CN108733811A - A kind of file access method, terminal and computer readable storage medium - Google Patents

A kind of file access method, terminal and computer readable storage medium Download PDF

Info

Publication number
CN108733811A
CN108733811A CN201810489388.4A CN201810489388A CN108733811A CN 108733811 A CN108733811 A CN 108733811A CN 201810489388 A CN201810489388 A CN 201810489388A CN 108733811 A CN108733811 A CN 108733811A
Authority
CN
China
Prior art keywords
user terminal
file
file destination
address information
storage address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810489388.4A
Other languages
Chinese (zh)
Inventor
余威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201810489388.4A priority Critical patent/CN108733811A/en
Publication of CN108733811A publication Critical patent/CN108733811A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of file access methods,This method in the first user terminal by receiving request by the file destination on the first user terminal to obtaining the storage address information of the file destination when open request of second user open-destination,The storage address information is sent to second user terminal,And the permission that can access the file destination is authorized to the second user terminal,When receiving the access request for accessing the file destination sent according to the storage address information by the second user terminal,Judge whether the second user terminal currently has the permission for accessing the file destination,When the determination result is yes,The second user terminal is allowed directly to access the file destination on first user terminal,The invention also discloses a kind of terminal and computer readable storage mediums,By implementing said program,In the case of not by Cloud Server,Second user terminal can access to the file destination on the first user terminal.

Description

A kind of file access method, terminal and computer readable storage medium
Technical field
The present invention relates to fields of communication technology, can more specifically to a kind of file access method, terminal and computer Read storage medium.
Background technology
Between existing two terminals need carry out file resource it is shared when, often by the file of chat tool Transfer function realizes file-sharing.For example, when terminal A wants to acquire the particular content of a certain file on terminal B, Terminal B just needs to transmit this file on Cloud Server by the file transfer conveyance of chat tool, and terminal A accesses cloud service Device carries out preview or download, in this way, terminal A has just acquired the file on terminal B from Cloud Server to this document Particular content namely existing terminal B, which only pass through Cloud Server, can just acquire the specific interior of a certain file on terminal A Hold, so the file-sharing between existing two terminals must could be realized by third-party server, namely to realizing text The shared equipment of part has additional requirement.
Invention content
The technical problem to be solved in the present invention is to need its local file-sharing to another terminal when a certain terminal When, it is necessary to it could realize that the shared problem of file between the two terminals is provided for the technical problem by Cloud Server A kind of new file access method, terminal and computer readable storage medium.
In order to solve the above technical problems, the present invention provides a kind of file access method, the file access method include with Lower step:
First user terminal is receiving request by the file destination on first user terminal to second user terminal When open open request, the storage address information of the file destination is obtained;
The storage address information is sent to the second user terminal, and the second user terminal is authorized and can be visited Ask the permission of the file destination;
Receiving the access file destination sent according to the storage address information by the second user terminal Access request when, judge whether the second user terminal currently has the permission for accessing the file destination;
When the determination result is yes, allow described in the second user terminal accesses directly on first user terminal File destination.
Optionally, described that the second user terminal is allowed directly to access the target text on first user terminal The step of part includes:The second user terminal is allowed directly to download the file destination from first user terminal;
It asks to open the file destination on first user terminal to second user open-destination in described receive It is further comprising the steps of after the step of putting request:The file destination is encrypted according to predetermined encryption algorithm;
The file access method further includes:It, will be with when the storage address information is sent to second user terminal The corresponding decruption key of the Encryption Algorithm is sent to the second user terminal, so that the second user terminal is according to institute Decruption key is stated to downloading the file destination after the file destination decryption of encrypted processing on first user terminal.
Optionally, described the step of authorizing the permission that can access the file destination to the second user terminal, includes:
For the storage address information for being currently sending to the second user terminal, energy is authorized to the second user terminal The access rights of the n times of the file destination are accessed, the N is more than 0.
Optionally, the described the step of storage address information is sent to the second user terminal, includes:
The storage address information is carried in electronic identification code and is sent to the second user terminal.
Further, the present invention also provides a kind of file access method, the file access method includes the following steps:
Second user terminal receives the storage address information for the file destination that the first user terminal is sent;The file destination For the file on the first user terminal;
The access request for accessing the file destination is sent to first user terminal according to the storage address information;
It determines that the second user terminal currently has based on the access request in first user terminal and accesses institute When stating the permission of file destination, the second user terminal is according to the storage address information directly in first user terminal It is upper to access the file destination.
Optionally, the second user terminal is directly complained to the higher authorities about an injustice and request fair settlement in first user terminal according to the storage address information The step of asking the file destination include:
Described in the second user terminal is downloaded according to the storage address information directly from first user terminal File destination.
