Product operation and maintenance method and device of terminal equipment and storage medium

文档序号:8017 发布日期:2021-09-17 浏览:93次 中文

1. A product operation and maintenance method of terminal equipment is characterized by comprising the following steps:

responding to a mobile storage device accessing a terminal device, and determining the existence form of the mobile storage device in the terminal device; wherein the existence form is used for forbidding a third-party program to execute write operation;

obtaining storage content to be called in the mobile storage equipment based on the existence form; the storage content comprises at least one of an installation package, an upgrade package and a network path, wherein the network path is used for indicating a storage address where the installation package and/or the upgrade package are/is stored;

and carrying out operation and maintenance on the product of the terminal equipment based on the storage content to be called.

2. The method of claim 1, prior to said accessing the terminal device in response to the mobile storage device, further comprising:

initializing a thread interacting with the mobile storage device;

and judging whether the mobile storage equipment is accessed to the terminal equipment or not based on the initialized thread.

3. The method of claim 2, wherein the determining the presence of the mobile storage device in the terminal device in response to the mobile storage device accessing the terminal device comprises:

responding to the access of the mobile storage equipment to the terminal equipment, and obtaining a unique equipment identifier of the mobile storage equipment;

and determining the existence form of the mobile storage device in the terminal device based on the unique device identification.

4. The method according to claim 3, further comprising, after the obtaining of the unique device identifier of the mobile storage device and before the determining of the presence form of the mobile storage device in the terminal device based on the unique device identifier:

identifying the unique device identification based on the initialized thread;

after the identification is successful, the existence form of the mobile storage device in the terminal device is determined based on the unique device identification.

5. The method according to claim 2, wherein the obtaining the storage content to be called in the mobile storage device based on the existence form comprises:

acquiring an encrypted content file based on the initialized thread and the existing form;

and decrypting the acquired content file to obtain the storage content to be called in the mobile storage equipment.

6. The method according to claim 5, wherein the operation and maintenance of the product of the terminal device based on the storage content to be called comprises:

decrypting the obtained content file to obtain a reference operation and maintenance rule; wherein the reference operation and maintenance rule comprises at least one of the following items: installing or repairing by using the installation package; upgrading by using an upgrade package; acquiring an installation package and/or an upgrade package by using a network path;

and calling and executing the storage content to be called according to the reference operation and maintenance rule so as to operate and maintain the product of the terminal equipment.

7. The method according to any of claims 1-6, wherein the presence configuration comprises an optical drive configuration and a hidden sector configuration; wherein the optical drive has read-only operation.

8. A product operation and maintenance device of a terminal device is characterized by comprising:

the presence form determining module is used for responding to the access of the mobile storage device to the terminal device and determining the presence form of the mobile storage device in the terminal device; wherein the existence form is used for forbidding a third-party program to execute write operation;

the storage content obtaining module is used for obtaining the storage content to be called in the mobile storage equipment based on the existence form; the storage content comprises at least one of an installation package, an upgrade package and a network path, wherein the network path is used for indicating a storage address where the installation package and/or the upgrade package are/is stored;

and the product operation and maintenance module is used for operating and maintaining the product of the terminal equipment based on the storage content to be called.

9. A computing device comprising a memory having stored therein a computer program and a processor that, when executing the computer program, implements the method of any of claims 1-7.

10. A computer-readable storage medium, on which a computer program is stored which, when executed in a computer, causes the computer to carry out the method of any one of claims 1-7.

Background

The operation and maintenance of the product of the terminal device (for example, including software, virus library, and the like) includes installation and upgrade of the product, and the operation and maintenance of the product of the terminal device may be damaged due to increasing viruses with network threat behaviors (for example, including stealing trojans, Lesojous software, and the like).

The operation and maintenance modes of the products of the terminal equipment generally comprise network networking operation and mobile storage equipment-based operation and maintenance. The operation and maintenance based on the mobile storage device refers to accessing the mobile storage device (for example, including an optical disc, a usb disk, and the like) to the terminal device, and then performing the storage content (for example, including an installation package, an upgrade package, and the like) in the mobile storage device manually to complete the operation and maintenance (i.e., installation or upgrade) of the product.

In the operation and maintenance mode based on the mobile storage device, if a terminal device has a virus infecting the mobile storage device, when a mobile storage device is accessed to the terminal device, the mobile storage device is likely to be infected with the virus. Therefore, when the mobile storage device is accessed into other terminal devices, the other terminal devices are infected with viruses.

Disclosure of Invention

The embodiment of the invention provides a product operation and maintenance method and device of terminal equipment and a storage medium, which can prevent a mobile storage device from being infected with viruses in the product operation and maintenance process.

In a first aspect, an embodiment of the present invention provides a product operation and maintenance method for a terminal device, including:

responding to a mobile storage device accessing a terminal device, and determining the existence form of the mobile storage device in the terminal device; wherein the existence form is used for forbidding a third-party program to execute write operation;

obtaining storage content to be called in the mobile storage equipment based on the existence form; the storage content comprises at least one of an installation package, an upgrade package and a network path, wherein the network path is used for indicating a storage address where the installation package and/or the upgrade package are/is stored;

and carrying out operation and maintenance on the product of the terminal equipment based on the storage content to be called.

In one possible design, before the accessing the terminal device in response to the mobile storage device, the method further includes:

initializing a thread interacting with the mobile storage device;

and judging whether the mobile storage equipment is accessed to the terminal equipment or not based on the initialized thread.

In one possible design, the determining, in response to the mobile storage device accessing the terminal device, the presence form of the mobile storage device in the terminal device includes:

responding to the access of the mobile storage equipment to the terminal equipment, and obtaining a unique equipment identifier of the mobile storage equipment;

and determining the existence form of the mobile storage device in the terminal device based on the unique device identification.

In one possible design, after the obtaining of the unique device identifier of the mobile storage device and before the determining of the existence form of the mobile storage device in the terminal device based on the unique device identifier, the method further includes:

identifying the unique device identification based on the initialized thread;

after the identification is successful, the existence form of the mobile storage device in the terminal device is determined based on the unique device identification.

In a possible design, the obtaining, based on the existence form, storage content to be called in the mobile storage device includes:

acquiring an encrypted content file based on the initialized thread and the existing form;

and decrypting the acquired content file to obtain the storage content to be called in the mobile storage equipment.

In a possible design, the operation and maintenance of the product of the terminal device based on the storage content to be called includes:

decrypting the obtained content file to obtain a reference operation and maintenance rule; wherein the reference operation and maintenance rule comprises at least one of the following items: installing or repairing by using the installation package; upgrading by using an upgrade package; acquiring an installation package and/or an upgrade package by using a network path;

and calling and executing the storage content to be called according to the reference operation and maintenance rule so as to operate and maintain the product of the terminal equipment.

In one possible design, the presence configuration includes an optical drive configuration and a hidden sector configuration; wherein the optical drive has read-only operation.

In a second aspect, an embodiment of the present invention further provides a product operation and maintenance device for a terminal device, including:

the presence form determining module is used for responding to the access of the mobile storage device to the terminal device and determining the presence form of the mobile storage device in the terminal device; wherein the existence form is used for forbidding a third-party program to execute write operation;

the storage content obtaining module is used for obtaining the storage content to be called in the mobile storage equipment based on the existence form; the storage content comprises at least one of an installation package, an upgrade package and a network path, wherein the network path is used for indicating a storage address where the installation package and/or the upgrade package are/is stored;

and the product operation and maintenance module is used for operating and maintaining the product of the terminal equipment based on the storage content to be called.

In a third aspect, an embodiment of the present invention further provides a computing device, including a memory and a processor, where the memory stores a computer program, and the processor, when executing the computer program, implements the method described in any embodiment of this specification.

In a fourth aspect, the present invention further provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed in a computer, the computer program causes the computer to execute the method described in any embodiment of the present specification.

The embodiment of the invention provides a product operation and maintenance method, a product operation and maintenance device and a storage medium of a terminal device.

Drawings

In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.

Fig. 1 is a flowchart of a product operation and maintenance method for a terminal device according to an embodiment of the present invention;

fig. 2 is a flowchart of a product operation and maintenance method of another terminal device according to an embodiment of the present invention;

FIG. 3 is a diagram of a hardware architecture of a computing device according to an embodiment of the present invention;

fig. 4 is a structural diagram of a product operation and maintenance device of a terminal device according to an embodiment of the present invention;

fig. 5 is a structural diagram of a product operation and maintenance device of another terminal device according to an embodiment of the present invention.

Detailed Description

In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer and more complete, the technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention, and based on the embodiments of the present invention, all other embodiments obtained by a person of ordinary skill in the art without creative efforts belong to the scope of the present invention.

As mentioned above, in the operation and maintenance method based on the mobile storage device, if a terminal device has a virus infecting the mobile storage device, when a mobile storage device is accessed to the terminal device, it is likely that the mobile storage device is infected with the virus. Therefore, when the mobile storage device is accessed into other terminal devices, the other terminal devices are infected with viruses.

The inventor finds out in the development process that the essential reason for causing the mobile storage device to be infected with the virus in the product operation and maintenance process is that the terminal device has an operation of writing into the mobile storage device, that is, a tampering operation, and therefore the terminal device can only infect the virus to the mobile storage device.

In order to solve the technical problem, it may be considered that the mobile storage device is not subjected to write operation in the terminal device, so that the mobile storage device may be prevented from being infected with viruses during the operation and maintenance of the product.

Specific implementations of the above concepts are described below.

Referring to fig. 1, an embodiment of the present invention provides a product operation and maintenance method for a terminal device, where the method includes:

step 100: responding to the access of the mobile storage equipment to the terminal equipment, and determining the existence form of the mobile storage equipment in the terminal equipment; wherein the presence form is to prohibit the third party program from performing the write operation;

step 102: based on the existence form, obtaining the storage content to be called in the mobile storage equipment; the storage content comprises at least one of an installation package, an upgrade package and a network path, wherein the network path is used for indicating a storage address in which the installation package and/or the upgrade package are/is stored;

step 104: and carrying out operation and maintenance on the product of the terminal equipment based on the storage content to be called.

In the embodiment of the invention, the existence form for forbidding the third-party program to execute the write operation after the mobile storage device is accessed to the terminal device is established, so that the possible tampering operation of the mobile storage device by a malicious program in the terminal device can be avoided, and the infection of viruses to the mobile storage device in the product operation and maintenance process is avoided.

It is understood that the product of the terminal device includes software and a virus library, and the operation and maintenance of the product includes installation and upgrade of the product, that is, installation and upgrade of the software and installation and upgrade of the virus library. In addition, the storage content may directly store the installation package and/or the upgrade package, or indirectly store the installation package and/or the upgrade package, that is, the installation package and/or the upgrade package is obtained in a network path manner, for example, the installation package and/or the upgrade package occupies a large space, and the storage space of the mobile storage device cannot accommodate the installation package and/or the upgrade package, so that the installation package and/or the upgrade package may be obtained in the indirect storage manner.

The manner in which the various steps shown in fig. 1 are performed is described below.

Prior to step 100, the method further comprises:

initializing a thread interacting with the mobile storage device;

and judging whether the mobile storage equipment is accessed to the terminal equipment or not based on the initialized thread.

In this embodiment, the reason that the mobile storage device is infected with the virus also includes that the security performance of the mobile storage device is not high, that is, the right to read the storage content in the mobile storage device is low. In order to solve the technical problem, the embodiment improves the security of the mobile storage device in the process of product operation and maintenance by installing software which can be adapted to the mobile storage device in the terminal device. That is, after the software is started, the software needs to be initialized first to realize the interaction with the mobile storage device. Specifically, a thread interacting with the mobile storage device is initialized, and whether the mobile storage device is accessed to the terminal device is judged by using the initialized thread, so that the safety of the mobile storage device in the product operation and maintenance process is improved.

For step 100, the existing patterns include an optical drive pattern and a hidden sector pattern; the optical drive has read-only operation.

In this embodiment, the presence status is used to prohibit the third-party program from performing write operation, and the manner for realizing prohibition of the third-party program from performing write operation includes read-only operation and inoperable operation, where inoperable operation can be understood as that the presence status is not visible in the terminal device by the user, so that a "hidden" function, i.e., an inoperable function is realized. That is to say, by setting the existing form of the mobile storage device in the terminal device, the mobile storage device can be prevented from being infected with viruses in the product operation and maintenance process, that is, the risk of virus infection can be completely avoided in the read-only form and the inoperable form. Of course, the mobile storage device may also provide the scheduling capability of the SDK, so that interface scheduling may be provided for other third-party products, so that more products may use the mobile storage device.

It can be known that, since the optical disc drive has read-only operation, the storage manner of the storage content in the existing state can be based on the existing File system, such as FAT (File Allocation Table) File system. However, although the hidden sector pattern is an inoperable disk, if a lawless person knows the source code that can find the address of the hidden sector (this is of course a low probability), the hidden sector pattern is also exposed to a risk of being tampered with. In order to solve the technical problem, it may be considered that a file is stored in the hidden sector through a self-developed file system, and the self-developed file system establishes a file sequence table through a read-write interface of the mobile storage device, and stores a name, a path, a length, a start address, and an offset address of the file, where a format of the self-developed file system is only recognized by specific software (i.e., software adapted to the mobile storage device) deployed in the terminal device, so as to further improve security of the mobile storage device in a process of performing product operation and maintenance.

In some embodiments, step 100 may comprise:

responding to the access of the mobile storage equipment to the terminal equipment, and obtaining the unique equipment identification of the mobile storage equipment;

and determining the existence form of the mobile storage device in the terminal device based on the unique device identification.

In this embodiment, each mobile storage device is configured with a unique device identifier when it leaves the factory, and a mapping relationship between the unique device identifier and the existing form can be established by configuring the unique device identifier, so that after software identifies the unique device identifier, the existing form of the mobile storage device in the terminal device can be determined, thereby facilitating the execution of subsequent operations. For example, a mapping relationship between the unique device identifier and the optical disc drive status may be established, and if the optical disc drive status is obtained, the existing status is the optical disc drive status, and if the optical disc drive status is not obtained, the existing status is the hidden sector status.

Of course, the existence form of the mobile storage device in the terminal device can also be determined based on the address of the hidden sector. For example, in response to the access of the mobile storage device to the terminal device, a unique device identifier of the mobile storage device is obtained; wherein the unique device identification and the storage address have a mapping relationship. If a storage address is obtained based on the unique device identifier, the existence form is the hidden sector state, and if a storage address cannot be obtained based on the unique device identifier, the existence form is the optical drive state.

In some embodiments, after obtaining the unique device identifier of the mobile storage device and before determining the presence form of the mobile storage device in the terminal device based on the unique device identifier, the method further includes:

identifying a unique device identifier based on the initialized thread;

and after the identification is successful, determining the existence form of the mobile storage device in the terminal device based on the unique device identification is executed.

In this embodiment, after obtaining the unique device identifier, it may be verified whether the mobile storage device is a target device (i.e., a device adapted to software) through the unique device identifier, and if the verification is passed (i.e., the unique device identifier is successfully identified by using software), the existence form of the mobile storage device in the terminal device may be determined based on the unique device identifier; otherwise, the mobile storage device is not adapted. That is to say, the security of the mobile storage device in the process of product operation and maintenance can be further improved by setting the unique device identifier. Meanwhile, the mobile storage device can be identified only through the initialized thread, namely the mobile storage device can be identified only through the software, so that certain operation and maintenance safety is improved.

With respect to step 102, step 102 may include:

acquiring an encrypted content file based on the initialized thread and the existence form;

and decrypting the acquired content file to obtain the storage content to be called in the mobile storage equipment.

In this embodiment, since some mobile storage devices may include several installation packages and/or upgrade packages, and only part of the stored content needs to be installed and/or upgraded in this terminal device, in order to improve the execution efficiency and accuracy of the stored content, a technical solution of obtaining the stored content to be called by using a content file may be considered. In addition, in order to further improve the security of the mobile storage device in the process of product operation and maintenance, the content file may be encrypted, wherein the encryption algorithm can be decrypted only by the terminal device deployed with specific software. On this basis, in order to further improve the security of the mobile storage device in the process of performing product operation and maintenance, it may be considered that only the terminal device deployed with specific software can acquire the encrypted content file.

It is understood that if some of the stored contents are installation packages, generally speaking, the program executing the installation can directly trigger the exe file in the installation package, and the installation can be completed. However, if some of the storage contents include an upgrade package, generally speaking, the procedure for performing the upgrade requires a complicated upgrade process, so it is necessary to set an upgrade operation corresponding to the upgrade process, i.e. the reference operation and maintenance rule in the following, so that the upgrade operation on the upgrade package can be completed. Of course, some installation packages also have some complex installation operations, which are not described herein.

In some embodiments, step 104 may include:

decrypting the obtained content file to obtain a reference operation and maintenance rule; wherein the reference operation and maintenance rule comprises at least one of the following items: installing or repairing by using the installation package; upgrading by using an upgrade package; acquiring an installation package and/or an upgrade package by using a network path;

and calling and executing the storage content to be called according to the reference operation and maintenance rule so as to operate and maintain the product of the terminal equipment.

In this embodiment, in order to automatically perform the operation and maintenance operation, when some complex operation and maintenance operations are faced, it is necessary to set a guiding rule, i.e. refer to the operation and maintenance rule. After the reference operation and maintenance rule is obtained, the software can call and execute the storage content to be called according to the reference operation and maintenance rule so as to operate and maintain the product of the terminal equipment.

It should be noted that, in the prior art, after the terminal device is connected to the mobile storage device, a large number of operations are usually performed manually to complete the operation and maintenance operations, so that a series of problems such as human negligence and non-professional operation obstacles are easily caused. By using the technical scheme, the software deployed in the terminal equipment can automatically identify the mobile storage equipment and automatically execute the storage content to be called, so that the error probability of manual intervention and the probability of occurrence of complex operation errors can be greatly reduced.

Fig. 2 shows a flow chart of a method of identification of power system anomaly data according to another embodiment.

Referring to fig. 2, the method includes:

step 200: initializing a thread interacting with the mobile storage device;

step 202: judging whether the mobile storage equipment is accessed to the terminal equipment or not based on the initialized thread;

step 204: responding to the access of the mobile storage equipment to the terminal equipment, and obtaining the unique equipment identification of the mobile storage equipment;

step 206: identifying a unique device identifier based on the initialized thread;

step 208: after the identification is successful, determining the existence form of the mobile storage equipment in the terminal equipment based on the unique equipment identification;

step 210: acquiring an encrypted content file based on the initialized thread and the existence form;

step 212: decrypting the obtained content file to obtain the storage content to be called in the mobile storage device;

step 214: decrypting the obtained content file to obtain a reference operation and maintenance rule;

step 216: and calling and executing the storage content to be called according to the reference operation and maintenance rule so as to operate and maintain the product of the terminal equipment.

As shown in fig. 3 and 4, an embodiment of the present invention provides a product operation and maintenance device for a terminal device. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. From a hardware aspect, as shown in fig. 3, for a hardware architecture diagram of a computing device where a product operation and maintenance apparatus of a terminal device provided in an embodiment of the present invention is located, in addition to the processor, the memory, the network interface, and the nonvolatile memory shown in fig. 3, the computing device where the apparatus is located in the embodiment may also generally include other hardware, such as a forwarding chip responsible for processing a packet, and the like. Taking a software implementation as an example, as shown in fig. 4, as a logical apparatus, a CPU of a computing device in which the apparatus is located reads a corresponding computer program in a non-volatile memory into a memory to run.

As shown in fig. 4, the product operation and maintenance device of a terminal device provided in this embodiment includes:

a presence form determining module 400, configured to determine a presence form of the mobile storage device in the terminal device in response to the mobile storage device accessing the terminal device; wherein the presence form is to prohibit the third party program from performing the write operation;

a storage content obtaining module 402, configured to obtain storage content to be called in the mobile storage device based on the existence form; the storage content comprises at least one of an installation package, an upgrade package and a network path, wherein the network path is used for indicating a storage address in which the installation package and/or the upgrade package are/is stored;

and a product operation and maintenance module 404, configured to perform operation and maintenance on a product of the terminal device based on the storage content to be called.

In an embodiment of the present invention, the presence form determining module 400 may be configured to perform step 100 of the above method embodiment, the storage content obtaining module 402 may be configured to perform step 102 of the above method embodiment, and the product operation and maintenance module 404 may be configured to perform step 104 of the above method embodiment.

As shown in fig. 4, the product operation and maintenance device of another terminal device provided in this embodiment further includes:

an initialization module 406, configured to initialize a thread interacting with the mobile storage device;

the determining module 408 is configured to determine whether the mobile storage device is accessed to the terminal device based on the initialized thread.

In one embodiment of the invention, there is a morphology determination module 400 to perform the following operations:

responding to the access of the mobile storage equipment to the terminal equipment, and obtaining the unique equipment identification of the mobile storage equipment;

and determining the existence form of the mobile storage device in the terminal device based on the unique device identification.

In one embodiment of the invention, there is a morphology determination module 400 further operable to:

identifying a unique device identifier based on the initialized thread;

and after the identification is successful, determining the existence form of the mobile storage device in the terminal device based on the unique device identification is executed.

In an embodiment of the present invention, the storage content obtaining module 402 is configured to perform the following operations:

acquiring an encrypted content file based on the initialized thread and the existence form;

and decrypting the acquired content file to obtain the storage content to be called in the mobile storage equipment.

In an embodiment of the present invention, the product operation and maintenance module 404 is configured to perform the following operations:

decrypting the obtained content file to obtain a reference operation and maintenance rule; wherein the reference operation and maintenance rule comprises at least one of the following items: installing or repairing by using the installation package; upgrading by using an upgrade package; acquiring an installation package and/or an upgrade package by using a network path;

and calling and executing the storage content to be called according to the reference operation and maintenance rule so as to operate and maintain the product of the terminal equipment.

In one embodiment of the present invention, the presence configuration includes an optical drive configuration and a hidden sector configuration; the optical drive has read-only operation.

It should be understood that the schematic structure in the embodiment of the present invention does not specifically limit the product operation and maintenance device of a terminal device. In other embodiments of the present invention, a product operation and maintenance device of a terminal device may include more or fewer components than those shown, or combine some components, or split some components, or arrange different components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.

Because the content of information interaction, execution process, and the like among the modules in the device is based on the same concept as the method embodiment of the present invention, specific content can be referred to the description in the method embodiment of the present invention, and is not described herein again.

The embodiment of the present invention further provides a computing device, which includes a memory and a processor, where the memory stores a computer program, and when the processor executes the computer program, the product operation and maintenance method of a terminal device in any embodiment of the present invention is implemented.

The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the processor is caused to execute a product operation and maintenance method of a terminal device in any embodiment of the present invention.

Specifically, a system or an apparatus equipped with a storage medium on which software program codes that realize the functions of any of the above-described embodiments are stored may be provided, and a computer (or a CPU or MPU) of the system or the apparatus is caused to read out and execute the program codes stored in the storage medium.

In this case, the program code itself read from the storage medium can realize the functions of any of the above-described embodiments, and thus the program code and the storage medium storing the program code constitute a part of the present invention.

Examples of the storage medium for supplying the program code include a floppy disk, a hard disk, a magneto-optical disk, an optical disk (e.g., CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD + RW), a magnetic tape, a nonvolatile memory card, and a ROM. Alternatively, the program code may be downloaded from a server computer via a communications network.

Further, it should be clear that the functions of any one of the above-described embodiments may be implemented not only by executing the program code read out by the computer, but also by causing an operating system or the like operating on the computer to perform a part or all of the actual operations based on instructions of the program code.

Further, it is to be understood that the program code read out from the storage medium is written to a memory provided in an expansion board inserted into the computer or to a memory provided in an expansion module connected to the computer, and then causes a CPU or the like mounted on the expansion board or the expansion module to perform part or all of the actual operations based on instructions of the program code, thereby realizing the functions of any of the above-described embodiments.

It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an …" does not exclude the presence of other similar elements in a process, method, article, or apparatus that comprises the element.

Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.

Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

完整详细技术资料下载
上一篇:石墨接头机器人自动装卡簧、装栓机
下一篇:保存密文的方法和装置

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类