Disclosure of Invention
The embodiment of the invention provides a flow processing method, a device, equipment and a medium applied to EC (embedded control) and can realize marginalization of a charging function.
According to an aspect of an embodiment of the present invention, there is provided a traffic processing method applied to an EC, including:
counting the total data traffic flow of the target object in the current time period;
judging whether the total flow of the data services exceeds a preset total flow threshold of the data services;
if the total flow of the data service exceeds a preset total flow threshold of the data service, reporting flow excess information to a BOSS system of a service operation support system;
the total flow of data traffic for the target object includes: the total traffic of the directed traffic used by the directed users, the total traffic of the data traffic generated between the local area network users and other local area network users, and the total traffic of the data traffic generated in the local area network.
In an optional embodiment, the method further comprises:
receiving feedback information sent by a BOSS system;
and responding to the feedback information, and executing the flow control strategy aiming at the data service of the target object.
In an optional implementation manner, the counting data service traffic of the target object in the current time period specifically includes:
receiving data service flow which is calculated by an external charging module and corresponds to a target object in a sub-time period of a current time period;
and updating the total data service flow of the target object in the current time period by using the received data service flow.
In an alternative embodiment, the traffic excess information is verified by the serving data network gateway PGW.
In an alternative embodiment, the PGW is configured to verify whether a format of the traffic excess information conforms to a GTP protocol format, where the traffic excess information in the GTP protocol format includes identification information of the traffic excess information.
In an optional implementation manner, the feedback information includes identification information of a flow control policy, and in response to the feedback information, the performing, for the data service of the target object, the flow control policy specifically includes:
analyzing the identification information of the flow control strategy in the feedback information;
and executing the flow control strategy aiming at the data service of the target object based on the identification information of the flow control strategy.
According to an aspect of an embodiment of the present invention, there is provided a traffic processing apparatus applied to an EC, including:
the statistical processing unit is used for counting the total data service flow of the target object in the current time period;
the judging and processing unit is used for judging whether the total flow of the data services exceeds a preset total flow threshold of the data services;
the reporting processing unit is used for reporting the traffic excess information to the BOSS system if the total traffic of the data services exceeds a preset total traffic threshold of the data services;
the total flow of data traffic for the target object includes: the total traffic of the directed traffic used by the directed users, the total traffic of the data traffic generated between the local area network users and other local area network users, and the total traffic of the data traffic generated in the local area network.
In an alternative embodiment, the apparatus further comprises:
the receiving processing unit is used for receiving the feedback information sent by the BOSS system;
and the execution processing unit is used for responding to the feedback information and executing the flow control strategy aiming at the data service of the target object.
In an optional implementation manner, the statistical processing unit is specifically configured to:
receiving data service flow which is calculated by an external charging module and corresponds to a target object in a sub-time period of a current time period;
and updating the total data service flow of the target object in the current time period by using the received data service flow.
In an alternative embodiment, the traffic excess information is PGW verified information.
In an alternative embodiment, the PGW is configured to verify whether a format of the traffic excess information conforms to a GTP protocol format, where the traffic excess information in the GTP protocol format includes identification information of the traffic excess information.
According to another aspect of the embodiments of the present invention, there is provided a traffic processing apparatus applied to an EC, including:
a memory for storing a program;
and the processor is used for operating the program stored in the memory so as to execute the flow processing method applied to the EC provided by the embodiment of the invention.
According to a further aspect of the embodiments of the present invention, there is provided a computer storage medium having computer program instructions stored thereon, where the computer program instructions, when executed by a processor, implement the traffic processing method applied to the EC provided by the embodiments of the present invention.
According to still another aspect of embodiments of the present invention, there is provided a system including: a memory, a processor, a communication interface, and a bus; the memory, the processor and the communication interface are connected through a bus and complete mutual communication; the memory is used for storing program codes; the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory, so as to execute a method for estimating the state of charge of the battery pack, wherein the method for estimating the state of charge of the battery pack comprises the following steps: .