Optionally, the target text is accessed in described sent to first user terminal according to the storage address information It is further comprising the steps of before the step of access request of part:
Receive what first user terminal was sent after the file destination is encrypted using predetermined encryption algorithm Decruption key corresponding with the Encryption Algorithm;
Described in the second user terminal is downloaded according to the storage address information directly from first user terminal The step of file destination includes:
The second user terminal acquires corresponding target according to the storage address information in the first user terminal After file, the file destination is decrypted according to the decruption key, and the file destination is downloaded after successful decryption.
Optionally, the second user terminal receives the storage address information for the file destination that the first user terminal is sent Step includes:
The second user terminal receives the electronic identification code that first user terminal is sent, in the electronic identification code Include the storage address information of the file destination;
It is described to send the access for accessing the file destination to first user terminal according to the storage address information The step of request includes:
The electronic identification code is scanned and recognized;
It is sent from the first user terminal described in trend after identifying the storage address information and accesses the file destination Access request.
Further, the present invention also provides a kind of terminal, the terminal includes processor, memory and communication bus;
The communication bus is for realizing the connection communication between the processor and the memory;
The processor is for executing one or more program stored in the memory, to realize as any of the above-described The step of described file access method.
Further, the present invention also provides a kind of computer readable storage medium, the computer readable storage mediums It is stored with one or more program, one or more of programs can be executed by one or more processor, to realize The step of file access method as described in any of the above-described.
Advantageous effect
A kind of file access method of present invention offer, terminal and computer readable storage medium, the first user terminal pass through Request is being received by the file destination on the first user terminal to obtaining the mesh when open request of second user open-destination The storage address information for marking file, is sent to second user terminal, and award to the second user terminal by the storage address information The permission of the file destination can be accessed by giving, and receive the access sent according to the storage address information by the second user terminal When the access request of the file destination, judge whether the second user terminal currently has the permission for accessing the file destination, When the determination result is yes, allow the second user terminal directly to access the file destination on first user terminal, pass through Scheme provided by the invention, since the first user terminal can dock the terminal (i.e. second user terminal) of receipts storage address information The permission of access target file is authorized, so the storage address that second user terminal can directly be sent according to the first user terminal Information accesses corresponding file destination on the first user terminal, and being total to for file is being carried out compared between terminal in existing scheme For needing the scheme that could be realized by third-party Cloud Server when enjoying, first user is whole in scheme provided by the invention The file destination that end can be directed to this ground opens up access rights to second user terminal, not by third party cloud server In the case of can realize the shared of file between terminal, namely in the case of not by Cloud Server, second user terminal It can access to the file destination on the first user terminal, reduce the requirement to equipment.
Description of the drawings
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
The hardware architecture diagram of Fig. 1 optional mobile terminals of each embodiment one to realize the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the basic procedure schematic diagram for the file access method that first embodiment of the invention provides;
Fig. 4 is the operation chart for user's selection target file that first embodiment of the invention provides;
Fig. 5 is the interface schematic diagram on the first user terminal that first embodiment of the invention provides;
Fig. 6 is the basic procedure schematic diagram for the file access method that second embodiment of the invention provides;
Fig. 7 is the basic procedure schematic diagram for the file access method that third embodiment of the invention provides;
Fig. 8 is the structural schematic diagram for the terminal that fourth embodiment of the invention provides.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, using for indicating that the suffix of such as " module ", " component " or " unit " of element is only The explanation for being conducive to the present invention, itself does not have a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, tablet Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable The shiftings such as media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special Except element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware architecture diagram of its mobile terminal of each embodiment to realize the present invention, the shifting Moving terminal 100 may include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram, Either combine certain components or different components arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating Frequency unit 101 can also be communicated with network and other equipment by radio communication.Above-mentioned wireless communication can use any communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need It to be omitted in the range for the essence for not changing invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, it is that radio frequency unit 101 or WiFi module 102 are received or The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103 The relevant audio output of specific function executed with mobile terminal 100 can also be provided (for example, call signal receives sound, disappears Breath receives sound etc.).Audio output unit 103 may include loud speaker, buzzer etc..
A/V input units 104 are for receiving audio or video signal.A/V input units 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained by image capture apparatus (such as camera) in image capture mode carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition) The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, size and the direction of gravity are can detect that when static, can be used to identify the application of mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family is arranged and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect user on it or neighbouring touch operation (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071 Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc. It is one or more, do not limit herein specifically.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel 1061 be to realize the function that outputs and inputs of mobile terminal as two independent components, but in certain embodiments, can The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example, External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For the transmission data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can include mainly storing program area And storage data field, wherein storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Embodiment to facilitate the understanding of the present invention, below to the communications network system that is based on of mobile terminal of the present invention into Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system System is the LTE system of universal mobile communications technology, which includes communicating UE (User Equipment, the use of connection successively Family equipment) (the lands Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers Such as the function of home location register (not shown) etc, and some are preserved in relation to use such as service features, data rates The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201 Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And the following new network system etc., it does not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the method for the present invention is proposed.
