CN108733811A - A kind of file access method, terminal and computer readable storage medium - Google Patents
A kind of file access method, terminal and computer readable storage medium Download PDFInfo
- Publication number
- CN108733811A CN108733811A CN201810489388.4A CN201810489388A CN108733811A CN 108733811 A CN108733811 A CN 108733811A CN 201810489388 A CN201810489388 A CN 201810489388A CN 108733811 A CN108733811 A CN 108733811A
- Authority
- CN
- China
- Prior art keywords
- user terminal
- file
- file destination
- address information
- storage address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of file access methods,This method in the first user terminal by receiving request by the file destination on the first user terminal to obtaining the storage address information of the file destination when open request of second user open-destination,The storage address information is sent to second user terminal,And the permission that can access the file destination is authorized to the second user terminal,When receiving the access request for accessing the file destination sent according to the storage address information by the second user terminal,Judge whether the second user terminal currently has the permission for accessing the file destination,When the determination result is yes,The second user terminal is allowed directly to access the file destination on first user terminal,The invention also discloses a kind of terminal and computer readable storage mediums,By implementing said program,In the case of not by Cloud Server,Second user terminal can access to the file destination on the first user terminal.
Description
Technical field
The present invention relates to fields of communication technology, can more specifically to a kind of file access method, terminal and computer
Read storage medium.
Background technology
Between existing two terminals need carry out file resource it is shared when, often by the file of chat tool
Transfer function realizes file-sharing.For example, when terminal A wants to acquire the particular content of a certain file on terminal B,
Terminal B just needs to transmit this file on Cloud Server by the file transfer conveyance of chat tool, and terminal A accesses cloud service
Device carries out preview or download, in this way, terminal A has just acquired the file on terminal B from Cloud Server to this document
Particular content namely existing terminal B, which only pass through Cloud Server, can just acquire the specific interior of a certain file on terminal A
Hold, so the file-sharing between existing two terminals must could be realized by third-party server, namely to realizing text
The shared equipment of part has additional requirement.
Invention content
The technical problem to be solved in the present invention is to need its local file-sharing to another terminal when a certain terminal
When, it is necessary to it could realize that the shared problem of file between the two terminals is provided for the technical problem by Cloud Server
A kind of new file access method, terminal and computer readable storage medium.
In order to solve the above technical problems, the present invention provides a kind of file access method, the file access method include with
Lower step:
First user terminal is receiving request by the file destination on first user terminal to second user terminal
When open open request, the storage address information of the file destination is obtained;
The storage address information is sent to the second user terminal, and the second user terminal is authorized and can be visited
Ask the permission of the file destination;
Receiving the access file destination sent according to the storage address information by the second user terminal
Access request when, judge whether the second user terminal currently has the permission for accessing the file destination;
When the determination result is yes, allow described in the second user terminal accesses directly on first user terminal
File destination.
Optionally, described that the second user terminal is allowed directly to access the target text on first user terminal
The step of part includes:The second user terminal is allowed directly to download the file destination from first user terminal;
It asks to open the file destination on first user terminal to second user open-destination in described receive
It is further comprising the steps of after the step of putting request:The file destination is encrypted according to predetermined encryption algorithm;
The file access method further includes:It, will be with when the storage address information is sent to second user terminal
The corresponding decruption key of the Encryption Algorithm is sent to the second user terminal, so that the second user terminal is according to institute
Decruption key is stated to downloading the file destination after the file destination decryption of encrypted processing on first user terminal.
Optionally, described the step of authorizing the permission that can access the file destination to the second user terminal, includes:
For the storage address information for being currently sending to the second user terminal, energy is authorized to the second user terminal
The access rights of the n times of the file destination are accessed, the N is more than 0.
Optionally, the described the step of storage address information is sent to the second user terminal, includes:
The storage address information is carried in electronic identification code and is sent to the second user terminal.
Further, the present invention also provides a kind of file access method, the file access method includes the following steps:
Second user terminal receives the storage address information for the file destination that the first user terminal is sent;The file destination
For the file on the first user terminal;
The access request for accessing the file destination is sent to first user terminal according to the storage address information;
It determines that the second user terminal currently has based on the access request in first user terminal and accesses institute
When stating the permission of file destination, the second user terminal is according to the storage address information directly in first user terminal
It is upper to access the file destination.
Optionally, the second user terminal is directly complained to the higher authorities about an injustice and request fair settlement in first user terminal according to the storage address information
The step of asking the file destination include:
Described in the second user terminal is downloaded according to the storage address information directly from first user terminal
File destination.
Optionally, the target text is accessed in described sent to first user terminal according to the storage address information
It is further comprising the steps of before the step of access request of part:
Receive what first user terminal was sent after the file destination is encrypted using predetermined encryption algorithm
Decruption key corresponding with the Encryption Algorithm;
Described in the second user terminal is downloaded according to the storage address information directly from first user terminal
The step of file destination includes:
The second user terminal acquires corresponding target according to the storage address information in the first user terminal
After file, the file destination is decrypted according to the decruption key, and the file destination is downloaded after successful decryption.
Optionally, the second user terminal receives the storage address information for the file destination that the first user terminal is sent
Step includes:
The second user terminal receives the electronic identification code that first user terminal is sent, in the electronic identification code
Include the storage address information of the file destination;
It is described to send the access for accessing the file destination to first user terminal according to the storage address information
The step of request includes:
The electronic identification code is scanned and recognized;
It is sent from the first user terminal described in trend after identifying the storage address information and accesses the file destination
Access request.
Further, the present invention also provides a kind of terminal, the terminal includes processor, memory and communication bus;
The communication bus is for realizing the connection communication between the processor and the memory;
The processor is for executing one or more program stored in the memory, to realize as any of the above-described
The step of described file access method.
Further, the present invention also provides a kind of computer readable storage medium, the computer readable storage mediums
It is stored with one or more program, one or more of programs can be executed by one or more processor, to realize
The step of file access method as described in any of the above-described.
Advantageous effect
A kind of file access method of present invention offer, terminal and computer readable storage medium, the first user terminal pass through
Request is being received by the file destination on the first user terminal to obtaining the mesh when open request of second user open-destination
The storage address information for marking file, is sent to second user terminal, and award to the second user terminal by the storage address information
The permission of the file destination can be accessed by giving, and receive the access sent according to the storage address information by the second user terminal
When the access request of the file destination, judge whether the second user terminal currently has the permission for accessing the file destination,
When the determination result is yes, allow the second user terminal directly to access the file destination on first user terminal, pass through
Scheme provided by the invention, since the first user terminal can dock the terminal (i.e. second user terminal) of receipts storage address information
The permission of access target file is authorized, so the storage address that second user terminal can directly be sent according to the first user terminal
Information accesses corresponding file destination on the first user terminal, and being total to for file is being carried out compared between terminal in existing scheme
For needing the scheme that could be realized by third-party Cloud Server when enjoying, first user is whole in scheme provided by the invention
The file destination that end can be directed to this ground opens up access rights to second user terminal, not by third party cloud server
In the case of can realize the shared of file between terminal, namely in the case of not by Cloud Server, second user terminal
It can access to the file destination on the first user terminal, reduce the requirement to equipment.
Description of the drawings
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
The hardware architecture diagram of Fig. 1 optional mobile terminals of each embodiment one to realize the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the basic procedure schematic diagram for the file access method that first embodiment of the invention provides;
Fig. 4 is the operation chart for user's selection target file that first embodiment of the invention provides;
Fig. 5 is the interface schematic diagram on the first user terminal that first embodiment of the invention provides;
Fig. 6 is the basic procedure schematic diagram for the file access method that second embodiment of the invention provides;
Fig. 7 is the basic procedure schematic diagram for the file access method that third embodiment of the invention provides;
Fig. 8 is the structural schematic diagram for the terminal that fourth embodiment of the invention provides.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, using for indicating that the suffix of such as " module ", " component " or " unit " of element is only
The explanation for being conducive to the present invention, itself does not have a specific meaning.Therefore, " module ", " component " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, tablet
Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
The shiftings such as media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer
The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special
Except element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware architecture diagram of its mobile terminal of each embodiment to realize the present invention, the shifting
Moving terminal 100 may include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit
108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram,
Either combine certain components or different components arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station
Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating
Frequency unit 101 can also be communicated with network and other equipment by radio communication.Above-mentioned wireless communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need
It to be omitted in the range for the essence for not changing invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, it is that radio frequency unit 101 or WiFi module 102 are received or
The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103
The relevant audio output of specific function executed with mobile terminal 100 can also be provided (for example, call signal receives sound, disappears
Breath receives sound etc.).Audio output unit 103 may include loud speaker, buzzer etc..
A/V input units 104 are for receiving audio or video signal.A/V input units 104 may include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the image data of the static images or video obtained by image capture apparatus (such as camera) in image capture mode carries out
Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited
Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can
To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition)
The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, size and the direction of gravity are can detect that when static, can be used to identify the application of mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal
Family is arranged and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with
And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect user on it or neighbouring touch operation
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071
Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can
To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc.
It is one or more, do not limit herein specifically.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel
1061 be to realize the function that outputs and inputs of mobile terminal as two independent components, but in certain embodiments, can
The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically
It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example,
External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing
Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For the transmission data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can include mainly storing program area
And storage data field, wherein storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection
A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage
Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place
Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated
Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main
Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Embodiment to facilitate the understanding of the present invention, below to the communications network system that is based on of mobile terminal of the present invention into
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system
System is the LTE system of universal mobile communications technology, which includes communicating UE (User Equipment, the use of connection successively
Family equipment) (the lands Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers
Such as the function of home location register (not shown) etc, and some are preserved in relation to use such as service features, data rates
The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201
Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources
Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And the following new network system etc., it does not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the method for the present invention is proposed.
First embodiment
To solve in the prior art, when a certain terminal is needed its local file-sharing to another terminal, it is necessary to borrow
The shared problem of file between helping additional Cloud Server that could realize the two terminals, the present embodiment provides a kind of visits of file
Ask method, shown in Figure 3, file access method provided in this embodiment is applied to the first subscriber terminal side, specific to wrap
It includes:
S301:First user terminal is receiving request by the file destination on the first user terminal to second user terminal
When open open request, the storage address information of file destination is obtained.
It should be noted that the file destination in the present embodiment can be stored in first this ground of user terminal it is arbitrary
File, for example can be the file of video format, can be the file of document format, can also be the file of picture format.
And the open request in the present embodiment can be issued by user by the first user terminal, for example, may refer to shown in Fig. 4, be used
Family can click corresponding file on the first user terminal, and the first user terminal can will be corresponding according to the clicking operation of user
File as file destination.After determining file destination, such as Fig. 5 can be shown on the display interface of the first user terminal
Shown in choice box, user can selects to need by the file destination in the selection frame (for Fig. 5 namely sina Sinas
File) it is shared with which user terminal, it that is to say selection to which user terminal open visit file destination
Permission, user are chosen in the selection frame after can sharing the terminal user of the file destination, and the first user terminal obtains automatically
Take the storage address information of the file destination.It should be noted that in some other embodiments, user can first carry out use
The selection operation of family terminal, then performance objective file selection operation.
Storage address information in the present embodiment includes specific in memory block of the file destination on the first user terminal
Storage address information in file directory position namely the present embodiment can indicate that the specific location residing for the file destination,
It of courses, the unique identity information of the first user terminal can also be included in the storage address information, for example can be MAC
(Medium Access Control, media access control) address, such second user terminal are receiving storage address letter
After breath, so that it may to know which terminal should be sent access request according to MAC Address therein, and as should be to the end
Which of end file accesses, and needs according to the specific file directory location determination in storage address information.
S302:Storage address information is sent to second user terminal, and the second user terminal is authorized to access and is somebody's turn to do
The permission of file destination.
It should be noted that in order to ensure that the safety of data on the first user terminal, the first user terminal can be only right
Open object (i.e. second user terminal) indicated by open request in step S301, which is authorized, can access the power of the file destination
Limit.In this way, even if other-end has acquired the storage address information in step S301, since other-end is not by first
User terminal mandate, so the file destination on the first user terminal can not be just accessed in other-end.
The mode that first user terminal authorizes second user terminal the permission that can access the file destination can be as follows:
Obtain second user terminal unique identity information, by the unique identity information preservation with the target
In authorized user's terminal list of file association, every user terminal in authorized user's terminal list all has access
The permission of the file destination of first user terminal.In this way, receiving the access target text that a certain user terminal is sent later
When the access request of part, it is only necessary to judge whether this user terminal is to belong to terminal in this authorized user's terminal list i.e.
Can, if so, there is the terminal permission for accessing the file destination otherwise not have.
It should also be noted that, in the present embodiment, storage address information is being sent to second user by the first user terminal
When terminal, or later, it can be directed to this transmission process, the file destination n times can be accessed by being authorized to second user terminal
Access rights, wherein N be more than 0.Preferably, N takes 1, shows to be directed to current storage address information transmission process at this time, the
It is primary that two user terminals can only access the file destination, if second user terminal thinks back-call file destination, first
User terminal must send a storage address information, in other words, the first user terminal at this time to second user terminal again
The first user can be accessed by representing second user terminal to the number of the action of second user terminal transmission storage address information
The number of file destination in terminal, it should be noted that each pair of file destination of second user terminal has carried out primary access, the
One user terminal should all record this operation, can be with so as to determine second user terminal current residual in real time
The number of access target file can preferably ensure the safety of file on the first user terminal in this way.
It of courses, in some other embodiments, the first user terminal, which can also be second user terminal, can access this
The priority assignation effective time of file destination, for example, storage address information is being sent to second user end by the first user terminal
When end, or later, the permission of energy access target file can be authorized to second user terminal, and is started timer and started to count
When, the permission of second user terminal energy access target file is withdrawn after the timing duration of timer reaches default effective time,
Namely forbid second user terminal access file destination, so if second user terminal after this presets effective time just to
If first user terminal sends access request, since the first user terminal can forbid second user terminal access file destination,
So second user terminal can not just obtain to obtain the file destination on the first user terminal at this time.Default effective time herein
It can be arbitrarily arranged by developer, can also support the User Defined of the first user terminal.
It is sent to it should also be noted that storage address information can be carried in electronic identification code by the first user terminal
Second user terminal that is to say that carrying out coding to storage address information generates electronic identification code, saves in the electronic identification code
The specifying information of storage address.Electronic identification code in the present embodiment can be by terminal scanning recognition, specifically, electronic recognition
Code includes but not limited to Quick Response Code, bar code.
S303:Receive the access request of the access target file sent according to storage address information by second user terminal.
Second user terminal is after the storage address information for receiving the transmission of the first user terminal, the use of second user terminal
Family can send the access request of access target file by second user terminal to the first user terminal.
S304:Judge whether second user terminal currently has the permission of access target file, if so, S305 is gone to, it is no
Then, S306 is gone to.
Second user terminal, can be by the storage after receiving the storage address information sent by the first user terminal
Location information carrying is sent to the first user terminal in access request, so that the first user terminal can after receiving access request
Therefrom to extract storage address information, so that it is determined which file what second user terminal currently needed to access is, namely
Determine file destination.It should be noted that second user terminal can also carry the unique identity information of itself
The first user terminal is sent jointly in access request, or after sending access request to the first user terminal, retransmit certainly
The unique identity information of body, in this way, the first user terminal can according to the unique identity information to the target
It is matched in authorized user's terminal list of file association, judges to whether there is unique body in authorized user's terminal list
Part identification information, such as exists, then illustrates the second user terminal currently permission with access target file, be such as not present, then say
Bright second user terminal does not have the permission of access target file currently.
S305:Second user terminal is allowed directly to access file destination on the first user terminal
It should be noted that the access in the present embodiment includes at least one of preview and download, for example, when the first use
Family terminal-pair second user terminal is authorized can be after the permission of preview file destination, if receiving the second user terminal access mesh
The preview request for marking file, then should allow the second user terminal preview file destination.For another example, when the first user terminal pair
Second user terminal is authorized can be after the permission of downloading object file, if receiving the second user terminal downloads file destinations
Request is downloaded, then should allow the second user terminal downloads file destination.It should be noted that in some embodiments, also
The priority that download can be arranged is higher than the priority of preview, namely when the first user terminal authorizes second user terminal downloads mesh
After the permission for marking file, then the second user terminal also has the permission of the preview file destination.
S306:Second user terminal is forbidden to access file destination on the first user terminal.
It should be noted that in step S301, after determining file destination, for example request is being received by first
After file destination on user terminal is to the open request of second user open-destination, the first user terminal can also be according to pre-
If Encryption Algorithm file destination is encrypted, preset Encryption Algorithm can be arbitrary Encryption Algorithm in the present embodiment,
For example, can be AES (Advanced Encryption Standard, Advanced Encryption Standard) Encryption Algorithm.It needs to illustrate
It is that file destination being encrypted using preset Encryption Algorithm in the present embodiment is in order to further ensure file destination
Safety, if in this way, even if if there is exterior terminal the permission of the access target file exterior terminal not have decruption key only
The ciphertext of file destination can be obtained.For the ease of user's operation, for the first user terminal, pass through first using user
When the user terminal access file destination, the plaintext of file destination can be read by not needing decruption key, that is to say target text
Part can be transparent for the local terminal where it, but file destination is for exterior terminal, then is encryption
's.If the first user terminal receives the access request of the access target file of exterior terminal, exterior terminal is only according to solution
Close key pair file destination could be downloaded after being decrypted or the clear content of preview file destination, if not having decruption key,
Then can only access target file ciphertext.So in the present embodiment, the first user terminal is in the preset Encryption Algorithm of use to mesh
Decruption key corresponding with the Encryption Algorithm can be sent to second user terminal by mark file after being encrypted, specifically, can
, when storage address information is sent to second user terminal, which is sent jointly in the first user terminal
Two user terminals, namely storage address information and decruption key can be carried on together in electronic identification code be sent at this time
Two user terminals.Second user terminal is after receiving decruption key, if initiating the file destination on the first user terminal
Access request can then be decrypted according to the file destination on the first user terminal of decruption key pair that itself is acquired.
In some embodiments, it can also be directed on first terminal and need to carry out other-end shared document creation
The copy is stored in the shared memory specially opened up on the first user terminal by copy, and using the copy as target text
Part executes the operation of above-mentioned steps S301 to step S306.It is shared on the first user terminal in this way, exterior terminal can only just access
Content in memory block.
File access method provided in this embodiment, by receiving request by the file destination on the first user terminal
To obtaining the storage address information of the file destination when open request of second user open-destination, which is sent out
Give second user terminal, and authorize the permission that can access the file destination to the second user terminal, receive by this
When the access request for accessing the file destination that two user terminals are sent according to the storage address information, second user end is judged
Whether end is current there is the permission for accessing the file destination to allow the second user terminal direct when the determination result is yes
The file destination is accessed on first user terminal, since the first user terminal can dock the terminal of receipts storage address information
(i.e. second user terminal) authorizes the permission of access target file, so second user terminal can be directly according to the first user end
The storage address information that end is sent accesses corresponding file destination on the first user terminal, not by third party cloud server
In the case of can realize the shared of file between terminal, namely in the case of not by Cloud Server, second user is whole
End can access to the file destination on the first user terminal, reduce the requirement to equipment.
Second embodiment
To solve in the prior art, when a certain terminal is needed its local file-sharing to another terminal, it is necessary to borrow
The shared problem of file between helping additional Cloud Server that could realize the two terminals, the present embodiment provides a kind of visits of file
Ask method, shown in Figure 6, file access method provided in this embodiment is applied to second user end side, specific to wrap
It includes:
S601:Second user terminal receives the storage address information for the file destination that the first user terminal is sent.
File destination in the present embodiment is the file on the first user terminal, can be first this ground of user terminal
The arbitrary file of storage, for example can be the file of video format, it can be the file of document format, can also be picture lattice
The file of formula.
Storage address information in step S601 can be the first user terminal, and receiving user, to pass through the first user whole
End send by the file destination on the first user terminal to the open request of second user open-destination when, by the first user end
End is sent to second user terminal.
Storage address information in the present embodiment includes specific in memory block of the file destination on the first user terminal
Storage address information in file directory position namely the present embodiment can indicate that the specific location residing for the file destination,
It of courses, should also include the unique identity information of the first user terminal in the storage address information, for example can be MAC
(Medium Access Control, media access control) address, such second user terminal are receiving storage address letter
After breath, so that it may to know which terminal should be sent access request according to MAC Address therein, and as should be to the end
Which of end file accesses, and needs according to the specific file directory location determination in storage address information.
In some embodiments, since the first user terminal is that storage address information is carried in electronic identification code to send
To second user terminal, so being exactly such a mistake on the process nature of second user terminal reception storage address information
Journey:Receive the electronic identification code of the first user terminal transmission.Should include at this time depositing for file destination in this electronic identification code
Store up address information.
S602:The access request of access target file is sent to the first user terminal according to storage address information.
The storage address information acquired can be carried and be sent to the first use in access request by second user terminal
Family terminal, so that the first user terminal can therefrom extract storage address information after receiving access request, so that it is determined that
Which file what second user terminal currently needed to access is, namely determines file destination.
If storage address information is to be carried in electronic identification code and be sent to second user terminal, step S602 can
To include following detailed process:
Scanning is identified to the electronic identification code;
The access request of access target file is sent from the first user terminal of trend after identifying storage address information.
S603:Determining second user terminal currently based on the access request in the first user terminal has access target text
When the permission of part, second user terminal directly accesses file destination according to the storage address information on the first user terminal.
In step S603, the first user terminal needs to judge whether the second user terminal for sending access request currently has
There is the permission of access target file.It should be noted that second user terminal can also be by the unique identity information of itself
Carrying sends jointly to the first user terminal in access request, or after sending access request to the first user terminal, then
Send the unique identity information of itself, in this way, the first user terminal can according to the unique identity information to
It is matched in the associated authorized user's terminal list of the file destination, judges to whether there is in authorized user's terminal list and be somebody's turn to do
Unique identity information such as exists, then illustrates the second user terminal currently permission with access target file, if do not deposited
Then illustrating that second user terminal does not have the permission of access target file currently.Being associated with file destination in the present embodiment
Authorized user's terminal list set-up mode and function be referred to the content in above-mentioned first embodiment, it is no longer superfluous here
It states.
It should be noted that the access in the present embodiment includes at least one of preview and download, for example, when the second use
After terminal-pair the first user terminal in family sends the preview request of request preview file destination, if the first user terminal determines second
The current permission with preview file destination of user terminal, then second user terminal can be according to storage address information directly the
Preview file destination on one user terminal.For another example, mesh is downloaded when the first user terminal of second user terminal-pair sends request
After the download request for marking file, if the first user terminal determines the second user terminal currently power with downloading object file
Limit, then second user terminal can directly download the file destination according to storage address information on the first user terminal.It should
Illustrate, in some embodiments, the priority that download can also be arranged is higher than the priority of preview, namely as the first user
After terminal determines that second user terminal currently has the permission of downloading object file, then the second user terminal can be according to storage
Address information directly downloads the file destination from the first user terminal, can also be according to the storage address information in the first user
Preview file destination in terminal.It should be noted that second user terminal can be pre- in the first user terminal based on 5G networks
It lookes at and/or downloading object file.
In some embodiments, before step S602, second user terminal can also receive the first user terminal right
The decruption key corresponding with the Encryption Algorithm that file destination is sent after being encrypted using predetermined encryption algorithm, subsequently to need
When accessing the file destination on the first user terminal, the file destination can be decrypted according to the decruption key, to
The clear content of file destination is obtained, to realize preview and/or download to the clear content.It is preset in the present embodiment to add
Close algorithm can be arbitrary Encryption Algorithm, for example, can be AES (Advanced Encryption Standard, it is advanced plus
Data Encryption Standard) Encryption Algorithm.
It should be noted that decruption key and storage address information can be sent jointly to the second use by the first user terminal
The two information specifically can all be carried in electronic identification code and be sent to second user terminal by family terminal, and second uses
Family terminal is by identifying that scanning also electronic identification code can send the request of access target file from the first user terminal of trend.
File access method provided in this embodiment, by receiving the transmission of the first user terminal in second user terminal
After the storage address information of file destination, the visit of access target file is sent to the first user terminal according to the storage address information
It asks request, determines that second user terminal currently has the power for accessing the file destination based on the access request in the first user terminal
In limited time, second user terminal directly accesses file destination according to the storage address information on the first user terminal.That is, second
The storage address information that user terminal can directly be sent according to the first user terminal accesses accordingly on the first user terminal
File destination can realize the shared of file between terminal in the case of not by third party cloud server, namely not
In the case of Cloud Server, second user terminal can access to the file destination on the first user terminal, drop
The low requirement to equipment.