According to the traffic processing method, device, equipment and medium applied to the EC in the embodiments of the present invention, the total traffic of the data service in the current time period may be counted in the module having the EC function, and when the total traffic of the data service exceeds the preset total traffic threshold of the data service, the traffic excess information is reported to the BOSS system. The statistics of the total amount of the data service can be realized at the network edge without a BOSS system, and the marginalization of the charging function is realized.
Detailed Description
Features and exemplary embodiments of various aspects of the present invention will be described in detail below, and in order to make objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not to be construed as limiting the invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present invention by illustrating examples of the present invention.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
With the development of mobile internet services, service requirements are increasingly diversified, a network needs to have more intelligent service support capability, and an Edge Computing (EC) technology is to further sink content and services to the Edge of the network to provide an IT service environment and cloud Computing capability for users, so as to further reduce delay and time delay, improve network operation efficiency, improve service distribution and transmission capability, and optimize and improve terminal user experience; meanwhile, the local forwarding capability is provided, the local service can be shunted as an anchor point, and the local content does not need to be returned after passing through a core network (in the traditional network without an EC, any service needs to pass through the core network, even though the local service still needs to be routed back through the core network, and transmission is wasted); the EC deployed at the edge of the wireless access network opens real-time wireless and network information to various upper-layer applications and services so as to provide various services related to the situation, thereby enabling telecom operators to fully utilize the characteristic of strong service bearing capacity of the LTE network, realizing deep fusion of the mobile communication network and the mobile Internet service and improving the value-added value of the network.
For EC technology, the LTE/4G standard does not support EC edge computing architecture today because EC functionality and industry are under development, resulting in LTE standards making without considering the prospects and needs of EC. In addition, currently, in the local forwarding function of the EC, the corresponding standardized architecture design and the corresponding service charging scheme are not supported.
Based on the current LTE/4G Network architecture, there are two implementation manners for EC, and fig. 2 shows a Network architecture based on an EC module in the embodiment of the present invention, and as shown in fig. 2, EC is connected in series between an Evolved Node B (eNB) and a Packet Data Network Gate Way (PGW).
Fig. 3 shows another network architecture based on RGW modules with EC functionality in an embodiment of the present invention. As shown in fig. 3, the EC-based network architecture in fig. 3 is separated from the core network control plane and the user plane to achieve a service gateway sink (RGW). Wherein, one side of the RGW is connected with the eNB, and the other side is respectively connected with a Control module (Control) and a PGW. Wherein the Control module (Control) has a distribution and Control function.
However, in both the architecture of fig. 2 and the architecture of fig. 3, the modules with EC function are connected in series in the network, and all the traffic needs to pass through the EC.
For a better understanding of the present invention, a traffic processing method, an apparatus, a device and a medium applied to an EC according to embodiments of the present invention will be described in detail below with reference to the accompanying drawings, and it should be noted that these embodiments are not intended to limit the scope of the present disclosure.
Fig. 4 is a schematic flowchart illustrating a traffic processing method applied to an EC according to an embodiment of the present invention. The execution subject of each step in the embodiment of the present invention may be an EC module with an EC function, or an RGW with an EC function. In addition, the traffic processing method applied to the EC in the embodiment of the present invention is applicable to the network architectures of fig. 2 and 3.
As shown in fig. 4, the traffic processing method 400 applied to the EC in the present embodiment may include the following steps:
and S410, counting the total data traffic flow of the target object in the current time period.
The target objects comprise a directional user handling directional service, a local area network user and a local area network.
The data traffic flow of the target object comprises: the method comprises the steps of directional flow used by a directional user, data service flow generated between a local area network user and other local area network users, and total data service flow generated in the local area network.
In some embodiments of the invention, the directed user represents: and the user of the directional service is opened.
The directional flow rate represents: the user is directed to traffic used only at the specified handset application, the specified content. For example, it may be the traffic of a user accessing a certain video website.
It should be noted that, in the embodiment of the present invention, the service flow of the directional traffic needs to pass through the core network, and the charging flow of the directional traffic does not need to pass through the core network and the BOSS system, and can be completed only by the EC module or the RGW module.