First embodiment
To solve in the prior art, when a certain terminal is needed its local file-sharing to another terminal, it is necessary to borrow The shared problem of file between helping additional Cloud Server that could realize the two terminals, the present embodiment provides a kind of visits of file Ask method, shown in Figure 3, file access method provided in this embodiment is applied to the first subscriber terminal side, specific to wrap It includes:
S301:First user terminal is receiving request by the file destination on the first user terminal to second user terminal When open open request, the storage address information of file destination is obtained.
It should be noted that the file destination in the present embodiment can be stored in first this ground of user terminal it is arbitrary File, for example can be the file of video format, can be the file of document format, can also be the file of picture format. And the open request in the present embodiment can be issued by user by the first user terminal, for example, may refer to shown in Fig. 4, be used Family can click corresponding file on the first user terminal, and the first user terminal can will be corresponding according to the clicking operation of user File as file destination.After determining file destination, such as Fig. 5 can be shown on the display interface of the first user terminal Shown in choice box, user can selects to need by the file destination in the selection frame (for Fig. 5 namely sina Sinas File) it is shared with which user terminal, it that is to say selection to which user terminal open visit file destination Permission, user are chosen in the selection frame after can sharing the terminal user of the file destination, and the first user terminal obtains automatically Take the storage address information of the file destination.It should be noted that in some other embodiments, user can first carry out use The selection operation of family terminal, then performance objective file selection operation.
Storage address information in the present embodiment includes specific in memory block of the file destination on the first user terminal Storage address information in file directory position namely the present embodiment can indicate that the specific location residing for the file destination, It of courses, the unique identity information of the first user terminal can also be included in the storage address information, for example can be MAC (Medium Access Control, media access control) address, such second user terminal are receiving storage address letter After breath, so that it may to know which terminal should be sent access request according to MAC Address therein, and as should be to the end Which of end file accesses, and needs according to the specific file directory location determination in storage address information.
S302:Storage address information is sent to second user terminal, and the second user terminal is authorized to access and is somebody's turn to do The permission of file destination.
It should be noted that in order to ensure that the safety of data on the first user terminal, the first user terminal can be only right Open object (i.e. second user terminal) indicated by open request in step S301, which is authorized, can access the power of the file destination Limit.In this way, even if other-end has acquired the storage address information in step S301, since other-end is not by first User terminal mandate, so the file destination on the first user terminal can not be just accessed in other-end.
The mode that first user terminal authorizes second user terminal the permission that can access the file destination can be as follows:
Obtain second user terminal unique identity information, by the unique identity information preservation with the target In authorized user's terminal list of file association, every user terminal in authorized user's terminal list all has access The permission of the file destination of first user terminal.In this way, receiving the access target text that a certain user terminal is sent later When the access request of part, it is only necessary to judge whether this user terminal is to belong to terminal in this authorized user's terminal list i.e. Can, if so, there is the terminal permission for accessing the file destination otherwise not have.
It should also be noted that, in the present embodiment, storage address information is being sent to second user by the first user terminal When terminal, or later, it can be directed to this transmission process, the file destination n times can be accessed by being authorized to second user terminal Access rights, wherein N be more than 0.Preferably, N takes 1, shows to be directed to current storage address information transmission process at this time, the It is primary that two user terminals can only access the file destination, if second user terminal thinks back-call file destination, first User terminal must send a storage address information, in other words, the first user terminal at this time to second user terminal again The first user can be accessed by representing second user terminal to the number of the action of second user terminal transmission storage address information The number of file destination in terminal, it should be noted that each pair of file destination of second user terminal has carried out primary access, the One user terminal should all record this operation, can be with so as to determine second user terminal current residual in real time The number of access target file can preferably ensure the safety of file on the first user terminal in this way.
It of courses, in some other embodiments, the first user terminal, which can also be second user terminal, can access this The priority assignation effective time of file destination, for example, storage address information is being sent to second user end by the first user terminal When end, or later, the permission of energy access target file can be authorized to second user terminal, and is started timer and started to count When, the permission of second user terminal energy access target file is withdrawn after the timing duration of timer reaches default effective time, Namely forbid second user terminal access file destination, so if second user terminal after this presets effective time just to If first user terminal sends access request, since the first user terminal can forbid second user terminal access file destination, So second user terminal can not just obtain to obtain the file destination on the first user terminal at this time.Default effective time herein It can be arbitrarily arranged by developer, can also support the User Defined of the first user terminal.
It is sent to it should also be noted that storage address information can be carried in electronic identification code by the first user terminal Second user terminal that is to say that carrying out coding to storage address information generates electronic identification code, saves in the electronic identification code The specifying information of storage address.Electronic identification code in the present embodiment can be by terminal scanning recognition, specifically, electronic recognition Code includes but not limited to Quick Response Code, bar code.
S303:Receive the access request of the access target file sent according to storage address information by second user terminal.
