CN105072135B - A kind of the authorization method for authenticating and system of cloud file-sharing - Google Patents

A kind of the authorization method for authenticating and system of cloud file-sharing Download PDF

Info

Publication number
CN105072135B
CN105072135B CN201510554226.0A CN201510554226A CN105072135B CN 105072135 B CN105072135 B CN 105072135B CN 201510554226 A CN201510554226 A CN 201510554226A CN 105072135 B CN105072135 B CN 105072135B
Authority
CN
China
Prior art keywords
user
file
token
list
primary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510554226.0A
Other languages
Chinese (zh)
Other versions
CN105072135A (en
Inventor
任伟
曾玲玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Heilongjiang ruidao Technology Co.,Ltd.
Original Assignee
China University of Geosciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Geosciences filed Critical China University of Geosciences
Priority to CN201510554226.0A priority Critical patent/CN105072135B/en
Publication of CN105072135A publication Critical patent/CN105072135A/en
Application granted granted Critical
Publication of CN105072135B publication Critical patent/CN105072135B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of authorization method for authenticating of cloud file-sharing and system, this method to include:After primary user uses the user name of oneself, password login server, file to be sharing is uploaded;User interface of the primary user by server end, the token for adding primary user, user name and token from user, and the access authority from user to the shared file currently uploaded is set;By the user name of primary user, password and after the username and password login service device that the token of user informs from user, from user using primary user, server obtains and verifies the token from user primary user;Server finds the user name from user according to the slave User Token after verifying, and the access authority from user to shared file is got from server.The present invention makes non-administrative users also access authority can be arranged for different user to the cloud shared file of upload, can prevent file from leaking, accidentally modify, and convenient and efficient, calculation amount is small, easy to accomplish.

