CN107172082B - File sharing method and system - Google Patents

File sharing method and system Download PDF

Info

Publication number
CN107172082B
CN107172082B CN201710517681.2A CN201710517681A CN107172082B CN 107172082 B CN107172082 B CN 107172082B CN 201710517681 A CN201710517681 A CN 201710517681A CN 107172082 B CN107172082 B CN 107172082B
Authority
CN
China
Prior art keywords
computer
connection
request
file
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710517681.2A
Other languages
Chinese (zh)
Other versions
CN107172082A (en
Inventor
罗雪莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN201710517681.2A priority Critical patent/CN107172082B/en
Publication of CN107172082A publication Critical patent/CN107172082A/en
Application granted granted Critical
Publication of CN107172082B publication Critical patent/CN107172082B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Abstract

The invention discloses a file sharing method and a system, wherein the method comprises the following steps: establishing a connection for sharing files with a first computer; receiving a login request sent by a second computer; and authenticating the second computer based on the login request, and if the authentication is passed, allowing the login of the second computer and the access to the shared file of the first computer with the connection established. According to the file sharing method provided by the invention, the second computer accesses the shared file of the first computer in a login mode, so that the indirect connection between the first computer and the second computer is realized, and the condition that the file sharing process is unstable due to the self problem of the second computer or the fact that the two computers are prompted to be directly connected but not actually connected is avoided. The file sharing method provided by the invention solves the technical problem of how to ensure the stability of file sharing among computers.

Description

File sharing method and system
Technical Field
The present invention relates to the field of NAS file system access technologies, and in particular, to a file sharing method and system.
Background
With the development of society and science and technology, computers are increasingly widely used. When computers are used for information interaction, file sharing is sometimes required among the computers.
An existing method for sharing files among computers is to implement file sharing based on an NAS file system. The method utilizes the NAS data storage function and the characteristic of being capable of being connected to the network to realize the file sharing among computers. When a computer accesses another computer, the computer initiating the access directly establishes connection with the accessed computer, and realizes the file sharing between the computers by accessing the NAS file system of the accessed computer.
However, when the existing NAS file system is used to implement the file sharing method, due to the problem of the computer initiating access or the fact that the computer initiating access establishes a connection with the accessed computer on the surface but does not actually establish a connection, the situation that the computer initiating access cannot access the shared file of the accessed computer occurs, and the stability of the sharing process is poor.
In summary, how to ensure the stability of file sharing between computers is a problem that needs to be solved urgently by those skilled in the art.
Disclosure of Invention
The invention aims to provide a file sharing method, which can solve the technical problem of ensuring the stability of file sharing between computers. The invention also provides a file sharing system.
In order to achieve the above purpose, the invention provides the following technical scheme:
a method of file sharing, comprising:
establishing a connection for sharing files with a first computer;
receiving a login request sent by a second computer;
and authenticating the second computer based on the login request, and if the authentication is passed, allowing the login of the second computer and the access to the shared file of the first computer with the connection established.
Preferably, the establishing of the connection for file sharing with the first computer comprises:
receiving a connection request which is input from the outside and shares files with a first computer, wherein the connection request carries a service name of the first computer;
analyzing the connection request to obtain the service name of the first computer, and sending a CIFS (common information file format) request to a server corresponding to the service name of the first computer;
receiving a verification result returned by the server, wherein the verification result is sent after the server receives the CIFS request and verifies the CIFS request;
and analyzing the verification result, and if the verification result obtained by analysis shows that the server verifies that the CIFS request passes, determining to establish the connection for sharing the file with the first computer.
Preferably, the authenticating the second computer based on the login request includes:
analyzing the login request to obtain first identity information carried by the login request;
and judging whether the first identity information is consistent with preset second identity information or not, and if so, passing the verification.
Preferably, the presetting of the second identity information includes:
receiving third identity information input from the outside;
sending the third identity information to the server;
receiving a confirmation result returned by the server, wherein the confirmation result is sent after the server receives the third identity information and confirms whether the third identity information is consistent with fourth identity information corresponding to the first computer;
and analyzing the confirmation result, and if the confirmation result obtained by analysis shows that the third identity information is consistent with the fourth identity information, determining that the third identity information is preset second identity information.
Preferably, the establishing of the connection for file sharing with the first computer further includes:
receiving and storing a shared file sent by the first computer;
the allowing login of the second computer and access to the shared file of the first computer to which the connection has been established includes:
allowing login of the second computer and access to the stored shared files of the first computer.
Preferably, the establishing of the connection for file sharing with the first computer further includes:
receiving access authority of a shared file of the first computer input from the outside;
the allowing login of the second computer and access to the shared file of the first computer to which the connection has been established includes:
and allowing the second computer to log in and access the shared file of the first computer which has established the connection according to the access authority.
Preferably, the establishing of the connection for file sharing with the first computer comprises:
establishing a connection for sharing files with a first computer provided with a linux system;
the receiving the login request sent by the second computer comprises:
and receiving a login request sent by a second computer for installing the windows system.
The present invention also provides a file sharing system, comprising:
the connection module is used for establishing connection for sharing files with the first computer;
the first receiving module is used for receiving a login request sent by a second computer;
and the verification module is used for carrying out identity verification on the second computer based on the login request, and if the verification is passed, the login of the second computer and the access to the shared file of the first computer which is connected are allowed.
Preferably, the connection module includes:
a first receiving unit, configured to receive a connection request for file sharing with a first computer, where the connection request carries a service name of the first computer;
the analysis unit is used for analyzing the connection request, obtaining the service name of the first computer and sending a CIFS (common information file format) request to a server corresponding to the service name of the first computer;
a second receiving unit, configured to receive a verification result returned by the server, where the verification result is sent after the server receives the CIFS request and verifies the CIFS request;
and the analysis unit is used for analyzing the verification result, and if the verification result obtained through analysis shows that the server verifies that the CIFS request passes, the establishment of the connection with the first computer is determined to be realized.
Preferably, the method further comprises the following steps:
the second receiving module is used for receiving and storing the shared file of the first computer after the connection module establishes the connection of file sharing with the first computer;
the authentication module includes:
a first authentication unit for allowing login of the second computer and access to the stored shared file of the first computer.
The file sharing method provided by the invention comprises the steps of firstly establishing a connection for sharing files with a first computer; then receiving a login request sent by a second computer; and finally, carrying out identity authentication on the second computer based on the login request, and if the authentication is passed, allowing the login of the second computer and the access to the shared file of the first computer with the connection established. The file sharing method provided by the invention firstly establishes the connection for sharing the file with the first computer, and then connects the second computer under the condition of judging that the login request of the second computer passes, so that the second computer accesses the shared file of the first computer in a login mode, the indirect connection between the first computer and the second computer is realized, and the condition that the file sharing process is unstable due to the fact that the second computer is directly connected or the condition that the two computers are not actually connected is avoided. In summary, the file sharing method provided by the present invention solves the technical problem of how to ensure the stability of file sharing between computers. The file sharing system provided by the invention also solves the corresponding technical problem.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a file sharing method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a file sharing system according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart of a file sharing method according to an embodiment of the present invention.
The execution subject of the file sharing method provided by the invention can be a corresponding file sharing system, the file sharing system can be arranged on the first computer, and the inside of the file sharing system can realize the sharing of files based on the NAS file system.
The file sharing method provided by the embodiment of the invention can comprise the following steps:
step S1: a connection for file sharing with the first computer is established.
Since the shared file of the first computer needs to be accessed, the file sharing system needs to establish a connection for file sharing with the first computer, and the first computer provides the shared file for other computers to access.
Step S2: and receiving a login request sent by the second computer.
After establishing connection with a first computer providing shared files, the file sharing system needs to be connected with a second computer accessing the shared files of the first computer, so that the second computer realizes indirect connection with the first computer, and the second computer can access the shared files of the first computer only if the first computer and the second computer establish connection. The second computer is connected with the first computer in a mode of logging in the file sharing system, so that the second computer can be indirectly connected with the first computer, access to the shared file of the first computer is realized, the second computer does not need to be connected with the first computer in a mapping mode, and the problems that the second computer cannot access the shared file of the first computer due to self problems and the second computer and the first computer are prompted to realize mapping connection but actual connection is not established are avoided.
Step S3: and authenticating the second computer based on the login request, and if the authentication is passed, allowing the login of the second computer and the access to the shared file of the first computer with the connection established.
The file sharing system may directly authenticate the second computer, or the file sharing system may send the login request to another terminal, and the other terminal performs information analysis according to the received login request, and then the file sharing system performs authentication on the second computer according to the information analysis result returned by the other terminal.
Only when the identity authentication of the second computer is passed, the login of the second computer and the access to the shared file provided by the first computer are allowed, so that the second computer is indirectly connected with the first computer in a mode of logging in a file sharing system, and after the connection is established, the second computer can access to the shared file of the first computer. And under the condition that the identity authentication of the second computer is not passed, directly refusing the login of the second computer, or sending the authentication result to the second computer, and performing the corresponding identity authentication again after the second computer changes the login request. Of course, other operations are possible in the case where the second computer authentication fails, and the present invention is not particularly limited herein.
According to the file sharing method provided by the invention, the file sharing system firstly establishes the connection for sharing the file with the first computer, and then is connected with the second computer under the condition that the login request of the second computer is judged to pass, so that the second computer accesses the shared file of the first computer in a mode of logging in the file sharing system, the indirect connection between the first computer and the second computer is realized, and the condition that the file sharing process is unstable due to the self problem of the second computer or the condition that the two computers are prompted to be directly connected but not actually connected is avoided. In summary, the file sharing method provided by the invention solves the technical problem of how to ensure the stability of file sharing between computers.
In the file sharing method provided in the embodiment of the present invention, step S1: establishing the connection for file sharing with the first computer may include:
receiving a connection request which is input from the outside and shares files with a first computer, wherein the connection request carries a service name of the first computer;
analyzing the connection request to obtain a service name of the first computer, and sending a CIFS request to a server corresponding to the service name of the first computer;
receiving a verification result returned by the server, wherein the verification result is sent after the server receives the CIFS request and verifies the CIFS request;
and analyzing the verification result, and if the verification result obtained by the analysis shows that the server verifies that the CIFS request passes, determining to establish the connection for sharing the file with the first computer.