Second user terminal is after the storage address information for receiving the transmission of the first user terminal, the use of second user terminal Family can send the access request of access target file by second user terminal to the first user terminal.
S304:Judge whether second user terminal currently has the permission of access target file, if so, S305 is gone to, it is no Then, S306 is gone to.
Second user terminal, can be by the storage after receiving the storage address information sent by the first user terminal Location information carrying is sent to the first user terminal in access request, so that the first user terminal can after receiving access request Therefrom to extract storage address information, so that it is determined which file what second user terminal currently needed to access is, namely Determine file destination.It should be noted that second user terminal can also carry the unique identity information of itself The first user terminal is sent jointly in access request, or after sending access request to the first user terminal, retransmit certainly The unique identity information of body, in this way, the first user terminal can according to the unique identity information to the target It is matched in authorized user's terminal list of file association, judges to whether there is unique body in authorized user's terminal list Part identification information, such as exists, then illustrates the second user terminal currently permission with access target file, be such as not present, then say Bright second user terminal does not have the permission of access target file currently.
S305:Second user terminal is allowed directly to access file destination on the first user terminal
It should be noted that the access in the present embodiment includes at least one of preview and download, for example, when the first use Family terminal-pair second user terminal is authorized can be after the permission of preview file destination, if receiving the second user terminal access mesh The preview request for marking file, then should allow the second user terminal preview file destination.For another example, when the first user terminal pair Second user terminal is authorized can be after the permission of downloading object file, if receiving the second user terminal downloads file destinations Request is downloaded, then should allow the second user terminal downloads file destination.It should be noted that in some embodiments, also The priority that download can be arranged is higher than the priority of preview, namely when the first user terminal authorizes second user terminal downloads mesh After the permission for marking file, then the second user terminal also has the permission of the preview file destination.
S306:Second user terminal is forbidden to access file destination on the first user terminal.
It should be noted that in step S301, after determining file destination, for example request is being received by first After file destination on user terminal is to the open request of second user open-destination, the first user terminal can also be according to pre- If Encryption Algorithm file destination is encrypted, preset Encryption Algorithm can be arbitrary Encryption Algorithm in the present embodiment, For example, can be AES (Advanced Encryption Standard, Advanced Encryption Standard) Encryption Algorithm.It needs to illustrate It is that file destination being encrypted using preset Encryption Algorithm in the present embodiment is in order to further ensure file destination Safety, if in this way, even if if there is exterior terminal the permission of the access target file exterior terminal not have decruption key only The ciphertext of file destination can be obtained.For the ease of user's operation, for the first user terminal, pass through first using user When the user terminal access file destination, the plaintext of file destination can be read by not needing decruption key, that is to say target text Part can be transparent for the local terminal where it, but file destination is for exterior terminal, then is encryption 's.If the first user terminal receives the access request of the access target file of exterior terminal, exterior terminal is only according to solution Close key pair file destination could be downloaded after being decrypted or the clear content of preview file destination, if not having decruption key, Then can only access target file ciphertext.So in the present embodiment, the first user terminal is in the preset Encryption Algorithm of use to mesh Decruption key corresponding with the Encryption Algorithm can be sent to second user terminal by mark file after being encrypted, specifically, can , when storage address information is sent to second user terminal, which is sent jointly in the first user terminal Two user terminals, namely storage address information and decruption key can be carried on together in electronic identification code be sent at this time Two user terminals.Second user terminal is after receiving decruption key, if initiating the file destination on the first user terminal Access request can then be decrypted according to the file destination on the first user terminal of decruption key pair that itself is acquired.
In some embodiments, it can also be directed on first terminal and need to carry out other-end shared document creation The copy is stored in the shared memory specially opened up on the first user terminal by copy, and using the copy as target text Part executes the operation of above-mentioned steps S301 to step S306.It is shared on the first user terminal in this way, exterior terminal can only just access Content in memory block.
File access method provided in this embodiment, by receiving request by the file destination on the first user terminal To obtaining the storage address information of the file destination when open request of second user open-destination, which is sent out Give second user terminal, and authorize the permission that can access the file destination to the second user terminal, receive by this When the access request for accessing the file destination that two user terminals are sent according to the storage address information, second user end is judged Whether end is current there is the permission for accessing the file destination to allow the second user terminal direct when the determination result is yes The file destination is accessed on first user terminal, since the first user terminal can dock the terminal of receipts storage address information (i.e. second user terminal) authorizes the permission of access target file, so second user terminal can be directly according to the first user end The storage address information that end is sent accesses corresponding file destination on the first user terminal, not by third party cloud server In the case of can realize the shared of file between terminal, namely in the case of not by Cloud Server, second user is whole End can access to the file destination on the first user terminal, reduce the requirement to equipment.