Description

A kind of the authorization method for authenticating and system of cloud file-sharing
Technical field
The present invention relates to mobile Internet and field of cloud calculation more particularly to a kind of authorization method for authenticating of cloud file-sharing And system.
Background technique
Occur a kind of cloud file-sharing service in internet, cloud computing, i.e. some file uploads to cloud, then other Downloading, browsing, editor's this document in people or other terminals.Such as Baidu's cloud, Kingsoft cloud etc., it is each provided with cloud file-sharing clothes Business.But the accurate access control to file can not be provided in this service at present, i.e., the primary user of upper transmitting file is uploading text After part, other shared participating users are the permission that can be equal to primary user to the access control right of file from user, that is, are led " single " of access control right is caused, this leads to the inadequate fine granularity of the access authority of file, is easy to appear the leakage of file, accidentally repairs The safety problems such as change, therefore, the access control of cloud shared file especially authorizes and method for authenticating is one and needs what is solved to ask Topic.
Currently, although access control based roles method comparative maturity, under cloud file-sharing situation, Common access control based roles method cannot be used directly, this setting for being primarily due to traditional access control method needs It to be completed by the system manager of server, and under cloud shared platform, it needs to be completed by file uploader, usual ordinary user is not Have the basic conception of role-base access control method, is unable to complete the user point that the knowledge that system manager just has is completed With role, the tasks such as role-security definition, it is, therefore, desirable to provide simpler solution.Simultaneously need in view of compared with Property convenient for management when multiple users share is compared with multifile, it is often desirable that certain user can voluntarily establish child user group, and antithetical phrase The member of user group automatically authority access authority.Primary user can be replaced to exercise distribution from user therefore, it is necessary to certain Permission(Authorize again)Right.
In view of the development of current mobile Internet, the possibility of mobile terminal such as smart phone processing cloud shared file is used Property be significantly increased, such number of users increases substantially, it is therefore proposed that for the shared authorization of cloud of intelligent movable mobile phone and authentication Method is necessary.
Summary of the invention
The technical problem to be solved in the present invention is that for file uploader in the prior art permission can not be carried out to file The defect of setting, providing one kind can prevent file from revealing and accidentally modifying, and file uploader can access to file The authorization method for authenticating of the cloud file-sharing of permission control.
The technical solution adopted by the present invention to solve the technical problems is:
The present invention provides a kind of authorization method for authenticating of cloud file-sharing, includes the following steps:
After S1, primary user use the user name of oneself, password login server, file to be sharing is uploaded;
S2, file upload after the completion of, primary user in the user interface of server end, can add primary user token, from The user name and token at family, and be arranged from user to the access authority of the shared file of upload;
S3, primary user complete to be informed by the user name of primary user, password and from the token of user after the authorization of user From user, it will be authenticated from user login services device end, and specifically include following steps:
After S31, the username and password login service device from user using primary user, server request is obtained and is verified From the token of user;
S32, server find the user name from user according to the slave User Token after verifying, and obtain from server Get the access authority from user to shared file.
The particular content of step S2 shared file setting is to include:
Server saves setting result into access control list ACL and User Control List UCL;
Access control list ACL includes listed files, and to the user list that listed files is assigned, user list is to file The list of access rights of file in list, additional conditions list and user founder;
User Control List UCL includes user name and token.
The additional conditions list includes:Spatial geographical locations information, equipment identification information are sky, are indicated not to be empty It limits.
User interface in step S2 specifically includes:
New user adds interface, and primary user adds the token of primary user in the interface, and addition prepares setting file access Permission from user, and user name and token from user are set;
User file access authority set interface, primary user can be arranged from user in the interface to the access right of file Limit, set content includes listed files, user list, list of access rights, additional conditions list and user founder.
It completes in step S2 to after the setting of the access authority of user, primary user can continue the addition of login service device Other access authority, or the operation that the access authority is modified and deleted.
Prescribing a time limit from permission of the user to file for ownership in step S3 should can be other to specified file from user User distributes permission again, carries out further extension authorization.
The present invention also provides a kind of authorization right discriminating systems of cloud file-sharing, specifically include:
File uploading unit, for uploading file to be sharing after primary user is using user name login service device;
Primary user's authorization unit, for after the completion of file uploads, primary user to add master in the user interface of server end The token of user, user name and token from user, and be arranged from user to the access authority of the shared file of upload;
From subscription authentication unit, for completing in primary user to after the authorization of user, by the user name of primary user, password It informs with from the token of user from user, is authenticated, specifically included from user login services device end:
Token authentication unit, for from user using primary user username and password login service device after, server It requests, obtain and verify the token from user;
Authority acquiring unit, server find the user name from user according to the slave User Token after verifying, and from clothes The access authority from user to shared file is got on business device.
Primary user's authorization unit specifically includes:
Accesses control list unit is saved in the access control list ACL of server, the access for result will to be arranged Controlling list includes listed files, to the user list that listed files is assigned, visit of the user list to file in listed files Ask permissions list, additional conditions list and user founder;
User Control List unit is saved in the User Control List UCL of server, the user for result will to be arranged Controlling list includes user name and token.
User interface in primary user's authorization unit specifically includes:
New user adds interface, and primary user adds the token of primary user in the interface, and addition prepares setting file access Permission from user, and user name and token from user are set;
The visit from user to file can be set in user file access authority set interface, primary user in the interface Ask that permission, set content include listed files, user list, list of access rights, additional conditions list and user founder.
From prescribing a time limit from permission of the user to file for ownership in subscription authentication unit, being somebody's turn to do can be to specified text from user Part is that other users distribute permission again, carries out further extension authorization.
The beneficial effect comprise that:The present invention provides a kind of authorization method for authenticating of cloud file-sharing, pass through Different users is identified using token, makes non-administrative users that can also be directed to different use to the cloud shared file of upload Access authority is arranged in family, and is identified by server end to from the token of user, and then authenticate to it;This method can To prevent file from leaking, accidentally modify, and convenient and efficient, calculation amount is small, easy to accomplish.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is the flow chart of the authorization method for authenticating of the cloud file-sharing of the embodiment of the present invention;
Fig. 2 is the structure chart of the authorization right discriminating system of the cloud file-sharing of the embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.
As shown in Figure 1, the authorization method for authenticating of cloud file-sharing of the invention includes the following steps:
After S1, primary user are using user name UserName and token Token login service device, file to be sharing is uploaded. Such as:Primary user utilizes the cloud account number of oneself(It is assumed to be " cug ")And password(It is assumed to be " 123456 ")Log in Cloud Server (It is assumed to be Kingsoft cloud disk, Baidu's cloud disk, some in Ali's cloud disk)Afterwards, upper transmitting file(Assuming that file entitled F1, F2, F3);After the completion of file uploads, one can be added automatically in server end and is recorded in access control list ACL, this is recorded as< FList={ F1, F2, F3 }, UserName=Master, OWN, CList=NULL, ByWhom=NULL>;Then server will continue to Automatic addition one is recorded in User Control List UCL, this is recorded as<UserName=Master,Token=Master>.
After the completion of S2, file upload, the user interface at primary user's login service device end.It should in one embodiment of the present of invention User interface specifically may include:
New user adds interface, and primary user can be added with the token of primary user oneself in the interface and be prepared setting File access permission from user, and user name UserName and token Token from user are set, for example,<UserName1, Token1>,<UserName2,Token2>;
The visit from user to file can be set in user file access authority set interface, primary user in the interface Ask that permission, set content include listed files, user list, list of access rights, additional conditions list and file creator.Add Add the UserName and Token from user, is arranged from user to the access authority of the shared file of upload, for example,<F1, UserName1,Modify,NULL,Master>,<F2,UserName1,Update,Null,Master>,<F3, UserName2,Read,NULL,Master>;That is the ByWhom in 3 newly added records is primary user Master, And CList is sky, i.e., without limitation.It completes in primary user to after the priority assignation of user, primary user can continue at this The operation modified and deleted to access authority in the priority assignation page.
After accomplishing the setting up, server saves the result being arranged in interface into the ACL table and UCL table of server.Then it leads User by the cloud account number of oneself, that is, and password, and inform from the corresponding Token of user from user, i.e., " cug ", " 123456 ", " Token1 " inform that user 1, " cug ", " 123456 ", " Token2 " inform user 2.
Wherein, the listed files FList in ACL includes one or more file name F, and user list UList includes One or more user's name UserName;List of access rights PList includes one or more access authority title P;It is attached Adding condition list CList includes one or more additional conditions title C;In addition, the relationship between them is the use in UList Family is to the cloud file name FList being assigned, in the case where additional conditions CList meets, cloud file access having the same Authority name PList, file creator ByWhom;User Control List UCL includes user name UserName and token Token.
Additional conditions list CList includes:Spatial geographical locations information, equipment identification information, or be NULL, it indicates not It limits.Equipment beacon information includes:From the terminal device MAC Address of user, from the IMSI of the terminal device of user, Yi Jicong The IMEI of the terminal device of user.List of access rights PList is specifically included:Possess permission (OWN), renewal authority (Update), modification authority (Modify), read right (READ).
S3, primary user complete to be authenticated, specifically included following from user login services device end to after the authorization of user Step:
S31, after user login services device, server obtains and verifies the token Token from user;For example, user 2 exists After the cloud account number and password login Cloud Server of primary user, server will inquire its Token;User 2 shows that its Token is Token2。
S32, server find the user name UserName from user according to the slave User Token Token after verifying, and The access authority from user to shared file is got from server.
Step S32 can be further specifically, server after learning the Token of currently logged on user, be learnt according to UCL Its UserName, and ACL is accessed according to UserName and obtains its accessible FList, and is corresponding with FList PList and CList;Such as in this example, server learns that its UserName is according to UCL after learning that its Token is Token2 Then UserName2 accesses ACL according to UserName2 and obtains<F3, UserName2, Read, NULL, Master>, it can " reading " file F3.
If the corresponding certain file permissions of user name UserName obtained are OWN permission, the user name UserName can carry out further extension Authorized operation to these files.
In another embodiment of the authorization method for authenticating of cloud file-sharing of the invention, authorized to from user During, user file access authority set interface, including filename, user name, permission name, additional conditions name;For example,< FList={ F1, F2 }, UserName1, OWN, NULL, Master>,<F3,UserName2,Read,NULL,Master>;It is exactly Say that F1 and F2 are OWN permission for UserName1, UserName1 can continue to distribute the permission of file.
Then during to being authenticated from user, from user such as user 1 using primary user cloud account number and After password login Cloud Server, server will inquire its Token;User 1 shows that its Token is Token1.Server is being learnt After its Token is Token1, learns that its UserName is UserName1 according to UCL, ACL is then accessed according to UserName1 and is obtained It arrives<FList={ F1, F2 }, UserName1, OWN, NULL, Master>, it can file F1 and F2 are continued to distribute permission.
If the corresponding P of certain F in the corresponding FList of the UserName is OWN permission, UserName can be to these F Further extension Authorized operation is carried out, including:It adds new user UserName_Sub, save new record into ACL(New record For new user UserName_Sub, to the access authority P of file F, and the ByWhom of new record is the UserName);Addition is new User's name UserName_Sub and Token to UCL.
In the present embodiment, user 1 can be considered group leader, continue to distribute group member's progress Document Editing, such as UserName1 pairs Add UserName_Sub1 and UserName_Sub2, to Token be Token_Sub1 and Token_Sub2, will< UserName_Sub1,Token_Sub1>With<UserName_Sub2,Token_Sub2>Into UCL;The visit of two group members is set Ask permission, such as:<F1,UserName_Sub1,Modify,NULL,UserName1>,<F2,UserName_Sub2, Modify,NULL,UserName1>, it is added in ACL, it is seen that the ByWhom of this 2 records is UserName1.The two Group member can modify respectively to file F1 and F2, but cannot update, and update is responsible for by group leader.
When CList is not sky, such as:<F3, UserName2, Read, CList={ Location=Nanjing }, Master >, then only geographical location UserName2 at Nanjing could read (" Read ") file F3;<F3,UserName2,Read, CList={ Location=Nanjing, MAC=AABBCCDD }, Master>, then only geographical location is at Nanjing, and use When the MAC Address of equipment is " AABBCCDD ", UserName2 could read (" Read ") file F3.
As shown in Fig. 2, the authorization right discriminating system of the cloud file-sharing of the embodiment of the present invention is for realizing above-described embodiment The authorization method for authenticating of cloud file-sharing, specifically includes:
File uploading unit 201, for uploading file to be sharing after primary user is using user name login service device;
Primary user's authorization unit 202 is used for after the completion of file uploads, the user interface at primary user's login service device end, The user name and token from user are added, and is arranged from user to the access authority of the shared file of upload;
From subscription authentication unit 203, for completing in primary user to after the authorization of user, by the user name of primary user, Password and from the token of user inform from user, authenticated, specifically included from user login services device end:
Token authentication unit, for from user using primary user username and password login service device after, server It requests, obtain and verify the token from user;
Authority acquiring unit, server find the user name from user according to the slave User Token after verifying, and from clothes The access authority from user to shared file is got on business device.
Primary user's authorization unit specifically includes:
Accesses control list unit is saved in the access control list ACL of server, the access for result will to be arranged Controlling list includes listed files, to the user list that listed files is assigned, visit of the user list to file in listed files Ask permissions list, additional conditions list and user founder;
User Control List unit is saved in the User Control List UCL of server, the user for result will to be arranged Controlling list includes user name and token.
User interface in primary user's authorization unit specifically includes:
New user adds interface, and primary user adds the token of primary user in the interface, and addition prepares setting file access Permission from user, and user name and token from user are set;
The visit from user to file can be set in user file access authority set interface, primary user in the interface Ask that permission, set content include listed files, user list, list of access rights, additional conditions list and user founder.
From prescribing a time limit from permission of the user to file for ownership in subscription authentication unit, being somebody's turn to do can be to specified text from user Part is that other users distribute permission again, carries out further extension authorization.
It should be understood that for those of ordinary skills, it can be modified or changed according to the above description, And all these modifications and variations should all belong to the protection domain of appended claims of the present invention.

Claims (2)

1. a kind of authorization method for authenticating of cloud file-sharing, which is characterized in that include the following steps:
After S1, primary user use the user name of oneself, password login server, file to be sharing is uploaded;
After the completion of S2, file upload, primary user adds the token of primary user, from user in the corresponding user interface of server end User name and token, and be arranged from user to the access authority of the shared file of upload;
S3, primary user are completed to after the authorization of user, by the user name of primary user, password and from the token of user inform from Family will be authenticated when from user login services device end, and specifically include following steps:
S31, from user using primary user username and password login service device after, server request, obtain and verify from The token at family;
S32, server find the user name from user according to the slave User Token after verifying, and get from server From user to the access authority of shared file;
The access authority of setting shared file is specially in step S2:
Server saves setting result into access control list ACL and User Control List UCL;Wherein, accesses control list ACL includes listed files, to the user list that listed files is assigned, access authority of the user list to file in listed files List, additional conditions list and user founder;User Control List UCL includes user name and token;
The additional conditions list includes:Spatial geographical locations information, equipment identification information are sky, are not limited for empty expression It is fixed;
User interface in step S2 specifically includes:
New user adds interface, and primary user adds the token of primary user in the interface, and addition prepares setting file access permission From user, and user name and token from user are set;
User file access authority set interface, primary user are arranged from user to the access authority of file, setting in the interface Content includes listed files, user list, list of access rights, additional conditions list and user founder;
It completes in step S2 to after the setting of the access authority of user, primary user can continue login service device and add other Access authority, or the operation that the access authority is modified and deleted;The permission of file is possessed from user in step S3 When permission, it can should be that other users distribute permission again to specified file from user, and carry out further extension authorization.
2. a kind of authorization right discriminating system of cloud file-sharing, which is characterized in that specifically include:
File uploading unit, for uploading file to be sharing after primary user is using user name login service device;
Primary user's authorization unit, for file upload after the completion of, the user interface at primary user's login service device end, addition from The user name and token at family, and be arranged from user to the access authority of the shared file of upload;
From subscription authentication unit, for completing in primary user to after the authorization of user, by the user name of primary user, password and from The token of user is informed from user, is authenticated, is specifically included from user login services device end:
Token authentication unit, for from user using primary user username and password login service device after, server request, It obtains and verifies the token from user;
Authority acquiring unit, server find the user name from user according to the slave User Token after verifying, and from server On get access authority from user to shared file;
Primary user's authorization unit specifically includes:
Accesses control list unit is saved in the access control list ACL of server, the access control for result will to be arranged List includes listed files, to the user list that listed files is assigned, access right of the user list to file in listed files Limit list, additional conditions list and user founder;
User Control List unit is saved in the User Control List UCL of server, the user's control for result will to be arranged List includes user name and token;
User interface in primary user's authorization unit specifically includes:
New user adds interface, and primary user adds the token of primary user in the interface, and addition prepares setting file access permission From user, and user name and token from user are set;
The access right from user to file can be set in user file access authority set interface, primary user in the interface Limit, set content includes listed files, user list, list of access rights, additional conditions list and user founder;
It prescribes a time limit from subscription authentication unit from permission of the user to file for ownership, should can be it to specified file from user His user distributes permission again, carries out further extension authorization.
CN201510554226.0A 2015-09-02 2015-09-02 A kind of the authorization method for authenticating and system of cloud file-sharing Active CN105072135B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510554226.0A CN105072135B (en) 2015-09-02 2015-09-02 A kind of the authorization method for authenticating and system of cloud file-sharing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510554226.0A CN105072135B (en) 2015-09-02 2015-09-02 A kind of the authorization method for authenticating and system of cloud file-sharing

Publications (2)

Publication Number Publication Date
CN105072135A CN105072135A (en) 2015-11-18
CN105072135B true CN105072135B (en) 2018-11-30

Family

ID=54501414

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510554226.0A Active CN105072135B (en) 2015-09-02 2015-09-02 A kind of the authorization method for authenticating and system of cloud file-sharing

Country Status (1)

Country Link
CN (1) CN105072135B (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105791276A (en) * 2016-02-26 2016-07-20 南京雨巢网络有限公司 Smart irrigation system based authorization control method
US10719408B2 (en) 2016-08-03 2020-07-21 Microsoft Technology Licensing, Llc Retain locally deleted content at storage service
US10614042B2 (en) 2016-08-08 2020-04-07 Microsoft Technology Licensing, Llc Detection of bulk operations associated with remotely stored content
US10616210B2 (en) 2016-08-19 2020-04-07 Microsoft Technology Licensing, Llc Protection feature for data stored at storage service
CN106355108A (en) * 2016-09-28 2017-01-25 郑州云海信息技术有限公司 Document handover method, device and system and computer readable medium
CN107948126B (en) * 2016-10-13 2021-09-03 阿里巴巴集团控股有限公司 Report form viewing method and equipment
CN107172098A (en) * 2017-07-12 2017-09-15 郑州云海信息技术有限公司 Right management method and device shared a kind of CIFS
CN109510849B (en) 2017-09-14 2021-06-25 腾讯科技(深圳)有限公司 Cloud-storage account authentication method and device
CN108200025A (en) * 2017-12-26 2018-06-22 华中科技大学同济医学院附属协和医院 A kind of shared file management system of office automatic
CN107948214A (en) * 2018-01-17 2018-04-20 北京网信云服信息科技有限公司 A kind of shared login method and device
CN108900487B (en) * 2018-06-20 2021-09-28 河北上通云天网络科技有限公司 Shared net disk for implanting middleware
CN108898027B (en) * 2018-06-29 2022-07-26 联想(北京)有限公司 Authority control method and device and server cluster
CN109684867A (en) * 2018-11-20 2019-04-26 深圳供电局有限公司 A kind of control method, the apparatus and system of network disk file collaboration and access
CN110191131A (en) * 2019-05-31 2019-08-30 北京金山云网络技术有限公司 A kind of file sharing method, device, system, server and storage medium
CN110138801A (en) * 2019-05-31 2019-08-16 北京金山云网络技术有限公司 File sharing method, device, system, server, terminal and storage medium
CN111131450B (en) * 2019-12-23 2022-06-21 北京奇艺世纪科技有限公司 File uploading method, file recombining method and file recombining device
CN112995157B (en) * 2021-02-07 2022-05-13 中原银行股份有限公司 Distributed cache platform client access authentication system
CN113297629B (en) * 2021-05-26 2023-03-14 杭州安恒信息技术股份有限公司 Authentication method, device, system, electronic equipment and storage medium
CN115544467A (en) * 2021-06-29 2022-12-30 中兴通讯股份有限公司 Account management method, account management system and computer readable storage medium
CN114817158B (en) * 2022-03-14 2023-03-24 山东日照发电有限公司 Safe electronic briefcase system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533006A (en) * 2012-07-06 2014-01-22 中兴通讯股份有限公司 United cloud disk client, server, system and united cloud disk service method
CN104283875A (en) * 2014-09-28 2015-01-14 深圳市中科无软件有限公司 Cloud disk authority management method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9378389B2 (en) * 2011-09-09 2016-06-28 Microsoft Technology Licensing, Llc Shared item account selection
US20130110832A1 (en) * 2011-10-27 2013-05-02 Microsoft Corporation Techniques to determine network addressing for sharing media files

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533006A (en) * 2012-07-06 2014-01-22 中兴通讯股份有限公司 United cloud disk client, server, system and united cloud disk service method
CN104283875A (en) * 2014-09-28 2015-01-14 深圳市中科无软件有限公司 Cloud disk authority management method

Also Published As

Publication number Publication date
CN105072135A (en) 2015-11-18

Similar Documents

Publication Publication Date Title
CN105072135B (en) A kind of the authorization method for authenticating and system of cloud file-sharing
US10635793B2 (en) Restricted accounts on a mobile platform
US10652235B1 (en) Assigning policies for accessing multiple computing resource services
US9860234B2 (en) Bundled authorization requests
US9473504B2 (en) Role based access control for connected consumer devices
US9654561B2 (en) Integrated cloud storage service through home gateway
US8935757B2 (en) OAuth framework
US8978122B1 (en) Secure cross-tenancy federation in software-as-a-service system
US10263994B2 (en) Authorized delegation of permissions
US9473417B2 (en) Controlling resources used by computing devices
CN106664291B (en) System and method for providing secure access to local network devices
CN106411857B (en) A kind of private clound GIS service access control method based on virtual isolation mech isolation test
US20150278510A1 (en) Credential Sharing
JP2016511479A (en) Support method and system of multi-tenant function for corporate social business computing.
US9871778B1 (en) Secure authentication to provide mobile access to shared network resources
WO2015042349A1 (en) Multiple resource servers with single, flexible, pluggable oauth server and oauth-protected restful oauth consent management service, and mobile application single sign on oauth service
US9237156B2 (en) Systems and methods for administrating access in an on-demand computing environment
KR101044343B1 (en) Cloud disk sharing system
US9275204B1 (en) Enhanced network access-control credentials
US9509698B2 (en) Method of establishing a trust relationship for sharing resources between two tenants in a cloud network
CN110008186A (en) For file management method, device, terminal and the medium of more ftp data sources
US20190253455A1 (en) Policy strength of managed devices
US20210409406A1 (en) Integrated hosted directory
CN105071959A (en) Plug-and-play management method and system based on unified registration of power network devices
KR20140121571A (en) System for intergrated authentication, method and apparatus for intergraged authentication thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210407

Address after: Room 801, 85 Kefeng Road, Huangpu District, Guangzhou City, Guangdong Province

Patentee after: Yami Technology (Guangzhou) Co., Ltd

Address before: 430074 No. 388 Lu Lu, Hongshan District, Hubei, Wuhan

Patentee before: CHINA University OF GEOSCIENCES (WUHAN CITY)

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211229

Address after: 150036 No. 1, floor 2, unit 4, building 2, Xiangqing community, Xiangfang District, Harbin, Heilongjiang Province (residential)

Patentee after: Heilongjiang ruidao Technology Co.,Ltd.

Address before: Room 801, 85 Kefeng Road, Huangpu District, Guangzhou City, Guangdong Province

Patentee before: Yami Technology (Guangzhou) Co., Ltd