CN108777696A - A kind of method and apparatus for sharing e-book - Google Patents
A kind of method and apparatus for sharing e-book Download PDFInfo
- Publication number
- CN108777696A CN108777696A CN201810294130.9A CN201810294130A CN108777696A CN 108777696 A CN108777696 A CN 108777696A CN 201810294130 A CN201810294130 A CN 201810294130A CN 108777696 A CN108777696 A CN 108777696A
- Authority
- CN
- China
- Prior art keywords
- information
- book
- target electronic
- electronic book
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 68
- 230000015654 memory Effects 0.000 claims description 24
- 230000005611 electricity Effects 0.000 claims description 15
- 238000003860 storage Methods 0.000 claims description 15
- 230000005540 biological transmission Effects 0.000 claims description 10
- 239000000284 extract Substances 0.000 claims description 9
- 230000006855 networking Effects 0.000 claims description 5
- PEDCQBHIVMGVHV-UHFFFAOYSA-N Glycerine Chemical class OCC(O)CO PEDCQBHIVMGVHV-UHFFFAOYSA-N 0.000 description 12
- 238000004590 computer program Methods 0.000 description 10
- 230000004044 response Effects 0.000 description 8
- 230000005291 magnetic effect Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 230000003993 interaction Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000009434 installation Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 210000003813 thumb Anatomy 0.000 description 2
- 101000953492 Homo sapiens Inositol hexakisphosphate and diphosphoinositol-pentakisphosphate kinase 1 Proteins 0.000 description 1
- 102100037739 Inositol hexakisphosphate and diphosphoinositol-pentakisphosphate kinase 1 Human genes 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000005294 ferromagnetic effect Effects 0.000 description 1
- 210000003811 finger Anatomy 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
Abstract
The purpose of the application be to provide it is a kind of for sharing the method and apparatus of e-book, user equipment obtain distribute to the first user, about target electronic book share token information;User equipment generates e-book sharing information about the target electronic book according to the target electronic book and the token information of sharing, wherein the e-book sharing information includes the access identities information of the target electronic book and described shares token information;The e-book sharing information is shared with second user by user equipment;Compared with prior art, the application realizes user and efficiently shares anywhere or anytime, significantly improves user experience, while ensuring that the copyright of the e-book is protected by the management of e-book platform.
Description
Technical field
This application involves the communications field more particularly to a kind of technologies for sharing e-book.
Background technology
With the development of the times, collect in word, picture, sound, image etc. and be dissolved in integrated E-book reader increasingly
It is welcome by everybody, the more books of purchase for keeping Ebook user more convenient with its notable advantage;With e-book
A large amount of to occur, the unnecessary certain e-book of purchase of user, sharing for e-book sometimes just becomes particularly important;E-book point at present
The contents such as abstract, catalogue can only be shared by enjoying, and other users, which go for the e-book shared, then to be needed to buy the account etc. of oneself
Deng, therefore occur conveniently and efficiently obtaining the problems such as sharing, and then the application body of user is limited to a certain extent
It tests.
Invention content
The purpose of the application is to provide the method and apparatus that a kind of user shares e-book.
According to the one side of the application, a kind of method being used to share e-book at the first user equipment end is provided,
This method includes:Obtain distribute to the first user, about target electronic book share token information;According to the target electronic
Book and the e-book sharing information for sharing token information generation about the target electronic book, wherein the e-book point
It enjoys access identities information that information includes the target electronic book and described shares token information;By the e-book sharing information
It is shared with second user.
According to the one side of the application, a kind of method for sharing e-book in second user equipment end subscriber is provided,
This method includes:The e-book sharing information shared according to the first user sends the access about target electronic book to the network equipment
Request, wherein the e-book sharing information includes the access identities information of the target electronic book and shares token information, institute
State the access identities information and share token information that access request includes the e-book sharing information or the target electronic book;
Receive the target electronic book that the network equipment is returned based on the access request.
According to the one side of the application, a kind of method being used to share e-book at network equipment end, the party are provided
Method includes:Receive the access request about target electronic book that second user equipment is sent, wherein the access request includes institute
It states the access identities information of target electronic book and shares token information;The access request is examined according to the token information of sharing
Whether the target electronic book may have access to;If the access request may have access to the target electronic book, by the target electronic book
It is provided to the second user equipment.
According to further aspect of the application, a kind of equipment with e-book is shared is provided, which includes processor;
And it is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed
Execute the first user equipment obtain distribute to the first user, about target electronic book share token information;Described first uses
Family equipment according to the target electronic book and it is described share token information and generate share about the e-book of the target electronic book
Information, wherein the e-book sharing information includes that the access identities information of the target electronic book and the token of sharing are believed
Breath;The e-book sharing information is shared with second user by first user equipment;The second user equipment is according to
The e-book sharing information that one user shares sends the access request about target electronic book to the network equipment, wherein the electricity
Philosophical works sharing information includes the access identities information of the target electronic book and shares token information, and the access request includes institute
It states the access identities information of e-book sharing information or the target electronic book and shares token information;The network equipment receives
The access request about target electronic book that second user equipment is sent, wherein the access request includes the target electronic
The access identities information of book and share token information;The network equipment shares token information according to and the access is examined to ask
Seeking Truth is no to may have access to the target electronic book;If the access request may have access to the target electronic book, the network equipment will
The target electronic book is provided to the second user equipment;The second user equipment receives the network equipment based on described
The target electronic book that access request returns.
According to the one side of the application, it includes the computer-readable medium instructed to provide a kind of, and described instruction is in quilt
System is made to carry out when execution:First user equipment obtain distribute to the first user, about target electronic book share token
Information;First user equipment is generated according to the target electronic book and the token information of sharing about the target electronic
The e-book sharing information of book, wherein the e-book sharing information include the target electronic book access identities information and
It is described to share token information;The e-book sharing information is shared with second user by first user equipment;Described second
The e-book sharing information that user equipment is shared according to the first user sends to the network equipment and is asked about the access of target electronic book
It asks, wherein the e-book sharing information includes the access identities information of the target electronic book and shares token information, described
Access request includes the access identities information of the e-book sharing information or the target electronic book and shares token information;Institute
It states the network equipment and receives the access request about target electronic book that second user equipment is sent, wherein the access request packet
It includes the access identities information of the target electronic book and shares token information;The network equipment shares token information according to
Examine whether the access request may have access to the target electronic book;If the access request may have access to the target electronic book,
The target electronic book is provided to the second user equipment by the network equipment;The second user equipment receives the net
The target electronic book that network equipment is returned based on the access request.
Compared with prior art, the application obtains the target electronic book and its share power that user shares by user equipment
Limit, and then generate e-book sharing information and the e-book sharing information is shared with other users;Wherein share user's utilization
Its user equipment, which realizes, whenever and wherever possible, efficiently to be shared, and significantly improves user experience, while passing through the pipe of e-book platform
Reason ensures that the copyright of the e-book is protected.
Description of the drawings
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 shows a kind of method being used to share e-book at the first user equipment end according to the application one embodiment
Flow chart;
Fig. 2 shows a kind of methods being used to share e-book in second user equipment end according to the application one embodiment
Flow chart;
Fig. 3 shows a kind of method flow being used to share e-book at network equipment end according to the application one embodiment
Figure;
Fig. 4 shows a kind of method flow diagram for sharing e-book according to the application one embodiment;
Fig. 5 is shown according to the application scenarios schematic diagram in the application some embodiments.
Same or analogous reference numeral represents same or analogous component in attached drawing.
Specific implementation mode
The application is described in further detail below in conjunction with the accompanying drawings.
In a typical configuration of this application, terminal, the equipment of service network and trusted party include one or more
Processor (CPU), input/output interface, network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, magnetic tape disk storage or other magnetic storage apparatus or
Any other non-transmission medium can be used for storage and can be accessed by a computing device information.
The application meaning equipment includes but not limited to that user equipment, the network equipment or user equipment and the network equipment pass through
Network is integrated constituted equipment.The user equipment, which includes but not limited to any type, to carry out human-computer interaction with user
The mobile electronic product, such as smart mobile phone, tablet computer etc. of (such as human-computer interaction is carried out by touch tablet), the mobile electricity
Arbitrary operating system, such as android operating systems, iOS operating systems may be used in sub- product.Wherein, the network equipment
Including a kind of the electronic equipment of numerical computations and information processing can be carried out automatically according to the instruction for being previously set or storing,
Hardware includes but not limited to microprocessor, application-specific integrated circuit (ASIC), programmable logic device (PLD), field programmable gate
Array (FPGA), digital signal processor (DSP), embedded device etc..The network equipment includes but not limited to computer, net
The cloud that network host, single network server, multiple network server collection or multiple servers are constituted;Here, cloud is by being based on cloud meter
The a large amount of computers or network server for calculating (Cloud Computing) are constituted, wherein cloud computing is the one of Distributed Calculation
Kind, a virtual supercomputer being made of the computer collection of a group loose couplings.The network includes but not limited to interconnect
Net, wide area network, Metropolitan Area Network (MAN), LAN, VPN network, wireless self-organization network (Ad Hoc networks) etc..Preferably, the equipment
Can also be run on the user equipment, the network equipment or user equipment and the network equipment, the network equipment, touch terminal or
The network equipment is integrated the program in constituted equipment by network with touch terminal.
Certainly, those skilled in the art will be understood that above equipment is only for example, other are existing or are likely to occur from now on
Equipment be such as applicable to the application, should also be included within the application protection domain, and be incorporated herein by reference herein.
In the description of the present application, the meaning of " plurality " is two or more, unless otherwise specifically defined.
Fig. 1 shows a kind of side being used to share e-book at the first user equipment end according to the application one embodiment
Method flow chart.The method comprising the steps of S11, step S12, step S13, wherein in step s 11, the first user equipment obtains
Distribute to the first user, about target electronic book share token information;In step s 12, the first user equipment is according to institute
State target electronic book and the e-book sharing information for sharing token information generation about the target electronic book, wherein institute
It states access identities information that e-book sharing information includes the target electronic book and described shares token information;In step S13
In, the e-book sharing information is shared with second user by the first user equipment.Herein, the first user equipment includes but unlimited
The mobile electronic product of human-computer interaction (such as human-computer interaction is carried out by touch tablet) can be carried out with user in any type, such as
Smart mobile phone, tablet computer etc.;It includes the use statistical data according to the first user (such as to the point of e-book to share token information
Praise, forward, comment on) information for sharing the target electronic book is obtained, it is inferior can to share the target electronic book 3 by such as the first user;
E-book sharing information includes the sharing information shown in the form of image or character by data encoding, such as to share two dimension
Code shares the e-book sharing information that the forms such as link are shown;Access identities information includes by effective, standard coding information
To obtain target electronic book, such as the access link of the International Standard Book Number of e-book, e-book;In some embodiments,
Second user includes not buying the user of the e-book.
For example, the first user equipment calls use statistical data about the first user, acquisition distribute to the first user,
(such as about target electronic book《Xx stories》) share token information;The first user equipment is according to e-book in some embodiments
《Xx stories》And first user can indefinitely share the e-book 3 times share token information, pass through data encoding and generate point
The e-book sharing information enjoyed Quick Response Code, share the forms such as link, wherein e-book sharing information includes the access of the e-book
Identification information (such as title《Xx stories》) and the first user can indefinitely share the e-book 3 times share token information;?
In some embodiments, the first user equipment is shared with second user by other applications such as short message, wechat, QQ, mails, or should
E-book sharing information is displayed for second user in the first user equipment and is read by its user equipment scans.In some implementations
In example, sharing token information, to include but not limited to the first user can indefinitely share e-book《Xx stories》3 times, the first user
It can be in today 8:00-17:Share e-book infinitely in 00 period《Xx stories》Or first user can be within this moon
Share e-book《Xx stories》5 is inferior.
In some embodiments, the access identities information of target electronic book described in this method includes but not limited to following appoint
One:The e-book identification information of the target electronic book;Described in the e-book identification information of the target electronic book and offer
The network equipment information of target electronic book;The access link information of the target electronic book.Herein, e-book identification information includes
It can uniquely, definitely identify information, such as the title of e-book, International Standard Book Number of the e-book etc..
Example as above, the first user equipment is according to the target electronic book《Xx stories》And first user can indefinitely share
The e-book 3 times shares token information;The e-book sharing information for sharing quick response code form is generated by data encoding, one
In a little embodiments, the e-book sharing information includes the e-book identification information of target electronic book, as the e-book title,
The International Standard Book Number of the e-book, number of the e-book etc..For example, the e-book sharing information includes target electronic book
E-book identification information and the network equipment information of the target electronic book is provided, such as include the title of the e-book《Xx stories》
And provide the e-book《Xx stories》Network device server model ThinkServer RD450.In another example the electronics
Book sharing information includes the access link information of the target electronic book, such as includes the e-book that network supplier provides《Xx events
Thing》Access link informationhttps://www.xyz.cn/dp/B00NBT68SA/ref。
Those skilled in the art will be understood that the content of above-mentioned access identities information is only for example, existing or from now on
Be likely to occur other contents of access identities information, be such as applicable to the application all should include within the scope of protection of this application,
And it is incorporated herein by reference herein.
In some embodiments, this method step S11 includes the target electricity that the first user equipment obtains the first user purchase
The philosophical works and the target electronic book share token information.
For example, the first user equipment calls the first user to buy the record of target electronic book, obtaining the target electronic book is
《Xx stories》;The use statistical data for calling the first user, is finally somebody's turn to do《Xx stories》E-book shares token information "
One user can share e-book within this moon《Xx stories》5 times ".In some embodiments, the use statistics of the first user
Data include but not limited to user gradation (such as VIP1 i.e. 1 grade of member), user's like time (such as like time is 500 times), use
Family hop count (such as hop count is 200 times).
In some embodiments, this method step S11 includes the target electricity that the first user equipment obtains the first user purchase
The philosophical works;First user equipment is that first user distributes to the use operation of the target electronic book according to first user
The target electronic book shares token information.Herein, the first user includes first to the use operation of the target electronic book
User thumbs up the comment operation etc. of operation, the first user to the target electronic book to the target electronic book.
For example, the first user equipment calls the first user to buy the record of target electronic book, and obtain target electronic book
Title is《Xx stories》, in some embodiments, the first user equipment is according to the first user couple《Xx stories》Thumb up, be first
The token information of sharing that user distributes the e-book is that the first user can be in today 8:00-17:Divide infinitely in 00 period
Enjoy e-book《Xx stories》Or first user equipment according to the first user couple《Xx stories》Book review, for the first user distribute
The e-book share token information be the first user can indefinitely share e-book《Xx stories》3 times.
Those skilled in the art will be understood that the mode of use operation of above-mentioned first user to the target electronic book only
To illustrate, other manner that is existing or being likely to occur use operation of first user to the target electronic book from now on, such as
It should includes within the scope of protection of this application, and to be incorporated herein by reference herein to be applicable to the application all.
In some embodiments, this method step S11 includes the target electricity that the first user equipment obtains the first user purchase
The philosophical works and the multiple of target electronic book share token information;Wherein, the step S12 includes:First user equipment according to
The target electronic book and each multiple e-book sharing informations for sharing token information generation about the target electronic book,
In, each e-book sharing information include the target electronic book access identities information and one described in share token information.
