Disclosure of Invention
In view of the above technical problems, the present invention provides a monitoring anomaly investigation method, a monitoring system, an electronic device, a computer storage medium and a computer program product.
The invention discloses a monitoring abnormality investigation method which is applied to a monitoring cloud, and comprises the following steps:
after the disconnection reconnection equipment completes one-time identity authentication, setting a basic communication mode between the disconnection reconnection equipment and a target server, wherein only uploading and downloading of a plurality of data of specified types are allowed in the basic communication mode;
Acquiring first operation data of the disconnection reconnection device during the disconnection reconnection period, and acquiring second operation data of a plurality of associated computer devices with preset association relations with the disconnection reconnection device during the disconnection reconnection period;
and performing risk assessment on the first operation data and the second operation data by using a risk analysis model to obtain a comprehensive risk value, if the comprehensive risk value is higher than a risk threshold value, performing secondary identity authentication on the disconnection reconnection equipment, otherwise, switching the basic communication mode into a normal communication mode.
Optionally, the acquiring the first operation data of the disconnection reconnection device during the disconnection reconnection includes:
acquiring a historical disconnection record of the disconnection reconnection device, counting the type number of each disconnection cause in the historical disconnection record, and obtaining a first dynamic adjustment coefficient according to the type number;
adjusting the standard acquisition time length corresponding to the equipment type of the disconnection reconnection equipment by using the first dynamic adjustment coefficient to obtain a target acquisition time length;
And acquiring the first operation data of the disconnection reconnection device in the disconnection reconnection period by taking the disconnection time as a reference, wherein the duration of the disconnection reconnection period is the target acquisition duration.
Optionally, the risk assessment of the first operation data and the second operation data using the risk analysis model obtains a comprehensive risk value, including:
performing risk assessment on the business data in the first operation data and the second operation data by using a risk analysis model to obtain business risk values;
if the business risk value is higher than a business risk threshold value, setting the comprehensive risk value as a preset value;
and if the business risk value is not higher than the business risk threshold, extracting first disconnection operation data of the disconnection reconnection device from the first operation data, extracting second disconnection operation data of the associated computer device from the second operation data, and performing risk assessment on the first disconnection operation data and the second disconnection operation data according to a preset logic rule to obtain a comprehensive risk value.
Optionally, extracting first disconnection operation data of the disconnection reconnection device from the first operation data, extracting second disconnection operation data of the associated computer device from the second operation data, performing risk assessment on the first disconnection operation data and the second disconnection operation data according to a preset logic rule, and obtaining a comprehensive risk value, where the method includes:
extracting and obtaining a first disconnection time and a first disconnection reconnection time of the disconnection reconnection device from the first operation data, and calculating and obtaining a first reconnection waiting time according to the first disconnection time and the first disconnection reconnection time;
Extracting and obtaining a second disconnection time and a second disconnection reconnection time of the related computer equipment from the second operation data, and calculating and obtaining a second reconnection waiting time according to the second disconnection time and the second disconnection reconnection time;
determining and obtaining a disconnection sequence between the disconnection reconnection equipment and each associated computer equipment according to the first disconnection time and each second disconnection time;
judging the overall matching degree of the wire breakage sequence and a standard wire breakage sequence, and obtaining a first risk value according to the overall matching degree, wherein the standard wire breakage sequence corresponds to the wire breakage reconnection device;
Performing deviation comparison on the first reconnection waiting time and each second reconnection waiting time respectively with the corresponding standard reconnection waiting time, and determining a second risk value according to the deviation comparison result;
And fusing the first risk value and the second risk value to obtain the comprehensive risk value.
Optionally, the fusing the first risk value and the second risk value to obtain the integrated risk value includes:
Fusing the first risk value and the second risk value to obtain a preliminary comprehensive risk value;
a second dynamic adjustment coefficient of the disconnection reconnection device is called, and the preliminary comprehensive risk value is adjusted by using the second dynamic adjustment coefficient to obtain the comprehensive risk value;
wherein the second dynamic adjustment coefficient is derived from a historical execution of the standard wire-break order.
The invention also discloses a monitoring system applied to the monitoring cloud, the system comprises a processing device and a storage device, wherein the computer code stored in the storage device is called and executed by the processing device to realize the following steps:
after the disconnection reconnection equipment completes one-time identity authentication, setting a basic communication mode between the disconnection reconnection equipment and a target server, wherein only uploading and downloading of a plurality of data of specified types are allowed in the basic communication mode;
Acquiring first operation data of the disconnection reconnection device during the disconnection reconnection period, and acquiring second operation data of a plurality of associated computer devices with preset association relations with the disconnection reconnection device during the disconnection reconnection period;
and performing risk assessment on the first operation data and the second operation data by using a risk analysis model to obtain a comprehensive risk value, if the comprehensive risk value is higher than a risk threshold value, performing secondary identity authentication on the disconnection reconnection equipment, otherwise, switching the basic communication mode into a normal communication mode.
The invention also discloses an electronic device comprising at least one processor, a memory and a computer program stored in the memory and executable on the at least one processor, the processor executing the computer program to implement the method as described in any one of the preceding.
The invention also discloses a computer storage medium storing a computer program for execution by a processor to implement a method as described in any of the preceding.
The invention also discloses a computer program product comprising computer code which, when executed by a processor of an electronic device, implements a method as described in any of the preceding.
The invention has the advantages that:
according to the scheme, the abnormal risk can be comprehensively analyzed by combining the operation data of the disconnection reconnection equipment and the related computer equipment during the disconnection reconnection, so that the risk investigation of the disconnection reconnection equipment is completed, and the risk of safety threat to a target server caused by the abnormal disconnection reconnection equipment is reduced.
Detailed Description
Other advantages and advantages of the present application will become apparent to those skilled in the art from the following detailed description, which, by way of illustration, is to be read in connection with certain specific embodiments, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In addition, the technical features of the different embodiments of the present application described below may be combined with each other as long as they do not collide with each other.
In view of the above technical problems, as shown in fig. 1, an embodiment of the present invention discloses a monitoring anomaly investigation method applied to a monitoring cloud, the method includes the following steps:
S101, setting a basic communication mode between the disconnection reconnection device and a target server after the disconnection reconnection device completes identity authentication once, wherein the basic communication mode only allows uploading and downloading of a plurality of specified types of data.
The monitoring cloud may communicate with the accessed individual computer devices via, for example, eBPF (Extended Berkeley PACKET FILTER) technology to receive communication data from the computer devices, thereby enabling status monitoring of large-scale computer devices. For example, the computer device is a plurality of financial transaction computers in a financial transaction system, the computers are distributed in various securities business departments, banking sites, financial data centers and the like, and the monitoring cloud is used for monitoring the running state of the computer device and managing the communication connection between the computer device and the target server.
The monitored computer equipment is disconnected with the monitoring cloud because of communication faults and the like, and disconnected computer equipment tries to reestablish connection with the monitoring cloud through the modes of restarting the whole machine, restarting a communication module and the like, and at the moment, the computer equipment is disconnected reconnection equipment. The disconnected reconnection device needs to send identity data (including key information such as device numbers, affiliated organization codes, digital certificates and the like) to the monitoring cloud for verification. In consideration of the fact that the equipment possibly faces safety risks during disconnection, the monitoring cloud can not immediately recover all communication functions of the equipment, after verification is passed, the monitoring cloud limits communication between the equipment and a target server to a basic communication mode, namely only data meeting specified types (identity data of the equipment, current basic running state data, such as CPU temperature, residual available space of memory and the like, which do not relate to sensitive transaction information) are allowed to be uploaded and downloaded, and large-scale data interaction of the equipment possibly at risk is prevented when insufficient investigation is carried out, so that safety threat to a computer system is avoided.
S102, acquiring first operation data of the disconnection reconnection device during disconnection reconnection, and acquiring second operation data of a plurality of associated computer devices with preset association relations with the disconnection reconnection device during disconnection reconnection.
The monitoring cloud further obtains first operation data of the disconnection reconnection device in a disconnection reconnection period, wherein the disconnection reconnection period refers to a period from a certain time (for example, 10s before disconnection) before the disconnection time of the disconnection reconnection device to the time when reconnection is started. Taking the transaction computer of the securities business department as an example, the monitoring cloud obtains the detailed log record of the transaction software during the disconnection period through a safety communication channel pre-established with the transaction computer. These logs are screened to see if there are abnormal login attempts, e.g., multiple times to login to different transaction accounts using an incorrect password for a short period of time, or if there are unauthorized programs attempting to modify default parameters of the transaction order, such as transaction price limits, upper transaction amount limits, etc.
