Spider pool website identification method and device, electronic device and storage medium

文档序号:7804 发布日期:2021-09-17 浏览:42次 中文

1. A method for identifying a spider pool website is characterized by comprising the following steps:

acquiring a source code of a website to be identified;

extracting page information in the source code, wherein the page information comprises at least one of the following: page subject information and page tag information;

matching target page information corresponding to the page information from a preset spider pool;

and under the condition that target page information corresponding to the page information is matched from the preset spider pool, classifying the website to be identified as a spider pool website.

2. The method of identifying a spider pool website of claim 1, further comprising:

under the condition that the page information corresponding to the page information is not matched from the preset spider pool, extracting page out-link information and all page link information in the source code;

judging whether the matching degree of the page external link information and all the page link information reaches a preset matching degree;

and under the condition that the matching degree of the page external link information and all the page link information reaches the preset matching degree, classifying the website to be identified as a spider pool website.

3. The method for identifying a spider pool website according to claim 2, wherein before extracting the out-of-page link information and all page link information in the source code, the method further comprises:

acquiring an anchor link of the source code;

judging whether the main domain name of the anchor link is the main domain name of the website to be identified;

and under the condition that the main domain name of the anchor link is judged not to be the main domain name of the website to be identified, judging that the anchor link is an external link, and extracting page external link information and all page link information in the source code.

4. The method of identifying a spider pool website of claim 3, wherein the out-of-page link information includes: the system comprises an external link anchor text, external link page information and external link host information.

5. The method for identifying the spider pool website according to claim 4, wherein before determining whether the matching degree of the page out-link information and all the page link information reaches a preset matching degree, the method further comprises:

according to the external link host information, determining IP home location information and external link website record information of the host;

acquiring first foreign link list information corresponding to the IP attribution information from the outside based on the IP attribution information;

acquiring second outer link list information with empty outer link website record information based on the outer link website record information;

determining third external link list information of which the external link anchor text is different from the external link page information;

obtaining a union set of the first external link list information, the second external link list information and the third external link list information to obtain target external link list information;

and judging whether the matching degree of the target external link list information and all the page link information reaches the preset matching degree or not based on the target external link list information.

6. The method of identifying a spider pool website of claim 2, further comprising:

and under the condition that the matching degree of the page external link information and all the page link information is judged not to reach the preset matching degree, classifying the website to be identified as a normal website.

7. The method for identifying the spider pool website according to claim 1, wherein extracting the page information in the source code comprises:

and extracting page information in the source code through a preset page resolver.

8. An apparatus for identifying a spider pool web site, comprising:

the first acquisition module is used for acquiring a source code of a website to be identified;

a first extraction module, configured to extract page information in the source code, where the page information includes at least one of: page subject information and page tag information;

the first matching module is used for matching target page information corresponding to the page information from a preset spider pool;

and the first classification module is used for classifying the website to be identified into a spider pool website under the condition that target page information corresponding to the page information is matched from the preset spider pool.

9. An electronic device comprising a memory and a processor, wherein the memory has stored therein a computer program, and the processor is configured to execute the computer program to perform the method of identifying a spider pool website of any one of claims 1 to 7.

10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of identifying a spider pool website according to any one of claims 1 to 7.

Background

Today of the explosive development of the internet, Search Engine Optimization (SEO for short) is a very common industry, and in order to improve the SEO ranking of websites, many hackers use the black cap SEO technology to manufacture a large number of spam websites (similar to a spider pool) which contain many illegal and meaningless contents and the like and are propagated in the internet to cause adverse effects, and a large number of invalid assets exist in the meaningless spider pool in a cloud monitoring system to cause resource waste for the monitoring system.

Aiming at the problem that resource waste is caused by the fact that a monitoring system detects other websites in a spider pool website in the related art, no effective solution is provided at present.

Disclosure of Invention

The embodiment provides a recognition method, a recognition device, an electronic device and a storage medium related to a spider pool website, so as to solve the problem of resource waste caused by detection of other websites in the spider pool website in the related art.

