Disclosure of Invention
The application aims to provide a method, a system, a server and a computer readable storage medium for video file operation, which are used for preventing video files from being embezzled.
In order to solve the above technical problem, the present application provides a method for operating a video file, including:
receiving a user request sent by a user terminal;
determining required operation authority, a video file to be operated and a copyright party of the video file to be operated according to the user request;
sending the user request to a copyright terminal of the copyright party, and judging whether an allowing command sent by the copyright party is received;
if so, granting the operation authority to the user, and generating an exclusive authority code for the user according to the operation authority;
judging whether the video file to be operated exists in the user terminal;
and when the video file to be operated is stored in the user terminal, sending a first data packet containing the exclusive permission code to the user terminal so that a user can perform related operation on the video file to be operated according to the exclusive permission code.
Optionally, when the video file to be operated is not stored in the user terminal, the method further includes:
sending a second data packet containing the exclusive permission code to the user terminal;
when receiving an authority code input by a user, judging whether the authority code input by the user is consistent with the exclusive authority code;
and if so, encrypting the video file to be operated, and sending the obtained encrypted file packet and the key to the user terminal.
Optionally, after sending the first data packet containing the exclusive right code to the user terminal, the method further includes:
when the user performs related operation on the video file to be operated according to the exclusive permission code, recording the operation times of the user;
judging whether the user operation times exceed a first threshold value or not;
and if so, prohibiting the user from operating the video file to be operated.
Optionally, the method further includes:
when the violation behavior is detected, outputting warning information; wherein the violation behavior comprises at least one of an illegal tampering right behavior and a bypassing right check behavior.
Optionally, the determining, according to the user request, the required operation permission, the video file to be operated, and the copyright owner of the video file to be operated include:
extracting a user identity from the user request;
authenticating the user identity identification, and judging whether the user identity identification is in an abnormal state; wherein the abnormal state comprises at least one of a loss reporting state, an untrusted state and a logout state;
if so, feeding back the information of requesting invalidity to the user terminal;
if not, determining the required operation authority, the video file to be operated and the copyright party of the video file to be operated according to the user request.
Optionally, the method further includes:
when a video file uploaded by a user is received, authenticating the user uploading the video file;
when the authentication is passed, marking the user as a copyright side of the video file;
granting the copyright side the copyright ownership right of the video file; the copyright ownership permission comprises at least one of a video deletion permission and a video secondary authorization permission;
and generating a video identification code according to the video file, and writing the video identification code and the user identity of the copyright party into a database.
Optionally, the method further includes:
when the fed-back video violation information is received, respectively recording the number of the video violation information of each video file;
marking the video files of which the number of the video violation information exceeds a second threshold value as video files to be audited;
sending the video file to be audited to a management platform, and judging whether violation determining information sent by an administrator is received or not;
and if so, deleting the video file to be audited.
The present application further provides a system for video file manipulation, the system comprising:
the receiving module is used for receiving a user request sent by a user terminal;
the determining module is used for determining the required operation authority, the video file to be operated and the copyright party of the video file to be operated according to the user request;
the first judgment module is used for sending the user request to a copyright terminal of the copyright party and judging whether an allowing command sent by the copyright party is received or not;
the first permission granting module is used for granting the operation permission to the user when receiving a permission command sent by the copyright party and generating an exclusive permission code for the user according to the operation permission;
the second judgment module is used for judging whether the video file to be operated exists in the user terminal;
and the first sending module is used for sending a first data packet containing the exclusive permission code to the user terminal when the video file to be operated is stored in the user terminal so as to enable a user to perform related operation on the video file to be operated according to the exclusive permission code.
The present application also provides a video file operation server, including:
a memory for storing a computer program;
a processor for implementing the steps of the method of video file manipulation as described in any one of the above when said computer program is executed.
The present application further provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the method of video file manipulation as set forth in any one of the preceding claims.
The method for operating the video file comprises the following steps: receiving a user request sent by a user terminal; determining required operation authority, a video file to be operated and a copyright party of the video file to be operated according to a user request; sending the user request to a copyright terminal of a copyright party, and judging whether an allowing command sent by the copyright party is received; if so, granting the user operation authority, and generating an exclusive authority code for the user according to the operation authority; judging whether a video file to be operated exists in the user terminal; and if the video file to be operated is stored in the user terminal, sending the first data packet containing the exclusive permission code to the user terminal so that the user can perform related operation on the video file to be operated according to the exclusive permission code.
According to the technical scheme, the user request is sent to the copyright terminal of the copyright party, the request of the user is checked by the copyright party, corresponding permission is granted to the user if the user passes the checking, whether the video file to be operated exists in the user terminal is further judged, if the user passes the checking, the user is enabled to carry out related operation on the video file to be operated according to the permission, accordingly, the specificity of video file operation is achieved, the user is prevented from being spread randomly, legal rights and interests of a video provider, namely the copyright party, are protected, meanwhile, path tracking can be carried out on the video file to be operated, and identity information of a pirate is further determined. The application also provides a system, a server and a computer readable storage medium for video file operation, which have the beneficial effects and are not repeated herein.
Detailed Description
The core of the application is to provide a method, a system, a server and a computer readable storage medium for video file operation, which are used for preventing video files from being embezzled.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for operating a video file according to an embodiment of the present disclosure.
The method specifically comprises the following steps:
s101: receiving a user request sent by a user terminal;
for the piracy infringement problem of videos, a digital watermarking technology is generally adopted in a plurality of video websites at present, for example, LOGO is added in video content, and the purpose that when other websites or individuals play or transmit the videos, the copyright parties can trace back related responsibilities after knowing the videos is achieved; or the video resources of some video websites are only browsed by the registered user in order to prevent being embezzled, and the user is not allowed to download the video resources.
In the prior art, most video websites simply embed information for identifying image copyright owners, such as LOGO, description and the like, into videos, and copyright information is easily tampered, for example, another LOGO is used to cover the copyright information, so that the legal rights and interests of the copyright owners cannot be effectively maintained; in addition, in an environment where the internet is open, cases often occur where videos are edited, copied, downloaded, and illegally distributed at will.
Based on this, the present application provides a method of video file manipulation to solve the above-mentioned problems.
S102: determining required operation authority, a video file to be operated and a copyright party of the video file to be operated according to a user request;
when a user wants to perform operations such as watching, downloading, clipping and the like on a certain video file, a corresponding user request can be sent to the system through the user terminal, and the system determines the required operation authority, the video file to be operated and the copyright party of the video file to be operated according to the user request; the copyright party is a user with the authority of deleting or secondarily authorizing the video file to be operated;
optionally, the required operation permission, the video file to be operated, and the copyright side of the video file to be operated are determined according to the user request, which may specifically be directly obtaining the related information included in the user request.
S103: sending the user request to a copyright terminal of a copyright party, and judging whether an allowing command sent by the copyright party is received;
if yes, go to step S104;
optionally, the determining whether the permission command sent by the copyright party is received may specifically be determining whether the permission command sent by the copyright party is received within a preset time;
further, when the permission command sent by the copyright party is not received within the preset time, a prompt message of request failure can be fed back to the user terminal to inform the user that the copyright party of the video file to be operated does not permit the operation request of the user.
S104: granting the user operation authority, and generating an exclusive authority code for the user according to the operation authority;
after the copyright side agrees with the request of the user, the server grants the operation authority of the user according to the request of the user, and generates an exclusive authority code for the user according to the operation authority;
preferably, the exclusive right code mentioned here may be a 32-bit hash value generated according to the right requested by the user, and its main functions include two aspects: firstly, when the operation of a user on a video file to be operated is the first operation, before the server sends an encrypted video file packet and a secret key to the user, the identity of the user and the behavior of the user need to be determined, and the system is verified through an authority code so as to prevent the user from being tampered; and secondly, if the server guides the user to a site authorized by the copyright owner, such as a video website, the site can verify the authority of the user through the authority code.
Preferably, the generation mode of the exclusive permission code may specifically be: the server writes a user Request into a Request script in a form of 'application time-video valid time-allowed playing times-additional information', and then adds a user identity identifier and a video identification code of a video file to be operated into the Request script to form a character string of 'user identity identifier-video identification code-application time-video valid time-allowed playing times-additional information', and generates an exclusive authority code through a preset encryption algorithm;
the Request script is a script file prestored in the first data packet and the second data packet and can be used for recording information such as a video identification code, an operation application of a user to the video file to be operated, the authority granted by a copyright party, the operation record of the video file and the like.
The user identity identification can be specifically distributed for each legally registered user by the server, and identity information submitted by the user on the server can be checked through the user identity identification; the video identification code may specifically be a unique identification code of each video file stored on the server, the additional information may specifically include at least one of information such as a video format and a video resolution, the exclusive authority code may be a 32-bit hash value, and the preset encryption algorithm may specifically be an MD5 encryption algorithm, an SHA-1 encryption algorithm, or another encryption algorithm capable of generating a hash value;
MD5 is a secure hash algorithm, and inputting two different plaintext will not result in the same output value, and according to the output value, the original plaintext cannot be obtained, i.e. the process is irreversible; the calculated MD5 value length is fixed for data with any length; and any change is made to the original data, even if only 1 byte is modified, the obtained MD5 value is very different.
S105: judging whether a video file to be operated exists in the user terminal;
if yes, the process proceeds to step S106.
S106: and sending the first data packet containing the exclusive permission code to a user terminal so that a user performs related operation on the video file to be operated according to the exclusive permission code.
The method comprises the steps that whether a video file to be operated exists in a user terminal or not is judged, if yes, a first data packet containing an exclusive authority code is sent to the user terminal, and a user can perform related operation on the video file to be operated according to the exclusive authority code;
optionally, the first data packet mentioned herein may specifically include an exclusive permission code and a Request script;
furthermore, the user performs related operations on the video file to be operated according to the exclusive permission code, and the implementation manner of the method can be specifically realized through a Request script, the Request script automatically performs permission check every time the user operates the video, and sends a new user operation application to the server and returns an application result under the condition that the user authorization is invalid.
Preferably, when the user performs related operations on the video file to be operated according to the exclusive permission code, the operation times of the video file to be operated can be recorded through the Request script, when the user tries to operate the video file to be operated again, the Request script can firstly check the operation permission of the user and check whether the exclusive permission code exists, and if the permission does not accord with the exclusive permission code, the user operation is prohibited;
further, the inconsistency of the authority referred to herein may be that the number of user operations reaches a threshold, and the specific process may be:
when a user performs related operation on a video file to be operated according to the exclusive authority code, recording the operation times of the user;
judging whether the operation times of the user exceed a first threshold value or not;
and if so, prohibiting the user from operating the video file to be operated.
Further, the inconsistency of the authority may also be a threshold value reached by the user operation time, and the specific process may also be:
when a user performs related operation on a video file to be operated according to the exclusive authority code, recording the operation time of the user;
judging whether the user operation time exceeds a second threshold value;
and if so, prohibiting the user from operating the video file to be operated.
Preferably, after the user is prohibited from operating the video file to be operated, the Request script may further send an operation Request of the user to the server, and the copyright side determines whether to approve a new video operation application of the user, and if the copyright side approves the new Request of the user, the server sends a new permission code to the user terminal to replace the original permission code, and at this time, the user may perform a new operation on the video file to be operated.
Preferably, when the violation is detected, warning information can be output; wherein, the violation behavior comprises at least one of illegal tampering right behavior and bypassing right check behavior;
further, when a serious violation is detected, such as a virus-type brute force attack, the local video resource and the key can be directly deleted, then the user is marked as an 'untrusted' state in a Request script, the user is uploaded to a cloud database, and finally a local data packet is deleted.
Based on the technical scheme, the method for operating the video file provided by the application sends the user request to the copyright terminal of the copyright party, the copyright party verifies the user request, if the verification is passed, the corresponding authority is granted to the user, then whether the video file to be operated exists in the user terminal is judged, if yes, the user is enabled to carry out related operation on the video file to be operated according to the authority, therefore, the specificity of the video file operation is realized, the user is prevented from randomly spreading, the legal rights and interests of a video provider, namely the copyright party, are protected, meanwhile, the path tracking can be carried out on the video file to be operated, and further the identity information of a pirate is determined.
Based on the above technical solution, please refer to fig. 2, fig. 2 is a flowchart of an actual expression manner of S102 in the method for operating a video file provided in fig. 1, that is, determining a required operation permission, a video file to be operated, and a copyright owner of the video file to be operated according to a user request, and specifically, the method may also include the following steps:
s201: extracting a user identity from the user request;
s202: authenticating the user identity and judging whether the user identity is in an abnormal state or not;
if yes, go to step S203; if not, go to step S204;
the abnormal state mentioned herein may specifically include, but is not limited to, at least one of a loss-reporting state, an untrusted state, and a logged-off state.
S203: feeding back the information of requesting invalidity to the user terminal;
s204: and determining the required operation authority, the video file to be operated and the copyright party of the video file to be operated according to the user request.
Based on the technical scheme, the embodiment of the application extracts the user identity from the user request after receiving the user request sent by the user terminal; authenticating the user identity identification, judging whether the user identity identification is in an abnormal state or not, and feeding back information of requesting invalidity to the user terminal if the user identity identification is in the abnormal state; and if the current state is not the abnormal state, determining the required operation authority, the video file to be operated and the copyright party of the video file to be operated according to the user request so as to ensure the credibility of the user identity.
For step S105 in the above embodiment, when the video file to be operated is not stored in the user terminal, the steps shown in fig. 3 may also be executed;
referring to fig. 3, fig. 3 is a flowchart of another video file operation method according to an embodiment of the present application, which may specifically include the following steps:
s301: sending a second data packet containing the exclusive authority code to the user terminal;
optionally, the second data packet mentioned here may specifically include an exclusive permission code, a Request script, a Monitor state detection script, and an Encrypt decryption script, where the Monitor state detection script has the following functions: firstly, the states of a data packet, a key and a video file are monitored, and only locally specified programs are allowed to access and read the files; the second is a deleting function, which can delete the video files in the user terminal; the Encrypt decryption script can decrypt the encrypted file packet through the secret key to obtain the original video file.
S302: when receiving an authority code input by a user, judging whether the authority code input by the user is consistent with the exclusive authority code;
if yes, go to step S302;
s303: and encrypting the video file to be operated, and sending the obtained encrypted file packet and the key to the user terminal.
Preferably, the encrypting the video file to be operated mentioned here may be performed by the following specific process:
the video file to be operated is added into a coding encryption queue, the content of the video file is coded and encrypted by adopting a symmetric encryption algorithm, and the symmetric encryption (also called private key encryption) refers to an encryption algorithm using the same secret key for encryption and decryption. The principle of encryption here is: each encrypted file is encrypted before being encrypted by using a dynamic key generator to randomly generate a 256-bit key, and the content of the file is symmetrically encrypted by the key. When the encryption is finished, an encrypted video file packet and a key can be obtained;
furthermore, after receiving the message that the user passes the authentication, the server can copy and store the secret key into the secret key management system, and meanwhile, the secret key transmission adopts an SSL encryption channel to ensure the security of the transmission data.
Based on the technical scheme, when the video file to be operated is not stored in the user terminal, the operation request of the user to the video file to be operated is a first application for the video file by default, because the communication content is possibly peeped and tampered on the communication line, the server confirms whether the request is the application of the user by checking the authority code, so that the authority code input by the user is compared with the exclusive authority code, if the authority code and the exclusive authority code are consistent, the verification is passed, the server considers that the legal user is the video operation application provided by the user to the server through the mobile terminal and obtains the agreement of a copyright party, the video file to be operated is encrypted, and the obtained encrypted file packet and the obtained secret key are sent to the user terminal so that the user can perform related operations.
Based on the foregoing embodiments, please refer to fig. 4, and fig. 4 is a flowchart of another method for operating a video file according to an embodiment of the present application.
The method specifically comprises the following steps:
s401: when a video file uploaded by a user is received, authenticating the user uploading the video file;
s402: when the authentication is passed, the user is marked as a copyright side of the video file;
s403: granting the copyright owner authority to the video file of the copyright party;
the copyright ownership right mentioned here can include but is not limited to at least one of video deletion right and video secondary authorization right;
the video secondary authorization authority is that the copyright parties can transfer the copyright of the video resource to other users, after a plurality of users apply for operation requests of the video file, the server can automatically distribute the user requests to all the copyright parties of the video file on the server for authorization, and as long as any one copyright party agrees with the user requests, the server can send the video resource to the user terminal.
Preferably, if the copyright owner transfers the copyright of the video resource to other sites, such as video websites, when the user applies for online viewing of the video resource without downloading, the server will automatically direct the user's request to these sites, and the user can directly input the permission code for online viewing.
S404: and generating a video identification code according to the video file, and writing the video identification code and the user identity of the copyright party into a database.
Based on the foregoing embodiments, please refer to fig. 5, and fig. 5 is a flowchart of another method for operating a video file according to an embodiment of the present application.
The method specifically comprises the following steps:
s501: when the fed-back video violation information is received, respectively recording the number of the video violation information of each video file;
s502: marking the video files with the number of the video violation information exceeding a second threshold value as video files to be audited;
s503: sending the video file to be audited to a management platform, and judging whether violation determining information sent by an administrator is received or not;
if yes, go to step S504;
optionally, the determining whether the violation determining information sent by the administrator is received may specifically be determining whether the violation determining information sent by the administrator is received within a preset time, and if not, marking the video file to be audited as a legal file.
S504: and deleting the video file to be audited.
Based on the technical scheme, when a plurality of users feed back video resource violation (such as improper talk, low content and the like), in order to reduce the possibility of misjudgment of the video resource, the embodiment of the application sends a video file to be audited to a management platform, so that a manager can manually audit the video file and judge whether violation determining information sent by the manager is received, when the violation determining information sent by the manager is received, the video violation is confirmed, the server can directly cross the authority of the video copyright side to delete the video resource from the video server, and further, the local resource file can be forcibly deleted through a Monitor state detection script in a data packet, so that the violation video is ensured to be completely invalid, and the legal responsibility of an uploader can be traced through path tracking if necessary.
Referring to fig. 6, fig. 6 is a block diagram of a system for video file operation according to an embodiment of the present disclosure.
The system may include:
a receiving module 100, configured to receive a user request sent by a user terminal;
the determining module 200 is configured to determine a required operation permission, a video file to be operated, and a copyright owner of the video file to be operated according to a user request;
a first judging module 300, configured to send a user request to a copyright terminal of a copyright party, and judge whether an allowing command sent by the copyright party is received;
the first permission granting module 400 is configured to grant an operation permission to a user when receiving a permission command sent by a copyright owner, and generate an exclusive permission code for the user according to the operation permission;
a second judging module 500, configured to judge whether a video file to be operated exists in the user terminal;
the first sending module 600 is configured to send a first data packet including an exclusive permission code to the user terminal when the video file to be operated is stored in the user terminal, so that a user performs a related operation on the video file to be operated according to the exclusive permission code.