3rd embodiment
The scheme provided in order to better understand the present invention, the present embodiment provides a kind of more specifical file access sides
Method, it is shown in Figure 7, including:
S701:First user terminal receives the request that user issues and uses the file destination pair second on the first user terminal
The open request of family open-destination.
File destination in the present embodiment can be the arbitrary file stored in first this ground of user terminal, such as can
It can be the file of document format to be the file of video format, can also be the file of picture format.
S702:First user terminal obtains the storage address information of file destination.
May include that the MAC Address of the first user terminal and file destination exist in storage address information in step S702
Residing specific physical location on first user terminal, for example can be specific file directory.It of courses in some implementations
In example, storage location (file mesh of the file destination residing for the first user terminal can be only included in the storage address information
Record), but need to ensure that second user terminal can determine the transmission storage according to the storage address information received at this time
The source of location information.
S703:First user terminal is encrypted file destination using preset Encryption Algorithm.
Preset Encryption Algorithm can be AES encryption algorithm in step S703, or can also be other Encryption Algorithm,
Step S703 can also be executed prior to step S702, or can also be performed simultaneously.
S704:Storage address information and decruption key corresponding with the Encryption Algorithm are carried in Quick Response Code and send second
User terminal, and being authorized to second user terminal can the primary permission of downloading object file.
Step S704 is substantially to generate two dimension for storage address information and decruption key corresponding with the Encryption Algorithm
Code, is then sent to second user terminal by the Quick Response Code.
It should be noted that the first user terminal authorizes the energy primary permission of downloading object file to second user terminal
Mode can be as follows:
Obtain second user terminal unique identity information, by the unique identity information addition with the target
In authorized user's terminal list of file association, every user terminal in authorized user's terminal list all has access
The permission of the file destination of first user terminal.In this way, receiving the access target text that a certain user terminal is sent later
When the access request of part, it is only necessary to judge whether this user terminal is to belong to terminal in this authorized user's terminal list i.e.
Can, if so, there is the terminal permission for accessing the file destination otherwise not have.
S705:After second user terminal receives the Quick Response Code of the first user terminal transmission, which is scanned
Identification.
S706:Second user terminal is after scanning obtains storage address information and decruption key from the first user terminal of trend
Send the download request of downloading object file.
Can include unique identity information and the acquisition of second user terminal in download request in step S706
Obtained storage address information.
S707:First user terminal asks to determine that second user terminal currently has downloading object file according to the download
Permission.
Specifically, the first user terminal can determine the according to the storage address information in the download request received
The file destination currently to be downloaded of two user terminals, then judge the unique identity information received whether with the target
In authorized user's terminal list of file association, if so, then illustrating the second user terminal currently power with downloading object file
Limit, otherwise, does not then have.
S708:After second user terminal decrypts file destination according to decruption key, the file destination after decryption is carried out
It downloads.
It should be noted that second user terminal is answered after to the file destination of the first user terminal once download
It is deleted from the associated authorized user's terminal list of the file destination when by the unique identity information of second user terminal.
The file access method provided through this embodiment, the Quick Response Code that second user terminal can be received according to scanning
Directly from the first user terminal downloading files, for second user terminal, the timeliness for downloading file is relatively high, together
When this downloading mode simple operation, the Quick Response Code that the user in second user terminal only needs scanning to receive can be to first
File on user terminal is downloaded.
Fourth embodiment
It is shown in Figure 8 the present embodiment provides a kind of terminal, including processor, memory and communication bus;Wherein,
Communication bus is for realizing the connection communication between processor and memory, and processor is for executing one stored in memory
Or multiple programs, to realize each file access in the first subscriber terminal side in above-mentioned first embodiment and 3rd embodiment
The step of method, or realize each file access side in the second user end side in above-mentioned second embodiment and 3rd embodiment
The step of method.
The present embodiment also provides a kind of computer readable storage medium, the computer-readable recording medium storage there are one or
The multiple programs of person, one or more program can be executed by one or more processor, to realize above-mentioned first embodiment
The step of with each file access method in the first subscriber terminal side in 3rd embodiment, or realize above-mentioned second embodiment and
The step of each file access method in second user end side in 3rd embodiment.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements include not only those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this
There is also other identical elements in the process of element, method, article or device.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form, all of these belong to the protection of the present invention.
Claims (10)
1. a kind of file access method, which is characterized in that the file access method includes the following steps:
First user terminal is receiving request by the file destination on first user terminal to second user open-destination
Open request when, obtain the storage address information of the file destination;
The storage address information is sent to the second user terminal, and the second user terminal is authorized can access institute
State the permission of file destination;
In the visit for receiving the access file destination sent according to the storage address information by the second user terminal
When asking request, judge whether the second user terminal currently has the permission for accessing the file destination;
When the determination result is yes, the second user terminal is allowed directly to access the target on first user terminal
File.