In a first aspect, in this embodiment, a method for identifying a spider pool website is provided, including:

acquiring a source code of a website to be identified;

extracting page information in the source code, wherein the page information comprises at least one of the following: page subject information and page tag information;

matching target page information corresponding to the page information from a preset spider pool;

and under the condition that target page information corresponding to the page information is matched from the preset spider pool, classifying the website to be identified as a spider pool website.

In some of these embodiments, the method further comprises:

under the condition that the page information corresponding to the page information is not matched from the preset spider pool, extracting page out-link information and all page link information in the source code;

judging whether the matching degree of the page external link information and all the page link information reaches a preset matching degree;

and under the condition that the matching degree of the page external link information and all the page link information reaches the preset matching degree, classifying the website to be identified as a spider pool website.

In some embodiments, before extracting the out-of-page link information and the full page link information in the source code, the method further includes:

acquiring an anchor link of the source code;

judging whether the main domain name of the anchor link is the main domain name of the website to be identified;

and under the condition that the main domain name of the anchor link is judged not to be the main domain name of the website to be identified, judging that the anchor link is an external link, and extracting page external link information and all page link information in the source code.

In some embodiments, the out-of-page link information comprises: the system comprises an external link anchor text, external link page information and external link host information.

In some embodiments, before determining whether the matching degrees of the page out-link information and all the page link information reach a preset matching degree, the method further includes:

according to the external link host information, determining IP home location information and external link website record information of the host;

acquiring first foreign link list information corresponding to the IP attribution information from the outside based on the IP attribution information;

acquiring second outer link list information with empty outer link website record information based on the outer link website record information;

determining third external link list information of which the external link anchor text is different from the external link page information;

obtaining a union set of the first external link list information, the second external link list information and the third external link list information to obtain target external link list information;

and judging whether the matching degree of the target external link list information and all the page link information reaches the preset matching degree or not based on the target external link list information.

In some of these embodiments, the method further comprises:

and under the condition that the matching degree of the page external link information and all the page link information is judged not to reach the preset matching degree, classifying the website to be identified as a normal website.

In some embodiments, extracting the page information in the source code includes: and extracting page information in the source code through a preset page resolver.

In a second aspect, in this embodiment, there is provided an apparatus for identifying a spider pool website, including:

the first acquisition module is used for acquiring a source code of a website to be identified;

a first extraction module, configured to extract page information in the source code, where the page information includes at least one of: page subject information and page tag information;

the first matching module is used for matching target page information corresponding to the page information from a preset spider pool;

and the first classification module is used for classifying the website to be identified into a spider pool website under the condition that target page information corresponding to the page information is matched from the preset spider pool.

In a third aspect, in this embodiment, there is provided an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the processor implements the method for identifying a spider pool website according to the first aspect.

In a fourth aspect, in the present embodiment, there is provided a storage medium having stored thereon a computer program which, when executed by a processor, implements the method for identifying a spider pool website according to the first aspect.

Compared with the related art, the identification method, the identification device, the electronic device and the storage medium of the spider pool website provided by the embodiment are used for identifying the website to be identified by acquiring the source code of the website to be identified; extracting page information in the source code, wherein the page information comprises at least one of the following: page subject information and page tag information; matching target page information corresponding to the page information from a preset spider pool; under the condition that target page information corresponding to the page information is matched from a preset spider pool, the website to be identified is classified into a spider pool website, so that the problem of resource waste caused by monitoring other websites in the spider pool website in the related art is solved, and the resource waste caused by detecting other websites in the spider pool website by a monitoring system is reduced.

The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the application.

Drawings

The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:

fig. 1 is a block diagram of a hardware configuration of a terminal of the recognition method of the spider pool website of the present embodiment;

FIG. 2 is a flowchart of a recognition method of the spider pool website of the present embodiment;

FIG. 3 is a flow chart of the method of identifying spider pool web sites of the preferred embodiment;

fig. 4 is a block diagram showing the structure of feature extraction of the website according to the present embodiment;

fig. 5 shows a recognition device for a spider pool website according to the present embodiment.