Referring to fig. 7, fig. 7 is a block diagram of another video file operation system according to an embodiment of the present disclosure.
The system may further comprise:
the second sending module is used for sending a second data packet containing the exclusive right code to the user terminal;
the third judging module is used for judging whether the authority code input by the user is consistent with the exclusive authority code when the authority code input by the user is received;
and the encryption module is used for encrypting the video file to be operated when the authority code input by the user is consistent with the exclusive authority code, and sending the obtained encrypted file packet and the key to the user terminal.
Preferably, the system may further include:
the first recording module is used for recording the operation times of the user when the user performs related operation on the video file to be operated according to the exclusive authority code;
the fourth judging module is used for judging whether the operation times of the user exceed the first threshold value;
and the operation forbidding module is used for forbidding the user to operate the video file to be operated when the operation times of the user exceed the first threshold value.
Preferably, the system may further include:
the warning module is used for outputting warning information when the violation behavior is detected; wherein the illegal action comprises at least one of illegal right tampering action and bypassing right checking action.
The determining module 200 may include:
the extraction submodule is used for extracting the user identity identification from the user request;
the authentication submodule is used for authenticating the user identity and judging whether the user identity is in an abnormal state; wherein the abnormal state comprises at least one of a loss reporting state, an untrusted state and a logout state;
the feedback submodule is used for feeding back the information of invalid request to the user terminal when the user identity is in an abnormal state;
and the determining submodule is used for determining the required operation authority, the video file to be operated and the copyright party of the video file to be operated according to the user request when the user identity identification is not in the abnormal state.
Preferably, the system may further include:
the authentication module is used for authenticating the user uploading the video file when receiving the video file uploaded by the user;
the first marking module is used for marking the user as a copyright side of the video file when the authentication is passed;
the second permission granting module is used for granting the copyright ownership permission of the video file of the copyright side; the copyright ownership permission comprises at least one of a video deletion permission and a video secondary authorization permission;
and the generating and writing module is used for generating a video identification code according to the video file and writing the video identification code and the user identity identification of the copyright party into a database.
Preferably, the system may further include:
the second recording module is used for respectively recording the number of the video violation information of each video file when the fed back video violation information is received;
the second marking module is used for marking the video files with the number of the video violation information exceeding a second threshold value as video files to be audited;
the fifth judgment module is used for sending the video file to be audited to the management platform and judging whether violation determination information sent by an administrator is received or not;
and the deleting module is used for deleting the video file to be audited when the violation determination information sent by the administrator is received.
Since the embodiment of the system portion corresponds to the embodiment of the method portion, the description of the embodiment of the system portion refers to the description of the embodiment of the method portion, and is not repeated here.
Referring to fig. 8, fig. 8 is a structural diagram of a video file operation server according to an embodiment of the present application.
The video file manipulation server 700 may vary significantly depending on configuration or performance, and may include one or more processors (CPUs) 722 (e.g., one or more processors) and memory 732, one or more storage media 730 (e.g., one or more mass storage devices) storing applications 742 or data 744. Memory 732 and storage medium 730 may be, among other things, transient storage or persistent storage. The program stored in the storage medium 730 may include one or more modules (not shown), each of which may include a sequence of instruction operations for the device. Further, the central processor 722 may be configured to communicate with the storage medium 730, and execute a series of instruction operations in the storage medium 730 on the video file operation server 700.
The video file manipulation server 700 may also include one or more power supplies 726, one or more wired or wireless network interfaces 750, one or more input-output interfaces 758, and/or one or more operating systems 741, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and so forth.
The steps in the method of video file manipulation described above in fig. 1 to 5 are implemented by the video file manipulation server based on the structure shown in fig. 8.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the apparatus and the module described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus, server and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of modules is merely a division of logical functions, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a function calling device, or a network device) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
A method, system, server and computer-readable storage medium for video file manipulation provided by the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.