include an image acquisition unit and an image comparison unit, wherein:
the certificate acquisition unit is used for acquiring a certificate image uploaded by the login user;
and the certificate comparison unit is used for comparing the certificate image with the target certificate contained in the first account information, and if the certificate image is matched with the target certificate, the identity verification of the login user is determined to be passed.
In an exemplary embodiment, the apparatus may further include a head image acquisition unit and an image matching unit, wherein:
the head image acquisition unit is used for acquiring a head image of the login user;
and the image matching unit is used for comparing the head image with the certificate image, and if the head image is matched with the certificate image, the identity authentication of the login user is determined to be passed.
In an exemplary embodiment, the apparatus further includes a feature matching unit, configured to compare the head image with a preset image feature, and if the head image matches the preset image feature, determine that the identity of the login user is verified.
In an exemplary embodiment, the information obtaining module may be specifically configured to obtain the first account information bound to the authentication information.
In an exemplary embodiment, the first account corresponding to the first account information and the target account are of different account types.
For details that are not disclosed in the embodiments of the apparatus of the present invention, reference is made to the above-described embodiments of the account information processing method of the present invention for the reason that each functional module of the account information processing apparatus of the exemplary embodiment of the present invention corresponds to the steps of the above-described exemplary embodiment of the account information processing method.
Referring now to FIG. 8, shown is a block diagram of a computer system 800 suitable for use in implementing an electronic device of an embodiment of the present invention. The computer system 800 of the electronic device shown in fig. 8 is only an example, and should not bring any limitation to the function and the scope of use of the embodiments of the present invention.
As shown in fig. 8, the computer system 800 includes a Central Processing Unit (CPU)801 that can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)802 or a program loaded from a storage section 808 into a Random Access Memory (RAM) 803. In the RAM 803, various programs and data necessary for system operation are also stored. The CPU801, ROM 802, and RAM 803 are connected to each other via a bus 804. An input/output (I/O) interface 805 is also connected to bus 804.
The following components are connected to the I/O interface 805: an input portion 806 including a keyboard, a mouse, and the like; an output section 807 including a signal such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 808 including a hard disk and the like; and a communication section 809 including a network interface card such as a LAN card, a modem, or the like. The communication section 809 performs communication processing via a network such as the internet. A drive 810 is also connected to the I/O interface 805 as necessary. A removable medium 811 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 810 as necessary, so that a computer program read out therefrom is mounted on the storage section 808 as necessary.
In particular, according to an embodiment of the present invention, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the invention include a computer program product comprising a computer program embodied on a computer-readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 809 and/or installed from the removable medium 811. The computer program executes the above-described functions defined in the system of the present application when executed by the Central Processing Unit (CPU) 801.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present invention may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the electronic device described in the above embodiments; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs, which when executed by the electronic device, cause the electronic device to implement the account information processing method as described in the above embodiments.
For example, the electronic device may implement the following as shown in fig. 2: step S210, obtaining the authentication information of the login user, and authenticating the login user through the authentication information; step S220, if the authentication is passed, acquiring the first account information opened by the login user; step S230, opening a target account for the login user through the identity information in the first account information to determine second account information corresponding to the target account; step S240, sending the second account information to the login user, so that the login user can use the target account.
As another example, the electronic device may implement the steps shown in fig. 3.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the invention. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiment of the present invention can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which can be a personal computer, a server, a touch terminal, or a network device, etc.) to execute the method according to the embodiment of the present invention.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.