2. file access method as described in claim 1, which is characterized in that described that the second user terminal is allowed directly to exist
The step of accessing the file destination on first user terminal include:Allow the second user terminal directly from described
The file destination is downloaded on one user terminal;
It asks to ask the file destination on first user terminal to the opening of second user open-destination in described receive
It is further comprising the steps of after the step of asking:The file destination is encrypted according to predetermined encryption algorithm;
The file access method further includes:When the storage address information is sent to second user terminal, will with it is described
The corresponding decruption key of Encryption Algorithm is sent to the second user terminal, so that the second user terminal is according to the solution
The file destination is downloaded after the file destination decryption of encrypted processing on first user terminal described in close key pair.
3. file access method as described in claim 1, which is characterized in that described authorized to the second user terminal can visit
The step of permission for asking the file destination includes:
For the storage address information for being currently sending to the second user terminal, being authorized to the second user terminal can access
The access rights of the n times of the file destination, the N are more than 0.
4. file access method as described in any one of claims 1-3, which is characterized in that described by the storage address information
The step of being sent to the second user terminal include:
The storage address information is carried in electronic identification code and is sent to the second user terminal.
5. a kind of file access method, which is characterized in that the file access method includes the following steps:
Second user terminal receives the storage address information for the file destination that the first user terminal is sent;The file destination is the
File on one user terminal;
The access request for accessing the file destination is sent to first user terminal according to the storage address information;
It determines that the second user terminal currently has based on the access request in first user terminal and accesses the mesh
When marking the permission of file, the second user terminal is directly complained to the higher authorities about an injustice and request fair settlement in first user terminal according to the storage address information
Ask the file destination.
6. file access method as claimed in claim 5, which is characterized in that the second user terminal is according to the storage
Location information directly includes the step of accessing the file destination on first user terminal:
The second user terminal directly downloads the target according to the storage address information from first user terminal
File.
7. file access method as claimed in claim 6, which is characterized in that it is described according to the storage address information to institute
It is further comprising the steps of before stating the step of the first user terminal sends the access request for accessing the file destination:
Receive first user terminal to the file destination using predetermined encryption algorithm be encrypted after send with institute
State the corresponding decruption key of Encryption Algorithm;
The second user terminal directly downloads the target according to the storage address information from first user terminal
The step of file includes:
The second user terminal acquires corresponding file destination according to the storage address information in the first user terminal
Afterwards, the file destination is decrypted according to the decruption key, and downloads the file destination after successful decryption.
8. such as claim 5-7 any one of them file access methods, which is characterized in that the second user terminal receives the
One user terminal send file destination storage address information the step of include:
The second user terminal receives the electronic identification code that first user terminal is sent, and includes in the electronic identification code
The storage address information of the file destination;
It is described to send the access request for accessing the file destination to first user terminal according to the storage address information
The step of include:
The electronic identification code is scanned and recognized;
The visit for accessing the file destination is sent from the first user terminal described in trend after identifying the storage address information
Ask request.
9. a kind of terminal, which is characterized in that the terminal includes processor, memory and communication bus;
The communication bus is for realizing the connection communication between the processor and the memory;
The processor is for executing one or more program stored in the memory, to realize such as claim 1-4
Or the step of file access method described in any one of 5-8.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage there are one or
Multiple programs, one or more of programs can be executed by one or more processor, to realize such as claim 1-4 or
The step of file access method described in any one of 5-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810489388.4A CN108733811A (en) | 2018-05-21 | 2018-05-21 | A kind of file access method, terminal and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810489388.4A CN108733811A (en) | 2018-05-21 | 2018-05-21 | A kind of file access method, terminal and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108733811A true CN108733811A (en) | 2018-11-02 |
Family
ID=63937829
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810489388.4A Pending CN108733811A (en) | 2018-05-21 | 2018-05-21 | A kind of file access method, terminal and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108733811A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109766316A (en) * | 2018-12-18 | 2019-05-17 | 深圳壹账通智能科技有限公司 | File acquisition method, device, computer equipment and storage medium |