The service name of the first computer may be an IP address of the server of the first computer, or a domain name of the server of the first computer, and the like, and the present invention is not limited in detail herein. The file sharing system sends a CIFS request to the server, the server can determine a sending end of the CIFS request, namely the file sharing system after receiving the CIFS request, if the server allows the file sharing connection to be established between the server and the file sharing system, the CIFS request is verified to pass, and if not, the CIFS request is verified not to pass; that is, the server verifies that the CIFS request passes, which indicates that it allows establishing a file sharing connection based on the CIFS protocol with the file sharing system.
In practical application, there may be a plurality of connection methods for establishing a file sharing with a first computer, and the simplest one is to establish a connection directly, that is, after receiving a connection request, a server corresponding to the first computer establishes a connection without any verification, so that the connection establishment process is simple, but because there is no verification process, there is a security problem in the connection establishment process, so that in this embodiment, a CIFS request is used to establish a connection for file sharing with the first computer, and only when the first computer passes the verification of the CIFS request, the connection establishment can be implemented, thereby ensuring the security of the connection; the CIFS protocol corresponding to the CIFS request can enable a program to access files on a remote computer and require the computer to provide services.
In the file sharing method provided in the embodiment of the present invention, the authenticating the identity of the second computer based on the login request in step S3 may include:
analyzing the login request to obtain first identity information carried by the login request;
and judging whether the first identity information is consistent with the preset second identity information, and if so, passing the verification.
The second identity information and the first identity information may include one or more parameter items of a service name, a sharing name, a user and a password, and of course, other parameter items may be set according to actual needs; in general, the parameter items included in the first identity information and the second identity information are consistent, that is, both of them may include a service name and a shared name, or both of them may include a user and a password. Wherein the service name refers to an IP address of a server of the first computer; the sharing name refers to a directory name of a sharing file set in the first computer; the user and password refer to a user and a password of the shared file set in the first computer.
Since the second computer establishes a connection with the file sharing system by means of login, authentication of the second computer is required. The file sharing system can directly carry out identity authentication on the second computer, firstly analyzes the login request to obtain first identity information carried by the login request, then judges whether each item of information in the first identity information is respectively the same as corresponding information in preset second identity information, if so, the authentication is passed, and if not, the authentication is not passed. The advantage of the whole process of directly carrying out identity authentication by the file sharing system is that the login request does not need to be sent to other terminals, thereby saving time and improving efficiency.
Of course, the login request may also be sent to the server corresponding to the first computer; then receiving a verification result returned by the server corresponding to the first computer, wherein the verification result is sent after the server corresponding to the first computer verifies whether each item of information carried in the login request is respectively the same as the corresponding information in the preset identity information; analyzing the verification result, if the verification result shows that each item of information carried in the server verification login request corresponding to the first computer is respectively the same as the corresponding information in the preset identity information (namely, fourth identity information mentioned below), passing the verification, otherwise, failing to pass the verification; this can reduce the service pressure of the file sharing system itself. Of course, other settings can be made according to actual needs, and the invention is not limited in detail here.
In the file sharing method provided in the embodiment of the present invention, the presetting of the second identity information may include:
receiving third identity information input from the outside;
sending the third identity information to a server corresponding to the first computer;
receiving a confirmation result returned by the server, wherein the confirmation result is sent after the server receives the third identity information and confirms whether the third identity information is consistent with fourth identity information corresponding to the first computer;
and analyzing the confirmation result, and if the confirmation result obtained by analysis shows that the third identity information is consistent with the fourth identity information, determining that the third identity information is preset second identity information.
The third identity information and the fourth identity information may each include one or more parameter items of a service name, a sharing name, a user and a password, and generally the third identity information is the same as the parameter items included in the fourth identity information; whether the third identity information is consistent with the fourth identity information can be confirmed by confirming whether each item of information in the third identity information is consistent with corresponding information in the fourth identity information, if each item of information in the third identity information is consistent with corresponding information in the fourth identity information, the third identity information is consistent with the fourth identity information, and if not, the third identity information is inconsistent with the fourth identity information; if the third identity information is consistent with the fourth identity information, it can be determined that the third identity information is the preset second identity information, and at this time, the second identity information is also consistent with the fourth identity information. Therefore, the preset second identity information can be ensured to be correspondingly consistent with the information in the server corresponding to the first computer, and the accuracy of the preset second identity information is enhanced. The two messages referred to in this application are identical to each other.
In the file sharing method provided in the embodiment of the present invention, after establishing the connection for file sharing with the first computer, the method may further include:
receiving and storing a shared file sent by a first computer;
allowing login of the second computer and access to the shared files of the first computer to which the connection has been established may include:
allowing the second computer to log in and access to the stored shared files of the first computer.
In practical application, the second computer can directly access the shared file on the first computer and can also access the shared file of the first computer stored on the file sharing system.
In the file sharing method provided in the embodiment of the present invention, after establishing the connection for file sharing with the first computer, the method may further include:
receiving an access right of a shared file of a first computer input from the outside;
allowing login of the second computer and access to the shared files of the first computer to which the connection has been established may include:
allowing the second computer to log in and access the shared file of the first computer which has established connection according to the access authority. When the server creates the shared directory, an access right is set for the shared directory, the access right comprises one or two of read operation and write operation, for example, the access right is the read-write operation, and after the second computer logs in the file sharing system, the second computer can perform the read-write operation on the shared file of the first computer according to the access right. Therefore, the second computer can be prevented from randomly accessing the shared file of the first computer, and the security of the shared file of the first computer is ensured.
In the file sharing method provided in the embodiment of the present invention, establishing a connection for file sharing with a first computer may include:
establishing a connection for sharing files with a first computer provided with a linux system;
receiving the login request sent by the second computer may include:
and receiving a login request sent by a second computer for installing the windows system.
The file sharing method provided by the invention can be applied to various application scenes, is preferably applied to a second computer provided with a windows system to access a first computer provided with a linux system, and can avoid the problem that the second computer cannot access the shared file of the first computer due to the problems of the windows system. In this case, the file sharing system may be configured to run on the windows system's interface.
The invention also provides a file sharing system which has the corresponding effect of the method. Referring to fig. 2, fig. 2 is a schematic structural diagram of a file sharing system according to an embodiment of the present invention.
The file sharing system provided by the embodiment of the invention can comprise:
a connection module A1, configured to establish a connection for file sharing with a first computer;
the first receiving module A2 is used for receiving a login request sent by a second computer;
and the authentication module A3 is used for performing identity authentication on the second computer based on the login request, and if the authentication is passed, allowing the login of the second computer and the access to the shared file of the first computer with the connection established.
In a file sharing system provided in an embodiment of the present invention, a connection module may include:
a first receiving unit, configured to receive a connection request for file sharing with a first computer, where the connection request carries a service name of the first computer.
And the first analysis unit is used for analyzing the connection request to obtain the service name of the first computer and sending the CIFS request to the server corresponding to the service name of the first computer.
And the second receiving unit is used for receiving a verification result returned by the server, wherein the verification result is sent after the server receives the CIFS request and verifies the CIFS request.
And the first analysis unit is used for analyzing the verification result, and if the verification result obtained through analysis shows that the server verifies that the CIFS request passes, the establishment of the connection with the first computer is determined to be realized.
In a file sharing system provided in an embodiment of the present invention, a verification module may include:
the second analysis unit is used for analyzing the login request to obtain first identity information carried by the login request;
and the judging unit is used for judging whether the first identity information is consistent with the preset second identity information or not, and if so, the verification is passed.
In the file sharing system provided in the embodiment of the present invention, the determining unit may include:
the third receiving unit is used for receiving third identity information input by the outside;
a sending unit, configured to send the third identity information to the server;
the fourth receiving unit is used for receiving a confirmation result returned by the server, wherein the confirmation result is sent after the server receives the third identity information and confirms whether the third identity information is consistent with fourth identity information corresponding to the first computer;
and the second analysis unit is used for analyzing the confirmation result, and if the confirmation result obtained through analysis shows that the third identity information is consistent with the fourth identity information, determining that the third identity information is the preset second identity information.
The file sharing system provided in the embodiment of the present invention may further include:
the fifth receiving unit is used for receiving and storing the shared file sent by the first computer;
the verification module may include:
a first authentication unit for allowing login of the second computer and access to the stored shared file of the first computer.
The file sharing system provided in the embodiment of the present invention may further include:
a sixth receiving unit, configured to receive an access right of a shared file of the first computer input from the outside;
the verification module may include:
and the second authentication unit is used for allowing the login of the second computer and the access to the shared file of the first computer which is connected according to the access authority.
In a file sharing system provided in an embodiment of the present invention, a connection module may include:
the device comprises a connecting unit, a processing unit and a processing unit, wherein the connecting unit is used for establishing connection for sharing files with a first computer provided with a linux system;
the first receiving module may include:
and the seventh receiving unit is used for receiving a login request sent by a second computer which installs the windows system.
For a description of a relevant part in the file sharing system according to the embodiment of the present invention, reference is made to detailed descriptions of a corresponding part in the file sharing method according to the embodiment of the present invention, which are not repeated herein. In addition, parts of the technical solutions provided in the embodiments of the present invention that are consistent with the implementation principles of the corresponding technical solutions in the prior art are not described in detail, so as to avoid redundant description.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (7)

1. A method for sharing a file, comprising:
establishing a connection for sharing files with a first computer;
receiving a login request sent by a second computer;
performing identity authentication on the second computer based on the login request, if the authentication is passed, allowing login of the second computer and access to the shared file of the first computer which has established connection, if the authentication is not passed, refusing login of the second computer, and sending an authentication result to the second computer to prompt the second computer to perform login again after the login request is changed;
authenticating the second computer based on the login request comprises:
sending the login request to a pre-designated terminal, and determining whether the identity authentication of the second computer passes according to an information analysis result returned after the terminal performs information analysis on the login request;
the establishing of the connection for the file sharing with the first computer comprises the following steps:
receiving a connection request which is input from the outside and shares files with a first computer, wherein the connection request carries a service name of the first computer;
analyzing the connection request to obtain the service name of the first computer, and sending a CIFS (common information file format) request to a server corresponding to the service name of the first computer;
receiving a verification result returned by the server, wherein the verification result is sent after the server receives the CIFS request and verifies the CIFS request;
analyzing the verification result, and if the verification result obtained by analysis shows that the server verifies that the CIFS request passes, determining to establish the connection for sharing the file with the first computer;
the establishing of the connection for the file sharing with the first computer comprises the following steps:
establishing a connection for sharing files with a first computer provided with a linux system;
the receiving the login request sent by the second computer comprises:
and receiving a login request sent by a second computer for installing the windows system.
2. The method of claim 1, wherein said authenticating the second computer based on the login request comprises:
analyzing the login request to obtain first identity information carried by the login request;
and judging whether the first identity information is consistent with preset second identity information or not, and if so, passing the verification.
3. The method of claim 2, wherein presetting the second identity information comprises:
receiving third identity information input from the outside;
sending the third identity information to the server;
receiving a confirmation result returned by the server, wherein the confirmation result is sent after the server receives the third identity information and confirms whether the third identity information is consistent with fourth identity information corresponding to the first computer;
and analyzing the confirmation result, and if the confirmation result obtained by analysis shows that the third identity information is consistent with the fourth identity information, determining that the third identity information is preset second identity information.
4. The method of claim 1, wherein establishing the connection for file sharing with the first computer further comprises:
receiving and storing a shared file sent by the first computer;
the allowing login of the second computer and access to the shared file of the first computer to which the connection has been established includes:
allowing login of the second computer and access to the stored shared files of the first computer.
5. The method of claim 1, wherein establishing the connection for file sharing with the first computer further comprises:
receiving access authority of a shared file of the first computer input from the outside;
the allowing login of the second computer and access to the shared file of the first computer to which the connection has been established includes:
and allowing the second computer to log in and access the shared file of the first computer which has established the connection according to the access authority.
6. A file sharing system, comprising:
the connection module is used for establishing connection for sharing files with the first computer;
the first receiving module is used for receiving a login request sent by a second computer;
the verification module is used for carrying out identity verification on the second computer based on the login request, allowing the login of the second computer and the access to the shared file of the first computer which is connected with the second computer if the verification is passed, refusing the login of the second computer if the verification is not passed, and sending a verification result to the second computer so as to prompt the second computer to change the login request and then log in again; authenticating the second computer based on the login request comprises: sending the login request to a pre-designated terminal, and determining whether the identity authentication of the second computer passes according to an information analysis result returned after the terminal performs information analysis on the login request;
the connection module includes:
a first receiving unit, configured to receive a connection request for file sharing with a first computer, where the connection request carries a service name of the first computer;
the analysis unit is used for analyzing the connection request, obtaining the service name of the first computer and sending a CIFS (common information file format) request to a server corresponding to the service name of the first computer;
a second receiving unit, configured to receive a verification result returned by the server, where the verification result is sent after the server receives the CIFS request and verifies the CIFS request;
the analysis unit is used for analyzing the verification result, and if the verification result obtained through analysis shows that the server verifies that the CIFS request passes, the establishment of the connection with the first computer is determined to be realized;
the connection module includes:
the device comprises a connecting unit, a file sharing unit and a file sharing unit, wherein the connecting unit is used for establishing connection for file sharing with a first computer provided with a linux system;
the first receiving module includes:
and the seventh receiving unit is used for receiving a login request sent by a second computer which installs the windows system.
7. The system of claim 6, further comprising:
the second receiving module is used for receiving and storing the shared file of the first computer after the connection module establishes the connection of file sharing with the first computer;
the authentication module includes:
a first authentication unit for allowing login of the second computer and access to the stored shared file of the first computer.
CN201710517681.2A 2017-06-29 2017-06-29 File sharing method and system Active CN107172082B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710517681.2A CN107172082B (en) 2017-06-29 2017-06-29 File sharing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710517681.2A CN107172082B (en) 2017-06-29 2017-06-29 File sharing method and system

Publications (2)

Publication Number Publication Date
CN107172082A CN107172082A (en) 2017-09-15
CN107172082B true CN107172082B (en) 2020-10-23

Family

ID=59826767

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710517681.2A Active CN107172082B (en) 2017-06-29 2017-06-29 File sharing method and system

Country Status (1)

Country Link
CN (1) CN107172082B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109361458A (en) * 2018-11-26 2019-02-19 华南师范大学 A kind of Windows and Linux shared file system based on the LiFi communication technology
CN110895600B (en) * 2019-04-22 2020-09-29 深圳市前海九米信息技术有限公司 Shared big data field protection method

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078898A (en) * 2012-12-18 2013-05-01 华为技术有限公司 File system, interface service device and data storage service provision method

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8868628B2 (en) * 2005-12-19 2014-10-21 International Business Machines Corporation Sharing computer data among computers
CN101304429A (en) * 2008-05-14 2008-11-12 乐之酷信息技术(深圳)有限公司 System and method for sharing personal computer document through mobile terminal
CN101686165B (en) * 2008-09-28 2012-08-22 联想(北京)有限公司 Chip device and method of accessing network shared files by using same
CN101741846B (en) * 2009-12-22 2013-12-11 北京网御星云信息技术有限公司 File downloading method, file downloading device and file downloading system
CN101841537B (en) * 2010-04-13 2013-01-16 北京时代亿信科技有限公司 Method and system for realizing file sharing access control based on protocol proxy
US20120137228A1 (en) * 2010-11-30 2012-05-31 Action Star Enterprise Co. Ltd. Point-to-point file transmitting device and file transmitting method thereof

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078898A (en) * 2012-12-18 2013-05-01 华为技术有限公司 File system, interface service device and data storage service provision method

Also Published As

Publication number Publication date
CN107172082A (en) 2017-09-15

Similar Documents

Publication Publication Date Title
US11843589B2 (en) Network connection automation
US11716390B2 (en) Systems and methods for remote management of appliances
CN111898124B (en) Process access control method and device, storage medium and electronic equipment
CN105162775A (en) Logging method and device of virtual machine
CN112491776B (en) Security authentication method and related equipment
CN104702624A (en) Method and system for logging virtual machine based on Cloud Stack platform
US20210099339A1 (en) Template-based onboarding of internet-connectible devices
CN111064708B (en) Authorization authentication method and device and electronic equipment
CN112738021B (en) Single sign-on method, terminal, application server, authentication server and medium
CN112966253A (en) Third-party application integrated login method, login device and platform
CN115022047B (en) Account login method and device based on multi-cloud gateway, computer equipment and medium
CN107172082B (en) File sharing method and system
CN113761509A (en) iframe verification login method and device
CN116204494B (en) Method and device for migrating active directory data, electronic equipment and storage medium
CN112367339B (en) System security login management method and device
CN112929388B (en) Network identity cross-device application rapid authentication method and system, and user agent device
CN117882337A (en) Certificate revocation as a service at a data center
CN113901428A (en) Login method and device of multi-tenant system
CN113360868A (en) Application program login method and device, computer equipment and storage medium
CN114585055A (en) Vehicle-mounted WiFi access method, vehicle controller, cloud server and mobile terminal
CN113949562B (en) Portal authentication method, device, system, electronic equipment and storage medium
CN115766070A (en) Terminal control method and device based on master control equipment and computing equipment
CN115766095A (en) Industrial equipment identity authentication method and device, computer equipment and storage medium
CN115776400A (en) Identity authentication method, device, system and equipment across multiple identity authentication centers
CN114090996A (en) Multi-party system mutual trust authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200922

Address after: 215100 No. 1 Guanpu Road, Guoxiang Street, Wuzhong Economic Development Zone, Suzhou City, Jiangsu Province

Applicant after: SUZHOU LANGCHAO INTELLIGENT TECHNOLOGY Co.,Ltd.

Address before: 450018 Henan province Zheng Dong New District of Zhengzhou City Xinyi Road No. 278 16 floor room 1601

Applicant before: ZHENGZHOU YUNHAI INFORMATION TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant