CN105100176B - A kind of resource sharing method - Google Patents
A kind of resource sharing method Download PDFInfo
- Publication number
- CN105100176B CN105100176B CN201410222680.1A CN201410222680A CN105100176B CN 105100176 B CN105100176 B CN 105100176B CN 201410222680 A CN201410222680 A CN 201410222680A CN 105100176 B CN105100176 B CN 105100176B
- Authority
- CN
- China
- Prior art keywords
- user
- resource
- key
- user account
- data packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to a kind of resource sharing methods, method includes the following steps: 101) receiving the data packet for the resource to be shared that the first user sends, the data packet includes resource code, share time, second user account;102) key is calculated using resource code and second user account, key term of validity is share time;103) key and service life are sent to second user, the second user is obtained by key and described by the access of sharing resource and/or operates with power.Compared with prior art, the present invention has many advantages, such as to save social resources.
Description
Technical field
The present invention relates to a kind of Internet technologies, more particularly, to a kind of resource sharing method.
Background technique
With increasing for current personal intelligent mobile terminal equipment number of users, individual has bought and downloaded many books, electricity
Shadow, animation, music album, game, do not have to later or seldom use.Are these things also valuable? it is produced in existing content type
Product do not have extensive user's transmission capacity still, can only be propagated by friend relation, range is smaller.And existing interior
Appearance type product substantially no longer manages locally downloading resource, these resources can become " silencing money after user's use
Source ".Existing telecommunications content type product is respectively runed simultaneously, is lacked unified content integration and management interface, is made information can not
Obtain wide-scale distribution.
Intelligent mobile terminal will occupy leading position on the market, it is necessary to reinforce independent research and development capacity, in existing application
With open up new approaches in service, and effectively come to obtain new breakthrough for it in conjunction with cloud computing, cloud storage, the technology of cloud individual.
Such as a kind of method of network resource sharing is disclosed application No. is the Chinese patent of 201010289032.X and is
System, the method includes receiving the sharing request of first user's network resource sharing;Save first user net to be shared
Network resource;When the Internet resources for the second user access that first user specifies are first user network money to be shared
When source, first user of preservation Internet resources to be shared are supplied to the second user.Through the invention, it uses
Family can connect bad or the webpage of register account number is needed to browse to some servers well, although note that only
It is browsing, rather than goes to access.Therefore the invention can only share the resource of general format, and when resource to be shared
For proprietary format, need using resource provider to dedicated decoders open when, the present invention is helpless.
Summary of the invention
It is an object of the present invention to overcome the above-mentioned drawbacks of the prior art and provide a kind of offer charge resources
The method of sharing.
The purpose of the present invention can be achieved through the following technical solutions:
A kind of resource sharing method, which is characterized in that method includes the following steps:
101) data packet for the resource to be shared that the first user sends is received, the data packet includes resource code, shares
Time, second user account;
102) key is calculated using resource code and second user account, key term of validity is share time;
103) key and service life are sent to second user, the second user obtains described shared by key
The access of resource and/or operate with power.
When key generates in the step 102), the first user is the right to use for losing the resource, while key enters
Validity period, i.e. term of validity start timing.
In the step 103), while key is sent to second user, also retains a key in server, be used as and divide
Enjoy the right to use identification of resource.
The recipient of key and service life is the utility control center of second user equipment, application in the step 103)
Administrative center carries out being assert by sharing resources use right in equipment off-line using the key.
The service life is remaining in the utility control center time of reception server of the second user equipment makes
With the time limit, while also carrying out term of validity timing.
When the right to use is assert, it is required to carry out account matching.
The term of validity timing uses decay algorithm, meanwhile, it will do it time limit synchronization after second user equipment networking,
Synchrodata is subject to server data.
The server provides clearing payment services simultaneously, and the clearing payment services are completed before and after step 101), tool
Body includes sub-step:
1001) server receives second user and obtains data packet, and the acquisition data packet is equally expected resource code, expected
Share time, payment amount and the first user account;
1002) wealth in second user account is deducted the corresponding amount of money by server;
1003) receive the data packet for the resource to be shared that the first user sends, and by resource code in data packet, share when
Between, the first user account and second user account respectively with expect resource code, expect in share time step 1001) first to use
Family account and second user account are compared;
If 1004) comparison result is consistent, the amount of money deducted in step 1002) is squeezed into the first user account and terminated
Delivery operation.
Compared with prior art, the invention has the following advantages that
1) permission is controlled, what it is by participator's acquisition is the complete right to use for sharing resource, this right to use makes
The resource of latest edition can be used by user is shared.
2) idle resource is used, effective utilization has been obtained.
3) payment services are provided, the power that people share these slack resources is improved.
4) after resource is shared, original user has been temporarily lost with the right to use of resource, meets intellectual property protection
Principle.
Detailed description of the invention
Fig. 1 is the flow chart of the method for the present invention;
Fig. 2 is payment services flow chart of the present invention.