Detailed Description

For a clearer understanding of the objects, aspects and advantages of the present application, reference is made to the following description and accompanying drawings.

Unless defined otherwise, technical or scientific terms used herein shall have the same general meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The use of the terms "a" and "an" and "the" and similar referents in the context of this application do not denote a limitation of quantity, either in the singular or the plural. The terms "comprises," "comprising," "has," "having," and any variations thereof, as referred to in this application, are intended to cover non-exclusive inclusions; for example, a process, method, and system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or modules, but may include other steps or modules (elements) not listed or inherent to such process, method, article, or apparatus. Reference throughout this application to "connected," "coupled," and the like is not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. Reference to "a plurality" in this application means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. In general, the character "/" indicates a relationship in which the objects associated before and after are an "or". The terms "first," "second," "third," and the like in this application are used for distinguishing between similar items and not necessarily for describing a particular sequential or chronological order.

The method embodiments provided in the present embodiment may be executed in a terminal, a computer, or a similar computing device. For example, the method is executed on a terminal, and fig. 1 is a block diagram of a hardware configuration of the terminal according to the method for identifying a spider pool website in this embodiment. As shown in fig. 1, the terminal may include one or more processors 102 (only one shown in fig. 1) and a memory 104 for storing data, wherein the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA. The terminal may also include a transmission device 106 for communication functions and an input-output device 108. It will be understood by those of ordinary skill in the art that the structure shown in fig. 1 is merely an illustration and is not intended to limit the structure of the terminal described above. For example, the terminal may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.

The memory 104 may be used to store a computer program, for example, a software program and a module of application software, such as a computer program corresponding to the recognition method of the spider pool website in the embodiment, and the processor 102 executes various functional applications and data processing by running the computer program stored in the memory 104, so as to implement the above-mentioned method. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.

The transmission device 106 is used to receive or transmit data via a network. The network described above includes a wireless network provided by a communication provider of the terminal. In one example, the transmission device 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.

First, terms necessary to be used in the embodiments of the present application are described and explained:

the spider pool is used for utilizing a large number of domain name spam station groups and hanging unreported website links so as to attract a search engine to quickly register.

Search Engine Optimization (SEO) is a method of using the rules of a Search Engine to increase the natural ranking of web sites within the relevant Search Engine. The purpose is to lead the device to occupy the leading position in the industry and obtain brand benefits. It is largely a business activity of the website operator that moves its own or its company's rank forward.

The black-cap SEO refers to a type of SEO technology that enables a site to quickly promote ranking through a cheating means, or a hacking technology, for example: black-cap SEO can quickly promote ranking, but is illegal and cheating after all, and is easily righted by K (websites).

Fig. 2 is a flowchart of the identification method of the spider pool website of this embodiment, and as shown in fig. 2, the flowchart includes the following steps:

step S201, acquiring a source code of a website to be identified.

In this step, the source code of the website to be identified may be obtained through some preset identification tools, such as a deep learning identification model. The website to be identified may be obtained at any time or in a database storing the website to be identified.

Step S202, extracting page information in the source code, wherein the page information comprises at least one of the following: page subject information, page tag information.

In this step, the common website content extraction technology mainly passes through a regular expression and a DOM operation tool. The regular expression can capture a specific character combination in a wildcard way without considering a structure tree of a website, and is suitable for extracting all types of characters; the DOM operation tool depends on the DOM structure, captures the target label and the attribute in a targeted manner, is more accurate and is more suitable for the webpage content extraction scheme. The extraction mode in the step can adopt the mode, so that the extracted content is more accurate, and the identification accuracy of the website is improved.

And step S203, matching target page information corresponding to the page information from a preset spider pool.

In this step, the preset spider pool may be a spider pool that is preset by the user according to actual needs.

In some embodiments, the user may train the preset spider pool to improve the accuracy of the preset spider pool.

And step S204, under the condition that target page information corresponding to the page information is matched from a preset spider pool, classifying the website to be identified into a spider pool website.