For example, the first user equipment obtains the target electronic book of the first user purchase《Xx stories》And the target electronic book is more
It is a to share token information, such as share token information 1, shares token information 2, shares token information 3;Wherein share token information 1
It can indefinitely share e-book for the first user《Xx stories》3 times, it is that the first user can be in today 8 to share token information 2:
00-17:Share e-book infinitely in 00 period《Xx stories》, it is that the first user can within this moon to share token information 3
To share e-book《Xx stories》5 times;First user equipment is according to the target electronic book《Xx stories》And share token information 1-3
Generate 3 e-book sharing informations of the target electronic book, respectively e-book sharing information 1, e-book sharing information 2,
E-book sharing information 3, wherein e-book sharing information 1 include the title such as the e-book《Xx stories》, the e-book state
Border International Standard Book Number (such as ISBN978-0-7334-2607-4), the e-book number NO598 access identities information and first
User can indefinitely share e-book《Xx stories》Share token information for 3 times;E-book sharing information 2 includes the e-book
Title《Xx stories》And provide the e-book《Xx stories》Network device server model ThinkServer RD450
Access identities information and the first user can be in today 8:00-17:Share e-book infinitely in 00 period《Xx stories》's
Share token information;E-book sharing information 3 includes the e-book《Xx stories》Access link information behttps:// www.xyz.cn/dp/B00NBT68SA/refAccess identities information and the first user can share e-book within this moon
《Xx stories》Share token information for 5 times.In some embodiments, access identities information includes but not limited to the target electronic
The e-book identification information of book;The e-book identification information of the target electronic book and the network for providing the target electronic book are set
Standby information;The access link information of the target electronic book.
In some embodiments, this method step S13 is installed on first user including the utilization of the first user equipment and sets
The e-book sharing information is shared with second user by standby third party's social networking application.Herein, third party's social networking application includes
But it is not limited to short message application, wechat application, QQ applications.
For example, the first wechat application installed with equipment utilization in real time shares the e-book of the target electronic book of generation
Information Sharing to system of real name second user, such as the first user chatted by wechat application with second user, first
The e-book sharing information for sharing link form of generation is shared with second user by user in real time;For another example, the first user sets
It is standby that the electronics sharing information of the target electronic book of generation is shared with by the second use by the QQ applications of installation or short message application
Family, in some embodiments, e-book sharing information include that e-book shares link, e-book shares Quick Response Code etc..
Those skilled in the art will be understood that the content of above-mentioned third party's social networking application is only for example, existing or modern
It is likely to occur other contents of third party's social networking application afterwards, the protection domain of the application should be included in by being such as applicable to the application all
It is interior, and be incorporated herein by reference herein.
Fig. 2 shows a kind of methods being used to share e-book in second user equipment end according to the application one embodiment
Flow chart.The method comprising the steps of S21, step S22, wherein in the step s 21, second user equipment is according to the first user point
The e-book sharing information enjoyed sends the access request about target electronic book to the network equipment, wherein the e-book is shared
Information includes the access identities information of the target electronic book and shares token information, and the access request includes the e-book
The access identities information of sharing information or the target electronic book and share token information;In step S22, second user equipment
Receive the target electronic book that the network equipment is returned based on the access request.
For example, the e-book sharing information (such as e-book shares link) that second user equipment is shared according to the first user,
The access request about the e-book is sent to the network equipment, wherein the e-book sharing information includes the access of the e-book
Identification information and share token information, respectively the e-book《Xx stories》Access link information behttps:// www.xyz.cn/dp/B00NBT68SA/ref, the first user can share e-book within this moon《Xx stories》5 times;The visit
Ask that request includes e-book sharing information;Second user equipment receives the target that the network equipment is returned based on the access request
E-book《Xx stories》.In some embodiments, the access request includes the access that target electronic book is shown with absolute version
Identification information and share token information.
In some embodiments, the e-book sharing information that first user shares in the method includes target electronic
The access identities information of book and share token information, and accesses the triggering information of the target electronic book;Wherein, the step
S21 includes:Access request according to the triggering information to network equipment transmission about the target electronic book, wherein described
Access request includes the access identities information of the e-book sharing information or the target electronic book and shares token information.This
Place, triggering information include the information of the forms such as automatic word, the picture for realizing quick response.Herein, the access request includes
The access identities information and share token information that target electronic book is shown with absolute version.
For example, the e-book sharing information that second user equipment is shared according to the first user sends target electricity to the network equipment
The access request of the philosophical works, wherein the e-book sharing information that the first user shares is to share the form of Quick Response Code, including the electronics
Book《Xx stories》Access link information behttps://www.xyz.cn/dp/B00NBT68SA/refAccess identification information
And first user can share e-book within this moon《Xx stories》Share token information, and access the e-book for 5 times
Triggering information:Second user device scan sends access request automatically after sharing Quick Response Code.In some embodiments, the access
Request includes the access identities information of the e-book sharing information or the e-book book and shares token information.
In some embodiments, this method step S21 include sub-step S211, sub-step S212, sub-step S213 (not
Show), wherein in sub-step S211, second user equipment extracts quilt from the e-book sharing information that the first user shares
The access identities information for the target electronic book shared and share token information;In sub-step S212, second user equipment generates
Access request about the target electronic book, wherein the access request includes the access identities information and described shares
Token information;In sub-step S213, second user equipment asks request to described in network equipment transmission.
For example, the form shown in second user equipment directly the first user equipment of scanning is to share the e-book of Quick Response Code
Sharing information, it is respectively target electricity therefrom to extract the access identities information for the target electronic book shared and share token information
The access link information of the philosophical workshttps://www.xyz.cn/dp/B00NBT68SA/ref, the first user can be in today 8:
00-17:Share the target electronic book in 00 period infinitely;The access that second user equipment generates the target electronic book is asked
It asks, wherein the access request includes the access identities information read and shares token information;Second user equipment is to the network equipment
Send the access request.
In application scenarios as shown in Figure 5, second user equipment (such as shares two dimension from the e-book sharing information received
Code form) in read the access identities information of target electronic book shared and share token information be respectively the target electronic book
Title《Xx stories》, the first user can indefinitely share the e-book《Xx stories》3 times;Second user equipment generates the electronics
Book《Xx stories》Access request, wherein the access request include read access identities information and share token information;Second
User equipment sends the access request to the network equipment.
In some embodiments, this method sub-step S212 includes:Second user equipment is according to user to target electricity
The access operation of the philosophical works generates the access request about the target electronic book, wherein the access request includes the access
Identification information and described share token information.
For example, second user equipment gives birth to the manual access operation of target electronic book as after clicking manually based on user
At the access request of the target electronic book, wherein the access request includes target electronic book title《Xx stories》Access identities
Information and the first user can indefinitely share the e-book《Xx stories》Share token information for 3 times.In some embodiments, it visits
Ask operation include but not limited to by click the operation of execution, by double-click the operation executed, the operation executed by long-press or
The operation executed by right click.
In some embodiments, this method sub-step S211 includes:Second user equipment receives the electricity that the first user shares
Philosophical works sharing information;The access identities information for the target electronic book shared is extracted from the e-book sharing information and is shared
Token information.
For example, second user equipment receives the e-book sharing information that the first user shares, such as share the electricity of link form
Philosophical works sharing information;Second user equipment extracts the access identities for the target electronic book shared from the e-book sharing information
Information and shares token information and be respectively:The access link information of e-bookhttps://www.xyz.cn/dp/ B00NBT68SA/ref, the first user can be in today 8:00-17:Share the target electronic book in 00 period infinitely.
In some embodiments, this method sub-step S211 includes:Second user equipment is by scanning the first user the
Share the e-book sharing information of display on one user equipment, extract the access identities information for the target electronic book shared and divides
Enjoy token information.
For example, second user equipment is shown with sharing quick response code form on the first user device by scanning the first user
E-book sharing information, therefrom extract the access identities information for the target electronic book shared and share token information and be respectively
The access link information of the target electronic bookhttps://www.xyz.cn/dp/B00NBT68SA/ref, the first user can be
Today 8:00-17:Share the target electronic book in 00 period infinitely.
Fig. 3 shows a kind of method flow being used to share e-book at network equipment end according to the application one embodiment
Figure.The method comprising the steps of S31, step S32, step S33, wherein in step S31, the network equipment receives second user and sets
The access request about target electronic book that preparation is sent, wherein the access request includes the access mark of the target electronic book
Know information and shares token information;In step s 32, the network equipment shares the token information inspection access request according to
Whether the target electronic book may have access to;In step S33, if the access request may have access to the target electronic book, network
The target electronic book is provided to the second user equipment by equipment.In some embodiments, access identities information include but
It is not limited to the e-book identification information of the target electronic book;Described in the e-book identification information of the target electronic book and offer
The network equipment information of target electronic book;The access link information of the target electronic book;Wherein, e-book identification information includes
It can uniquely, definitely identify information, such as the title of e-book, International Standard Book Number of the e-book etc..
For example, the network equipment receive second user equipment send about target electronic book《Xx stories》Access request,
The wherein described access request includes the e-book《Xx stories》Access identities information and share token information, such as include the electronics
The access link information of bookhttps://www.xyz.cn/dp/B00NBT68SA/refAnd first user can be within this moon
Share e-book《Xx stories》Share token information for 5 times;The network equipment can share electricity according to the first user within this moon
The philosophical works《Xx stories》5 token informations of sharing examine whether the access request can access the e-book《Xx stories》,
As the first user can share e-book within this moon《Xx stories》5 times, share 4 times, network equipment verification second
The access request about the e-book that user equipment is sent just is that second user equipment is shared according to the 5th of the first user
It sends, i.e., the network equipment, which verifies the access request, can access the target electronic book;The network equipment is by the e-book《Xx events
Thing》It is provided to second user equipment.
In some embodiments, this method step S33 includes:If the access request may have access to the target electronic book,
The network equipment is provided to described according to target electronic book described in the access identities acquisition of information, and by the target electronic book
Two user equipmenies.
For example, the access request about target electronic book that network equipment verification second user equipment is sent can access this
Target electronic book《Xx stories》;The network equipment is according to access identities information:The title of target electronic book《Xx stories》And e-book
Access link informationhttps://www.xyz.cn/dp/B00NBT68SA/refThe target electronic book is finally obtained, and should
E-book《Xx stories》It is supplied to second user equipment.
In some embodiments, this method step S31 includes:The network equipment receives second user equipment based on e-book point
Enjoy the access request about target electronic book of information transmission, wherein the e-book sharing information includes the target electronic
The access identities information of book and share token information, the access request includes the e-book sharing information.
For example, the network equipment receives the target electronic book that second user equipment is sent based on e-book sharing information《Xx events
Thing》Access request, wherein access request includes the e-book sharing information of the e-book, which includes
The e-book accesses link informationhttps://www.xyz.cn/dp/B00NBT68SA/refAccess identities information and first
User can share e-book within this moon《Xx stories》Share token information for 5 times.
In some embodiments, this method step S32 includes:The network equipment extracts institute from the e-book sharing information
That states target electronic book shares token information;Examine the access request whether addressable described according to the token information of sharing
Target electronic book.
For example, the network equipment extract the target electronic book from the e-book sharing information of target electronic book share token
Information is the first user can share e-book within this moon《Xx stories》5 times;Network equipment inspection includes the e-book point
Whether the access request for enjoying information may have access to e-book《Xx stories》;As the first user can share e-book within this moon
《Xx stories》5 times, share 4 times, the access about the e-book that network equipment verification second user equipment is sent is asked
Ask that be just second user equipment share transmission according to the 5th of the first user, i.e., the network equipment verify the access request can
To access the target electronic book.
Fig. 4 shows a kind of method flow diagram for sharing e-book according to the application one embodiment.This method packet
It includes:First user equipment obtain distribute to the first user, about target electronic book share token information;
First user equipment is generated according to the target electronic book and the token information of sharing about the target
The e-book sharing information of e-book, wherein the e-book sharing information includes the access identities letter of the target electronic book
Breath and described share token information;
The e-book sharing information is shared with second user by first user equipment;
The e-book sharing information that the second user equipment is shared according to the first user is sent to the network equipment about mesh
Mark e-book access request, wherein the e-book sharing information include the target electronic book access identities information and
Share token information, the access request includes the access identities information of the e-book sharing information or the target electronic book
And share token information;
The network equipment receives the access request about target electronic book that second user equipment is sent, wherein described
Access request includes the access identities information of the target electronic book and shares token information;
The network equipment shares token information according to and examines whether the access request may have access to the target electricity
The philosophical works;
If the access request may have access to the target electronic book, the target electronic book is provided to by the network equipment
The second user equipment;
The second user equipment receives the target electronic book that the network equipment is returned based on the access request.
Present invention also provides a kind of computer readable storage medium, the computer readable storage medium
It is stored with computer code, when the computer code is performed, such as preceding any one of them method is performed.
Present invention also provides a kind of computer program products, when the computer program product is executed by computer equipment
When, such as preceding any one of them method is performed.
Present invention also provides a kind of computer equipment, the computer equipment includes:
One or more processors;
Memory, for storing one or more computer programs;
When one or more of computer programs are executed by one or more of processors so that it is one or
Multiple processors realize such as preceding any one of them method.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt
With application-specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In one embodiment
In, the software program of the application can be executed by processor to realize steps described above or function.Similarly, the application
Software program (including relevant data structure) can be stored in computer readable recording medium storing program for performing, for example, RAM memory,
Magnetic or optical driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the application, example
Such as, coordinate to execute the circuit of each step or function as with processor.
In addition, the part of the application can be applied to computer program product, such as computer program instructions, when its quilt
When computer executes, by the operation of the computer, it can call or provide according to the present processes and/or technical solution.
Those skilled in the art will be understood that the existence form of computer program instructions in computer-readable medium includes but not limited to
Source file, executable file, installation package file etc., correspondingly, the mode that computer program instructions are computer-executed include but
It is not limited to:The computer directly execute the instruction or the computer compile the instruction after execute program after corresponding compiling again,
Either the computer reads and executes the instruction or after the computer reads and install and execute corresponding installation again after the instruction
Program.Here, computer-readable medium can be the arbitrary available computer readable storage medium accessed for computer or
Communication media.
Communication media includes thereby comprising such as computer-readable instruction, data structure, program module or other data
Signal of communication is transmitted to the medium of another system from a system.Communication media may include having the transmission medium led (such as electric
Cable and line (for example, optical fiber, coaxial etc.)) and can propagate wireless (not having the transmission the led) medium of energy wave, such as sound, electricity
Magnetic, RF, microwave and infrared.Computer-readable instruction, data structure, program module or other data can be embodied as example wireless
Medium (such as carrier wave or be such as embodied as spread spectrum technique a part similar mechanism) in modulated message signal.
Term " modulated message signal " refers to that one or more feature is modified or is set in a manner of coding information in the signal
Fixed signal.Modulation can be simulation, digital or Hybrid Modulation Technology.
As an example, not a limit, computer readable storage medium may include such as computer-readable finger for storage
Enable, the volatile and non-volatile that any method or technique of the information of data structure, program module or other data is realized, can
Mobile and immovable medium.For example, computer readable storage medium includes, but are not limited to volatile memory, such as with
Machine memory (RAM, DRAM, SRAM);And nonvolatile memory, such as flash memory, various read-only memory (ROM, PROM,
EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memory (MRAM, FeRAM);And magnetic and optical storage apparatus (hard disk,
Tape, CD, DVD);Or other currently known media or Future Development can store the computer used for computer system
Readable information/data.
Here, including a device according to one embodiment of the application, which includes for storing computer program
The memory of instruction and processor for executing program instructions, wherein when the computer program instructions are executed by the processor
When, trigger method and/or technology scheme of the device operation based on aforementioned multiple embodiments according to the application.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie
In the case of without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power
Profit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent requirements of the claims
Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This
Outside, it is clear that one word of " comprising " is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in device claim is multiple
Unit or device can also be realized by a unit or device by software or hardware.The first, the second equal words are used for table
Show title, and does not represent any particular order.
Claims (19)
1. a kind of be used to share the method for e-book at the first user equipment end, wherein this method includes:
Obtain distribute to the first user, about target electronic book share token information;
According to the target electronic book and it is described share token information and generate share letter about the e-book of the target electronic book
Breath, wherein the e-book sharing information includes the access identities information of the target electronic book and described shares token information;
The e-book sharing information is shared with second user.
2. according to the method described in claim 1, wherein, the access identities information of the target electronic book includes following at least appointing
One:
The e-book identification information of the target electronic book;
The e-book identification information of the target electronic book and the network equipment information that the target electronic book is provided;
The access link information of the target electronic book.
3. method according to claim 1 or 2, wherein it is described obtain distribute to the first user, about target electronic book
Token information of sharing include:
The target electronic book and the target electronic book for obtaining the first user purchase share token information.
4. according to the method described in claim 3, wherein, the target electronic book for obtaining the first user purchase and described
The token information of sharing of target electronic book includes:
Obtain the target electronic book of the first user purchase;
It is that first user distributes the target electronic to the use operation of the target electronic book according to first user
Book shares token information.
5. method according to claim 3 or 4, wherein the target electronic book for obtaining the first user purchase, Yi Jisuo
The token information of sharing for stating target electronic book includes:
The target electronic book and the multiple of target electronic book for obtaining the first user purchase share token information;
Wherein, described according to the target electronic book and the token information of sharing generates electronics about the target electronic book
Book sharing information, wherein the e-book sharing information includes the access identities information of the target electronic book and described shares
Token information includes:
According to the target electronic book and each multiple e-book point for sharing token information generation about the target electronic book
Enjoy information, wherein each e-book sharing information include the target electronic book access identities information and one described in share
Token information.
6. the method according to any one of claims 1 to 5, wherein, described be shared with the e-book sharing information
Second user includes:
The e-book sharing information is shared with second using the third party's social networking application for being installed on first user equipment
User.
7. a kind of be used to share the method for e-book in second user equipment end, wherein this method includes:
The e-book sharing information shared according to the first user sends the access request about target electronic book to the network equipment,
In, the e-book sharing information includes the access identities information of the target electronic book and shares token information, the access
Request includes the access identities information of the e-book sharing information or the target electronic book and shares token information;
Receive the target electronic book that the network equipment is returned based on the access request.
8. according to the method described in claim 7, wherein, the e-book sharing information that first user shares includes target electricity
The access identities information of the philosophical works and share token information, and accesses the triggering information of the target electronic book;
Wherein, the e-book sharing information shared according to the first user sends the visit about target electronic book to the network equipment
Ask request, wherein the e-book sharing information includes the access identities information of the target electronic book and shares token information,
The access request include the access identities information of the e-book sharing information or the target electronic book and share token letter
Breath includes:
Access request according to the triggering information to network equipment transmission about the target electronic book, wherein the access
Request includes the access identities information of the e-book sharing information or the target electronic book and shares token information.
9. according to the method described in claim 7, wherein, the e-book sharing information shared according to the first user is to network
Equipment sends the access request about target electronic book, wherein the e-book sharing information includes the target electronic book
Access identities information and share token information, the access request includes the e-book sharing information or the target electronic book
Access identities information and share token information and include:
The access identities information for the target electronic book shared is extracted from the e-book sharing information that the first user shares and is divided
Enjoy token information;
Generate access request about the target electronic book, wherein the access request include the access identities information and
It is described to share token information;
Request is asked to described in network equipment transmission.
10. according to the method described in claim 9, wherein, access request of the generation about the target electronic book,
In, the access request includes the access identities information and the token information of sharing includes:
According to user to the access operation of the target electronic book, the access request about the target electronic book is generated, wherein
The access request includes the access identities information and described shares token information.
11. method according to claim 9 or 10, wherein in the e-book sharing information shared from the first user
It extracts the access identities information for the target electronic book shared and shares token information and include:
Receive the e-book sharing information that the first user shares;
The access identities information for the target electronic book shared is extracted from the e-book sharing information and shares token information.
12. method according to claim 9 or 10, wherein in the e-book sharing information shared from the first user
It extracts the access identities information for the target electronic book shared and shares token information and include:
Share the e-book sharing information of display on the first user device by scanning the first user, extracts the target shared
The access identities information of e-book and share token information.
13. a kind of be used to share the method for e-book at network equipment end, wherein this method includes:
Receive the access request about target electronic book that second user equipment is sent, wherein the access request includes described
The access identities information of target electronic book and share token information;
Examine whether the access request may have access to the target electronic book according to the token information of sharing;
If the access request may have access to the target electronic book, the target electronic book is provided to the second user and is set
It is standby.
14. according to the method for claim 13, wherein if the access request may have access to the target electronic book,
The target electronic book, which is provided to the second user equipment, includes:
If the access request may have access to the target electronic book, according to target electronic described in the access identities acquisition of information
Book, and the target electronic book is provided to the second user equipment.
15. the method according to claim 13 or 14, wherein described to receive the electric about target of second user equipment transmission
The access request of the philosophical works, wherein the access request include the access identities information of the target electronic book and share token letter
Breath includes:
Receive the access request about target electronic book that second user equipment is sent based on e-book sharing information, wherein institute
State the access identities information and share token information that e-book sharing information includes the target electronic book, the access request packet
Include the e-book sharing information.
16. according to the method for claim 15, wherein share token information described in the basis and examine the access request
The target electronic school bag whether is may have access to include:
That the target electronic book is extracted from the e-book sharing information shares token information;
Examine whether the access request may have access to the target electronic book according to the token information of sharing.
17. a kind of method for sharing e-book, wherein the method includes:
First user equipment obtain distribute to the first user, about target electronic book share token information;
First user equipment is generated according to the target electronic book and the token information of sharing about the target electronic
The e-book sharing information of book, wherein the e-book sharing information include the target electronic book access identities information and
It is described to share token information;
The e-book sharing information is shared with second user by first user equipment;
The e-book sharing information that the second user equipment is shared according to the first user is sent to the network equipment about target electricity
The access request of the philosophical works, wherein the e-book sharing information includes the access identities information of the target electronic book and shares
Token information, the access request include the access identities information of the e-book sharing information or the target electronic book and divide
Enjoy token information;
The network equipment receives the access request about target electronic book that second user equipment is sent, wherein the access
Request includes the access identities information of the target electronic book and shares token information;
The network equipment shares token information according to and examines whether the access request may have access to the target electronic book;
If the access request may have access to the target electronic book, the target electronic book is provided to described by the network equipment
Second user equipment;
The second user equipment receives the target electronic book that the network equipment is returned based on the access request.
18. a kind of for sharing the equipment of e-book, wherein the equipment includes:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed
Execute the operation such as any one of claim 1 to 17 the method.
19. a kind of includes the computer-readable medium of instruction, described instruction makes system carry out following operation, holds when executed
The operation of row any one of such as claim 1 to 17 the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810294130.9A CN108777696A (en) | 2018-03-30 | 2018-03-30 | A kind of method and apparatus for sharing e-book |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810294130.9A CN108777696A (en) | 2018-03-30 | 2018-03-30 | A kind of method and apparatus for sharing e-book |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108777696A true CN108777696A (en) | 2018-11-09 |
Family
ID=64033574
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810294130.9A Pending CN108777696A (en) | 2018-03-30 | 2018-03-30 | A kind of method and apparatus for sharing e-book |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108777696A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101075278A (en) * | 2006-05-18 | 2007-11-21 | 华为技术有限公司 | Method for presenting digital content use authorization and authorization releaser |
CN103379098A (en) * | 2012-04-19 | 2013-10-30 | 华为技术有限公司 | Content sharing method, device and network system thereof |
CN104618217A (en) * | 2014-03-24 | 2015-05-13 | 腾讯科技(北京)有限公司 | Method, terminal, server and system for sharing resource |
CN104917807A (en) * | 2015-03-19 | 2015-09-16 | 腾讯科技(深圳)有限公司 | Resource transfer method, apparatus and system |
US20160142473A1 (en) * | 2014-11-15 | 2016-05-19 | Optim Corporation | E-book Share Server, the method and the program |
CN106534277A (en) * | 2016-10-25 | 2017-03-22 | 广东欧珀移动通信有限公司 | Data sharing method and device |
CN106599228A (en) * | 2016-12-19 | 2017-04-26 | 掌阅科技股份有限公司 | Data sharing method and apparatus, terminal device and server |
-
2018
- 2018-03-30 CN CN201810294130.9A patent/CN108777696A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101075278A (en) * | 2006-05-18 | 2007-11-21 | 华为技术有限公司 | Method for presenting digital content use authorization and authorization releaser |
CN103379098A (en) * | 2012-04-19 | 2013-10-30 | 华为技术有限公司 | Content sharing method, device and network system thereof |
CN104618217A (en) * | 2014-03-24 | 2015-05-13 | 腾讯科技(北京)有限公司 | Method, terminal, server and system for sharing resource |
US20160142473A1 (en) * | 2014-11-15 | 2016-05-19 | Optim Corporation | E-book Share Server, the method and the program |
CN104917807A (en) * | 2015-03-19 | 2015-09-16 | 腾讯科技(深圳)有限公司 | Resource transfer method, apparatus and system |
CN106534277A (en) * | 2016-10-25 | 2017-03-22 | 广东欧珀移动通信有限公司 | Data sharing method and device |
CN106599228A (en) * | 2016-12-19 | 2017-04-26 | 掌阅科技股份有限公司 | Data sharing method and apparatus, terminal device and server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11601398B2 (en) | Multiplexed data exchange portal interface in scalable data networks | |
CN108305072A (en) | Dispose method, equipment and the computer storage media of block chain network | |
US9037571B1 (en) | Topology service using closure tables and metagraphs | |
US10572381B2 (en) | Updating cache using two bloom filters | |
CN108170612B (en) | Automatic testing method and device and server | |
CN110266505A (en) | A kind of method and apparatus managing session group | |
CN109359237A (en) | It is a kind of for search for boarding program method and apparatus | |
CN110334299A (en) | A kind of pop-up methods of exhibiting, device and electronic equipment monitored based on address field | |
CN110290557A (en) | A kind of method and apparatus of the interior page-tag of load application | |
CN106651422A (en) | Data processing method and data processing device | |
Sahinoglu et al. | CLOUD computing | |
US10027692B2 (en) | Modifying evasive code using correlation analysis | |
US9710575B2 (en) | Hybrid platform-dependent simulation interface | |
CN116601630A (en) | Generating defensive target database attacks through dynamic honey database responses | |
CN109711840B (en) | Transaction data processing method and device and storage medium | |
CN109345416A (en) | It is a kind of for recording the method and apparatus of the adduction relationship between works | |
Pan et al. | Gray computing: A framework for computing with background javascript tasks | |
CN108462757A (en) | A kind of method and apparatus for sharing e-book | |
CN104967631B (en) | A kind of method and apparatus for sharing cloud storage content | |
CN108777696A (en) | A kind of method and apparatus for sharing e-book | |
CN110443641A (en) | A kind of method and apparatus of the reading permission managing novel chapters and sections and comment information | |
CN107231664B (en) | A kind of method and apparatus for user equipment progress flow control | |
CN110415131A (en) | A kind of method and apparatus for realizing social interaction between author and reader | |
CN114185592A (en) | Multi-version coexisting target item access method, device, equipment and storage medium | |
CN108985758B (en) | Data processing method, data processing system and terminal equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181109 |
|
RJ01 | Rejection of invention patent application after publication |