Second embodiment
To solve in the prior art, when a certain terminal is needed its local file-sharing to another terminal, it is necessary to borrow The shared problem of file between helping additional Cloud Server that could realize the two terminals, the present embodiment provides a kind of visits of file Ask method, shown in Figure 6, file access method provided in this embodiment is applied to second user end side, specific to wrap It includes:
S601:Second user terminal receives the storage address information for the file destination that the first user terminal is sent.
File destination in the present embodiment is the file on the first user terminal, can be first this ground of user terminal The arbitrary file of storage, for example can be the file of video format, it can be the file of document format, can also be picture lattice The file of formula.
Storage address information in step S601 can be the first user terminal, and receiving user, to pass through the first user whole End send by the file destination on the first user terminal to the open request of second user open-destination when, by the first user end End is sent to second user terminal.
Storage address information in the present embodiment includes specific in memory block of the file destination on the first user terminal Storage address information in file directory position namely the present embodiment can indicate that the specific location residing for the file destination, It of courses, should also include the unique identity information of the first user terminal in the storage address information, for example can be MAC (Medium Access Control, media access control) address, such second user terminal are receiving storage address letter After breath, so that it may to know which terminal should be sent access request according to MAC Address therein, and as should be to the end Which of end file accesses, and needs according to the specific file directory location determination in storage address information.
In some embodiments, since the first user terminal is that storage address information is carried in electronic identification code to send To second user terminal, so being exactly such a mistake on the process nature of second user terminal reception storage address information Journey:Receive the electronic identification code of the first user terminal transmission.Should include at this time depositing for file destination in this electronic identification code Store up address information.
S602:The access request of access target file is sent to the first user terminal according to storage address information.
The storage address information acquired can be carried and be sent to the first use in access request by second user terminal Family terminal, so that the first user terminal can therefrom extract storage address information after receiving access request, so that it is determined that Which file what second user terminal currently needed to access is, namely determines file destination.
If storage address information is to be carried in electronic identification code and be sent to second user terminal, step S602 can To include following detailed process:
Scanning is identified to the electronic identification code;
The access request of access target file is sent from the first user terminal of trend after identifying storage address information.
S603:Determining second user terminal currently based on the access request in the first user terminal has access target text When the permission of part, second user terminal directly accesses file destination according to the storage address information on the first user terminal.
In step S603, the first user terminal needs to judge whether the second user terminal for sending access request currently has There is the permission of access target file.It should be noted that second user terminal can also be by the unique identity information of itself Carrying sends jointly to the first user terminal in access request, or after sending access request to the first user terminal, then Send the unique identity information of itself, in this way, the first user terminal can according to the unique identity information to It is matched in the associated authorized user's terminal list of the file destination, judges to whether there is in authorized user's terminal list and be somebody's turn to do Unique identity information such as exists, then illustrates the second user terminal currently permission with access target file, if do not deposited Then illustrating that second user terminal does not have the permission of access target file currently.Being associated with file destination in the present embodiment Authorized user's terminal list set-up mode and function be referred to the content in above-mentioned first embodiment, it is no longer superfluous here It states.
It should be noted that the access in the present embodiment includes at least one of preview and download, for example, when the second use After terminal-pair the first user terminal in family sends the preview request of request preview file destination, if the first user terminal determines second The current permission with preview file destination of user terminal, then second user terminal can be according to storage address information directly the Preview file destination on one user terminal.For another example, mesh is downloaded when the first user terminal of second user terminal-pair sends request After the download request for marking file, if the first user terminal determines the second user terminal currently power with downloading object file Limit, then second user terminal can directly download the file destination according to storage address information on the first user terminal.It should Illustrate, in some embodiments, the priority that download can also be arranged is higher than the priority of preview, namely as the first user After terminal determines that second user terminal currently has the permission of downloading object file, then the second user terminal can be according to storage Address information directly downloads the file destination from the first user terminal, can also be according to the storage address information in the first user Preview file destination in terminal.It should be noted that second user terminal can be pre- in the first user terminal based on 5G networks It lookes at and/or downloading object file.
In some embodiments, before step S602, second user terminal can also receive the first user terminal right The decruption key corresponding with the Encryption Algorithm that file destination is sent after being encrypted using predetermined encryption algorithm, subsequently to need When accessing the file destination on the first user terminal, the file destination can be decrypted according to the decruption key, to The clear content of file destination is obtained, to realize preview and/or download to the clear content.It is preset in the present embodiment to add Close algorithm can be arbitrary Encryption Algorithm, for example, can be AES (Advanced Encryption Standard, it is advanced plus Data Encryption Standard) Encryption Algorithm.
It should be noted that decruption key and storage address information can be sent jointly to the second use by the first user terminal The two information specifically can all be carried in electronic identification code and be sent to second user terminal by family terminal, and second uses Family terminal is by identifying that scanning also electronic identification code can send the request of access target file from the first user terminal of trend.