Based on the steps S201 to S204, by identifying the spider pool website in the cloud monitoring asset according to the page information in the source code, the spider pool website in the asset and the implanted spider pool website can be accurately identified, and whether the website is used by a hacker for a black-cap SEO can be timely found out, so that the problem of resource waste caused by monitoring other websites in the spider pool website in the related art is solved, and the resource waste of the monitoring system for detecting other websites in the spider pool website is reduced.

In some embodiments, the page out-link information and all page link information in the source code can be extracted when the page information corresponding to the page information is not matched from the preset spider pool; judging whether the matching degree of the page external link information and all the page link information reaches a preset matching degree or not; and under the condition that the matching degree of the page external link information and all the page link information reaches the preset matching degree, classifying the website to be identified into a spider pool website.

In this embodiment, when the page information corresponding to the page information is not matched in the preset spider pool, whether the website is a spider pool website is further judged according to the page out-link information and all page link information in the source code, and when the matching degree of the page out-link information and all page link information is judged to reach the preset matching degree, the website to be identified is classified as the spider pool website, so that the spider pool website and the implanted spider pool website in the asset are further accurately identified, whether the website is used for the black-cap SEO is timely found, the problem that in the related art, the resource waste is caused by monitoring other websites in the spider pool website is solved, and the resource waste of the monitoring system for detecting other websites in the spider pool website is reduced.

In some embodiments, before extracting page out-link information and all page link information in the source code, an anchor link of the source code may also be obtained; judging whether the main domain name of the anchor link is the main domain name of the website to be identified; and under the condition that the main domain name of the anchor link is judged not to be the main domain name of the website to be identified, judging that the anchor link is an external link, and extracting page external link information and all page link information in the source code.

In this embodiment, the external link refers to a link that jumps to a website with another domain name, and the determining manner determines whether the main domain name of the anchor link is the main domain name of the website to be currently identified, and if not, the external link is defined as the external link. In this embodiment, by identifying the anchor link and extracting the page external link information and all the page link information in the source code when the anchor link is an external link, the accuracy of the page external link information in the source code is improved, so as to improve the accuracy of identifying the website to be identified.

In some of these embodiments, the out-of-page link information includes: the system comprises an external link anchor text, external link page information and external link host information.

In the present embodiment, anchor text: also known as anchor text links, is a form of link. Similar to a hyperlink, the code of the hyperlink is an anchor text, and the keyword is used as a link to point to another web page, and the link in this form is called the anchor text. The out-link host information may carry host IP information and website backup information.

In some embodiments, before determining whether the matching degree between the page out-link information and all page link information reaches the preset matching degree, the method may further include the following steps:

step 1, determining IP attribution information and external link website record information of a host according to external link host information.

In this step, the website IP attribution information may be queried in the open-source IP trueness database according to matching through the IP trueness database. The external link website record information determining method may include: the method comprises the steps of work and communication department official network query, station leader tool website record query, station loving ICP record query and query based on the self-built big data record knowledge base.

And 2, acquiring first external link list information corresponding to the IP attribution information outside the country based on the IP attribution information.

It should be noted that the IP overseas judgment technology is not limited to the matching of the IP truthful database, and other tools may be similar to the station leader tool.

And 3, acquiring second external link list information with empty external link website record information based on the external link website record information.

It should be noted that the ICP record information query technology is not limited to building a big data ICP record library by itself, and other channels may be similar to the work and communication department official website query, the station leader tool website record query, the loving station ICP record query, and the like.

And 4, determining third external link list information with different external link anchor texts and external link page information.

And 5, taking a union set of the first external link list information, the second external link list information and the third external link list information to obtain target external link list information.

And 6, judging whether the matching degree of the target external link list information and all page link information reaches a preset matching degree or not based on the target external link list information.

In this embodiment, the first external link list information, the second external link list information, and the third external link list information are respectively determined according to the three pieces of information, i.e., the external link host information, the IP home location information, and the external link website record information, and finally, the matching is performed according to the union set of the first external link list information, the second external link list information, and the third external link list information, so that the matching degree between the target external link list information and all the page link information can be more accurately determined, and the accuracy of identification of the website to be identified can be subsequently improved.

In some embodiments, the website to be identified may be classified as a normal website when it is determined that the matching degree between the page out-link information and all page link information does not reach the preset matching degree.

In this embodiment, the classification of the websites to be identified is realized by classifying the websites to be identified into normal websites in a manner that the matching degree of the page out-link information and all the page link information is not equal to the preset matching degree.

In some embodiments, extracting the page information in the source code comprises: and extracting the page information in the source code through a preset page resolver. In the embodiment, the extraction of the page information in the source code is realized through the parser.

The present embodiment is described and illustrated below by means of preferred embodiments.

For the sake of accurate description, the following definitions are made:

target property: and (4) target.

Asset source code: html.

Page title: title.

Page meta: meta.

Number of all links of page (equivalent to all page links in the above embodiment): allLinkCount.

Outer chain: an outLink.

And (3) website recording: and (4) icp.

And (3) web site ip: ip.

HOST: and (6) host.

The spider pool regular matching expression: spiderPattern.

Fig. 3 is a flowchart of the recognition method of the spider pool website according to the preferred embodiment, and as shown in fig. 3, the recognition method of the spider pool website includes the following steps:

in step S301, a spider-pool-regularized matching (apiderPattern) is performed on title (equivalent to the page subject information in the above embodiment) and meta (equivalent to the page tag information in the above embodiment).

Step S302, determining whether title and meta satisfy a hit spider pool, if yes, performing step S308, otherwise, performing step S303.

In step S303, an out-link list outoutoutlinks (corresponding to the first out-link list information in the above-described embodiment) whose ip home location is out is acquired.

In step S304, an external link list icpNullOutLinks (equivalent to the second external link list information in the above embodiment) with an empty ICP record is obtained.

In step S305, an out-link list contentsubnormaloulinks (corresponding to the third out-link list information in the above-described embodiment) in which the out-link anchor text is inconsistent with the out-link page content is acquired.

It should be noted that the order of steps S303, S304, and S305 may be interchanged.

Step S306, a union of outoutlinks, icpNullOutLinks, and contentAbnormalOutLinks is taken to obtain spiderOuterLinks (corresponding to the target out-link list information in the above embodiment).

Step S307, judging whether the occupation ratio of the spiderOutlinks in all the link numbers allLinkCount of the page exceeds a preset occupation ratio, if so, executing step S308, and if not, finishing the execution.

And step S308, judging as the spider pool website.

Based on the steps S301 to S308, the embodiment of the present application can accurately identify the spider pool website and the implanted spider pool website in the cloud monitoring asset, timely find whether the website is used by a hacker for a black-cap SEO, avoid the website from being derated in a search engine, and avoid resource waste caused by detecting other websites in the spider pool website.

In some embodiments, before step S301, as shown in fig. 4, html of the source code of the asset of the website may also be obtained through a source code obtaining tool JSOUP. Extracting a page title, a page meta, an external link address URL and corresponding anchor text information in the source code; analyzing the external link address through a URL analysis tool to obtain corresponding HOST and IP information; matching the IP address through an IP trueness database to obtain IP home location information; and matching HOST through a website record knowledge base to obtain record information of the website.

In this embodiment, a device for identifying a spider pool website is further provided, and the device is used to implement the foregoing embodiments and preferred embodiments, and the description of the device that has been already made is omitted. The terms "module," "unit," "subunit," and the like as used below may implement a combination of software and/or hardware for a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.

Fig. 5 is a block diagram showing the configuration of the recognition apparatus for a spider pool website according to the present embodiment, and as shown in fig. 5, the apparatus includes:

a first obtaining module 51, configured to obtain a source code of a website to be identified;

a first extracting module 52, coupled to the first obtaining module 51, configured to extract page information in the source code, where the page information includes at least one of: page subject information and page tag information;

a first matching module 53, coupled to the first extracting module 52, for matching target page information corresponding to the page information from a preset spider pool;

and a first classification module 54, coupled to the first matching module 53, configured to classify the website to be identified as a spider pool website in the case that target page information corresponding to the page information is matched from a preset spider pool.

In some of these embodiments, the apparatus further comprises: the second extraction module is used for extracting page out-link information and all page link information in the source code under the condition that the page information corresponding to the page information is not matched from the preset spider pool; the first judgment module is used for judging whether the matching degree of the page external link information and all the page link information reaches the preset matching degree; and the second classification module is used for classifying the website to be identified into the spider pool website under the condition that the matching degree of the page external link information and all the page link information reaches the preset matching degree.

In some of these embodiments, the apparatus further comprises: the second acquisition module is used for acquiring the anchor link of the source code; the second judgment module is used for judging whether the main domain name of the anchor link is the main domain name of the website to be identified; and the judging module is used for judging that the anchor link is an external link under the condition that the main domain name of the anchor link is not the main domain name of the website to be identified, and extracting page external link information and all page link information in the source code.

In some of these embodiments, the out-of-page link information includes: the system comprises an external link anchor text, external link page information and external link host information.

In some of these embodiments, the apparatus further comprises: the first determining module is used for determining IP attribution information and external link website record information of the host according to the external link host information; the third acquisition module is used for acquiring first external link list information corresponding to the IP attribution information from the outside based on the IP attribution information; the fourth acquisition module is used for acquiring second external link list information with empty external link website record information based on the external link website record information; the second determining module is used for determining third external link list information of which the external link anchor text is different from the external link page information; the processing module is used for obtaining a union set of the first external link list information, the second external link list information and the third external link list information to obtain target external link list information; and the first judgment module is used for judging whether the matching degree of the target external link list information and all page link information reaches the preset matching degree or not based on the target external link list information.

In some of these embodiments, the apparatus further comprises: and the third classification module is used for classifying the website to be identified as a normal website under the condition that the matching degree of the page external link information and all the page link information is judged not to reach the preset matching degree.

In some embodiments, the first extracting module 52 is further configured to extract the page information in the source code through a preset page parser

The above modules may be functional modules or program modules, and may be implemented by software or hardware. For a module implemented by hardware, the modules may be located in the same processor; or the modules can be respectively positioned in different processors in any combination.

There is also provided in this embodiment an electronic device comprising a memory having a computer program stored therein and a processor arranged to run the computer program to perform the steps of any of the above method embodiments.

Optionally, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.

Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:

step S201, acquiring a source code of a website to be identified.

Step S202, extracting page information in the source code, wherein the page information comprises at least one of the following: page subject information, page tag information.

And step S203, matching target page information corresponding to the page information from a preset spider pool.

And step S204, under the condition that target page information corresponding to the page information is matched from a preset spider pool, classifying the website to be identified into a spider pool website.

It should be noted that, for specific examples in this embodiment, reference may be made to the examples described in the foregoing embodiments and optional implementations, and details are not described again in this embodiment.

In addition, in combination with the method for identifying a spider pool website provided in the above embodiment, a storage medium may also be provided in this embodiment. The storage medium having stored thereon a computer program; the computer program, when executed by a processor, implements any of the methods of identifying a spider pool website of the above embodiments.

It should be understood that the specific embodiments described herein are merely illustrative of this application and are not intended to be limiting. All other embodiments, which can be derived by a person skilled in the art from the examples provided herein without any inventive step, shall fall within the scope of protection of the present application.

It is obvious that the drawings are only examples or embodiments of the present application, and it is obvious to those skilled in the art that the present application can be applied to other similar cases according to the drawings without creative efforts. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.

The term "embodiment" is used herein to mean that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is to be expressly or implicitly understood by one of ordinary skill in the art that the embodiments described in this application may be combined with other embodiments without conflict.

The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the patent protection. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

完整详细技术资料下载
上一篇:石墨接头机器人自动装卡簧、装栓机
下一篇:一种一步式采集互联网数据的方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!