Meanwhile, the monitoring cloud terminal can also acquire second operation data of a plurality of associated computer devices with preset association relations (pre-designated manually) with the disconnection reconnection device in the same time period. The associated computer device may be an auxiliary device for supporting the transaction computer, such as a data storage server, a monitoring and early warning server, an associated business exchange server, etc., or may be a computer or server of another financial system (e.g., a banking system) having business to and from the transaction computer. The operation data of the associated computer equipment in the same time period is abnormal or not, and the operation data can be used for assisting in analyzing whether the disconnection and reconnection behaviors of the transaction computer are abnormal or not.
And S103, performing risk assessment on the first operation data and the second operation data by using a risk analysis model to obtain a comprehensive risk value, if the comprehensive risk value is higher than a risk threshold, performing secondary identity authentication on the disconnection reconnection equipment, otherwise, switching the basic communication mode into a normal communication mode.
After the first operation data of the disconnection reconnection device and the second operation data of the related device are successfully obtained, the monitoring cloud enables a pre-trained risk analysis model to conduct depth analysis and risk assessment on the data.
For example, a risk threshold of 75 points is preset based on past security events and risk assessment experience. When the calculated comprehensive risk value is 85 minutes and is obviously higher than the risk threshold, the monitoring cloud can immediately trigger a secondary identity authentication process. The method comprises the steps of but not limited to requiring the staff of the securities business department to input a randomly generated disposable password through a dynamic two-dimensional code displayed on a mobile authentication APP scanning device exclusive to a financial system, and simultaneously combining with a biological recognition technology such as fingerprint recognition or facial recognition and the like to perform multiple identity verification. Through the strict secondary identity authentication mode, the validity of the equipment and the true identity of an operator are further confirmed, so that illegal equipment or malicious personnel can be effectively prevented from performing financial transaction operation by utilizing the loopholes during the disconnection of the equipment.
If the calculated comprehensive risk value is 65 minutes and is lower than the risk threshold, the monitoring cloud judges that abnormal conditions which are enough to threat the safety of the financial transaction do not occur in the disconnection reconnection period of the disconnection reconnection device. At this time, the monitoring cloud stably switches the basic communication mode between the device and the monitoring cloud to the normal communication mode. The trading computer of the securities business department can resume normal financial trade operation, such as receiving stock quotation data, buying and selling stocks for clients, executing funds transfer and other various complicated and high-frequency financial trade businesses, and ensuring the efficient and smooth development of the financial trade businesses.
According to the scheme, the abnormal risk can be comprehensively analyzed by combining the operation data of the disconnection reconnection equipment and the related computer equipment during the disconnection reconnection, so that the risk investigation of the disconnection reconnection equipment is completed, and the risk of safety threat to a target server caused by the abnormal disconnection reconnection equipment is reduced.
It should be noted that, the above-mentioned scheme of the present invention is not only used in financial transaction systems, but also used in, for example, industrial control systems, intelligent transportation systems, medical information systems, etc., and these systems all have various computer devices (for example, order data importing computers, signal controllers, doctor terminals, etc.), and these computer devices need to be communicatively connected with corresponding target servers under the supervision of the monitoring cloud. In addition, the risk analysis model is also obtained by training the actual operation data in the corresponding application system in advance, and may be constructed by using, for example, a transducer, a general large model (for example, GPT series), and the like, which will not be described in detail.
Optionally, the acquiring the first operation data of the disconnection reconnection device during the disconnection reconnection includes:
acquiring a historical disconnection record of the disconnection reconnection device, counting the type number of each disconnection cause in the historical disconnection record, and obtaining a first dynamic adjustment coefficient according to the type number;
adjusting the standard acquisition time length corresponding to the equipment type of the disconnection reconnection equipment by using the first dynamic adjustment coefficient to obtain a target acquisition time length;
And acquiring the first operation data of the disconnection reconnection device in the disconnection reconnection period by taking the disconnection time as a reference, wherein the duration of the disconnection reconnection period is the target acquisition duration.
In this embodiment, the operation data of the wire-break reconnection device in a period of time before wire breaking may be used to reflect whether there is an abnormality, for example, the wire-break reconnection device has a characteristic of obvious data transmission failure before wire breaking, which indicates that there may be problems such as electromagnetic interference, line failure, etc. in the area where the wire-break reconnection device is located, resulting in unstable data transmission. If the disconnection reconnection device is normally operated before disconnection, the disconnection reconnection device may be exposed to an abnormal condition, and the risk value of the disconnection reconnection device is higher. In addition, the "abnormality" of the present invention may include abnormality of the business content, which will be described in detail later.
And for the acquisition time length of the first operation data, taking the disconnection time as a reference, upwards reaching the reconnection time, downwards (i.e. in the history direction) reaching the preset time, and taking the time period between the reconnection time and the preset time as the acquisition time length. Specifically:
the historical wire breakage record of the wire breakage reconnection equipment is firstly obtained, wherein the historical wire breakage record comprises a plurality of wire breakage records of the wire breakage reconnection equipment, and each wire breakage record also comprises corresponding wire breakage reasons, such as line aging, electromagnetic interference, software faults and the like. When the diversity of fault reasons is higher, more operation data before disconnection need to be acquired, so that a risk analysis model can accurately analyze whether the disconnection reconnection device is disconnected due to conventional reasons or whether the disconnection is caused by unconventional abnormal reasons (such as intentional plugging by an intruder), otherwise, only less operation data before disconnection in a shorter time period need to be acquired. And then, counting the types of various broken line reasons (namely, how many broken line reasons are in total) and then obtaining a first dynamic adjustment coefficient according to the matching of the types, wherein the first dynamic adjustment coefficient is positively correlated with the types of the types.
Different computer devices are grouped in advance, each computer device corresponds to one device type, such as transaction type devices and data management type devices, and different device types correspond to different standard acquisition time periods (such as 5s and 10 s). And then, a first dynamic adjustment coefficient (for example, 1.2 and 1.5) is used for adjusting the standard acquisition time length corresponding to the equipment type of the disconnection reconnection equipment to obtain the target acquisition time length. The adjustment is, for example, the first dynamic adjustment coefficient multiplied by the standard acquisition time period.
And finally, taking the disconnection time as a reference, and acquiring first operation data of the disconnection reconnection equipment in the disconnection reconnection period according to the target acquisition time length.
The second operation data of the associated computer device is the same as the disconnection reconnection device, that is, the operation data of the disconnection reconnection device and the associated computer device in the same disconnection reconnection period are obtained at the same time.
Optionally, the risk assessment of the first operation data and the second operation data using the risk analysis model obtains a comprehensive risk value, including:
performing risk assessment on the business data in the first operation data and the second operation data by using a risk analysis model to obtain business risk values;
if the business risk value is higher than a business risk threshold value, setting the comprehensive risk value as a preset value;
and if the business risk value is not higher than the business risk threshold, extracting first disconnection operation data of the disconnection reconnection device from the first operation data, extracting second disconnection operation data of the associated computer device from the second operation data, and performing risk assessment on the first disconnection operation data and the second disconnection operation data according to a preset logic rule to obtain a comprehensive risk value.
In this embodiment, the acquired first operation data and second operation data include service data and disconnection operation data of each computer device at the same time. Where the transaction data refers to a particular type of data processing transaction undertaken by the computer device, such as securities transaction data (transaction time, transaction amount, transaction object, transaction type, etc.), account login data (e.g., multiple login password errors, multiple changes to other login accounts), etc. And analyzing whether abnormal business contents exist in the business data by using a risk analysis model so as to obtain corresponding business risk values. The risk analysis model realizes training by using actual business risk data, so that whether the current business data has a business risk of a specified type or not can be identified, and a specific business risk value can be estimated.
The disconnection operation data mainly comprise disconnection time, disconnection reconnection time and the like, and because the disconnection reconnection equipment and the associated computer equipment have an association relationship, the association relationship is embodied in a standard operation rule, the normal disconnection reconnection operation of the disconnection reconnection equipment is realized by relying on the assistance cooperation of other associated computer equipment, and the logic rule is formed based on the standard operation rule. Therefore, the risk assessment is carried out on the first disconnection operation data and the second disconnection operation data according to the preset logic rule, and the comprehensive risk value is obtained.
It should be noted that, the preset value is a fixed value, which is higher than the risk threshold. When the comprehensive risk value is a preset value, the service abnormality of the disconnection reconnection equipment is determined, and at the moment, the reconnection behavior after disconnection of the disconnection reconnection equipment can be directly determined as abnormal behavior, and secondary identity verification is required.
Optionally, extracting first disconnection operation data of the disconnection reconnection device from the first operation data, extracting second disconnection operation data of the associated computer device from the second operation data, performing risk assessment on the first disconnection operation data and the second disconnection operation data according to a preset logic rule, and obtaining a comprehensive risk value, where the method includes:
extracting and obtaining a first disconnection time and a first disconnection reconnection time of the disconnection reconnection device from the first operation data, and calculating and obtaining a first reconnection waiting time according to the first disconnection time and the first disconnection reconnection time;
Extracting and obtaining a second disconnection time and a second disconnection reconnection time of the related computer equipment from the second operation data, and calculating and obtaining a second reconnection waiting time according to the second disconnection time and the second disconnection reconnection time;
determining and obtaining a disconnection sequence between the disconnection reconnection equipment and each associated computer equipment according to the first disconnection time and each second disconnection time;
judging the overall matching degree of the wire breakage sequence and a standard wire breakage sequence, and obtaining a first risk value according to the overall matching degree, wherein the standard wire breakage sequence corresponds to the wire breakage reconnection device;
Performing deviation comparison on the first reconnection waiting time and each second reconnection waiting time respectively with the corresponding standard reconnection waiting time, and determining a second risk value according to the deviation comparison result;
And fusing the first risk value and the second risk value to obtain the comprehensive risk value.
In this embodiment, as described above, the disconnection operation data of each computer device mainly includes a disconnection time and a disconnection reconnection time, so that reconnection waiting periods of the disconnection reconnection device and the associated computer device can be calculated respectively, that is, how long these devices wait for communication reconnection with the monitoring cloud after disconnection.
In view of factors such as service association relation and data security among the computer devices, when a certain computer device needs to be disconnected and reconnected due to abnormal communication, the computer device cannot directly perform operations such as restarting and the like, but coordinates with other related computer devices according to a predetermined standard disconnection sequence, and each computer device including the disconnected and reconnected device sequentially disconnects communication connection with the monitoring cloud according to the standard disconnection sequence (for example, the computer device is realized by restarting a complete machine or a communication module or performing communication disconnection, reconnection and the like through a software operation mode). In addition, to ensure transaction standardization, data security, etc., such standard wire-break sequences typically encourage workers to refer to execution, but do not have to be strictly executed in their entirety, and some of the standard wire-break sequences may actually be performed without reference. According to the invention, the first risk value of the reconnection behavior of the disconnection reconnection device is analyzed by analyzing the overall matching degree of the disconnection sequence of the computer devices and the standard disconnection reconnection sequence, and the first risk value is inversely related to the overall matching degree. For example, when only the disconnection reconnection device is found to be disconnected from the monitoring cloud, but no other related computer device is disconnected from the monitoring cloud, the disconnection reconnection device is determined to have a high risk, for example, an illegal person directly pulls out the disconnection reconnection device from the connection interface with the monitoring cloud, and when the disconnection sequence of all the key computer devices accords with the standard disconnection sequence, the disconnection reconnection device is determined to have a low risk.
Meanwhile, in addition to the disconnection sequence, the time required for restarting, disconnecting, reconnecting operation and the like is considered, and the reconnection waiting time of different computer devices is generally regular. Therefore, the invention further compares the deviation of the reconnection waiting time of each related computer device with the corresponding standard reconnection waiting time, and further analyzes the second risk value of the reconnection behavior of the disconnection reconnection device. For example, the above-mentioned deviations of each of the computer devices involved are calculated, for example an average or median value of these deviations is calculated, and a second risk value is derived from this median value and the preset control data. The standard reconnection waiting time is obtained by carrying out statistical analysis on a plurality of groups of disconnection time and first reconnection time of corresponding computer equipment. For example, the standard reconnection waiting time of the disconnected reconnection device is 10s, but the monitoring cloud finds that the reconnection waiting time of the disconnected reconnection device is only 5s, which indicates that the disconnected reconnection device may be another computer device which is ready for communication connection, for example, the computer device is a counterfeit device but is configured with a trusted digital certificate (obtained through an illegal way), and an intruder quickly pulls out the original computer device and inserts the counterfeit computer device into the counterfeit computer device, and at the moment, the disconnected reconnection device is determined to have a great risk.
And finally, fusing (e.g. summing and taking the maximum value) the obtained first risk value and the second risk value to obtain a comprehensive risk value.
Optionally, the fusing the first risk value and the second risk value to obtain the integrated risk value includes:
Fusing the first risk value and the second risk value to obtain a preliminary comprehensive risk value;
a second dynamic adjustment coefficient of the disconnection reconnection device is called, and the preliminary comprehensive risk value is adjusted by using the second dynamic adjustment coefficient to obtain the comprehensive risk value;
wherein the second dynamic adjustment coefficient is derived from a historical execution of the standard wire-break order.
In this embodiment, as previously described, the standard wire-break order, while advantageous for transaction normalization, data security, etc., is not necessarily all strictly performed, and in practice, the relevant personnel may only perform some of the critical orders therein, and may not perform for which non-critical orders. In consideration of the actual situation, the invention further obtains the historical execution degree corresponding to the standard disconnection sequence based on the actual operation record of the related personnel, and the higher the historical execution degree is, the higher the duty ratio of the standard disconnection sequence which is strictly executed is, and the lower the duty ratio is, otherwise. The historical execution level may be the duty cycle at which the standard wire-break order is strictly executed, or the wire-break order that is most adopted involves the ratio of each node in the standard wire-break order to all nodes in the standard wire-break order, for example, 8 nodes in the standard wire-break order, and 6 of which are most adopted, then the historical execution level is 75%.
Then, the invention obtains a corresponding second dynamic adjustment coefficient based on the historical execution degree matching, and uses the second dynamic adjustment coefficient to correct the obtained preliminary comprehensive risk value appropriately so as to obtain a final comprehensive risk value. Thus, unnecessary secondary identity authentication can be reduced, and user experience is improved. The second dynamic adjustment coefficient is positively correlated with the historical execution degree, and the sensitivity of the risk analysis can be adjusted through the second dynamic adjustment coefficient.
As shown in fig. 2, the embodiment of the invention also discloses a monitoring system applied to a monitoring cloud, the system comprises a processing device and a storage device, wherein computer codes stored in the storage device are called and executed by the processing device to realize the following steps:
after the disconnection reconnection equipment completes one-time identity authentication, setting a basic communication mode between the disconnection reconnection equipment and a target server, wherein only uploading and downloading of a plurality of data of specified types are allowed in the basic communication mode;
Acquiring first operation data of the disconnection reconnection device during the disconnection reconnection period, and acquiring second operation data of a plurality of associated computer devices with preset association relations with the disconnection reconnection device during the disconnection reconnection period;
and performing risk assessment on the first operation data and the second operation data by using a risk analysis model to obtain a comprehensive risk value, if the comprehensive risk value is higher than a risk threshold value, performing secondary identity authentication on the disconnection reconnection equipment, otherwise, switching the basic communication mode into a normal communication mode.
The monitoring system can be embedded in the monitoring cloud, and can also be positioned outside the monitoring cloud but can be called by the monitoring cloud.
The embodiment of the invention also discloses an electronic device, which comprises at least one processor, a memory and a computer program stored in the memory and capable of running on the at least one processor, wherein the processor executes the computer program to realize the method according to the previous embodiment.
The embodiment of the invention also discloses a computer storage medium, which stores a computer program, and the computer program is executed by a processor to implement the method according to the previous embodiment.
The embodiment of the invention also discloses a computer program product, which comprises computer code, wherein the computer code is executed by a processor of electronic equipment to realize the method according to the previous embodiment.
The computer readable storage medium described above can include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present invention may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solution of the present invention are achieved, and the present invention is not limited herein.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.