File access method provided in this embodiment, by receiving the transmission of the first user terminal in second user terminal After the storage address information of file destination, the visit of access target file is sent to the first user terminal according to the storage address information It asks request, determines that second user terminal currently has the power for accessing the file destination based on the access request in the first user terminal In limited time, second user terminal directly accesses file destination according to the storage address information on the first user terminal.That is, second The storage address information that user terminal can directly be sent according to the first user terminal accesses accordingly on the first user terminal File destination can realize the shared of file between terminal in the case of not by third party cloud server, namely not In the case of Cloud Server, second user terminal can access to the file destination on the first user terminal, drop The low requirement to equipment.
3rd embodiment
The scheme provided in order to better understand the present invention, the present embodiment provides a kind of more specifical file access sides Method, it is shown in Figure 7, including:
S701:First user terminal receives the request that user issues and uses the file destination pair second on the first user terminal The open request of family open-destination.
File destination in the present embodiment can be the arbitrary file stored in first this ground of user terminal, such as can It can be the file of document format to be the file of video format, can also be the file of picture format.
S702:First user terminal obtains the storage address information of file destination.
May include that the MAC Address of the first user terminal and file destination exist in storage address information in step S702 Residing specific physical location on first user terminal, for example can be specific file directory.It of courses in some implementations In example, storage location (file mesh of the file destination residing for the first user terminal can be only included in the storage address information Record), but need to ensure that second user terminal can determine the transmission storage according to the storage address information received at this time The source of location information.
S703:First user terminal is encrypted file destination using preset Encryption Algorithm.
Preset Encryption Algorithm can be AES encryption algorithm in step S703, or can also be other Encryption Algorithm, Step S703 can also be executed prior to step S702, or can also be performed simultaneously.
S704:Storage address information and decruption key corresponding with the Encryption Algorithm are carried in Quick Response Code and send second User terminal, and being authorized to second user terminal can the primary permission of downloading object file.
Step S704 is substantially to generate two dimension for storage address information and decruption key corresponding with the Encryption Algorithm Code, is then sent to second user terminal by the Quick Response Code.
It should be noted that the first user terminal authorizes the energy primary permission of downloading object file to second user terminal Mode can be as follows:
Obtain second user terminal unique identity information, by the unique identity information addition with the target In authorized user's terminal list of file association, every user terminal in authorized user's terminal list all has access The permission of the file destination of first user terminal.In this way, receiving the access target text that a certain user terminal is sent later When the access request of part, it is only necessary to judge whether this user terminal is to belong to terminal in this authorized user's terminal list i.e. Can, if so, there is the terminal permission for accessing the file destination otherwise not have.
S705:After second user terminal receives the Quick Response Code of the first user terminal transmission, which is scanned Identification.
S706:Second user terminal is after scanning obtains storage address information and decruption key from the first user terminal of trend Send the download request of downloading object file.
Can include unique identity information and the acquisition of second user terminal in download request in step S706 Obtained storage address information.
S707:First user terminal asks to determine that second user terminal currently has downloading object file according to the download Permission.
Specifically, the first user terminal can determine the according to the storage address information in the download request received The file destination currently to be downloaded of two user terminals, then judge the unique identity information received whether with the target In authorized user's terminal list of file association, if so, then illustrating the second user terminal currently power with downloading object file Limit, otherwise, does not then have.
S708:After second user terminal decrypts file destination according to decruption key, the file destination after decryption is carried out It downloads.
It should be noted that second user terminal is answered after to the file destination of the first user terminal once download It is deleted from the associated authorized user's terminal list of the file destination when by the unique identity information of second user terminal.
The file access method provided through this embodiment, the Quick Response Code that second user terminal can be received according to scanning Directly from the first user terminal downloading files, for second user terminal, the timeliness for downloading file is relatively high, together When this downloading mode simple operation, the Quick Response Code that the user in second user terminal only needs scanning to receive can be to first File on user terminal is downloaded.
Fourth embodiment
It is shown in Figure 8 the present embodiment provides a kind of terminal, including processor, memory and communication bus;Wherein, Communication bus is for realizing the connection communication between processor and memory, and processor is for executing one stored in memory Or multiple programs, to realize each file access in the first subscriber terminal side in above-mentioned first embodiment and 3rd embodiment The step of method, or realize each file access side in the second user end side in above-mentioned second embodiment and 3rd embodiment The step of method.
The present embodiment also provides a kind of computer readable storage medium, the computer-readable recording medium storage there are one or The multiple programs of person, one or more program can be executed by one or more processor, to realize above-mentioned first embodiment The step of with each file access method in the first subscriber terminal side in 3rd embodiment, or realize above-mentioned second embodiment and The step of each file access method in second user end side in 3rd embodiment.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or device.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (10)

1. a kind of file access method, which is characterized in that the file access method includes the following steps:
First user terminal is receiving request by the file destination on first user terminal to second user open-destination Open request when, obtain the storage address information of the file destination;
The storage address information is sent to the second user terminal, and the second user terminal is authorized can access institute State the permission of file destination;
In the visit for receiving the access file destination sent according to the storage address information by the second user terminal When asking request, judge whether the second user terminal currently has the permission for accessing the file destination;
When the determination result is yes, the second user terminal is allowed directly to access the target on first user terminal File.
2. file access method as described in claim 1, which is characterized in that described that the second user terminal is allowed directly to exist The step of accessing the file destination on first user terminal include:Allow the second user terminal directly from described The file destination is downloaded on one user terminal;
It asks to ask the file destination on first user terminal to the opening of second user open-destination in described receive It is further comprising the steps of after the step of asking:The file destination is encrypted according to predetermined encryption algorithm;
The file access method further includes:When the storage address information is sent to second user terminal, will with it is described The corresponding decruption key of Encryption Algorithm is sent to the second user terminal, so that the second user terminal is according to the solution The file destination is downloaded after the file destination decryption of encrypted processing on first user terminal described in close key pair.
3. file access method as described in claim 1, which is characterized in that described authorized to the second user terminal can visit The step of permission for asking the file destination includes:
For the storage address information for being currently sending to the second user terminal, being authorized to the second user terminal can access The access rights of the n times of the file destination, the N are more than 0.
4. file access method as described in any one of claims 1-3, which is characterized in that described by the storage address information The step of being sent to the second user terminal include:
The storage address information is carried in electronic identification code and is sent to the second user terminal.
5. a kind of file access method, which is characterized in that the file access method includes the following steps:
Second user terminal receives the storage address information for the file destination that the first user terminal is sent;The file destination is the File on one user terminal;
The access request for accessing the file destination is sent to first user terminal according to the storage address information;
It determines that the second user terminal currently has based on the access request in first user terminal and accesses the mesh When marking the permission of file, the second user terminal is directly complained to the higher authorities about an injustice and request fair settlement in first user terminal according to the storage address information Ask the file destination.
6. file access method as claimed in claim 5, which is characterized in that the second user terminal is according to the storage Location information directly includes the step of accessing the file destination on first user terminal:
The second user terminal directly downloads the target according to the storage address information from first user terminal File.
7. file access method as claimed in claim 6, which is characterized in that it is described according to the storage address information to institute It is further comprising the steps of before stating the step of the first user terminal sends the access request for accessing the file destination:
Receive first user terminal to the file destination using predetermined encryption algorithm be encrypted after send with institute State the corresponding decruption key of Encryption Algorithm;
The second user terminal directly downloads the target according to the storage address information from first user terminal The step of file includes:
The second user terminal acquires corresponding file destination according to the storage address information in the first user terminal Afterwards, the file destination is decrypted according to the decruption key, and downloads the file destination after successful decryption.
8. such as claim 5-7 any one of them file access methods, which is characterized in that the second user terminal receives the One user terminal send file destination storage address information the step of include:
The second user terminal receives the electronic identification code that first user terminal is sent, and includes in the electronic identification code The storage address information of the file destination;
It is described to send the access request for accessing the file destination to first user terminal according to the storage address information The step of include:
The electronic identification code is scanned and recognized;
The visit for accessing the file destination is sent from the first user terminal described in trend after identifying the storage address information Ask request.
9. a kind of terminal, which is characterized in that the terminal includes processor, memory and communication bus;
The communication bus is for realizing the connection communication between the processor and the memory;
The processor is for executing one or more program stored in the memory, to realize such as claim 1-4 Or the step of file access method described in any one of 5-8.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage there are one or Multiple programs, one or more of programs can be executed by one or more processor, to realize such as claim 1-4 or The step of file access method described in any one of 5-8.
CN201810489388.4A 2018-05-21 2018-05-21 A kind of file access method, terminal and computer readable storage medium Pending CN108733811A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810489388.4A CN108733811A (en) 2018-05-21 2018-05-21 A kind of file access method, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810489388.4A CN108733811A (en) 2018-05-21 2018-05-21 A kind of file access method, terminal and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN108733811A true CN108733811A (en) 2018-11-02

Family

ID=63937829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810489388.4A Pending CN108733811A (en) 2018-05-21 2018-05-21 A kind of file access method, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108733811A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109766316A (en) * 2018-12-18 2019-05-17 深圳壹账通智能科技有限公司 File acquisition method, device, computer equipment and storage medium
CN110619236A (en) * 2019-08-15 2019-12-27 中国人民银行数字货币研究所 File authorization access method, device and system based on file credential information
CN111191257A (en) * 2019-12-02 2020-05-22 泰康保险集团股份有限公司 File preview processing method and device
CN111240422A (en) * 2020-01-13 2020-06-05 成都奥伯莱思科技有限公司 Smart community data file management device based on Internet of things
CN111294396A (en) * 2020-01-20 2020-06-16 咪咕数字传媒有限公司 File transmission method and device, electronic equipment and storage medium
CN111339049A (en) * 2020-02-04 2020-06-26 浙江大华技术股份有限公司 Data sharing method and terminal
CN112492035A (en) * 2020-11-30 2021-03-12 维沃移动通信有限公司 File transmission method and device and electronic equipment
CN112637281A (en) * 2020-12-08 2021-04-09 北京嘀嘀无限科技发展有限公司 Terminal device data access method and device, electronic device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103699597A (en) * 2013-12-12 2014-04-02 北京奇虎科技有限公司 Method for downloading file through browser and browser
CN106503579A (en) * 2016-09-29 2017-03-15 维沃移动通信有限公司 A kind of method and device of access target file
CN106998329A (en) * 2017-03-31 2017-08-01 腾讯科技(深圳)有限公司 File sharing method and device
US20170339215A1 (en) * 2012-11-08 2017-11-23 Gpvtl Canada Inc. System and method of secure file sharing using p2p
CN107766743A (en) * 2017-11-09 2018-03-06 广州杰赛科技股份有限公司 Method to set up and device, terminal device, the storage medium of file access authority

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170339215A1 (en) * 2012-11-08 2017-11-23 Gpvtl Canada Inc. System and method of secure file sharing using p2p
CN103699597A (en) * 2013-12-12 2014-04-02 北京奇虎科技有限公司 Method for downloading file through browser and browser
CN106503579A (en) * 2016-09-29 2017-03-15 维沃移动通信有限公司 A kind of method and device of access target file
CN106998329A (en) * 2017-03-31 2017-08-01 腾讯科技(深圳)有限公司 File sharing method and device
CN107766743A (en) * 2017-11-09 2018-03-06 广州杰赛科技股份有限公司 Method to set up and device, terminal device, the storage medium of file access authority

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109766316A (en) * 2018-12-18 2019-05-17 深圳壹账通智能科技有限公司 File acquisition method, device, computer equipment and storage medium
CN110619236A (en) * 2019-08-15 2019-12-27 中国人民银行数字货币研究所 File authorization access method, device and system based on file credential information
CN111191257A (en) * 2019-12-02 2020-05-22 泰康保险集团股份有限公司 File preview processing method and device
CN111240422A (en) * 2020-01-13 2020-06-05 成都奥伯莱思科技有限公司 Smart community data file management device based on Internet of things
CN111294396A (en) * 2020-01-20 2020-06-16 咪咕数字传媒有限公司 File transmission method and device, electronic equipment and storage medium
CN111339049A (en) * 2020-02-04 2020-06-26 浙江大华技术股份有限公司 Data sharing method and terminal
CN112492035A (en) * 2020-11-30 2021-03-12 维沃移动通信有限公司 File transmission method and device and electronic equipment
CN112492035B (en) * 2020-11-30 2023-10-27 维沃移动通信有限公司 File transmission method and device and electronic equipment
CN112637281A (en) * 2020-12-08 2021-04-09 北京嘀嘀无限科技发展有限公司 Terminal device data access method and device, electronic device and storage medium

Similar Documents

Publication Publication Date Title
CN108733811A (en) A kind of file access method, terminal and computer readable storage medium
CN107770369A (en) Control method, device and the computer-readable recording medium of mobile terminal
CN109063505A (en) A kind of method for secret protection, terminal and computer readable storage medium
CN109151169A (en) Camera right management method, mobile terminal and computer readable storage medium
CN107704766A (en) Multimedia file access control method, terminal and computer-readable recording medium
CN109618316A (en) Network share method, mobile terminal and storage medium
CN110069229A (en) Screen sharing method, mobile terminal and computer readable storage medium
CN109800602A (en) Method for secret protection, mobile terminal and computer readable storage medium
CN108833690A (en) authority control method, terminal and computer readable storage medium
CN109660973A (en) Bluetooth control method, mobile terminal and storage medium
CN107770443A (en) A kind of image processing method, mobile terminal and computer-readable recording medium
CN110187943A (en) A kind of record screen method, terminal and computer readable storage medium
CN108052845A (en) file display control method, terminal and computer readable storage medium
CN107580336A (en) A kind of method for connecting network, terminal and computer-readable recording medium
CN107506039A (en) Mobile terminal, data transmission method and computer-readable storage medium
CN108616878A (en) A kind of encrypting and decrypting method, equipment and computer storage media
CN108601062A (en) WiFi connections sharing method, terminal and computer storage media
CN108920917A (en) Log in end switching method, mobile terminal and computer readable storage medium
CN108012270A (en) A kind of method of information processing, equipment and computer-readable recording medium
CN107347117A (en) A kind of message management method, mobile terminal and computer-readable recording medium
CN108777734A (en) A kind of application invitation method, terminal and computer readable storage medium
CN107609066A (en) Method, equipment and the computer for clearing up file can storage mediums
CN107395363A (en) Fingerprint sharing method and mobile terminal
CN109409081A (en) A kind of authority setting method, mobile terminal and computer storage medium
CN109711198A (en) Application management method, mobile terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181102