CN104468495B - A kind of e-sourcing borrows the method and system of control - Google Patents

A kind of e-sourcing borrows the method and system of control Download PDF

Info

Publication number
CN104468495B
CN104468495B CN201310446582.1A CN201310446582A CN104468495B CN 104468495 B CN104468495 B CN 104468495B CN 201310446582 A CN201310446582 A CN 201310446582A CN 104468495 B CN104468495 B CN 104468495B
Authority
CN
China
Prior art keywords
information
sourcing
client
borrowing
borrowed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310446582.1A
Other languages
Chinese (zh)
Other versions
CN104468495A (en
Inventor
高扎根
万巍
徐剑波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New Founder Holdings Development Co ltd
Founder Apabi Technology Ltd
Original Assignee
Peking University Founder Group Co Ltd
Beijing Founder Apabi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University Founder Group Co Ltd, Beijing Founder Apabi Technology Co Ltd filed Critical Peking University Founder Group Co Ltd
Priority to CN201310446582.1A priority Critical patent/CN104468495B/en
Publication of CN104468495A publication Critical patent/CN104468495A/en
Application granted granted Critical
Publication of CN104468495B publication Critical patent/CN104468495B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

A kind of method that e-sourcing borrows control, user is when e-sourcing is borrowed in request, information is borrowed in input user profile and the e-sourcing generation for needing to borrow, borrow link and user profile that information only includes e-sourcing, client offer is borrowed to borrow information and borrow the resource information of client, and the resource information for borrowing client is encrypted with the e-sourcing borrowed, and the hardware resource for borrowing equipment for borrowing request without using sending is encrypted, user is set there are more selection rights to borrowing client, so that reading be no longer limited to send with equipment borrow request borrow equipment;By the way that resource information and e-sourcing are bound so that e-sourcing can only be read in borrowing for resource information of binding in client, can not be copied to other and borrowed and be read in client, be advantageous to the copyright protection of e-sourcing.

Description

A kind of e-sourcing borrows the method and system of control
Technical field
The present invention relates to a kind of control method of e-sourcing.Relate in particular to the side that a kind of e-sourcing borrows control Method and system.
Background technology
With the continuous development of information technology, internet becomes increasingly popular, the e-sourcing that user obtains on the internet Also become increasingly abundant.Increasing traditionally on paper e-sourcing begins with corresponding e-sourcing, and user can be looked into by internet Read, download, storing rich and varied e-sourcing.With the increasingly enhancing of people's Copyright Awareness, the management of digital and electronic resource Also copyright protection is increasingly paid attention to.
In face of increasingly increased digital and electronic resource, how to go to manage borrowing for digital and electronic resource is each digital and electronic The problem of resource provider to be faced.It is that the mandate based on request is borrowed that current most common e-sourcing, which borrows control mode, Read.Such as the method for disclosed a kind of e-sourcing borrowing management in the prior art, specifically comprise the following steps:User exists in advance Login account in server, logged in the account on equipment is borrowed and search for the e-sourcing to be borrowed, then borrowed in submission Request is read, system background judges that user borrows whether request meets the requirements, and as met the requirements, mandate is borrowed, for protection electronics money The copyright in source, the hardware electronic resource for the equipment that can be borrowed when sending e-sourcing with request are encrypted to e-sourcing, protected Demonstrate,prove the e-sourcing to be only capable of using in the equipment of corresponding hardware electronic resource, and record the number of copies for borrowing e-sourcing; Otherwise user is closed to borrow.The e-sourcing borrowing management method is the control management method based on e-sourcing number of copies, is used Family needs account registered in advance before borrow, and by the account storage of the registration in the server to call.So, borrow all Completed on equipment is borrowed, but many e-sourcings borrowed will not typically be read by borrowing equipment, can typically be passed through Either the Quick Response Code or bar code that successfully generate afterwards is borrowed in mobile electronic device scanning to mobile phone, to it is appropriate when further according to this Quick Response Code or bar code access corresponding e-sourcing and read, such as in the case where there is Wi-Fi network.It is existing to borrow The mode e-sourcing of readding is bound with the hardware electronic resource for borrowing equipment, can only complete to borrow on equipment is borrowed, very Be inconvenient to use.
The content of the invention
Therefore, first technical problem to be solved by this invention in existing borrow e-sourcing use send and borrow Read request the hardware resource for borrowing equipment be encrypted bring be inconvenient to use, so as to propose the e-sourcing of convenient use Borrow the method and system of control.
In order to solve the above technical problems, the technical solution adopted in the present invention is:
A kind of method that e-sourcing borrows control, comprises the following steps:
Borrow information generation:Information is borrowed for borrowing client according to the link of user profile and the e-sourcing borrowed generation End obtains;
E-sourcing is sent:Receive and borrow borrowing information and borrowing the resource information of client for client transmission, and according to E-sourcing corresponding to the link is found according to the information of borrowing, with the resource information for borrowing client to the electronics Resource is sent to after being encrypted and borrows client.
Described borrow in information generation step also includes believing the image for borrowing information described in generation and being converted into processing Breath is for borrowing the step of client obtains.
Borrow what information was obtained by borrowing client according to scanning described in being received in the e-sourcing forwarding step Obtained after the decoding of described image information.
A kind of method that e-sourcing borrows control, also comprises the following steps:
Resource borrows reservation:Retain information is borrowed described in generation within the predetermined time, if not having in the given time Have and download borrowed e-sourcing, be then automatically deleted this and borrow information.
The system that a kind of e-sourcing borrows control includes:
Generation module is borrowed, information is borrowed for borrowing for the link generation according to user profile and the e-sourcing borrowed Client obtains;
E-sourcing sending module, receive and borrow borrowing for client transmission and information and borrow the resource information of client, And e-sourcing corresponding to the link is found according to the information of borrowing, with the resource information for borrowing client to described E-sourcing is sent to after being encrypted and borrows client.
Described borrow also includes transform subblock in generation module, be converted into locating for will borrow information described in generation The image information of reason.
The information of borrowing received in e-sourcing sending module is as borrowing client according to obtaining scanning Obtained after picture information decoding.
A kind of e-sourcing borrows the system of control, in addition to borrows reservation module, for will borrow letter described in generation Breath retains within the predetermined time, if being automatically deleted this without borrowed e-sourcing is downloaded in the given time and borrowing Information.
The above-mentioned technical proposal of the present invention has advantages below compared with prior art:
1. a kind of method that e-sourcing borrows control, user when e-sourcing is borrowed in request, input user profile and The e-sourcing for needing to borrow generates and borrows information, borrows link and user profile that information only includes e-sourcing, borrows Client provides borrows information and borrows the resource information of client, and by the resource information for borrowing client and is borrowed E-sourcing is encrypted, and the hardware resource for borrowing equipment for borrowing request without using sending is encrypted, make user to by means of Readding client has more selection rights so that reading be no longer limited to send with equipment borrow request borrow equipment;Pass through Resource information and e-sourcing are bound so that e-sourcing can only be read in borrowing for resource information of binding in client Read, other can not be copied to borrow and be read in client, be advantageous to the copyright protection of e-sourcing.
2. a kind of method that e-sourcing borrows control, information forming by word or letter or number and symbol will be borrowed Image information is converted into for borrowing client acquisition, helps to protect user privacy information, other people only can not be from by naked eyes What image obtained user borrows information;Information is borrowed in the identification for conveniently borrowing client simultaneously.
3. a kind of method that e-sourcing borrows control, user's selection suitably borrows client, is carried and borrowed by scanning The image information of information is read, and is decoded, obtains borrowing information, accesses the link of e-sourcing, and send and borrow client Unique resource information, by accessing the link of e-sourcing automatically, user is set to eliminate the complicated processes for being manually entered link; By by e-sourcing and borrowing the unique resource information of client and being bound and encrypt to be sent to and borrow client, electricity is realized What child resource can only specify at one borrow reads in client, effectively prevents the unauthorized duplication of e-sourcing, use.
4. a kind of method that e-sourcing borrows control, after information is borrowed in generation, if user borrows without selection immediately Client is downloaded, and borrowing information will retain within the time of setting so that user can suitable when selection it is suitable Borrow client carry out e-sourcing download and borrow;Until crossed setting time user does not download borrowed e-sourcing yet Just it is automatically deleted and borrows information, system burden can be mitigated by clearing up the invalid function of borrowing information automatically.
5. the system that a kind of e-sourcing borrows control, including:Borrow generation module and e-sourcing sending module.User When e-sourcing is borrowed in request, borrow the e-sourcing generation that generation module is borrowed according to the user profile and needs of input and borrow Information is read, borrows link and user profile that information only includes e-sourcing;E-sourcing sending module receives and borrows client The resource information borrowed information and borrow client sent is held, and the resource information of client and the electricity borrowed will be borrowed Child resource is encrypted, and the hardware resource for borrowing equipment for borrowing request without using sending is encrypted, and makes user to borrowing Client has more selection rights so that reading be no longer limited to send with equipment borrow request borrow equipment;Passing through will Resource information is bound with e-sourcing so that and e-sourcing can only be read in borrowing for resource information of binding in client, Other can not be copied to borrow and be read in client, be advantageous to the copyright protection of e-sourcing.
6. the system that a kind of e-sourcing borrows control, letter is borrowed by described by the transform subblock for borrowing generation module Breath is converted into the image information of processing, will borrow information and is converted into image letter by word or forming for letter or number and symbol Cease and show, help to protect user privacy information, other people only borrow information by what naked eyes can not obtain user from image; Information is borrowed in the identification for conveniently borrowing client simultaneously.
7. the system that a kind of e-sourcing borrows control, user's selection suitably borrows client, is carried and borrowed by scanning The image information of information is read, and is decoded, obtains borrowing information, accesses the link of e-sourcing, and send and borrow client Unique resource information, by accessing the link of e-sourcing automatically, user is set to eliminate the complicated processes for being manually entered link; By by e-sourcing and borrowing the unique resource information of client and being bound and encrypt to be sent to and borrow client, electricity is realized What child resource can only specify at one borrow reads in client, effectively prevents the unauthorized duplication of e-sourcing, use.
8. the system that e-sourcing borrows control, after information is borrowed in generation, if user not borrow in the scheduled time by selection Client is downloaded, and is borrowed reservation module and is retained in the given time and borrows information so that user can be selected suitable when Suitable client of borrowing is selected to carry out the download of straight e-sourcing and borrow;Borrowed until having crossed setting time user and not downloaded yet E-sourcing, borrow reservation module and be just automatically deleted and borrow information, clear up the invalid function of borrowing information automatically and can mitigate and be System burden.
Brief description of the drawings
In order that present disclosure is more likely to be clearly understood, specific embodiment and combination below according to the present invention Accompanying drawing, the present invention is further detailed explanation, wherein
Fig. 1 is the flow chart for a kind of method that e-sourcing borrows control;
Fig. 2 is a kind of structured flowchart for the system that e-sourcing borrows control.
Reference is expressed as in figure:1- borrows generation module;2- e-sourcing sending modules;3- borrows client.
Embodiment
Embodiment 1
Method shown in Figure 1, that a kind of e-sourcing of one embodiment of the invention borrows control, including following step Suddenly:
Borrow information generation:Information is borrowed for borrowing client according to the link of user profile and the e-sourcing borrowed generation End obtains, such as can will borrow presentation of information on a display screen;The user profile can include username and password User profile or the user profile for only including the password such as identification code of digital alphabet composition.
E-sourcing is sent:Receive and borrow borrowing information and borrowing the resource information of client for client transmission, and according to E-sourcing corresponding to the link is found according to the information of borrowing, with the resource information for borrowing client to the electronics Resource is sent to after being encrypted and borrows client.The resource information for borrowing client is to borrow the unique hardware of client Identification information, such as can be:Borrow the physical address of client NIC, manufacturer assigns and borrows the unique hardware of client ID, the information of SIM card for borrowing client etc., wherein, the physical address of the network interface card is also referred to as mac addresses;It is described to add Close mode can be bound e-sourcing with borrowing the resource information of client so that e-sourcing can only provide in binding Borrowing for source information is read in client.
The method that a kind of e-sourcing of the present embodiment borrows control, user when e-sourcing is borrowed in request, use by input Information is borrowed in family information and the e-sourcing generation for needing to borrow, and borrows link and user's letter that information only includes e-sourcing Breath, borrow client and provide and borrow information and borrow the resource information of client, and will borrow the resource information of client with The e-sourcing borrowed is encrypted, and the hardware resource for borrowing equipment for borrowing request without using sending is encrypted, and makes User has more selection rights to borrowing client so that reading is no longer limited to send with equipment borrows borrowing for request and set It is standby;By the way that resource information and e-sourcing are bound so that e-sourcing can only borrowing in client in binding resource information Read, other can not be copied to borrow and be read in client, be advantageous to the copyright protection of e-sourcing.
Embodiment 2
As one embodiment of the present of invention, on the basis of above-described embodiment 1, a kind of e-sourcing borrows control Method described in borrow in information generation step and also to include believing the image for borrowing information described in generation and being converted into processing Breath is for borrowing the step of client obtains.
For example, the form for borrowing information and being converted into Quick Response Code can be shown, it can also will borrow information conversion and be in strip The form of code is shown.Borrowing client can decode to obtain to borrow letter by the identification software that carries by scan image information Breath.
The method that a kind of e-sourcing of the present embodiment borrows control, will borrow information has word or letter or number and symbol Number composition be converted into image information for borrow client acquisition, contribute to protect user privacy information, other people only pass through meat What eye can not obtain user from image borrows information;Information is borrowed in the identification for conveniently borrowing client simultaneously.
Embodiment 3
As one embodiment of the present of invention, on the basis of above-described embodiment 2, a kind of e-sourcing borrows control Method in the information of borrowing that receives in e-sourcing forwarding step as borrowing client according to obtaining scanning Obtained after picture information decoding.Such as can be:
Client scan described image information, such as the image information of scanning bar code or Quick Response Code are borrowed, is decoded, Obtain borrowing information, the information of borrowing includes link and the user profile of e-sourcing.
Borrow that client accesses the link of e-sourcing and login user information while send carries that to borrow client unique Resource information;The unique resource information of client of borrowing can read mac addresses, the manufacturer's imparting of client's network interface card Borrow the unique hardware ID of client, borrow client SIM card information.
The e-sourcing that the resource information for borrowing client and user's request are borrowed is bound and encrypted and is sent to institute State and borrow client;The cipher mode can be bound e-sourcing with borrowing the resource information of client so that E-sourcing can only be read in borrowing for resource information of binding in client.
The method that a kind of e-sourcing of the present embodiment borrows control, user's selection suitably borrows client, by sweeping The image information for carrying and borrowing information is retouched, and is decoded, obtains borrowing information, accesses the link of e-sourcing, and send and borrow The unique resource information of client is read, by accessing the link of e-sourcing automatically, user is eliminated and is manually entered link Complicated processes;By by e-sourcing and borrowing the unique resource information of client and being bound and encrypt to be sent to and borrow client End, borrowing of realizing that e-sourcing can only specify at one are read in client, effectively prevent e-sourcing unauthorized Replicate, use.
Embodiment 4
As one embodiment of the present of invention, on the basis of above-mentioned 1-3 any embodiments, a kind of e-sourcing borrows control The method of system also comprises the following steps:
Resource borrows reservation:Retain information is borrowed described in generation within the predetermined time, if not having in the given time Have and download borrowed e-sourcing, be then automatically deleted this and borrow information.Such as set:If user is not in life in 24 hours Into the e-sourcing downloading after information and says and borrow is borrowed, then it is automatically deleted this and borrows information, only preserves setting in effective time That does not download borrows information.
The method that a kind of e-sourcing of the present embodiment borrows control, after information is borrowed in generation, if user is without immediately Selection is borrowed client and is downloaded, and borrowing information will retain within the time of setting so that user can be suitable when The suitable client of borrowing of selection carries out the download of e-sourcing and borrowed;Borrowed until having crossed setting time user and not downloaded yet E-sourcing, which is just automatically deleted, borrows information, and system burden can be mitigated by clearing up the invalid function of borrowing information automatically.
Embodiment 5
System shown in Figure 2, that a kind of e-sourcing of one embodiment of the present of invention borrows control, including:
Generation module 1 is borrowed, information is borrowed for borrowing for the link generation according to user profile and the e-sourcing borrowed Read client 3 to obtain, such as can will borrow presentation of information on a display screen;The user profile can be include user name and The user profile of password or the user profile for only including the password such as identification code of digital alphabet composition.
E-sourcing sending module 2, receive the resource borrowed information and the borrow client letter for borrowing the transmission of client 3 Breath, and e-sourcing corresponding to the link is found according to the information of borrowing, with the resource information pair for borrowing client 3 The e-sourcing is sent to after being encrypted borrows client 3.The resource information for borrowing client 3 is to borrow client Unique hardware identification information, such as can be:Borrow the mac addresses of the network interface card of client 3, manufacturer assigns and borrows client 3 Unique hardware ID, the information of SIM card for borrowing client 3 etc., the cipher mode can be with borrowing by e-sourcing The resource information of client 3 is bound so that e-sourcing can only be read in borrowing for resource information of binding in client 3.
It can be regular service that e-sourcing, which borrows the system of control mounted in borrowing with server, borrowing with server, Device, for example can be PC.It can be conventional mobile terminal to borrow client 3, such as:Mobile phone, tablet personal computer etc.;It may also be Fixed terminal, such as PC.
The system that a kind of e-sourcing of the present embodiment borrows control, user borrow life when e-sourcing is borrowed in request Information is borrowed into the e-sourcing generation that module 1 is borrowed according to the user profile and needs of input, information is borrowed and only includes electronics The link of resource and user profile;E-sourcing sending module 2, which receives, borrows borrowing information and borrowing for the transmission of client 3 The resource information of client 3, and the resource information for borrowing client 3 is encrypted with the e-sourcing borrowed, without making The hardware resource for borrowing equipment for borrowing request with sending is encrypted, and user is had more rights to choose to borrowing client 3 Profit so that reading be no longer limited to send with equipment borrow request borrow equipment;By the way that resource information and e-sourcing are tied up It is fixed so that e-sourcing can only be read in borrowing for resource information of binding in client 3, can not be copied to other and be borrowed visitor Read on family end 3, be advantageous to the copyright protection of e-sourcing.
Embodiment 6
As one embodiment of the present of invention, on the basis of above-described embodiment 5, what a kind of e-sourcing borrowed control is System is borrowed and also includes transform subblock in generation module, for image information will be borrowed described in generation be converted into handling Information.For example, the transform subblock can show the form for borrowing information and being converted to Quick Response Code, information can also will be borrowed The form for being converted into bar code is shown.
The system that a kind of e-sourcing of the present embodiment borrows control, by borrowing the transform subblock of generation module by institute State and borrow the image information that information is converted into processing, information will be borrowed conversion is formed by word or letter or number and symbol Into image information and show, help to protect user privacy information, other people only can not obtain user's by naked eyes from image Borrow information;Information is borrowed in the identification for conveniently borrowing client simultaneously.
Embodiment 7
As one embodiment of the present of invention, on the basis of above-described embodiment 5 or 6, a kind of e-sourcing borrows control System electronic resource sending module in the figure borrowed information and obtained by borrowing client according to scanning that receives Obtained after being decoded as information.Client scan described image information is borrowed, such as is scanned with the camera of the mobile terminals such as mobile phone The image information of bar code or Quick Response Code, is decoded, and is decoded, and obtains borrowing information, the information of borrowing includes electronics The link of resource and user profile.
Borrow that client accesses the link of e-sourcing and login user information while send carries that to borrow client unique Resource information;The unique resource information of client of borrowing can be the mac addresses of mobile terminal network interface card, manufacturer's imparting The unique hardware ID of mobile terminal, mobile terminal SIM card information.
E-sourcing sending module is tied up the e-sourcing that the resource information for borrowing client is borrowed with user's request Determine and encrypt to be sent to described to borrow client;The cipher mode can believe e-sourcing with borrowing the resource of client Breath is bound so that e-sourcing can only be read in borrowing for resource information of binding in client.
The system that a kind of e-sourcing of the present embodiment borrows control, user's selection suitably borrows client, by sweeping The image information for carrying and borrowing information is retouched, and is decoded, obtains borrowing information, accesses the link of e-sourcing, and send and borrow The unique resource information of client is read, by accessing the link of e-sourcing automatically, user is eliminated and is manually entered link Complicated processes;By by e-sourcing and borrowing the unique resource information of client and being bound and encrypt to be sent to and borrow client End, borrowing of realizing that e-sourcing can only specify at one are read in client, effectively prevent e-sourcing unauthorized Replicate, use.
Embodiment 8
As one embodiment of the present of invention, on the basis of above-described embodiment 5-7, a kind of e-sourcing borrows control System also includes borrowing reservation module, retains within the predetermined time for will borrow information described in generation, if in pre- timing The interior e-sourcing borrowed without download, such as set:If user is not in the case where generation is borrowed after information in 24 hours Carry and say the e-sourcing borrowed, then borrow reservation module and be automatically deleted this and borrow information.
The system that a kind of e-sourcing of the present embodiment borrows control, after information is borrowed in generation, if user is not predetermined Selection of time is borrowed client and is downloaded, and borrows reservation module and retains in the given time and borrows information so that user can be The suitable client of borrowing of selection carries out the download of straight e-sourcing and borrowed when suitable;Until having crossed setting time user Do not download yet and borrow e-sourcing, borrow reservation module and be just automatically deleted and borrow information, clear up the invalid work(for borrowing information automatically It can mitigate system burden.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more Usable storage medium(Including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)The computer program production of upper implementation The form of product.
The present invention is with reference to method according to embodiments of the present invention, equipment(System)And the flow of computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent Select embodiment and fall into having altered and changing for the scope of the invention.

Claims (8)

1. a kind of method that e-sourcing borrows control, it is characterised in that comprise the following steps:
Borrow information generation:Information is borrowed according to the link of user profile and the e-sourcing borrowed generation to obtain for borrowing client Take;
E-sourcing is sent:Receive and borrow borrowing for client transmission and information and borrow the resource information of client, and according to institute State and borrow information and find e-sourcing corresponding to the link, with the resource information for borrowing client to the e-sourcing It is sent to after being encrypted and borrows client.
2. the method that a kind of e-sourcing according to claim 1 borrows control, it is characterised in that described to borrow information life Into in step also include by borrowed described in generation information be converted into processing image information for borrow client acquisition step Suddenly.
3. the method that a kind of e-sourcing according to claim 2 borrows control, it is characterised in that the e-sourcing hair The information of borrowing received in step is sent by being obtained after borrowing the described image information decoding that client obtains according to scanning.
4. the method that control is borrowed according to a kind of any described e-sourcings of claim 1-3, it is characterised in that also include such as Lower step:
Resource borrows reservation:Retain information is borrowed described in generation within the predetermined time, if in the given time without under Borrowed e-sourcing is carried, then is automatically deleted this and borrows information.
A kind of 5. system that e-sourcing borrows control, it is characterised in that including:
Generation module is borrowed, information is borrowed for borrowing client for the link generation according to user profile and the e-sourcing borrowed End obtains;
E-sourcing sending module, receive and borrow borrowing information and borrowing the resource information of client for client transmission, and according to E-sourcing corresponding to the link is found according to the information of borrowing, with the resource information for borrowing client to the electronics Resource is sent to after being encrypted and borrows client.
6. the system that a kind of e-sourcing according to claim 5 borrows control, it is characterised in that described to borrow generation mould Also include transform subblock in block, for by borrowed described in generation information be converted into processing image information.
7. the system that a kind of e-sourcing according to claim 6 borrows control, it is characterised in that
The described image borrowed information and obtained by borrowing client according to scanning received in e-sourcing sending module Obtained after information decoding.
8. the system that control is borrowed according to a kind of any described e-sourcings of claim 5-7, it is characterised in that also include borrowing Reservation module is read, is retained within the predetermined time for information will to be borrowed described in generation, if not downloading in the given time The e-sourcing borrowed, then it is automatically deleted this and borrows information.
CN201310446582.1A 2013-09-25 2013-09-25 A kind of e-sourcing borrows the method and system of control Expired - Fee Related CN104468495B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310446582.1A CN104468495B (en) 2013-09-25 2013-09-25 A kind of e-sourcing borrows the method and system of control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310446582.1A CN104468495B (en) 2013-09-25 2013-09-25 A kind of e-sourcing borrows the method and system of control

Publications (2)

Publication Number Publication Date
CN104468495A CN104468495A (en) 2015-03-25
CN104468495B true CN104468495B (en) 2018-03-06

Family

ID=52913873

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310446582.1A Expired - Fee Related CN104468495B (en) 2013-09-25 2013-09-25 A kind of e-sourcing borrows the method and system of control

Country Status (1)

Country Link
CN (1) CN104468495B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446609B (en) * 2016-08-31 2018-06-29 南阳理工学院 A kind of copy-right protection method of Network Environment
CN108280618A (en) * 2017-01-06 2018-07-13 北大方正集团有限公司 The method and system of online barcode scanning project management
CN108632473A (en) * 2017-03-24 2018-10-09 上海触乐信息科技有限公司 The information transferring method of personal data, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101996386A (en) * 2009-08-14 2011-03-30 北大方正集团有限公司 Method, device and system for lending digital books
CN102855323A (en) * 2012-09-11 2013-01-02 北京蜂侠飞科技有限公司 Information sharing method based on two-dimension codes and system implementing method
CN103139182A (en) * 2011-12-01 2013-06-05 北大方正集团有限公司 Method, client end, server and system allowing user to visit
CN103188068A (en) * 2011-12-27 2013-07-03 北大方正集团有限公司 Digital content sending method, digital content sending device, digital content receiving method and digital content receiving device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080312943A1 (en) * 2007-06-17 2008-12-18 Michael Zunke Method And System For Data Product License-Modification Coupons

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101996386A (en) * 2009-08-14 2011-03-30 北大方正集团有限公司 Method, device and system for lending digital books
CN103139182A (en) * 2011-12-01 2013-06-05 北大方正集团有限公司 Method, client end, server and system allowing user to visit
CN103188068A (en) * 2011-12-27 2013-07-03 北大方正集团有限公司 Digital content sending method, digital content sending device, digital content receiving method and digital content receiving device
CN102855323A (en) * 2012-09-11 2013-01-02 北京蜂侠飞科技有限公司 Information sharing method based on two-dimension codes and system implementing method

Also Published As

Publication number Publication date
CN104468495A (en) 2015-03-25

Similar Documents

Publication Publication Date Title
CN106682028B (en) Method, device and system for acquiring webpage application
CN105512881B (en) A kind of method and terminal for completing payment based on two dimensional code
CN105165069B (en) Access method, Wi-Fi Hotspot equipment and the user equipment of Wi-Fi Hotspot equipment
US9449294B2 (en) Method and apparatus for managing user devices and contents by using quick response codes
ES2743131T3 (en) Access procedure for a telecommunication terminal to a database hosted by a service platform accessible through a telecommunications network
CN108280144A (en) Information displaying method, device and electronic equipment
US20140115674A1 (en) Wireless communication system, portable terminal, digital camera, communication method, and computer-readable storage device
WO2014161259A1 (en) Verification code processing method, device, terminal and server
CN104468495B (en) A kind of e-sourcing borrows the method and system of control
JP4932047B1 (en) Content or application providing system, content or application providing system control method, terminal device, terminal device control method, authentication device, authentication device control method, program, and information storage medium
KR20120087095A (en) Apparatus and method for generating a realtime password and storage medium
CN106203141A (en) The data processing method of a kind of application and device
JP2008146363A (en) Authentication method in computer network
CN108846277A (en) Reading control method, equipment and computer storage medium
CN109636922A (en) A kind of method and apparatus of the content of augmented reality for rendering
CN114996663A (en) Picture processing method, storage medium and computer terminal
JP7273007B2 (en) Authentication device, authentication method and authentication program
CN106534096A (en) Method for master device to share user identity with slave device, master device, and slave device
CN113704656A (en) Webpage display method, device, equipment and storage medium
RU2666283C1 (en) Method for distribution of advertising content through technologies of nfc-points and qr-code
CN112434327A (en) Information protection method and device and electronic equipment
CN116132422B (en) Authority control method and device of input device, server and readable storage medium
CN105530260B (en) A kind of setting method and device of the safety identification information for website
JP7385100B2 (en) Information processing device, information processing terminal, information processing method, and program
US20240113889A1 (en) Verifying ownership using decentralized verification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220621

Address after: 3007, Hengqin international financial center building, No. 58, Huajin street, Hengqin new area, Zhuhai, Guangdong 519031

Patentee after: New founder holdings development Co.,Ltd.

Patentee after: FOUNDER APABI TECHNOLOGY Ltd.

Address before: 100871, Beijing, Haidian District Cheng Fu Road 298, founder building, 9 floor

Patentee before: PEKING UNIVERSITY FOUNDER GROUP Co.,Ltd.

Patentee before: FOUNDER APABI TECHNOLOGY Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180306