CN108777696A - A kind of method and apparatus for sharing e-book - Google Patents

A kind of method and apparatus for sharing e-book Download PDF

Info

Publication number
CN108777696A
CN108777696A CN201810294130.9A CN201810294130A CN108777696A CN 108777696 A CN108777696 A CN 108777696A CN 201810294130 A CN201810294130 A CN 201810294130A CN 108777696 A CN108777696 A CN 108777696A
Authority
CN
China
Prior art keywords
information
book
target electronic
electronic book
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810294130.9A
Other languages
Chinese (zh)
Inventor
苏勇
陈晓磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN201810294130.9A priority Critical patent/CN108777696A/en
Publication of CN108777696A publication Critical patent/CN108777696A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Abstract

The purpose of the application be to provide it is a kind of for sharing the method and apparatus of e-book, user equipment obtain distribute to the first user, about target electronic book share token information;User equipment generates e-book sharing information about the target electronic book according to the target electronic book and the token information of sharing, wherein the e-book sharing information includes the access identities information of the target electronic book and described shares token information;The e-book sharing information is shared with second user by user equipment;Compared with prior art, the application realizes user and efficiently shares anywhere or anytime, significantly improves user experience, while ensuring that the copyright of the e-book is protected by the management of e-book platform.

Description

A kind of method and apparatus for sharing e-book
Technical field
This application involves the communications field more particularly to a kind of technologies for sharing e-book.
Background technology
With the development of the times, collect in word, picture, sound, image etc. and be dissolved in integrated E-book reader increasingly It is welcome by everybody, the more books of purchase for keeping Ebook user more convenient with its notable advantage;With e-book A large amount of to occur, the unnecessary certain e-book of purchase of user, sharing for e-book sometimes just becomes particularly important;E-book point at present The contents such as abstract, catalogue can only be shared by enjoying, and other users, which go for the e-book shared, then to be needed to buy the account etc. of oneself Deng, therefore occur conveniently and efficiently obtaining the problems such as sharing, and then the application body of user is limited to a certain extent It tests.
Invention content
The purpose of the application is to provide the method and apparatus that a kind of user shares e-book.
According to the one side of the application, a kind of method being used to share e-book at the first user equipment end is provided, This method includes:Obtain distribute to the first user, about target electronic book share token information;According to the target electronic Book and the e-book sharing information for sharing token information generation about the target electronic book, wherein the e-book point It enjoys access identities information that information includes the target electronic book and described shares token information;By the e-book sharing information It is shared with second user.
According to the one side of the application, a kind of method for sharing e-book in second user equipment end subscriber is provided, This method includes:The e-book sharing information shared according to the first user sends the access about target electronic book to the network equipment Request, wherein the e-book sharing information includes the access identities information of the target electronic book and shares token information, institute State the access identities information and share token information that access request includes the e-book sharing information or the target electronic book; Receive the target electronic book that the network equipment is returned based on the access request.
According to the one side of the application, a kind of method being used to share e-book at network equipment end, the party are provided Method includes:Receive the access request about target electronic book that second user equipment is sent, wherein the access request includes institute It states the access identities information of target electronic book and shares token information;The access request is examined according to the token information of sharing Whether the target electronic book may have access to;If the access request may have access to the target electronic book, by the target electronic book It is provided to the second user equipment.
According to further aspect of the application, a kind of equipment with e-book is shared is provided, which includes processor; And it is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute the first user equipment obtain distribute to the first user, about target electronic book share token information;Described first uses Family equipment according to the target electronic book and it is described share token information and generate share about the e-book of the target electronic book Information, wherein the e-book sharing information includes that the access identities information of the target electronic book and the token of sharing are believed Breath;The e-book sharing information is shared with second user by first user equipment;The second user equipment is according to The e-book sharing information that one user shares sends the access request about target electronic book to the network equipment, wherein the electricity Philosophical works sharing information includes the access identities information of the target electronic book and shares token information, and the access request includes institute It states the access identities information of e-book sharing information or the target electronic book and shares token information;The network equipment receives The access request about target electronic book that second user equipment is sent, wherein the access request includes the target electronic The access identities information of book and share token information;The network equipment shares token information according to and the access is examined to ask Seeking Truth is no to may have access to the target electronic book;If the access request may have access to the target electronic book, the network equipment will The target electronic book is provided to the second user equipment;The second user equipment receives the network equipment based on described The target electronic book that access request returns.
According to the one side of the application, it includes the computer-readable medium instructed to provide a kind of, and described instruction is in quilt System is made to carry out when execution:First user equipment obtain distribute to the first user, about target electronic book share token Information;First user equipment is generated according to the target electronic book and the token information of sharing about the target electronic The e-book sharing information of book, wherein the e-book sharing information include the target electronic book access identities information and It is described to share token information;The e-book sharing information is shared with second user by first user equipment;Described second The e-book sharing information that user equipment is shared according to the first user sends to the network equipment and is asked about the access of target electronic book It asks, wherein the e-book sharing information includes the access identities information of the target electronic book and shares token information, described Access request includes the access identities information of the e-book sharing information or the target electronic book and shares token information;Institute It states the network equipment and receives the access request about target electronic book that second user equipment is sent, wherein the access request packet It includes the access identities information of the target electronic book and shares token information;The network equipment shares token information according to Examine whether the access request may have access to the target electronic book;If the access request may have access to the target electronic book, The target electronic book is provided to the second user equipment by the network equipment;The second user equipment receives the net The target electronic book that network equipment is returned based on the access request.
Compared with prior art, the application obtains the target electronic book and its share power that user shares by user equipment Limit, and then generate e-book sharing information and the e-book sharing information is shared with other users;Wherein share user's utilization Its user equipment, which realizes, whenever and wherever possible, efficiently to be shared, and significantly improves user experience, while passing through the pipe of e-book platform Reason ensures that the copyright of the e-book is protected.
Description of the drawings
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 shows a kind of method being used to share e-book at the first user equipment end according to the application one embodiment Flow chart;
Fig. 2 shows a kind of methods being used to share e-book in second user equipment end according to the application one embodiment Flow chart;
Fig. 3 shows a kind of method flow being used to share e-book at network equipment end according to the application one embodiment Figure;
Fig. 4 shows a kind of method flow diagram for sharing e-book according to the application one embodiment;
Fig. 5 is shown according to the application scenarios schematic diagram in the application some embodiments.
Same or analogous reference numeral represents same or analogous component in attached drawing.
Specific implementation mode
The application is described in further detail below in conjunction with the accompanying drawings.
In a typical configuration of this application, terminal, the equipment of service network and trusted party include one or more Processor (CPU), input/output interface, network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, magnetic tape disk storage or other magnetic storage apparatus or Any other non-transmission medium can be used for storage and can be accessed by a computing device information.
The application meaning equipment includes but not limited to that user equipment, the network equipment or user equipment and the network equipment pass through Network is integrated constituted equipment.The user equipment, which includes but not limited to any type, to carry out human-computer interaction with user The mobile electronic product, such as smart mobile phone, tablet computer etc. of (such as human-computer interaction is carried out by touch tablet), the mobile electricity Arbitrary operating system, such as android operating systems, iOS operating systems may be used in sub- product.Wherein, the network equipment Including a kind of the electronic equipment of numerical computations and information processing can be carried out automatically according to the instruction for being previously set or storing, Hardware includes but not limited to microprocessor, application-specific integrated circuit (ASIC), programmable logic device (PLD), field programmable gate Array (FPGA), digital signal processor (DSP), embedded device etc..The network equipment includes but not limited to computer, net The cloud that network host, single network server, multiple network server collection or multiple servers are constituted;Here, cloud is by being based on cloud meter The a large amount of computers or network server for calculating (Cloud Computing) are constituted, wherein cloud computing is the one of Distributed Calculation Kind, a virtual supercomputer being made of the computer collection of a group loose couplings.The network includes but not limited to interconnect Net, wide area network, Metropolitan Area Network (MAN), LAN, VPN network, wireless self-organization network (Ad Hoc networks) etc..Preferably, the equipment Can also be run on the user equipment, the network equipment or user equipment and the network equipment, the network equipment, touch terminal or The network equipment is integrated the program in constituted equipment by network with touch terminal.
Certainly, those skilled in the art will be understood that above equipment is only for example, other are existing or are likely to occur from now on Equipment be such as applicable to the application, should also be included within the application protection domain, and be incorporated herein by reference herein.
In the description of the present application, the meaning of " plurality " is two or more, unless otherwise specifically defined.
Fig. 1 shows a kind of side being used to share e-book at the first user equipment end according to the application one embodiment Method flow chart.The method comprising the steps of S11, step S12, step S13, wherein in step s 11, the first user equipment obtains Distribute to the first user, about target electronic book share token information;In step s 12, the first user equipment is according to institute State target electronic book and the e-book sharing information for sharing token information generation about the target electronic book, wherein institute It states access identities information that e-book sharing information includes the target electronic book and described shares token information;In step S13 In, the e-book sharing information is shared with second user by the first user equipment.Herein, the first user equipment includes but unlimited The mobile electronic product of human-computer interaction (such as human-computer interaction is carried out by touch tablet) can be carried out with user in any type, such as Smart mobile phone, tablet computer etc.;It includes the use statistical data according to the first user (such as to the point of e-book to share token information Praise, forward, comment on) information for sharing the target electronic book is obtained, it is inferior can to share the target electronic book 3 by such as the first user; E-book sharing information includes the sharing information shown in the form of image or character by data encoding, such as to share two dimension Code shares the e-book sharing information that the forms such as link are shown;Access identities information includes by effective, standard coding information To obtain target electronic book, such as the access link of the International Standard Book Number of e-book, e-book;In some embodiments, Second user includes not buying the user of the e-book.
For example, the first user equipment calls use statistical data about the first user, acquisition distribute to the first user, (such as about target electronic book《Xx stories》) share token information;The first user equipment is according to e-book in some embodiments 《Xx stories》And first user can indefinitely share the e-book 3 times share token information, pass through data encoding and generate point The e-book sharing information enjoyed Quick Response Code, share the forms such as link, wherein e-book sharing information includes the access of the e-book Identification information (such as title《Xx stories》) and the first user can indefinitely share the e-book 3 times share token information;? In some embodiments, the first user equipment is shared with second user by other applications such as short message, wechat, QQ, mails, or should E-book sharing information is displayed for second user in the first user equipment and is read by its user equipment scans.In some implementations In example, sharing token information, to include but not limited to the first user can indefinitely share e-book《Xx stories》3 times, the first user It can be in today 8:00-17:Share e-book infinitely in 00 period《Xx stories》Or first user can be within this moon Share e-book《Xx stories》5 is inferior.
In some embodiments, the access identities information of target electronic book described in this method includes but not limited to following appoint One:The e-book identification information of the target electronic book;Described in the e-book identification information of the target electronic book and offer The network equipment information of target electronic book;The access link information of the target electronic book.Herein, e-book identification information includes It can uniquely, definitely identify information, such as the title of e-book, International Standard Book Number of the e-book etc..
Example as above, the first user equipment is according to the target electronic book《Xx stories》And first user can indefinitely share The e-book 3 times shares token information;The e-book sharing information for sharing quick response code form is generated by data encoding, one In a little embodiments, the e-book sharing information includes the e-book identification information of target electronic book, as the e-book title, The International Standard Book Number of the e-book, number of the e-book etc..For example, the e-book sharing information includes target electronic book E-book identification information and the network equipment information of the target electronic book is provided, such as include the title of the e-book《Xx stories》 And provide the e-book《Xx stories》Network device server model ThinkServer RD450.In another example the electronics Book sharing information includes the access link information of the target electronic book, such as includes the e-book that network supplier provides《Xx events Thing》Access link informationhttps://www.xyz.cn/dp/B00NBT68SA/ref
Those skilled in the art will be understood that the content of above-mentioned access identities information is only for example, existing or from now on Be likely to occur other contents of access identities information, be such as applicable to the application all should include within the scope of protection of this application, And it is incorporated herein by reference herein.
In some embodiments, this method step S11 includes the target electricity that the first user equipment obtains the first user purchase The philosophical works and the target electronic book share token information.
For example, the first user equipment calls the first user to buy the record of target electronic book, obtaining the target electronic book is 《Xx stories》;The use statistical data for calling the first user, is finally somebody's turn to do《Xx stories》E-book shares token information " One user can share e-book within this moon《Xx stories》5 times ".In some embodiments, the use statistics of the first user Data include but not limited to user gradation (such as VIP1 i.e. 1 grade of member), user's like time (such as like time is 500 times), use Family hop count (such as hop count is 200 times).
In some embodiments, this method step S11 includes the target electricity that the first user equipment obtains the first user purchase The philosophical works;First user equipment is that first user distributes to the use operation of the target electronic book according to first user The target electronic book shares token information.Herein, the first user includes first to the use operation of the target electronic book User thumbs up the comment operation etc. of operation, the first user to the target electronic book to the target electronic book.
For example, the first user equipment calls the first user to buy the record of target electronic book, and obtain target electronic book Title is《Xx stories》, in some embodiments, the first user equipment is according to the first user couple《Xx stories》Thumb up, be first The token information of sharing that user distributes the e-book is that the first user can be in today 8:00-17:Divide infinitely in 00 period Enjoy e-book《Xx stories》Or first user equipment according to the first user couple《Xx stories》Book review, for the first user distribute The e-book share token information be the first user can indefinitely share e-book《Xx stories》3 times.
Those skilled in the art will be understood that the mode of use operation of above-mentioned first user to the target electronic book only To illustrate, other manner that is existing or being likely to occur use operation of first user to the target electronic book from now on, such as It should includes within the scope of protection of this application, and to be incorporated herein by reference herein to be applicable to the application all.
In some embodiments, this method step S11 includes the target electricity that the first user equipment obtains the first user purchase The philosophical works and the multiple of target electronic book share token information;Wherein, the step S12 includes:First user equipment according to The target electronic book and each multiple e-book sharing informations for sharing token information generation about the target electronic book, In, each e-book sharing information include the target electronic book access identities information and one described in share token information.
For example, the first user equipment obtains the target electronic book of the first user purchase《Xx stories》And the target electronic book is more It is a to share token information, such as share token information 1, shares token information 2, shares token information 3;Wherein share token information 1 It can indefinitely share e-book for the first user《Xx stories》3 times, it is that the first user can be in today 8 to share token information 2: 00-17:Share e-book infinitely in 00 period《Xx stories》, it is that the first user can within this moon to share token information 3 To share e-book《Xx stories》5 times;First user equipment is according to the target electronic book《Xx stories》And share token information 1-3 Generate 3 e-book sharing informations of the target electronic book, respectively e-book sharing information 1, e-book sharing information 2, E-book sharing information 3, wherein e-book sharing information 1 include the title such as the e-book《Xx stories》, the e-book state Border International Standard Book Number (such as ISBN978-0-7334-2607-4), the e-book number NO598 access identities information and first User can indefinitely share e-book《Xx stories》Share token information for 3 times;E-book sharing information 2 includes the e-book Title《Xx stories》And provide the e-book《Xx stories》Network device server model ThinkServer RD450 Access identities information and the first user can be in today 8:00-17:Share e-book infinitely in 00 period《Xx stories》's Share token information;E-book sharing information 3 includes the e-book《Xx stories》Access link information behttps:// www.xyz.cn/dp/B00NBT68SA/refAccess identities information and the first user can share e-book within this moon 《Xx stories》Share token information for 5 times.In some embodiments, access identities information includes but not limited to the target electronic The e-book identification information of book;The e-book identification information of the target electronic book and the network for providing the target electronic book are set Standby information;The access link information of the target electronic book.
In some embodiments, this method step S13 is installed on first user including the utilization of the first user equipment and sets The e-book sharing information is shared with second user by standby third party's social networking application.Herein, third party's social networking application includes But it is not limited to short message application, wechat application, QQ applications.
For example, the first wechat application installed with equipment utilization in real time shares the e-book of the target electronic book of generation Information Sharing to system of real name second user, such as the first user chatted by wechat application with second user, first The e-book sharing information for sharing link form of generation is shared with second user by user in real time;For another example, the first user sets It is standby that the electronics sharing information of the target electronic book of generation is shared with by the second use by the QQ applications of installation or short message application Family, in some embodiments, e-book sharing information include that e-book shares link, e-book shares Quick Response Code etc..
Those skilled in the art will be understood that the content of above-mentioned third party's social networking application is only for example, existing or modern It is likely to occur other contents of third party's social networking application afterwards, the protection domain of the application should be included in by being such as applicable to the application all It is interior, and be incorporated herein by reference herein.
Fig. 2 shows a kind of methods being used to share e-book in second user equipment end according to the application one embodiment Flow chart.The method comprising the steps of S21, step S22, wherein in the step s 21, second user equipment is according to the first user point The e-book sharing information enjoyed sends the access request about target electronic book to the network equipment, wherein the e-book is shared Information includes the access identities information of the target electronic book and shares token information, and the access request includes the e-book The access identities information of sharing information or the target electronic book and share token information;In step S22, second user equipment Receive the target electronic book that the network equipment is returned based on the access request.
For example, the e-book sharing information (such as e-book shares link) that second user equipment is shared according to the first user, The access request about the e-book is sent to the network equipment, wherein the e-book sharing information includes the access of the e-book Identification information and share token information, respectively the e-book《Xx stories》Access link information behttps:// www.xyz.cn/dp/B00NBT68SA/ref, the first user can share e-book within this moon《Xx stories》5 times;The visit Ask that request includes e-book sharing information;Second user equipment receives the target that the network equipment is returned based on the access request E-book《Xx stories》.In some embodiments, the access request includes the access that target electronic book is shown with absolute version Identification information and share token information.
In some embodiments, the e-book sharing information that first user shares in the method includes target electronic The access identities information of book and share token information, and accesses the triggering information of the target electronic book;Wherein, the step S21 includes:Access request according to the triggering information to network equipment transmission about the target electronic book, wherein described Access request includes the access identities information of the e-book sharing information or the target electronic book and shares token information.This Place, triggering information include the information of the forms such as automatic word, the picture for realizing quick response.Herein, the access request includes The access identities information and share token information that target electronic book is shown with absolute version.
For example, the e-book sharing information that second user equipment is shared according to the first user sends target electricity to the network equipment The access request of the philosophical works, wherein the e-book sharing information that the first user shares is to share the form of Quick Response Code, including the electronics Book《Xx stories》Access link information behttps://www.xyz.cn/dp/B00NBT68SA/refAccess identification information And first user can share e-book within this moon《Xx stories》Share token information, and access the e-book for 5 times Triggering information:Second user device scan sends access request automatically after sharing Quick Response Code.In some embodiments, the access Request includes the access identities information of the e-book sharing information or the e-book book and shares token information.
In some embodiments, this method step S21 include sub-step S211, sub-step S212, sub-step S213 (not Show), wherein in sub-step S211, second user equipment extracts quilt from the e-book sharing information that the first user shares The access identities information for the target electronic book shared and share token information;In sub-step S212, second user equipment generates Access request about the target electronic book, wherein the access request includes the access identities information and described shares Token information;In sub-step S213, second user equipment asks request to described in network equipment transmission.
For example, the form shown in second user equipment directly the first user equipment of scanning is to share the e-book of Quick Response Code Sharing information, it is respectively target electricity therefrom to extract the access identities information for the target electronic book shared and share token information The access link information of the philosophical workshttps://www.xyz.cn/dp/B00NBT68SA/ref, the first user can be in today 8: 00-17:Share the target electronic book in 00 period infinitely;The access that second user equipment generates the target electronic book is asked It asks, wherein the access request includes the access identities information read and shares token information;Second user equipment is to the network equipment Send the access request.
In application scenarios as shown in Figure 5, second user equipment (such as shares two dimension from the e-book sharing information received Code form) in read the access identities information of target electronic book shared and share token information be respectively the target electronic book Title《Xx stories》, the first user can indefinitely share the e-book《Xx stories》3 times;Second user equipment generates the electronics Book《Xx stories》Access request, wherein the access request include read access identities information and share token information;Second User equipment sends the access request to the network equipment.
In some embodiments, this method sub-step S212 includes:Second user equipment is according to user to target electricity The access operation of the philosophical works generates the access request about the target electronic book, wherein the access request includes the access Identification information and described share token information.
For example, second user equipment gives birth to the manual access operation of target electronic book as after clicking manually based on user At the access request of the target electronic book, wherein the access request includes target electronic book title《Xx stories》Access identities Information and the first user can indefinitely share the e-book《Xx stories》Share token information for 3 times.In some embodiments, it visits Ask operation include but not limited to by click the operation of execution, by double-click the operation executed, the operation executed by long-press or The operation executed by right click.
In some embodiments, this method sub-step S211 includes:Second user equipment receives the electricity that the first user shares Philosophical works sharing information;The access identities information for the target electronic book shared is extracted from the e-book sharing information and is shared Token information.
For example, second user equipment receives the e-book sharing information that the first user shares, such as share the electricity of link form Philosophical works sharing information;Second user equipment extracts the access identities for the target electronic book shared from the e-book sharing information Information and shares token information and be respectively:The access link information of e-bookhttps://www.xyz.cn/dp/ B00NBT68SA/ref, the first user can be in today 8:00-17:Share the target electronic book in 00 period infinitely.
In some embodiments, this method sub-step S211 includes:Second user equipment is by scanning the first user the Share the e-book sharing information of display on one user equipment, extract the access identities information for the target electronic book shared and divides Enjoy token information.
For example, second user equipment is shown with sharing quick response code form on the first user device by scanning the first user E-book sharing information, therefrom extract the access identities information for the target electronic book shared and share token information and be respectively The access link information of the target electronic bookhttps://www.xyz.cn/dp/B00NBT68SA/ref, the first user can be Today 8:00-17:Share the target electronic book in 00 period infinitely.
Fig. 3 shows a kind of method flow being used to share e-book at network equipment end according to the application one embodiment Figure.The method comprising the steps of S31, step S32, step S33, wherein in step S31, the network equipment receives second user and sets The access request about target electronic book that preparation is sent, wherein the access request includes the access mark of the target electronic book Know information and shares token information;In step s 32, the network equipment shares the token information inspection access request according to Whether the target electronic book may have access to;In step S33, if the access request may have access to the target electronic book, network The target electronic book is provided to the second user equipment by equipment.In some embodiments, access identities information include but It is not limited to the e-book identification information of the target electronic book;Described in the e-book identification information of the target electronic book and offer The network equipment information of target electronic book;The access link information of the target electronic book;Wherein, e-book identification information includes It can uniquely, definitely identify information, such as the title of e-book, International Standard Book Number of the e-book etc..
For example, the network equipment receive second user equipment send about target electronic book《Xx stories》Access request, The wherein described access request includes the e-book《Xx stories》Access identities information and share token information, such as include the electronics The access link information of bookhttps://www.xyz.cn/dp/B00NBT68SA/refAnd first user can be within this moon Share e-book《Xx stories》Share token information for 5 times;The network equipment can share electricity according to the first user within this moon The philosophical works《Xx stories》5 token informations of sharing examine whether the access request can access the e-book《Xx stories》, As the first user can share e-book within this moon《Xx stories》5 times, share 4 times, network equipment verification second The access request about the e-book that user equipment is sent just is that second user equipment is shared according to the 5th of the first user It sends, i.e., the network equipment, which verifies the access request, can access the target electronic book;The network equipment is by the e-book《Xx events Thing》It is provided to second user equipment.
In some embodiments, this method step S33 includes:If the access request may have access to the target electronic book, The network equipment is provided to described according to target electronic book described in the access identities acquisition of information, and by the target electronic book Two user equipmenies.
For example, the access request about target electronic book that network equipment verification second user equipment is sent can access this Target electronic book《Xx stories》;The network equipment is according to access identities information:The title of target electronic book《Xx stories》And e-book Access link informationhttps://www.xyz.cn/dp/B00NBT68SA/refThe target electronic book is finally obtained, and should E-book《Xx stories》It is supplied to second user equipment.
In some embodiments, this method step S31 includes:The network equipment receives second user equipment based on e-book point Enjoy the access request about target electronic book of information transmission, wherein the e-book sharing information includes the target electronic The access identities information of book and share token information, the access request includes the e-book sharing information.
For example, the network equipment receives the target electronic book that second user equipment is sent based on e-book sharing information《Xx events Thing》Access request, wherein access request includes the e-book sharing information of the e-book, which includes The e-book accesses link informationhttps://www.xyz.cn/dp/B00NBT68SA/refAccess identities information and first User can share e-book within this moon《Xx stories》Share token information for 5 times.
In some embodiments, this method step S32 includes:The network equipment extracts institute from the e-book sharing information That states target electronic book shares token information;Examine the access request whether addressable described according to the token information of sharing Target electronic book.
For example, the network equipment extract the target electronic book from the e-book sharing information of target electronic book share token Information is the first user can share e-book within this moon《Xx stories》5 times;Network equipment inspection includes the e-book point Whether the access request for enjoying information may have access to e-book《Xx stories》;As the first user can share e-book within this moon 《Xx stories》5 times, share 4 times, the access about the e-book that network equipment verification second user equipment is sent is asked Ask that be just second user equipment share transmission according to the 5th of the first user, i.e., the network equipment verify the access request can To access the target electronic book.
Fig. 4 shows a kind of method flow diagram for sharing e-book according to the application one embodiment.This method packet It includes:First user equipment obtain distribute to the first user, about target electronic book share token information;
First user equipment is generated according to the target electronic book and the token information of sharing about the target The e-book sharing information of e-book, wherein the e-book sharing information includes the access identities letter of the target electronic book Breath and described share token information;
The e-book sharing information is shared with second user by first user equipment;
The e-book sharing information that the second user equipment is shared according to the first user is sent to the network equipment about mesh Mark e-book access request, wherein the e-book sharing information include the target electronic book access identities information and Share token information, the access request includes the access identities information of the e-book sharing information or the target electronic book And share token information;
The network equipment receives the access request about target electronic book that second user equipment is sent, wherein described Access request includes the access identities information of the target electronic book and shares token information;
The network equipment shares token information according to and examines whether the access request may have access to the target electricity The philosophical works;
If the access request may have access to the target electronic book, the target electronic book is provided to by the network equipment The second user equipment;
The second user equipment receives the target electronic book that the network equipment is returned based on the access request.
Present invention also provides a kind of computer readable storage medium, the computer readable storage medium
It is stored with computer code, when the computer code is performed, such as preceding any one of them method is performed.
Present invention also provides a kind of computer program products, when the computer program product is executed by computer equipment When, such as preceding any one of them method is performed.
Present invention also provides a kind of computer equipment, the computer equipment includes:
One or more processors;
Memory, for storing one or more computer programs;
When one or more of computer programs are executed by one or more of processors so that it is one or Multiple processors realize such as preceding any one of them method.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt With application-specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In one embodiment In, the software program of the application can be executed by processor to realize steps described above or function.Similarly, the application Software program (including relevant data structure) can be stored in computer readable recording medium storing program for performing, for example, RAM memory, Magnetic or optical driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the application, example Such as, coordinate to execute the circuit of each step or function as with processor.
In addition, the part of the application can be applied to computer program product, such as computer program instructions, when its quilt When computer executes, by the operation of the computer, it can call or provide according to the present processes and/or technical solution. Those skilled in the art will be understood that the existence form of computer program instructions in computer-readable medium includes but not limited to Source file, executable file, installation package file etc., correspondingly, the mode that computer program instructions are computer-executed include but It is not limited to:The computer directly execute the instruction or the computer compile the instruction after execute program after corresponding compiling again, Either the computer reads and executes the instruction or after the computer reads and install and execute corresponding installation again after the instruction Program.Here, computer-readable medium can be the arbitrary available computer readable storage medium accessed for computer or Communication media.
Communication media includes thereby comprising such as computer-readable instruction, data structure, program module or other data Signal of communication is transmitted to the medium of another system from a system.Communication media may include having the transmission medium led (such as electric Cable and line (for example, optical fiber, coaxial etc.)) and can propagate wireless (not having the transmission the led) medium of energy wave, such as sound, electricity Magnetic, RF, microwave and infrared.Computer-readable instruction, data structure, program module or other data can be embodied as example wireless Medium (such as carrier wave or be such as embodied as spread spectrum technique a part similar mechanism) in modulated message signal. Term " modulated message signal " refers to that one or more feature is modified or is set in a manner of coding information in the signal Fixed signal.Modulation can be simulation, digital or Hybrid Modulation Technology.
As an example, not a limit, computer readable storage medium may include such as computer-readable finger for storage Enable, the volatile and non-volatile that any method or technique of the information of data structure, program module or other data is realized, can Mobile and immovable medium.For example, computer readable storage medium includes, but are not limited to volatile memory, such as with Machine memory (RAM, DRAM, SRAM);And nonvolatile memory, such as flash memory, various read-only memory (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memory (MRAM, FeRAM);And magnetic and optical storage apparatus (hard disk, Tape, CD, DVD);Or other currently known media or Future Development can store the computer used for computer system Readable information/data.
Here, including a device according to one embodiment of the application, which includes for storing computer program The memory of instruction and processor for executing program instructions, wherein when the computer program instructions are executed by the processor When, trigger method and/or technology scheme of the device operation based on aforementioned multiple embodiments according to the application.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie In the case of without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power Profit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent requirements of the claims Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This Outside, it is clear that one word of " comprising " is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in device claim is multiple Unit or device can also be realized by a unit or device by software or hardware.The first, the second equal words are used for table Show title, and does not represent any particular order.

Claims (19)

1. a kind of be used to share the method for e-book at the first user equipment end, wherein this method includes:
Obtain distribute to the first user, about target electronic book share token information;
According to the target electronic book and it is described share token information and generate share letter about the e-book of the target electronic book Breath, wherein the e-book sharing information includes the access identities information of the target electronic book and described shares token information;
The e-book sharing information is shared with second user.
2. according to the method described in claim 1, wherein, the access identities information of the target electronic book includes following at least appointing One:
The e-book identification information of the target electronic book;
The e-book identification information of the target electronic book and the network equipment information that the target electronic book is provided;
The access link information of the target electronic book.
3. method according to claim 1 or 2, wherein it is described obtain distribute to the first user, about target electronic book Token information of sharing include:
The target electronic book and the target electronic book for obtaining the first user purchase share token information.
4. according to the method described in claim 3, wherein, the target electronic book for obtaining the first user purchase and described The token information of sharing of target electronic book includes:
Obtain the target electronic book of the first user purchase;
It is that first user distributes the target electronic to the use operation of the target electronic book according to first user Book shares token information.
5. method according to claim 3 or 4, wherein the target electronic book for obtaining the first user purchase, Yi Jisuo The token information of sharing for stating target electronic book includes:
The target electronic book and the multiple of target electronic book for obtaining the first user purchase share token information;
Wherein, described according to the target electronic book and the token information of sharing generates electronics about the target electronic book Book sharing information, wherein the e-book sharing information includes the access identities information of the target electronic book and described shares Token information includes:
According to the target electronic book and each multiple e-book point for sharing token information generation about the target electronic book Enjoy information, wherein each e-book sharing information include the target electronic book access identities information and one described in share Token information.
6. the method according to any one of claims 1 to 5, wherein, described be shared with the e-book sharing information Second user includes:
The e-book sharing information is shared with second using the third party's social networking application for being installed on first user equipment User.
7. a kind of be used to share the method for e-book in second user equipment end, wherein this method includes:
The e-book sharing information shared according to the first user sends the access request about target electronic book to the network equipment, In, the e-book sharing information includes the access identities information of the target electronic book and shares token information, the access Request includes the access identities information of the e-book sharing information or the target electronic book and shares token information;
Receive the target electronic book that the network equipment is returned based on the access request.
8. according to the method described in claim 7, wherein, the e-book sharing information that first user shares includes target electricity The access identities information of the philosophical works and share token information, and accesses the triggering information of the target electronic book;
Wherein, the e-book sharing information shared according to the first user sends the visit about target electronic book to the network equipment Ask request, wherein the e-book sharing information includes the access identities information of the target electronic book and shares token information, The access request include the access identities information of the e-book sharing information or the target electronic book and share token letter Breath includes:
Access request according to the triggering information to network equipment transmission about the target electronic book, wherein the access Request includes the access identities information of the e-book sharing information or the target electronic book and shares token information.
9. according to the method described in claim 7, wherein, the e-book sharing information shared according to the first user is to network Equipment sends the access request about target electronic book, wherein the e-book sharing information includes the target electronic book Access identities information and share token information, the access request includes the e-book sharing information or the target electronic book Access identities information and share token information and include:
The access identities information for the target electronic book shared is extracted from the e-book sharing information that the first user shares and is divided Enjoy token information;
Generate access request about the target electronic book, wherein the access request include the access identities information and It is described to share token information;
Request is asked to described in network equipment transmission.
10. according to the method described in claim 9, wherein, access request of the generation about the target electronic book, In, the access request includes the access identities information and the token information of sharing includes:
According to user to the access operation of the target electronic book, the access request about the target electronic book is generated, wherein The access request includes the access identities information and described shares token information.
11. method according to claim 9 or 10, wherein in the e-book sharing information shared from the first user It extracts the access identities information for the target electronic book shared and shares token information and include:
Receive the e-book sharing information that the first user shares;
The access identities information for the target electronic book shared is extracted from the e-book sharing information and shares token information.
12. method according to claim 9 or 10, wherein in the e-book sharing information shared from the first user It extracts the access identities information for the target electronic book shared and shares token information and include:
Share the e-book sharing information of display on the first user device by scanning the first user, extracts the target shared The access identities information of e-book and share token information.
13. a kind of be used to share the method for e-book at network equipment end, wherein this method includes:
Receive the access request about target electronic book that second user equipment is sent, wherein the access request includes described The access identities information of target electronic book and share token information;
Examine whether the access request may have access to the target electronic book according to the token information of sharing;
If the access request may have access to the target electronic book, the target electronic book is provided to the second user and is set It is standby.
14. according to the method for claim 13, wherein if the access request may have access to the target electronic book, The target electronic book, which is provided to the second user equipment, includes:
If the access request may have access to the target electronic book, according to target electronic described in the access identities acquisition of information Book, and the target electronic book is provided to the second user equipment.
15. the method according to claim 13 or 14, wherein described to receive the electric about target of second user equipment transmission The access request of the philosophical works, wherein the access request include the access identities information of the target electronic book and share token letter Breath includes:
Receive the access request about target electronic book that second user equipment is sent based on e-book sharing information, wherein institute State the access identities information and share token information that e-book sharing information includes the target electronic book, the access request packet Include the e-book sharing information.
16. according to the method for claim 15, wherein share token information described in the basis and examine the access request The target electronic school bag whether is may have access to include:
That the target electronic book is extracted from the e-book sharing information shares token information;
Examine whether the access request may have access to the target electronic book according to the token information of sharing.
17. a kind of method for sharing e-book, wherein the method includes:
First user equipment obtain distribute to the first user, about target electronic book share token information;
First user equipment is generated according to the target electronic book and the token information of sharing about the target electronic The e-book sharing information of book, wherein the e-book sharing information include the target electronic book access identities information and It is described to share token information;
The e-book sharing information is shared with second user by first user equipment;
The e-book sharing information that the second user equipment is shared according to the first user is sent to the network equipment about target electricity The access request of the philosophical works, wherein the e-book sharing information includes the access identities information of the target electronic book and shares Token information, the access request include the access identities information of the e-book sharing information or the target electronic book and divide Enjoy token information;
The network equipment receives the access request about target electronic book that second user equipment is sent, wherein the access Request includes the access identities information of the target electronic book and shares token information;
The network equipment shares token information according to and examines whether the access request may have access to the target electronic book;
If the access request may have access to the target electronic book, the target electronic book is provided to described by the network equipment Second user equipment;
The second user equipment receives the target electronic book that the network equipment is returned based on the access request.
18. a kind of for sharing the equipment of e-book, wherein the equipment includes:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute the operation such as any one of claim 1 to 17 the method.
19. a kind of includes the computer-readable medium of instruction, described instruction makes system carry out following operation, holds when executed The operation of row any one of such as claim 1 to 17 the method.
CN201810294130.9A 2018-03-30 2018-03-30 A kind of method and apparatus for sharing e-book Pending CN108777696A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810294130.9A CN108777696A (en) 2018-03-30 2018-03-30 A kind of method and apparatus for sharing e-book

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810294130.9A CN108777696A (en) 2018-03-30 2018-03-30 A kind of method and apparatus for sharing e-book

Publications (1)

Publication Number Publication Date
CN108777696A true CN108777696A (en) 2018-11-09

Family

ID=64033574

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810294130.9A Pending CN108777696A (en) 2018-03-30 2018-03-30 A kind of method and apparatus for sharing e-book

Country Status (1)

Country Link
CN (1) CN108777696A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075278A (en) * 2006-05-18 2007-11-21 华为技术有限公司 Method for presenting digital content use authorization and authorization releaser
CN103379098A (en) * 2012-04-19 2013-10-30 华为技术有限公司 Content sharing method, device and network system thereof
CN104618217A (en) * 2014-03-24 2015-05-13 腾讯科技(北京)有限公司 Method, terminal, server and system for sharing resource
CN104917807A (en) * 2015-03-19 2015-09-16 腾讯科技(深圳)有限公司 Resource transfer method, apparatus and system
US20160142473A1 (en) * 2014-11-15 2016-05-19 Optim Corporation E-book Share Server, the method and the program
CN106534277A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Data sharing method and device
CN106599228A (en) * 2016-12-19 2017-04-26 掌阅科技股份有限公司 Data sharing method and apparatus, terminal device and server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075278A (en) * 2006-05-18 2007-11-21 华为技术有限公司 Method for presenting digital content use authorization and authorization releaser
CN103379098A (en) * 2012-04-19 2013-10-30 华为技术有限公司 Content sharing method, device and network system thereof
CN104618217A (en) * 2014-03-24 2015-05-13 腾讯科技(北京)有限公司 Method, terminal, server and system for sharing resource
US20160142473A1 (en) * 2014-11-15 2016-05-19 Optim Corporation E-book Share Server, the method and the program
CN104917807A (en) * 2015-03-19 2015-09-16 腾讯科技(深圳)有限公司 Resource transfer method, apparatus and system
CN106534277A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Data sharing method and device
CN106599228A (en) * 2016-12-19 2017-04-26 掌阅科技股份有限公司 Data sharing method and apparatus, terminal device and server

Similar Documents

Publication Publication Date Title
US11601398B2 (en) Multiplexed data exchange portal interface in scalable data networks
CN108305072A (en) Dispose method, equipment and the computer storage media of block chain network
US9037571B1 (en) Topology service using closure tables and metagraphs
US10572381B2 (en) Updating cache using two bloom filters
CN108170612B (en) Automatic testing method and device and server
CN110266505A (en) A kind of method and apparatus managing session group
CN109359237A (en) It is a kind of for search for boarding program method and apparatus
CN110334299A (en) A kind of pop-up methods of exhibiting, device and electronic equipment monitored based on address field
CN110290557A (en) A kind of method and apparatus of the interior page-tag of load application
CN106651422A (en) Data processing method and data processing device
Sahinoglu et al. CLOUD computing
US10027692B2 (en) Modifying evasive code using correlation analysis
US9710575B2 (en) Hybrid platform-dependent simulation interface
CN116601630A (en) Generating defensive target database attacks through dynamic honey database responses
CN109711840B (en) Transaction data processing method and device and storage medium
CN109345416A (en) It is a kind of for recording the method and apparatus of the adduction relationship between works
Pan et al. Gray computing: A framework for computing with background javascript tasks
CN108462757A (en) A kind of method and apparatus for sharing e-book
CN104967631B (en) A kind of method and apparatus for sharing cloud storage content
CN108777696A (en) A kind of method and apparatus for sharing e-book
CN110443641A (en) A kind of method and apparatus of the reading permission managing novel chapters and sections and comment information
CN107231664B (en) A kind of method and apparatus for user equipment progress flow control
CN110415131A (en) A kind of method and apparatus for realizing social interaction between author and reader
CN114185592A (en) Multi-version coexisting target item access method, device, equipment and storage medium
CN108985758B (en) Data processing method, data processing system and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181109

RJ01 Rejection of invention patent application after publication