In some embodiments of the present invention, the data service traffic generated between the lan user and the other lan users specifically includes: the data service flow of users in the local area network and other users in the same local area network, and the data service flow of users in a certain local area network and other users in the local area network. Such as enterprise networks and campus networks.
It should be noted that the local area network in the embodiment of the present invention is specifically a local area network established by a mobile private line. Data traffic in the local area network needs to pass through a module with an EC function. For example, it may be based on a VPN network.
It should be noted that the total traffic between the lan subscribers and other lan subscribers, and the data traffic generated in the lan, may not need to pass through the core network. Therefore, the EC module also has a service distribution function, and can directly charge and send the services in the same local area network and among different local area networks without passing through a core network. The charging is ensured, the message transmission is improved, and the return overhead is low.
In some embodiments of the invention, the current time period may be the same as the settlement period for the data service package transacted by the target object. For example, the data service packages transacted by the user may be monthly packages, seasonal packages, semi-annual packages, and the like. Accordingly, the current time period may be monthly, quarterly, semi-annually, yearly.
In some embodiments of the present invention, the data traffic may include, divided according to the type of the traffic: data traffic generated by data traffic, voice traffic generated by voice traffic, video traffic generated by video traffic, and directed traffic generated by customized traffic.
In some embodiments of the present invention, when the target object is a lan user or a lan, the total data traffic used by the target object, which is obtained after calculation by the external charging module, is received in S410. For example, an external billing module of a server of a video website providing a certain targeted traffic service may calculate the data traffic volume used by the targeted user for a certain period of time.
At this time, the specific implementation of S410 includes S411 and S412:
s411, receiving the data service flow calculated by the external charging module and corresponding to the target object in the sub-time period of the current time period.
In some embodiments, the EC-capable module may perform reporting policies with an external billing module. The reporting policy may include a reporting frequency. That is, the external charging module reports the data service traffic generated in the current sub-time period to the module with the EC function every preset sub-time period.
Illustratively, the preset time period is 1 month, and the external charging module may report the data traffic generated within a half hour to the module having the EC function at an interval of half an hour. For example, 8: and when the time is 00, reporting the data service flow generated by the target object in the sub-time period of 7:31 to 8: 00.
And S412, updating the total data service flow of the target object in the current time period by using the received data service flow.
In some embodiments of the present invention, the sum of the originally counted total data traffic flow of the target object and the data traffic flow reported in S411 and used by the target object in the sub-time period of the current time period may be updated to the new total data traffic flow of the target object in the current time period.
As an example, if the total data traffic flow of the target object counted before being reported by the external charging module is a, and the data traffic flow used by the target object in the sub-period of the current time period reported in S411 is a, the total data traffic flow updated in S412 is a + a.
In other embodiments of the present invention, when there is no external billing module to bill, for example, data traffic between the lan subscriber and other lan subscribers. At this time, S410 specifically includes S413 to S415:
s413, receiving a traffic ticket generated after the target object generates the data service traffic.
In some embodiments, after the target object uses the data service traffic, a traffic ticket is sent to the module with the EC function.
Specifically, the traffic ticket may include the initiation time of the data service traffic, the initiator and the receiver of the data service, and the identification information of the corresponding base station. For example, when the data service is a call service, the traffic ticket includes the origination time of the data service, identification information of both communication parties, and identification information of a corresponding base station.
It should be noted that, when the target object is a lan user, both parties of communication need to negotiate a charging policy, a communication policy, and the like in advance.
And S414, analyzing the data service flow generated by the target object from the flow ticket.
In some embodiments, the data service traffic generated by the target object this time can be analyzed from the traffic ticket. For example, flow rate a.
S415, updating the total data traffic of the target object in the current time period by using the data traffic generated this time.
In some embodiments, the sum of the total data traffic flow a of the target object in the previous current time period and the data traffic flow a generated this time may be updated to the total data traffic flow a + a of the target object in the new current time period.
S420, determine whether the total data traffic flow exceeds a preset total data traffic flow threshold.
In some embodiments of the invention, the total data traffic threshold may be determined based on data traffic handled in a package of data traffic handled by the target object. For example, a local area network transacts packages at 20G monthly flow. Then, the total data traffic flow threshold may include: and 20G.