Specific embodiment
The present invention is described in detail with specific embodiment below in conjunction with the accompanying drawings.The present embodiment is with technical solution of the present invention
Premised on implemented, the detailed implementation method and specific operation process are given, but protection scope of the present invention is not limited to
Following embodiments.
A kind of resource sharing method, as shown in Figure 1, method includes the following steps:
101) receive the first user send resource to be shared data packet, data packet include resource code, share time,
Second user account;
102) key is calculated using resource code and second user account, key term of validity is share time.
103) key and service life are sent to second user, second user is obtained by key by the visit of sharing resource
The rights to use such as ask, operate.
When key generates in step 102), the first user is the right to use for losing resource, while key enters validity period, i.e.,
Term of validity starts timing.
In step 103), while key is sent to second user, also retains a key in server, be used as and share money
The right to use identification in source.
The recipient of key and service life is the utility control center of second user equipment, application management in step 103)
Center carries out being assert by sharing resources use right in equipment off-line using key.
Service life is remaining service life in the utility control center time of reception server of second user equipment, together
When also carry out term of validity timing.
When the right to use is assert, being required to carry out account matching, i.e. second user needs login account that could use the resource,
If user equipment is offline, need to carry out local verification, local verification can be password or pattern password etc..
Term of validity timing uses decay algorithm, meanwhile, it will do it time limit synchronization after second user equipment networking, it is synchronous
Data are subject to server data.
Server provides clearing payment services simultaneously, settles accounts payment services, completes before and after step 101), as shown in Fig. 2,
Specifically include sub-step:
1001) server receives second user and obtains data packet, obtains data packet and equally expects resource code, expects to share
Time, payment amount and the first user account;
1002) wealth in second user account is deducted the corresponding amount of money by server, which can be RMB account
It can be with ideal money account;
1003) receive the data packet for the resource to be shared that the first user sends, and by resource code in data packet, share when
Between, the first user account and second user account respectively with expect resource code, expect share time, first in step 1001)
User account and second user account are compared;
If 1004) comparison result is consistent, the amount of money deducted in step 1002) is squeezed into the first user account and terminated
Delivery operation.
Such as: user A has purchased a game APP, but never plays, and then just wants to share away APP, then discuss
It posts on altar and finds recipient, user B just wants to play this game, and then two people, which appoint, lends time and payment amount (spy
Do not point out that payment amount can be for 0), then user B be submitted to server and applied, and sends acquisition data packet, server receives
The corresponding amount of money is deducted on the personal account of user B again after, after the sharing request data packet for having received user's transmission, by two
Data in a data packet compare, and the amount of money deducted in user B before is squeezed into the account of user A if consistent
In, while key is calculated according to resource code and second user account, and establish the validity period of the key in the database
Limit, service life are the share time that two people make an appointment, and are illustrated, interrupt payment services operation in following three kinds of situations: 1) handing over
Easily success;2) there is side cancellation before trading successfully;3) after receiving the request of mono- side of user A and user B, when defined
The interior request for not receiving another party.
When key generates, server just cancels user A for the right to use of game APP, i.e., to the APP of user A into
Row de-activated, while the key of generation is sent to second user.
Second user receives key and service life by the utility control center being mounted in oneself mobile device,
To use.
Service life and key separate, convenient for being managed to the time limit, without because the time setting of user terminal is wrong
The case where accidentally leading to not using APP.
Claims (7)
1. a kind of resource sharing method, which is characterized in that method includes the following steps:
101) receive the first user send resource to be shared data packet, the data packet include resource code, share time,
Second user account;
102) key is calculated using resource code and second user account, key term of validity is share time;
103) key and service life are sent to second user, the second user is obtained by key by the visit of sharing resource
Ask and/or operate with power;
Server provides clearing payment services simultaneously, and the clearing payment services are completed after step 101), specifically include sub-step
It is rapid:
1001) server receives second user and obtains data packet, and the acquisition data packet includes expecting resource code, expecting to share
Time, payment amount and the first user account;
1002) wealth in second user account is deducted the corresponding amount of money by server;
1003) receive the first user send resource to be shared data packet, and by data packet resource code, share when
Between, the first user account and second user account respectively with expect resource code, expect share time, first in step 1001)
User account and second user account are compared;
If 1004) comparison result is consistent, the amount of money deducted in step 1002) is squeezed into the first user account and terminates to pay
Operation.
2. a kind of resource sharing method according to claim 1, which is characterized in that key generates in the step 102)
When, the first user is the right to use for losing the resource, while key enters validity period, i.e. term of validity starts timing.
3. a kind of resource sharing method according to claim 1, which is characterized in that in the step 103), key is sent
While to second user, also retain a key in server, as the right to use identification for sharing resource.
4. a kind of resource sharing method according to claim 1, which is characterized in that key and use in the step 103)
The recipient in time limit is the utility control center of second user equipment, and utility control center is using the key in equipment off-line
Progress is assert by sharing resources use right.
