CN107995219A - File accelerates to show method, computing device and computer-readable storage medium - Google Patents

File accelerates to show method, computing device and computer-readable storage medium Download PDF

Info

Publication number
CN107995219A
CN107995219A CN201711402376.5A CN201711402376A CN107995219A CN 107995219 A CN107995219 A CN 107995219A CN 201711402376 A CN201711402376 A CN 201711402376A CN 107995219 A CN107995219 A CN 107995219A
Authority
CN
China
Prior art keywords
file
content
key
encrypted content
showed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711402376.5A
Other languages
Chinese (zh)
Inventor
李兆蒙
霍美莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhangyue Technology Co Ltd
Original Assignee
Zhangyue Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhangyue Technology Co Ltd filed Critical Zhangyue Technology Co Ltd
Priority to CN201711402376.5A priority Critical patent/CN107995219A/en
Priority to PCT/CN2018/080056 priority patent/WO2019119665A1/en
Publication of CN107995219A publication Critical patent/CN107995219A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

Accelerate to show method, computing device and computer-readable storage medium the invention discloses a kind of file, wherein, method includes:Receive the file acquisition request that user sends;Asked according to file acquisition, file to be showed is obtained from cache server, wherein at least a portion content of file to be showed is the first encrypted content being encrypted using first key;Show the file content in addition to the first encrypted content in advance;After the first key for obtaining file to be showed from remote server, the first encrypted content is decrypted using first key, shows the first encrypted content.As can be seen here, using scheme provided by the invention, the file content in addition to the first encrypted content can be showed in advance, during user checks the file content shown in advance, first key is obtained to decrypt the first encrypted content to remote server, and then accelerates showing for file to be showed;And the first encrypted content of decryption can be presented to user in the case of user's unaware.

Description

File accelerates to show method, computing device and computer-readable storage medium
Technical field
The present invention relates to field of computer technology, and in particular to a kind of file accelerate to show method, apparatus, computing device and Computer-readable storage medium.
Background technology
With the development of science and technology, the mode for obtaining information and storage information also changes therewith, this change is constantly full Foot exchange, obtain information, the convenient demand of record information.At the same time, it is big but to become one for thing followed Information Security Problem.
At present, it will usually take the mode by data and cipher key separation storage to improve the security of data, for example, by number According to being stored in cache service system, and by key storage in Cloud Server.Due to obtaining the time of key from Cloud Server It is longer than the time that data file is obtained from cache service system, therefore following scenes easily occurs:Getting data text After part, user can not check file content immediately, and must wait until be checked after getting key, and then to use The use at family brings great inconvenience.
The content of the invention
In view of the above problems, it is proposed that the present invention overcomes the above problem in order to provide one kind or solves at least in part The file for stating problem accelerates to show method, apparatus, computing device and computer-readable storage medium.
According to an aspect of the invention, there is provided a kind of file accelerates to show method, including:
Receive the file acquisition request that user sends;
Asked according to the file acquisition, file to be showed is obtained from cache server, wherein the file to be showed At least a portion content is the first encrypted content being encrypted using first key;
Show the file content in addition to the first encrypted content in advance;
After the first key of file to be showed described in being obtained from remote server, institute is decrypted using the first key The first encrypted content is stated, shows first encrypted content.
According to another aspect of the present invention, there is provided a kind of computing device, including:Processor, memory, communication interface and Communication bus, the processor, the memory and the communication interface complete mutual communication by the communication bus;
The memory is used to store an at least executable instruction, and it is following that the executable instruction performs the processor Operation:
Receive the file acquisition request that user sends;
Asked according to the file acquisition, file to be showed is obtained from cache server, wherein the file to be showed At least a portion content is the first encrypted content being encrypted using first key;
Show the file content in addition to the first encrypted content in advance;
After the first key of file to be showed described in being obtained from remote server, institute is decrypted using the first key The first encrypted content is stated, shows first encrypted content.
According to another aspect of the invention, there is provided a kind of computer-readable storage medium, be stored with the storage medium to A few executable instruction, the executable instruction make processor perform following operation:
Receive the file acquisition request that user sends;
Asked according to the file acquisition, file to be showed is obtained from cache server, wherein the file to be showed At least a portion content is the first encrypted content being encrypted using first key;
Show the file content in addition to the first encrypted content in advance;
After the first key of file to be showed described in being obtained from remote server, institute is decrypted using the first key The first encrypted content is stated, shows first encrypted content.
The file provided according to the present invention accelerates to show method, computing device and computer-readable storage medium, receives user's hair The file acquisition request sent;Asked according to file acquisition, file to be showed is obtained from cache server, wherein file to be showed At least a portion content is the first encrypted content being encrypted using first key;Show in advance in addition to the first encrypted content File content;After the first key for obtaining file to be showed from remote server, added using first key decryption first Close content, shows the first encrypted content.It can be seen from the above that using scheme provided by the invention, can show in advance except the first encryption File content beyond content, during user checks the file content showed in advance, the is obtained to remote server One key accelerates showing for file to be showed to decrypt the first encrypted content;And can be in the feelings of user's unaware Under condition, the first encrypted content of decryption is presented to user.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this area Technical staff will be clear understanding.Attached drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole attached drawing, identical component is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows that file according to an embodiment of the invention accelerates the flow chart for showing method;
Fig. 2 shows that file in accordance with another embodiment of the present invention accelerates the flow chart for showing method;
Fig. 3 shows a kind of structure diagram of computing device according to embodiments of the present invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
In numerous application platforms, usually only VIP user can just check the data file of high authority, for example, regarding In frequency player, VIP user can just check the video of payment.In other words, when VIP user wants to check the data file of high authority File content when, the remote server of application platform needs to verify the authority of the VIP user, then send corresponding key to User, and the process take it is longer so that user cannot view file content immediately after data file is got, and then lead Cause poor user experience.Based on this, the present invention provides a kind of quick user for having higher-rights for VIP user etc. to show file The scheme of content.
Fig. 1 shows that file according to an embodiment of the invention accelerates the flow chart for showing method.As shown in Figure 1, should Method comprises the following steps:
Step S101:Receive the file acquisition request that user sends.
User using application platform or during browsing webpage, is sending file acquisition request;Server receives this article Part obtains request.Wherein, user refers to the user with higher-rights, for example, VIP user;The file that file acquisition request is directed to Refer to the file non-fully unconditionally checked, for example, member prefecture books, it is necessary to be member or supplement user with money to check completely These books.
In the present embodiment, the request method of file acquisition request is not specifically limited, those skilled in the art can Understand, the request method can be arbitrarily be capable of the file non-fully unconditionally checked of acquisition request in the prior art please Seek mode, for example, request method can be to click on file, select to browse file etc..
Step S102:Asked according to file acquisition, file to be showed is obtained from cache server.
Asked in response to the file acquisition of user, obtain the file to be showed that file acquisition request is directed to first.
Wherein, at least a portion content of file to be showed is the first encrypted content being encrypted using first key, I.e.:File to be showed includes directly being presented to the first encrypted content of user, which must utilize first Key could be decrypted;Also, first key is stored separately with file to be showed, and first key is stored in remote server In.
Specifically, after file acquisition request is received, file to be showed is obtained from cache server, is treated with accelerating acquisition Show the speed of file, optionally, cache server is content distributing network (Content Delivery Network, abbreviation CDN), source contents can be synchronized to each fringe node in the whole nation by CDN, and system is accurately dispatched in cooperation, and the request of user is distributed To most suitable node, user is set to obtain the content of request with most fast speed, and then improve the file of response user Obtain the speed of request.
Step S103:Show the file content in addition to the first encrypted content in advance.
After file to be showed is got, show the file content being decrypted without first key in advance, in this hair In bright, which is denoted as to the content unconditionally checked, the contents of the section from remote server without obtaining key It can check, and the first encrypted content is denoted as to the content had ready conditions and checked.
Specifically, it is generally the case that the more demanding file content of a file medium security level to be showed can be with separation The form storage of key, i.e., be stored in remote server by first key;And the file content of remainder, then usually without close Key, and/or, key stores together with file content, and then can show the file content of remainder in advance, for user Checked for this partial file content, and avoid the first key to be obtained such as user and the first encrypted content is solved Close process.
Step S104:After the first key for obtaining file to be showed from remote server, decrypted using first key First encrypted content, shows the first encrypted content.
While the file content in addition to the first encrypted content is showed in advance, text to be showed is obtained from remote server The first key of part;Then the first encrypted content is decrypted using first key, and then can be checked in user except in the first encryption During file content beyond appearance, what no user perceived gets first key and the first encrypted content is decrypted. Wherein, first key is dynamic key, to improve the security of the first encryption file.
Accelerated to show method according to file provided in this embodiment, receive the file acquisition request that user sends;According to text Part obtains request, and file to be showed is obtained from cache server, to accelerate to obtain the speed of file to be showed;Show in advance except the File content beyond one encrypted content, avoids not completing because obtaining first key and decrypting the process of the first encrypted content, Cause entirely that file to be showed can not be checked, and then greatly shorten and even eliminate user and wait time for showing, lifting User experience;After the first key for obtaining file to be showed from remote server, added using first key decryption first Close content, shows the first encrypted content, and then while user checks the file content in addition to the first encrypted content, to One encrypted content is decrypted.It can be seen from the above that using scheme provided in this embodiment, electronic reading can be widely used in The application platforms such as device, video player, and suitable for web page platform.In these platforms, for non-fully unconditionally looking into The file seen, can show the file content in addition to the first encrypted content in advance, and the file showed in advance is checked in user During content, first key is obtained to decrypt the first encrypted content to remote server, and then accelerate file to be showed Show;And the first encrypted content of decryption can be presented to user, and then lifted in the case of user's unaware User experience.
Fig. 2 shows that file in accordance with another embodiment of the present invention accelerates the flow chart for showing method.As shown in Fig. 2, This method comprises the following steps:
Step S201:Receive the file acquisition request that user sends.
Receive the file acquisition request for the file that the acquisition that user sends non-fully unconditionally is checked.
Step S202:Asked according to file acquisition, file to be showed is obtained from cache server.
After file acquisition request is received, file acquisition is obtained from cache server first and ask what is be directed to wait to show File, file to be showed is obtained with quick.
Wherein, at least a portion content of file to be showed is the first encrypted content being encrypted using first key, The security of first encrypted content is higher;Also, first key is stored in remote server, compared to from cache server The middle time for obtaining file to be showed, the time for obtaining the first key are then longer.At the same time, generally attract user, treat Show also some unused first key is encrypted in file file content (i.e. hereinafter except the first encrypted content with Outer file content), check that the authority that the partial file content needs is relatively low, therefore acquisition checks the time cycle of authority more It is short.
In the present embodiment, the first encrypted content is specially word, picture, audio and/or video;Except the first encrypted content File content in addition is specially word, picture, audio and/or video.
Step S203:Show the file content in addition to the first encrypted content in advance.
In view of the above-mentioned acquisition referred to checks that the time cycle of the authority of the encrypted file content of unused first key is short, and Obtain first key time it is long the reason for, in the present embodiment, show the file content in addition to the first encrypted content in advance, with Reduce the stand-by period of user.
Wherein, the file content in addition to the first encrypted content includes:The second encryption being encrypted using the second key Content, and/or, not encrypted 3rd file content.Wherein, the second key is collectively stored in cache server with file to be showed In, while file to be showed is obtained, you can from cache server quick obtaining to the second key.In the present embodiment, remove File content beyond first encrypted content is specially file content forward in file to be showed, and/or, in file to be showed Excellent file content.By taking e-book of paying as an example, then the file content in addition to the first encrypted content can be Content of Introductory Reading, Alternatively, the wonderful of selected parts.Wherein, the 3rd file content is without encrypted file content.
Specifically, show the file content in addition to the first encrypted content in advance and further comprise showing and utilize the second key The second encrypted content being encrypted, and/or, show the 3rd file content.
As an optional step of the present embodiment, if the file content in addition to the first encrypted content is using The second encrypted content that two keys are encrypted, then before the file content in addition to the first encrypted content is showed, from caching Server obtains the second key;Utilize second the second encrypted content of secret key decryption.
Step S204:The verification for sending acquisition first key is asked to remote server so that remote server is according to verification The solicited message that request carries is verified;If verify the first key that file to be showed successfully is obtained from remote server.
While the file content in addition to the first encrypted content is showed in advance, sent to remote server and carry request The verification of information is asked so that remote server is verified according to the solicited message, and then is determined whether user has and obtained the The authority of one key, and search first key.In the present embodiment, it is the security that improves the first encrypted content, sets the One key is according to user right dynamically distributes, and then improves low rights user and obtains first key by back door Difficulty.
Specifically, the verification for sending carrying solicited message is asked to server, wherein, solicited message includes the account of user Information, the information of file to be showed, and/or, the information of the first encrypted content;Remote server determines user according to account information Authority, if user have obtain first key authority, verify successfully;Then remote server is according to file to be showed Information, and/or, the information searching of the first encrypted content corresponds to the first key of the first encrypted content of decryption;Finally from long-range clothes Business device obtains the first key of the file to be showed found.
Step S205:After the first key for obtaining file to be showed from remote server, decrypted using first key First encrypted content, shows the first encrypted content.
After the first key for obtaining file to be showed from remote server, using in the first encryption of first key decryption Hold, and then can be during the file content that user is checked in addition to the first encrypted content, what no user perceived gets First key is simultaneously decrypted the first encrypted content;And after the first encrypted content is decrypted using first key, judgement is The no condition for meeting to show the first encrypted content;If so, then show the first encrypted content.
Specifically, after the first encrypted content is decrypted using first key, the operation of user is monitored in real time, according to monitoring As a result judge currently whether need to show the first encrypted content, if so, then showing the first encrypted content.To read e-book of paying Exemplified by, after the first encrypted content is decrypted, the page turning behavior of user is monitored in real time, if the page number reaches the first encrypted content and includes The page number in the range of, then show the first encrypted content of the corresponding page number.
Accelerated to show method according to file provided in this embodiment, receive the file acquisition request that user sends;According to text Part obtains request, and file to be showed is obtained from cache server, to accelerate to obtain the speed of file to be showed;Show in advance except the File content beyond one encrypted content, and then greatly shorten and even eliminate the time that user's wait shows, improve use Experience at family;While the file content in addition to the first encrypted content is showed in advance, the verification for sending acquisition first key please Ask to remote server so that remote server is verified according to the solicited message that verification request carries;If verifying successfully, The first key of file to be showed is obtained from remote server, then, the first encrypted content, Jin Er are decrypted using first key While user checks the file content in addition to the first encrypted content, the first encrypted content is decrypted;Show when meeting Condition when, show the first encrypted content.It can be seen from the above that using scheme provided in this embodiment, can show in advance except first File content beyond encrypted content, during user checks the file content showed in advance, is obtained to remote server First key is taken to decrypt the first encrypted content, and then accelerates showing for file to be showed;And can be in user's unaware In the case of, the first encrypted content of decryption is presented to user, and then improve user experience.
The embodiment of the present application provides a kind of nonvolatile computer storage media, and the computer-readable storage medium is stored with An at least executable instruction, the file which can perform in above-mentioned any means embodiment accelerate the side of showing Method.
Executable instruction specifically can be used for so that processor performs following operation:
Receive the file acquisition request that user sends;
Asked according to the file acquisition, file to be showed is obtained from cache server, wherein the file to be showed At least a portion content is the first encrypted content being encrypted using first key;
Show the file content in addition to the first encrypted content in advance;
After the first key of file to be showed described in being obtained from remote server, institute is decrypted using the first key The first encrypted content is stated, shows first encrypted content.
In a kind of optional embodiment, the file content in addition to the first encrypted content includes:Utilize second The second encrypted content that key is encrypted, and/or, not encrypted 3rd file content.
In a kind of optional embodiment, the executable instruction also makes the processor perform following operation:Postpone Deposit server and obtain the second key;Utilize the second encrypted content described in second secret key decryption;
Show second encrypted content, and/or, show the 3rd file content.
In a kind of optional embodiment, the executable instruction also makes the processor perform following operation:Send Obtain first key verification request to remote server for remote server according to verification request carry solicited message into Row verification;
If verify successfully, from the first key of file to be showed described in remote server acquisition.
In a kind of optional embodiment, the executable instruction also makes the processor perform following operation:Judge Whether satisfaction shows the condition of the first encrypted content;
If so, then show first encrypted content.
In a kind of optional embodiment, first encrypted content is specially word, picture, audio and/or video; The file content in addition to the first encrypted content is specially word, picture, audio and/or video.
In a kind of optional embodiment, the first key is according to user right dynamically distributes.
In a kind of optional embodiment, the file content in addition to the first encrypted content is specially described to be waited to open up Forward file content in existing file, and/or, excellent file content in the file to be showed.
Fig. 3 shows a kind of structure diagram of computing device according to embodiments of the present invention, the specific embodiment of the invention The specific implementation to computing device does not limit.
As shown in figure 3, the computing device can include:Processor (processor) 302, communication interface (Communications Interface) 304, memory (memory) 306 and communication bus 308.
Wherein:
Processor 302, communication interface 304 and memory 306 complete mutual communication by communication bus 308.
Communication interface 304, for communicating with the network element of miscellaneous equipment such as client or other servers etc..
Processor 302, for executive program 310, can specifically perform above-mentioned file and accelerate to show in embodiment of the method Correlation step.
Specifically, program 310 can include program code, which includes computer-managed instruction.
Processor 302 is probably central processor CPU, or specific integrated circuit ASIC (Application Specific Integrated Circuit), or be arranged to implement the embodiment of the present invention one or more integrate electricity Road.The one or more processors that computing device includes, can be same type of processors, such as one or more CPU;Also may be used To be different types of processor, such as one or more CPU and one or more ASIC.
Memory 306, for storing program 310.Memory 306 may include high-speed RAM memory, it is also possible to further include Nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.
Program 310 specifically can be used for so that processor 302 performs following operation:
Receive the file acquisition request that user sends;
Asked according to the file acquisition, file to be showed is obtained from cache server, wherein the file to be showed At least a portion content is the first encrypted content being encrypted using first key;
Show the file content in addition to the first encrypted content in advance;
After the first key of file to be showed described in being obtained from remote server, institute is decrypted using the first key The first encrypted content is stated, shows first encrypted content.
In a kind of optional embodiment:The file content in addition to the first encrypted content includes:Utilize second The second encrypted content that key is encrypted, and/or, not encrypted 3rd file content.
In a kind of optional embodiment, program 310 specifically can be also used for so that processor 302 performs following behaviour Make:The second key is obtained from cache server;Utilize the second encrypted content described in second secret key decryption;
Show second encrypted content, and/or, show the 3rd file content.
In a kind of optional embodiment, program 310 specifically can be also used for so that processor 302 performs following behaviour Make:Send and obtain the request that the verification request of first key is carried to remote server for remote server according to verification request Information is verified;
If verify successfully, from the first key of file to be showed described in remote server acquisition.
In a kind of optional embodiment, program 310 specifically can be also used for so that processor 302 performs following behaviour Make:Judge whether to meet the condition for showing the first encrypted content;
If so, then show first encrypted content.
In a kind of optional embodiment:First encrypted content is specially word, picture, audio and/or video; The file content in addition to the first encrypted content is specially word, picture, audio and/or video.
In a kind of optional embodiment:The first key is according to user right dynamically distributes.
In a kind of optional embodiment:The file content in addition to the first encrypted content is waited to open up described in being specially Forward file content in existing file, and/or, excellent file content in the file to be showed.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with teaching based on this.As described above, required by constructing this kind of system Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It should be understood that it can utilize various Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the specification that this place provides, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, Above in the description to the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The application claims of shield features more more than the feature being expressly recited in each claim.It is more precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself Separate embodiments all as the present invention.
Those skilled in the art, which are appreciated that, to carry out adaptively the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any Combination is disclosed to all features disclosed in this specification (including adjoint claim, summary and attached drawing) and so to appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power Profit requires, summary and attached drawing) disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation Replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed One of meaning mode can use in any combination.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of some different elements and being come by means of properly programmed computer real It is existing.The use of word first, second, and third does not indicate that any order.These words can be construed to title.
The invention discloses:A1. a kind of file accelerates to show method, including:
Receive the file acquisition request that user sends;
Asked according to the file acquisition, file to be showed is obtained from cache server, wherein the file to be showed At least a portion content is the first encrypted content being encrypted using first key;
Show the file content in addition to the first encrypted content in advance;
After the first key of file to be showed described in being obtained from remote server, institute is decrypted using the first key The first encrypted content is stated, shows first encrypted content.
A2. the method according to A1, wherein, the file content in addition to the first encrypted content includes:Utilize The second encrypted content that two keys are encrypted, and/or, not encrypted 3rd file content.
A3. the method according to A2, wherein, it is described show in advance file content in addition to the first encrypted content it Before, the method further includes:The second key is obtained from cache server;Using described in second secret key decryption second encryption in Hold;
Then the file content showed in advance in addition to the first encrypted content further comprises:Show second encryption Content, and/or, show the 3rd file content.
A4. according to A1-A3 any one of them methods, wherein, described from text to be showed described in remote server acquisition Before the first key of part, the method further includes:The verification for sending acquisition first key is asked to remote server for remote Journey server is verified according to the solicited message that verification request carries;
Then the first key from file to be showed described in remote server acquisition is specially:If verify successfully, from The first key of file to be showed described in remote server acquisition.
A5. according to A1-A4 any one of them methods, wherein, utilize first key decryption described first described After encrypted content, the method further includes:Judge whether to meet the condition for showing the first encrypted content;
If so, then show first encrypted content.
A6. according to A1-A5 any one of them methods, wherein, first encrypted content is specially word, picture, sound Frequency and/or video;The file content in addition to the first encrypted content is specially word, picture audio and/or video.
A7. according to A1-A6 any one of them methods, wherein, the first key is according to user right dynamically distributes 's.
A8. according to A1-A7 any one of them methods, wherein, the file content tool in addition to the first encrypted content Body is file content forward in the file to be showed, and/or, excellent file content in the file to be showed.
The invention also discloses:B9. a kind of computing device, including:Processor, memory, communication interface and communication bus, The processor, the memory and the communication interface complete mutual communication by the communication bus;
The memory is used to store an at least executable instruction, and it is following that the executable instruction performs the processor Operation:
Receive the file acquisition request that user sends;
Asked according to the file acquisition, file to be showed is obtained from cache server, wherein the file to be showed At least a portion content is the first encrypted content being encrypted using first key;
Show the file content in addition to the first encrypted content in advance;
After the first key of file to be showed described in being obtained from remote server, institute is decrypted using the first key The first encrypted content is stated, shows first encrypted content.
B10. the computing device according to B9, wherein, the file content in addition to the first encrypted content includes:Profit The second encrypted content being encrypted with the second key, and/or, not encrypted 3rd file content.
B11. the computing device according to B10, wherein, the executable instruction also makes the processor perform following behaviour Make:The second key is obtained from cache server;Utilize the second encrypted content described in second secret key decryption;
Show second encrypted content, and/or, show the 3rd file content.
B12. according to B9-B11 any one of them computing devices, wherein, the executable instruction also makes the processor Perform following operation:The verification for sending acquisition first key is asked to remote server so that remote server is asked according to verification The solicited message of carrying is verified;
If verify successfully, from the first key of file to be showed described in remote server acquisition.
B13. according to B9-B12 any one of them computing devices, wherein, the executable instruction also makes the processor Perform following operation:Judge whether to meet the condition for showing the first encrypted content;
If so, then show first encrypted content.
B14. according to B9-B13 any one of them computing devices, wherein, first encrypted content is specially word, figure Piece, audio and/or video;The file content in addition to the first encrypted content is specially word, picture, audio and/or regards Frequently.
B15. according to B9-B14 any one of them computing devices, wherein, the first key is moved according to user right State distribution.
B16. according to B9-B15 any one of them computing devices, wherein, the file in addition to the first encrypted content Content is specially file content forward in the file to be showed, and/or, in the file to be showed in excellent file Hold.
The invention also discloses:C17. a kind of computer-readable storage medium, being stored with least one in the storage medium can hold Row instruction, the executable instruction make processor perform following operation:
Receive the file acquisition request that user sends;
Asked according to the file acquisition, file to be showed is obtained from cache server, wherein the file to be showed At least a portion content is the first encrypted content being encrypted using first key;
Show the file content in addition to the first encrypted content in advance;
After the first key of file to be showed described in being obtained from remote server, institute is decrypted using the first key The first encrypted content is stated, shows first encrypted content.
C18. the computer-readable storage medium according to C17, wherein, the file content in addition to the first encrypted content Including:The second encrypted content being encrypted using the second key, and/or, not encrypted 3rd file content.
C19. the computer-readable storage medium according to C18, wherein, the executable instruction also performs the processor Operate below:The second key is obtained from cache server;Utilize the second encrypted content described in second secret key decryption;
Show second encrypted content, and/or, show the 3rd file content.
C20. according to C17-C19 any one of them computer-readable storage mediums, wherein, the executable instruction also makes described Processor performs following operation:The verification for sending acquisition first key is asked to remote server so that remote server is according to school The solicited message that request carries is tested to be verified;
If verify successfully, from the first key of file to be showed described in remote server acquisition.
C21. according to C17-C20 any one of them computer-readable storage mediums, wherein, the executable instruction also makes described Processor performs following operation:Judge whether to meet the condition for showing the first encrypted content;
If so, then show first encrypted content.
C22. according to C17-C21 any one of them computer-readable storage mediums, wherein, first encrypted content is specially Word, picture, audio and/or video;The file content in addition to the first encrypted content is specially word, picture, audio And/or video.
C23. according to C17-C22 any one of them computer-readable storage mediums, wherein, the first key is according to user Authority dynamically distributes.
C24. according to C17-C23 any one of them computer-readable storage mediums, wherein, it is described in addition to the first encrypted content File content be specially file content forward in the file to be showed, and/or, excellent text in the file to be showed Part content.

Claims (10)

1. a kind of file accelerates to show method, including:
Receive the file acquisition request that user sends;
Asked according to the file acquisition, file to be showed is obtained from cache server, wherein the file to be showed is at least A part of content is the first encrypted content being encrypted using first key;
Show the file content in addition to the first encrypted content in advance;
After the first key of file to be showed described in being obtained from remote server, first key decryption described the is utilized One encrypted content, shows first encrypted content.
2. according to the method described in claim 1, wherein, the file content in addition to the first encrypted content includes:Utilize The second encrypted content that second key is encrypted, and/or, not encrypted 3rd file content.
3. according to the method described in claim 2, wherein, in the file content showed in advance in addition to the first encrypted content Before, the method further includes:The second key is obtained from cache server;Utilize the second encryption described in second secret key decryption Content;
Then the file content showed in advance in addition to the first encrypted content further comprises:Show in second encryption Hold, and/or, show the 3rd file content.
4. according to claim 1-3 any one of them methods, wherein, described from text to be showed described in remote server acquisition Before the first key of part, the method further includes:The verification for sending acquisition first key is asked to remote server for remote Journey server is verified according to the solicited message that verification request carries;
Then the first key from file to be showed described in remote server acquisition is specially:If verify successfully, from long-range The first key of file to be showed described in server acquisition.
5. according to claim 1-4 any one of them methods, wherein, utilize first key decryption described first described After encrypted content, the method further includes:Judge whether to meet the condition for showing the first encrypted content;
If so, then show first encrypted content.
6. according to claim 1-5 any one of them methods, wherein, first encrypted content is specially word, picture, sound Frequency and/or video;The file content in addition to the first encrypted content is specially word, picture audio and/or video.
7. according to claim 1-6 any one of them methods, wherein, the first key is according to user right dynamically distributes 's.
8. according to claim 1-7 any one of them methods, wherein, the file content tool in addition to the first encrypted content Body is file content forward in the file to be showed, and/or, excellent file content in the file to be showed.
9. a kind of computing device, including:Processor, memory, communication interface and communication bus, the processor, the storage Device and the communication interface complete mutual communication by the communication bus;
The memory is used to store an at least executable instruction, and the executable instruction makes the processor perform following behaviour Make:
Receive the file acquisition request that user sends;
Asked according to the file acquisition, file to be showed is obtained from cache server, wherein the file to be showed is at least A part of content is the first encrypted content being encrypted using first key;
Show the file content in addition to the first encrypted content in advance;
After the first key of file to be showed described in being obtained from remote server, first key decryption described the is utilized One encrypted content, shows first encrypted content.
10. a kind of computer-readable storage medium, an at least executable instruction, the executable instruction are stored with the storage medium Processor is set to perform following operation:
Receive the file acquisition request that user sends;
Asked according to the file acquisition, file to be showed is obtained from cache server, wherein the file to be showed is at least A part of content is the first encrypted content being encrypted using first key;
Show the file content in addition to the first encrypted content in advance;
After the first key of file to be showed described in being obtained from remote server, first key decryption described the is utilized One encrypted content, shows first encrypted content.
CN201711402376.5A 2017-12-22 2017-12-22 File accelerates to show method, computing device and computer-readable storage medium Pending CN107995219A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201711402376.5A CN107995219A (en) 2017-12-22 2017-12-22 File accelerates to show method, computing device and computer-readable storage medium
PCT/CN2018/080056 WO2019119665A1 (en) 2017-12-22 2018-03-22 File acceleration display method, computing device, and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711402376.5A CN107995219A (en) 2017-12-22 2017-12-22 File accelerates to show method, computing device and computer-readable storage medium

Publications (1)

Publication Number Publication Date
CN107995219A true CN107995219A (en) 2018-05-04

Family

ID=62038218

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711402376.5A Pending CN107995219A (en) 2017-12-22 2017-12-22 File accelerates to show method, computing device and computer-readable storage medium

Country Status (2)

Country Link
CN (1) CN107995219A (en)
WO (1) WO2019119665A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111831975A (en) * 2020-07-14 2020-10-27 郑凯璇 Network novel display method for preventing piracy, computer equipment and storage medium
CN113713378A (en) * 2021-09-02 2021-11-30 北京百度网讯科技有限公司 Content generation method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103716330A (en) * 2014-01-03 2014-04-09 网易(杭州)网络有限公司 Method and device for encryption and decryption of digital content
CN103873243A (en) * 2012-12-12 2014-06-18 腾讯科技(北京)有限公司 Method for realizing data security transmission, system, server and terminal
CN105704515A (en) * 2015-06-03 2016-06-22 深圳Tcl数字技术有限公司 Fast playback starting method and device of media file
CN106961614A (en) * 2017-02-22 2017-07-18 北京奇艺世纪科技有限公司 A kind of method and system of encrypted video netcast

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453448A (en) * 2015-08-06 2017-02-22 北京奇虎科技有限公司 Method for downloading target file and device thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873243A (en) * 2012-12-12 2014-06-18 腾讯科技(北京)有限公司 Method for realizing data security transmission, system, server and terminal
CN103716330A (en) * 2014-01-03 2014-04-09 网易(杭州)网络有限公司 Method and device for encryption and decryption of digital content
CN105704515A (en) * 2015-06-03 2016-06-22 深圳Tcl数字技术有限公司 Fast playback starting method and device of media file
CN106961614A (en) * 2017-02-22 2017-07-18 北京奇艺世纪科技有限公司 A kind of method and system of encrypted video netcast

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111831975A (en) * 2020-07-14 2020-10-27 郑凯璇 Network novel display method for preventing piracy, computer equipment and storage medium
CN113713378A (en) * 2021-09-02 2021-11-30 北京百度网讯科技有限公司 Content generation method and device

Also Published As

Publication number Publication date
WO2019119665A1 (en) 2019-06-27

Similar Documents

Publication Publication Date Title
US11934888B2 (en) Systems and method for managing memory resources used by smart contracts of a blockchain
US10880287B2 (en) Out of box experience application API integration
AU2016265837B2 (en) Virtual assistant in a communication session
CN108234475B (en) Account management method, electronic equipment and computer storage medium
US10902094B2 (en) File origin determination
CN108305072A (en) Dispose method, equipment and the computer storage media of block chain network
AU2016422515A1 (en) Tracing objects across different parties
CN104219198B (en) A kind of tamper resistant method of WebApp
CN109154968B (en) System and method for secure and efficient communication within an organization
CN110046000B (en) Applet running method and device
US10671738B2 (en) Controlled publication of sensitive content
JP2022502882A (en) HSM self-destruction methods, systems and programs in hybrid cloud KMS solutions
CN104618445B (en) A kind of file consolidation method and apparatus based on cloud storage space
CN107995219A (en) File accelerates to show method, computing device and computer-readable storage medium
CN103607449A (en) Method, device and system for enterprise internal network physical machine to visit cloud storage virtual machine
US11418327B2 (en) Automatic provisioning of key material rotation information to services
CN107533468A (en) Extensibility bundles for cloud and device suites
CN112528239A (en) Method and device for automatically authorizing software
US20160173593A1 (en) Message retrieval in a distributed computing network
US20160300269A1 (en) Usage-based hardware or software upgrades
US11405364B1 (en) Privacy-preserving endorsements in blockchain transactions
US12008363B1 (en) Delivering portions of source code based on a stacked-layer framework
US20230394163A1 (en) Data cluster management
EP4423703A1 (en) Client-to client asset hosting and serving for digital advertising
CN109213474A (en) GENERAL SHELL setting method, storage medium, electronic equipment and system based on Flash

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180504