In some embodiments of the invention, a plurality of total data traffic thresholds may be included, which may be determined according to a proportion of the data traffic handled. For example, if the data service traffic handled by the target user is N, 50% of N may be taken as the first total data traffic threshold, and at this time, first traffic warning information may be reported to the BOSS system to prompt the BOSS system to notify the target user that the remaining amount of traffic is less than 50%. And 90% of N can be taken as a second total data flow threshold, and second flow early warning information can be reported to the BOSS system at the moment to prompt the BOSS system to inform a target user that the flow residual is less than 90% and the flow is about to exceed the standard.
In some embodiments of the present invention, if the total data traffic flow does not exceed the preset total data traffic flow threshold, the sending-up function is not triggered, and after a period of time, S410 and S420 are executed again.
And S430, if the total data service flow exceeds a preset total data service flow threshold, reporting flow excess information to the BOSS system.
According to the traffic processing method applied to the EC of the embodiment of the invention, the total traffic of the data service in the current time period can be counted in the module with the EC function, and when the total traffic of the data service exceeds the preset total traffic threshold of the data service, the traffic excess information is reported to the BOSS system. The statistics of the total amount of the data service can be realized at the network edge without a BOSS system, and the marginalization of the charging function is realized.
In some embodiments of the present invention, the traffic excess information in S430 is PGW verified information.
In some embodiments, the traffic excess information may be embodied as a Local Data Request message. Specifically, the EC-capable module sends a Local Data Request message to the serving Data network gateway.
In some embodiments, the traffic excess information sent by the EC-capable module to the PGW includes: identification information of the target object and a total amount of data traffic of the target object in the current time period counted by the EC.
In one embodiment, when the target user is an individual user, the identification information of the target object may include: the International Mobile Equipment Identity (IMEI) of the subscriber.
In another embodiment, when the target object is a local area network, the identification information of the target object may be identification information of the local area network.
In yet another embodiment, since the eNB is connected to the EC through the S1 interface, the identification information of the target object may be S1-APID.
In some embodiments, the transmission between the service data network gateway and the EC-capable module is based on the GTP protocol format.
At this time, the service data network gateway is used for verifying whether the format of the traffic excess information conforms to the GTP protocol format. The traffic excess information in the GTP protocol format comprises identification information of the traffic excess information.
Specifically, the PGW may parse the traffic excess information to verify the traffic sent by the EC-capable module
And if the PGW verifies that the transmission format of the flow excess information is correct, sending the flow excess information to the BOSS system.
In an embodiment, fig. 5 shows an information interaction diagram in a process of reporting traffic excess information in the embodiment of the present invention, and as shown in fig. 5, S430 specifically includes:
and S431, the module with the EC function sends a Local Data Request message to the PGW, wherein the Local Data Request message is a carrier of the flow excess information.
S432, the PGW verifies that the transmission format of the traffic excess information is correct, i.e. conforms to the GTP protocol format. And returning a Local Data Response message to the EC-enabled module to inform the EC-enabled module of successful verification.
And S433, the PGW forwards the traffic excess information to the BOSS system through a local Record Transfer Request message.
And S434, the BOSS system receives the local Record Transfer Request message and feeds back the local Record Transfer Response message to inform the PGW of successful uploading.
As an example, table 1 shows the format of the GTP protocol. As shown in table 1, the 3 rd byte records an information format (Message Type) capable of indicating the contents of the GTP protocol.
TABLE 1
As a specific example, in order to ensure accurate uploading of traffic excess information, in the embodiment of the present invention, assignments to a Local Data transfer request Message and a Local Data transfer response Message are newly added in an information format (Message Type).
Specifically, table 2 shows the comparison of the information format assignment and the meaning of the GTP format information. As shown in Table 2, the assignment 300 corresponds to a Local Data transfer request message; the assignment 301 corresponds to a Local Data transfer response message.
TABLE 2
For example, if the PGW parses the assignment 300 from the third byte of the received GTP format information, it may prove that the received information is a Local Data transfer request message containing traffic excess information. At this time, it may be confirmed that the traffic excess information passes the verification of the PGW.
In some embodiments of the invention, the traffic handling method 400 applied to the EC further includes S440 and S450:
and 440, receiving the feedback information sent by the BOSS system.
In some embodiments, to ensure the accuracy of the feedback information, the feedback information further includes identification information of the target object.
Specifically, the identification information of the target object is the same as the identification information of the target object in S430, and is not described herein again.
In one embodiment, the feedback information includes identification information of the target object B and identification information of the flow control policy C.
Specifically, the feedback information is used to instruct the module having the EC function to execute the corresponding flow control policy C on the target object B.
And 450, responding to the feedback information, and executing the flow control strategy aiming at the data service of the target object.
In some embodiments, the flow control policy comprises: the preset data service flow threshold value is adjusted up, the transmission rate of the data service flow of the target object is limited, or the target object is forbidden to generate new data service flow, and the like.
Correspondingly, different identification information may be set for the several flow control policies, and the identification information may be preset after negotiation between the module with the EC function and the BOSS system.
It should be noted that the BOSS system may select different flow control policies according to the type of data service handled by the target user. Specifically, when the target object handles an unlimited package within a fixed period, a control policy that limits the transmission rate of the data traffic of the target object may be selected. When a user transacts a non-limited package in a certain service fee form, after the flow of the target object is excessive, the preset data service flow threshold value can be selected to be adjusted upwards or the target object is prohibited from generating new data service flow according to the overlapped package transacted between the target object and a communication operator.
The following embodiments of the present invention are divided into three examples, and the three flow control policies are specifically explained.
As a first example, when a user handles a new data traffic flow in an overlay manner, a preset data traffic flow threshold may be adjusted up according to the data traffic flow overlaid by the user. For example, if the originally preset data traffic threshold is 10G, after the user overlaps with the 2G traffic, the preset data traffic threshold may be adjusted up to 12G.
As a second example, limiting the transmission rate of the data traffic of the target object may be to adjust the transmission rate of the data traffic down. Specifically, if the usage flow of the unlimited package user exceeds the preset data service flow threshold, the transmission rate of the data service flow of the target object may be adjusted downward.
As a third example, prohibiting the target object from generating a new data traffic may be prohibiting the target object from using the new data traffic. As a specific example, if the target object has an excess of the directional traffic, the target object may be prohibited from using the directional traffic, and the target object may use the domestic traffic provided by the mobile operator. As another specific example, when the data traffic of the target object is excessive and the target object does not overlay new traffic, the target object may be prohibited from generating new data traffic.
In some embodiments, the flow control policy is that the BOSS system and the module with the EC function are negotiated in advance and preset in a configuration unit of the module with the EC function in advance. At this time, S450 specifically includes:
s451, the identification information of the flow control policy in the feedback information is analyzed.
In one embodiment, the BOSS system may select an execution policy for the target object for the EC-capable module. Specifically, the flow control policy may be identified by the identification information of the corresponding flow control policy below the EC-capable module.
S452, based on the identification information of the flow control policy, executing the flow control policy for the data service of the target object.
As an example, if the preset flow control policy includes A, B, C and D. And after receiving the identification information of the flow control strategy D, the module with the EC function executes the flow control strategy D on the target object.
In some embodiments, the configuration unit of the EC-capable module is further configured with policies for content distribution, service distribution, and content upload and service upload.
In some embodiments of the invention, the traffic handling method 400 applied to the EC further comprises:
460, after the current time period is over, reporting the total data traffic of the target object in the current time period to the BOSS system,
in some embodiments, S460 further comprises: and clearing the total flow of the data traffic to zero. That is, the flow rate statistics result of the current time period is not substituted into the flow rate statistics of the next time period.
An apparatus according to an embodiment of the present invention will be described in detail below with reference to the accompanying drawings.
Based on the same inventive concept, another embodiment of the present invention provides a flow processing apparatus applied to an EC. Fig. 6 is a schematic structural diagram of a flow processing apparatus applied to an EC according to another embodiment of the present invention. As shown in fig. 6, a traffic processing apparatus 600 applied to EC includes a statistical processing unit 610, a determining processing unit 620, and a reporting processing unit 630:
and the statistical processing unit 610 is configured to count a total data traffic flow of the target object in the current time period.
The determining unit 620 is configured to determine whether the total data traffic flow exceeds a preset total data traffic flow threshold.
A reporting processing unit 630, configured to report the traffic excess information to the BOSS system if the total traffic of the data service exceeds a preset total traffic threshold of the data service.
Wherein, the total flow of data traffic of the target object comprises: the total traffic of the directed traffic used by the directed users, the total traffic of the data traffic generated between the local area network users and other local area network users, and the total traffic of the data traffic generated in the local area network.
In some embodiments of the present invention, the statistics processing unit 610 and the judgment processing unit 620 belong to a traffic statistics sub-module in the EC module or the RGW module.
In some embodiments of the present invention, the traffic processing device 600 applied to the EC further includes:
the receiving processing unit is used for receiving the feedback information sent by the BOSS system;
and the execution processing unit is used for responding to the feedback information and executing the flow control strategy aiming at the data service of the target object.
In some embodiments of the present invention, the statistical processing unit 610 is specifically configured to:
and receiving the data service flow which is calculated by the external charging module and corresponds to the target object in the sub-time period of the current time period.
And updating the total data service flow of the target object in the current time period by using the received data service flow.
In some embodiments of the invention, the traffic excess information is PGW verified information.
In some embodiments of the invention, the PGW is configured to verify whether a format of the traffic excess information conforms to a GTP protocol format, where the traffic excess information in the GTP protocol format includes identification information of the traffic excess information.
In some embodiments of the present invention, the feedback information includes identification information of a flow control policy, and the execution processing unit is specifically configured to:
analyzing the identification information of the flow control strategy in the feedback information;
and executing the flow control strategy aiming at the data service of the target object based on the identification information of the flow control strategy.
Other details of the traffic processing apparatus applied to the EC according to the embodiment of the present invention are similar to the method according to the embodiment of the present invention described above with reference to fig. 1 to 5, and are not repeated herein.
Fig. 7 is a block diagram of an exemplary hardware architecture of a traffic processing device applied to an EC in an embodiment of the present invention.
As shown in fig. 7, a traffic processing device 700 applied to the EC includes an input device 701, an input interface 702, a central processor 703, a memory 704, an output interface 705, and an output device 706. The input interface 702, the central processing unit 703, the memory 704, and the output interface 705 are connected to each other via a bus 710, and the input device 701 and the output device 706 are connected to the bus 710 via the input interface 702 and the output interface 705, respectively, and further connected to other components of the traffic processing device 700 applied to the EC.
Specifically, the input device 701 receives input information from the outside, and transmits the input information to the central processor 703 through the input interface 702; the central processor 703 processes input information based on computer-executable instructions stored in the memory 704 to generate output information, stores the output information temporarily or permanently in the memory 704, and then transmits the output information to the output device 706 through the output interface 705; the output device 706 outputs the output information to the outside of the traffic processing device 700 applied to the EC for use by the user.
That is, the traffic processing device applied to the EC shown in fig. 7 may also be implemented to include: a memory storing computer-executable instructions; and a processor which, when executing computer executable instructions, may implement the methods and apparatus described in connection with fig. 1-2 as applied to the traffic handling device of the EC.
In one embodiment, the traffic processing device 700 applied to the EC shown in fig. 7 may be implemented as a device that may include: a memory for storing a program; and a processor for executing the program stored in the memory to perform the traffic processing method applied to the EC according to the embodiment of the present invention.
The embodiment of the invention also provides a computer storage medium, wherein computer program instructions are stored on the computer storage medium, and when being executed by a processor, the computer program instructions realize the flow processing method applied to the EC in the embodiment of the invention.
It is to be understood that the invention is not limited to the specific arrangements and instrumentality described above and shown in the drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present invention are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications and additions or change the order between the steps after comprehending the spirit of the present invention.
The functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the invention are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include electronic circuits, semiconductor memory devices, ROM, flash memory, Erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, Radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
As described above, only the specific embodiments of the present invention are provided, and it can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the module and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.