CN110619236A (en) * | 2019-08-15 | 2019-12-27 | 中国人民银行数字货币研究所 | File authorization access method, device and system based on file credential information |
CN111191257A (en) * | 2019-12-02 | 2020-05-22 | 泰康保险集团股份有限公司 | File preview processing method and device |
CN111240422A (en) * | 2020-01-13 | 2020-06-05 | 成都奥伯莱思科技有限公司 | Smart community data file management device based on Internet of things |
CN111294396A (en) * | 2020-01-20 | 2020-06-16 | 咪咕数字传媒有限公司 | File transmission method and device, electronic equipment and storage medium |
CN111339049A (en) * | 2020-02-04 | 2020-06-26 | 浙江大华技术股份有限公司 | Data sharing method and terminal |
CN112492035A (en) * | 2020-11-30 | 2021-03-12 | 维沃移动通信有限公司 | File transmission method and device and electronic equipment |
CN112637281A (en) * | 2020-12-08 | 2021-04-09 | 北京嘀嘀无限科技发展有限公司 | Terminal device data access method and device, electronic device and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103699597A (en) * | 2013-12-12 | 2014-04-02 | 北京奇虎科技有限公司 | Method for downloading file through browser and browser |
CN106503579A (en) * | 2016-09-29 | 2017-03-15 | 维沃移动通信有限公司 | A kind of method and device of access target file |
CN106998329A (en) * | 2017-03-31 | 2017-08-01 | 腾讯科技(深圳)有限公司 | File sharing method and device |
US20170339215A1 (en) * | 2012-11-08 | 2017-11-23 | Gpvtl Canada Inc. | System and method of secure file sharing using p2p |
CN107766743A (en) * | 2017-11-09 | 2018-03-06 | 广州杰赛科技股份有限公司 | Method to set up and device, terminal device, the storage medium of file access authority |
-
2018
- 2018-05-21 CN CN201810489388.4A patent/CN108733811A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170339215A1 (en) * | 2012-11-08 | 2017-11-23 | Gpvtl Canada Inc. | System and method of secure file sharing using p2p |
CN103699597A (en) * | 2013-12-12 | 2014-04-02 | 北京奇虎科技有限公司 | Method for downloading file through browser and browser |
CN106503579A (en) * | 2016-09-29 | 2017-03-15 | 维沃移动通信有限公司 | A kind of method and device of access target file |
CN106998329A (en) * | 2017-03-31 | 2017-08-01 | 腾讯科技(深圳)有限公司 | File sharing method and device |
CN107766743A (en) * | 2017-11-09 | 2018-03-06 | 广州杰赛科技股份有限公司 | Method to set up and device, terminal device, the storage medium of file access authority |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109766316A (en) * | 2018-12-18 | 2019-05-17 | 深圳壹账通智能科技有限公司 | File acquisition method, device, computer equipment and storage medium |
CN110619236A (en) * | 2019-08-15 | 2019-12-27 | 中国人民银行数字货币研究所 | File authorization access method, device and system based on file credential information |
CN111191257A (en) * | 2019-12-02 | 2020-05-22 | 泰康保险集团股份有限公司 | File preview processing method and device |
CN111240422A (en) * | 2020-01-13 | 2020-06-05 | 成都奥伯莱思科技有限公司 | Smart community data file management device based on Internet of things |
CN111294396A (en) * | 2020-01-20 | 2020-06-16 | 咪咕数字传媒有限公司 | File transmission method and device, electronic equipment and storage medium |
CN111339049A (en) * | 2020-02-04 | 2020-06-26 | 浙江大华技术股份有限公司 | Data sharing method and terminal |
CN112492035A (en) * | 2020-11-30 | 2021-03-12 | 维沃移动通信有限公司 | File transmission method and device and electronic equipment |
CN112492035B (en) * | 2020-11-30 | 2023-10-27 | 维沃移动通信有限公司 | File transmission method and device and electronic equipment |
CN112637281A (en) * | 2020-12-08 | 2021-04-09 | 北京嘀嘀无限科技发展有限公司 | Terminal device data access method and device, electronic device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108733811A (en) | A kind of file access method, terminal and computer readable storage medium | |
CN107770369A (en) | Control method, device and the computer-readable recording medium of mobile terminal | |
CN109063505A (en) | A kind of method for secret protection, terminal and computer readable storage medium | |
CN109151169A (en) | Camera right management method, mobile terminal and computer readable storage medium | |
CN107704766A (en) | Multimedia file access control method, terminal and computer-readable recording medium | |
CN109618316A (en) | Network share method, mobile terminal and storage medium | |
CN110069229A (en) | Screen sharing method, mobile terminal and computer readable storage medium | |
CN109800602A (en) | Method for secret protection, mobile terminal and computer readable storage medium | |
CN108833690A (en) | authority control method, terminal and computer readable storage medium | |
CN109660973A (en) | Bluetooth control method, mobile terminal and storage medium | |
CN107770443A (en) | A kind of image processing method, mobile terminal and computer-readable recording medium | |
CN110187943A (en) | A kind of record screen method, terminal and computer readable storage medium | |
CN108052845A (en) | file display control method, terminal and computer readable storage medium | |
CN107580336A (en) | A kind of method for connecting network, terminal and computer-readable recording medium | |
CN107506039A (en) | Mobile terminal, data transmission method and computer-readable storage medium | |
CN108616878A (en) | A kind of encrypting and decrypting method, equipment and computer storage media | |
CN108601062A (en) | WiFi connections sharing method, terminal and computer storage media | |
CN108920917A (en) | Log in end switching method, mobile terminal and computer readable storage medium | |
CN108012270A (en) | A kind of method of information processing, equipment and computer-readable recording medium | |
CN107347117A (en) | A kind of message management method, mobile terminal and computer-readable recording medium | |
CN108777734A (en) | A kind of application invitation method, terminal and computer readable storage medium | |
CN107609066A (en) | Method, equipment and the computer for clearing up file can storage mediums | |
CN107395363A (en) | Fingerprint sharing method and mobile terminal | |
CN109409081A (en) | A kind of authority setting method, mobile terminal and computer storage medium | |
CN109711198A (en) | Application management method, mobile terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181102 |