5. a kind of resource sharing method according to claim 4, which is characterized in that the service life is second use
Remaining service life in the utility control center time of reception server of family equipment, while the application of the second user equipment
Administrative center also carries out term of validity timing.
6. a kind of resource sharing method according to claim 3 or 4, which is characterized in that when the right to use is assert, be both needed to
Carry out account matching.
7. a kind of resource sharing method according to claim 2 or 5, which is characterized in that the term of validity timing uses
Decay algorithm, meanwhile, it is synchronous to will do it the time limit after second user equipment networking, and synchrodata is subject to server data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410222680.1A CN105100176B (en) | 2014-05-23 | 2014-05-23 | A kind of resource sharing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410222680.1A CN105100176B (en) | 2014-05-23 | 2014-05-23 | A kind of resource sharing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105100176A CN105100176A (en) | 2015-11-25 |
CN105100176B true CN105100176B (en) | 2019-10-15 |
Family
ID=54579700
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410222680.1A Active CN105100176B (en) | 2014-05-23 | 2014-05-23 | A kind of resource sharing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105100176B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105979294A (en) * | 2015-11-26 | 2016-09-28 | 乐视致新电子科技(天津)有限公司 | Data processing method and device based on users |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101951318A (en) * | 2010-09-07 | 2011-01-19 | 南京大学 | Bidirectional mobile streaming media digital copyright protection method and system |
CN102131127A (en) * | 2011-03-29 | 2011-07-20 | 深圳创维-Rgb电子有限公司 | Television with digital certification function, authentication system and authentication method |
CN102413151A (en) * | 2010-09-20 | 2012-04-11 | 北京搜狗科技发展有限公司 | Network resource sharing method and system |
CN102739793A (en) * | 2012-07-03 | 2012-10-17 | 厦门简帛信息科技有限公司 | Intelligent terminal, management system and method of digital resource |
CN103297484A (en) * | 2012-03-05 | 2013-09-11 | 腾讯科技(深圳)有限公司 | Resource sharing method and device |
-
2014
- 2014-05-23 CN CN201410222680.1A patent/CN105100176B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101951318A (en) * | 2010-09-07 | 2011-01-19 | 南京大学 | Bidirectional mobile streaming media digital copyright protection method and system |
CN102413151A (en) * | 2010-09-20 | 2012-04-11 | 北京搜狗科技发展有限公司 | Network resource sharing method and system |
CN102131127A (en) * | 2011-03-29 | 2011-07-20 | 深圳创维-Rgb电子有限公司 | Television with digital certification function, authentication system and authentication method |
CN103297484A (en) * | 2012-03-05 | 2013-09-11 | 腾讯科技(深圳)有限公司 | Resource sharing method and device |
CN102739793A (en) * | 2012-07-03 | 2012-10-17 | 厦门简帛信息科技有限公司 | Intelligent terminal, management system and method of digital resource |
Also Published As
Publication number | Publication date |
---|---|
CN105100176A (en) | 2015-11-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101127606B (en) | Method and device for transmitting data object | |
CN101102257B (en) | Method and device for transmitting data objects | |
CN109146437B (en) | Virtual resource processing method, client and storage medium | |
CN102932414A (en) | Method and system for combining address book and social network | |
CN110110509A (en) | Right management method and Related product | |
CN106060097B (en) | A kind of management system and management method of information security contest | |
CN110198265A (en) | Information processing method, system, device, equipment and medium | |
CN104380655A (en) | Mechanisms for certificate revocation status verification on constrained devices | |
CN104168563A (en) | K-anonymity incentive mechanism based on local reputation storage | |
CN103905482B (en) | Method, push server and the system of pushed information | |
CN110177124A (en) | Identity identifying method and relevant device based on block chain | |
Feng et al. | Distributed signing protocol for IEEE P1363‐compliant identity‐based signature scheme | |
CN109214807A (en) | Method, apparatus, computer equipment and the storage medium of management contribution information | |
CN105791359A (en) | Internet of things system and data interaction method | |
CN114861211B (en) | Metadata scene-oriented data privacy protection method, system and storage medium | |
WO2012000227A1 (en) | Method of p2p video communication implemented on web page | |
He et al. | Fair peer-to-peer content delivery via blockchain | |
CN114143021B (en) | News information credit score system based on block chain | |
CN105100176B (en) | A kind of resource sharing method | |
CN109558710A (en) | User login method, device, system and storage medium | |
CN109614778A (en) | Dynamic Configuration, gateway and the system of user right | |
CN109845198A (en) | For the access control of the message channel in message transfer service | |
Salami et al. | SMAK-IOV: secure mutual authentication scheme and key exchange protocol in fog based IoV | |
CN111199007A (en) | Configuration method based on Web page, data encryption method and device | |
CN109818753A (en) | Selecting a client is the method and apparatus that multi-client multiserver generates key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |