CN111049726B - File sharing method, device, system, client, server and storage medium - Google Patents

File sharing method, device, system, client, server and storage medium Download PDF

Info

Publication number
CN111049726B
CN111049726B CN201911110131.4A CN201911110131A CN111049726B CN 111049726 B CN111049726 B CN 111049726B CN 201911110131 A CN201911110131 A CN 201911110131A CN 111049726 B CN111049726 B CN 111049726B
Authority
CN
China
Prior art keywords
account
sharing
designated
information
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911110131.4A
Other languages
Chinese (zh)
Other versions
CN111049726A (en
Inventor
李继
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dajia Internet Information Technology Co Ltd
Original Assignee
Beijing Dajia Internet Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dajia Internet Information Technology Co Ltd filed Critical Beijing Dajia Internet Information Technology Co Ltd
Priority to CN201911110131.4A priority Critical patent/CN111049726B/en
Publication of CN111049726A publication Critical patent/CN111049726A/en
Application granted granted Critical
Publication of CN111049726B publication Critical patent/CN111049726B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/10Multimedia information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Abstract

The disclosure relates to a file sharing method, a device, a system, a client, a server and a storage medium, wherein the file sharing method comprises the following steps: responding to a sharing request of a target account on a first file, and determining at least one designated account to be shared with the first file; obtaining sharing authorization information of the designated account; and sharing the first file to the designated account according to the sharing authorization information. According to the technical scheme, the file sharing is realized by triggering the designated account of the file to be shared to provide the sharing authorization information, so that all user accounts sharing the file participate in the file sharing authorization process, the triggering party of the file sharing is not relied on, and the safety of the file sharing process is improved.

Description

File sharing method, device, system, client, server and storage medium
Technical Field
The disclosure relates to the technical field of communication, and in particular relates to a file sharing method, device, system, client, server and storage medium.
Background
With the continuous development of communication technology, file sharing functions are widely used in various large social platforms. For example, a user may share pictures, documents, audio, video, and other files to other users of a social platform through a file sharing functionality provided by the social platform.
In the related art, in order to ensure the security of a shared file, a user generally encrypts the shared file before sharing the file with other users and then shares the encrypted file with other users to share the file, so that the other users need to input a correct password to decrypt and view the file after receiving the file. However, the file sharing method has the problem of single encryption mode, so that the shared file is easy to be decrypted and checked by other illegal users who steal the password, and the security is low.
Disclosure of Invention
The disclosure provides a file sharing method, device, system, client, server and storage medium, which at least solve the problem of low file sharing security in the related art. The technical scheme of the present disclosure is as follows:
according to a first aspect of an embodiment of the present disclosure, there is provided a file sharing method, including:
responding to a sharing request of a target account on a first file, and determining at least one designated account to be shared with the first file;
obtaining sharing authorization information of the designated account;
and sharing the first file to the designated account according to the sharing authorization information.
According to a second aspect of an embodiment of the present disclosure, there is provided a file sharing method, including:
receiving a sharing request of a target account on a target file, wherein the sharing request carries account information of at least one designated account to be shared with the target file;
acquiring sharing authorization information of the designated account based on the account information of the designated account;
and sharing the target file to the designated account according to the sharing authorization information.
According to a third aspect of the embodiments of the present disclosure, there is provided a file sharing apparatus, including:
the first determining unit is configured to execute a sharing request of a target account on a first file, and determine at least one designated account to share the first file;
the first acquisition unit is configured to acquire sharing authorization information of the designated account;
and the first sharing unit is configured to perform sharing of the first file to the designated account according to the sharing authorization information.
According to a fourth aspect of an embodiment of the present disclosure, there is provided a file sharing apparatus, including:
the first receiving unit is configured to execute receiving a sharing request of a target account to a target file, wherein the sharing request carries account information of at least one designated account to be shared with the target file;
A second acquisition unit configured to perform acquisition of sharing authorization information of the designated account based on account information of the designated account;
and the first sending unit is configured to perform sharing of the target file to the designated account according to the sharing authorization information.
According to a fifth aspect of embodiments of the present disclosure, there is provided a client, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the file sharing method according to the first aspect of the embodiments of the present disclosure.
According to a sixth aspect of the embodiments of the present disclosure, there is provided a storage medium, which when executed by a processor of a client, enables the client to perform the file sharing method according to the first aspect of the embodiments of the present disclosure.
According to a seventh aspect of embodiments of the present disclosure, there is provided a server comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the file sharing method according to the second aspect of the embodiments of the present disclosure.
According to an eighth aspect of embodiments of the present disclosure, there is provided a storage medium, which when executed by a processor of a server, enables the server to perform the file sharing method according to the second aspect of embodiments of the present disclosure.
According to a ninth aspect of an embodiment of the present disclosure, there is provided a file sharing system, including:
a client according to a fifth aspect of embodiments of the present disclosure;
a server according to a seventh aspect of embodiments of the present disclosure;
the client is used for responding to a sharing request of a target account on a target file, determining at least one designated account to be shared with the target file, and uploading account information of the target file and the at least one designated account to the server;
the server is configured to receive the target file and account information of the at least one designated account uploaded by the client, obtain sharing authorization information of the designated account based on the account information of the designated account, and share the target file with the designated account according to the sharing authorization information.
According to a tenth aspect of embodiments of the present disclosure, there is provided a computer program product comprising one or more instructions which, when executed by a processor of a client, enable the client to perform the file sharing method according to the first aspect of embodiments of the present disclosure.
According to an eleventh aspect of embodiments of the present disclosure, there is provided a computer program product comprising one or more instructions which, when executed by a processor of a server, enable the server to perform the file sharing method according to the second aspect of embodiments of the present disclosure.
The technical scheme provided by the embodiment of the disclosure at least brings the following beneficial effects:
and obtaining the sharing authorization information of the designated account by determining at least one designated account of the first file to be shared, sharing the first file to the designated account according to the sharing authorization information, and providing the sharing authorization information to realize file sharing by triggering the designated account of the file to be shared, so that all user accounts sharing the file participate in the file sharing authorization process, and the method does not depend on the triggering party of the file, thereby improving the safety of the file sharing process.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure and do not constitute an undue limitation on the disclosure.
Fig. 1 is a schematic diagram of an implementation environment to which embodiments of the present disclosure relate.
FIG. 2 is a flow chart illustrating a method of file sharing according to an exemplary embodiment.
Fig. 3 is a flowchart illustrating a file sharing method according to another exemplary embodiment.
Fig. 4 is a flowchart illustrating a file sharing method according to still another exemplary embodiment.
Fig. 5 is a flowchart illustrating a file sharing method according to still another exemplary embodiment.
FIG. 6 is a flowchart illustrating a method of file sharing according to an example embodiment.
Fig. 7 is a flowchart illustrating a file sharing method according to another exemplary embodiment.
FIG. 8 is an interaction diagram illustrating a file sharing method according to an example embodiment.
Fig. 9 is a flowchart illustrating a file sharing method according to still another exemplary embodiment.
Fig. 10 is a flowchart illustrating a file sharing method according to still another exemplary embodiment.
Fig. 11 is a block diagram illustrating a file sharing apparatus according to an exemplary embodiment.
Fig. 12 is a block diagram illustrating a file sharing apparatus according to another exemplary embodiment.
Fig. 13 is a block diagram illustrating a file sharing apparatus according to an exemplary embodiment.
Fig. 14 is a block diagram illustrating a file sharing apparatus according to another exemplary embodiment.
Fig. 15 is a block diagram of a client, according to an example embodiment.
Fig. 16 is a block diagram of a server, according to an example embodiment.
Detailed Description
In order to enable those skilled in the art to better understand the technical solutions of the present disclosure, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the foregoing figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the disclosure described herein may be capable of operation in sequences other than those illustrated or described herein. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
Before describing the technical solutions provided by the embodiments of the present disclosure, an implementation environment related to the embodiments of the present disclosure will be described first. Fig. 1 is a schematic diagram of an implementation environment according to an embodiment of the disclosure, where the implementation environment may include at least two clients, and the implementation environment shown in fig. 1 is illustrated by using four clients as an example, and referring to fig. 1, the four clients 10 respectively operate different accounts, including, for example, an account a to an account D. The implementation environment may also include a server 20, and each client 10 may be communicatively coupled to the server 20. In addition, peer-to-peer communication between the various clients 10 may also be performed for direct interaction of data.
The client 10 may be any client that installs a social application providing a file sharing function such as instant messaging, and the server 20 may be an application server corresponding to the social application installed by the client 10.
Each of accounts a through D may be social application accounts, such as instant messaging accounts, for identifying a unique one of the communication users. The accounts can send and receive files to and from each other, and are sharing parties and shared parties, for example, the account a can be used as a sharing party, and share files to the accounts B to D through the corresponding clients 10, and at this time, the accounts B to D are used as shared parties, and receive the files shared by the account a through the corresponding clients 10; the account a may also be used as a shared party, and receive, through its corresponding client 10, a file shared by any one of the accounts B to D. It should be noted that, the client corresponding to an account refers to a client running the account.
For example, when sharing a file, the sharing party account may set a shared party account of the file to be shared through the corresponding client, and upload account information (such as an account ID) of the file to be shared and the shared party account to the server 20; the server 20 receives the file to be shared and the account information of the shared account corresponding to the file to be shared, and forwards the file to be shared to the client corresponding to the shared account based on the account information of the shared account, or sends a sharing message to the client corresponding to the shared account, so that the shared account downloads the file to be shared from the server 20 through the corresponding client.
Based on the above implementation environment, the embodiment of the disclosure provides a file sharing method. Fig. 2 is a flowchart of a file sharing method according to an exemplary embodiment, which is illustrated by the application of the file sharing method to a client, where the client may be the client 10 in the implementation environment shown in fig. 1. Referring to fig. 2, the file sharing method may include the steps of:
in step S21, at least one designated account to share the first file is determined in response to a sharing request of the target account for the first file.
The first file is a file to be shared by the target account, and may include, for example, but not limited to, one or more of a document, a picture, a video, an audio, and the like.
The user can log in the client side by using the target account, and after selecting a first file to be shared and setting a designated account for the first file to be shared, the sharing request for the first file is triggered by clicking a click sharing button and other operations on a user interface. Wherein the designated account may include, but is not limited to, one or more of a friend account of the target account, some or all of the accounts in the group, accounts of interest, and the like.
It should be noted that, the group refers to various types of groups added by the user account in instant messaging software or other social applications with instant messaging functions.
In step S22, sharing authorization information of the designated account is obtained.
In step S23, the first file is shared with the designated account according to the sharing authorization information of the designated account.
In embodiments of the present disclosure, the sharing authorization information of the designated account may include encryption information of the designated account, the authorized social relationship may include one or more of a key, an authorization code, a fingerprint of an owner of the designated account, a face image, and other biometric information, and the social relationship may include, for example, but not limited to: friend relationships, group relationships, praise relationships, and the like.
According to the file sharing method, the at least one designated account of the first file to be shared is determined, the sharing authorization information of the designated account is obtained, the first file is shared to the designated account according to the sharing authorization information, the designated account of the file to be shared is triggered, the sharing authorization information is provided to realize file sharing, all user accounts sharing the file participate in the file sharing authorization process, the triggering party of the file is not only relied, and the safety of the file sharing process is improved.
In order to enable those skilled in the art to better understand the technical solution provided by the embodiments of the present disclosure, a detailed description is provided below of the file sharing method provided by the embodiments of the present disclosure.
First, with respect to the above step S21, in some optional embodiments, in response to a sharing request of the target account for the first file, the client may determine an account in the target group where the target account is located as a designated account to share the first file, and/or may determine an account in a friend list of the target account as a designated account to share the first file.
According to the method and the device, the target account can quickly share the first file. And the accounts in the friend list of the target account and/or the accounts in the target group are determined to be the designated accounts, and the files are shared to the designated accounts based on the sharing authorization information of the designated accounts with the association relation with the target accounts, so that the files can be prevented from being acquired by strange accounts without any relation with the target accounts, and the security of the shared files is further enhanced.
Of course, in other alternative embodiments, when the user logs in the client through the target account to share the first file, the user may also select the designated account to share the first file according to needs, for example, a part of accounts in the friend list may be marked or account information of the designated account to share the first file may be input, so that the account information is carried in the sharing request received by the client, and thus, the client determines the designated account based on the account information carried in the sharing request in response to the sharing request. The implementation mode is more flexible, and meets various file sharing requirements of users.
Secondly, for the step S22, the sharing authorization information of the designated account may be obtained through three modes of online obtaining, offline obtaining and self-generating. These three modes are described in detail below.
Embodiment one: and obtaining the sharing authorization of the appointed account on line.
As shown in fig. 3, in this embodiment, the step S22 specifically includes:
in step S221, a sharing authorization request is sent to the designated account, where the sharing authorization request is used to request the designated account to set sharing authorization information for the first file.
In step S222, the sharing authorization information returned by the designated account is received.
Optionally, the client corresponding to the target account may send the sharing authorization request to the client corresponding to the designated account through a peer-to-peer communication manner, or may send the sharing authorization request to a server, where the server forwards the sharing authorization request to the client corresponding to the designated account, so as to set the sharing authorization information for the first file through the designated account. Correspondingly, the client corresponding to the designated account receives the sharing authorization information of the designated account and returns the sharing authorization information to the client corresponding to the target account in a point-to-point communication mode, or the sharing authorization information of the designated account is sent to a server and forwarded to the client corresponding to the target account through the server.
For example, when the account a (i.e. the target account) requests to share the target file from the account B to the account D (i.e. the designated account), the client sends a sharing authorization request to the account B to the account D respectively after receiving the request for sharing the target file from the account a, so as to request to obtain the sharing authorization information of the designated accounts set by the designated accounts respectively and return the sharing authorization information to the target accounts.
It can be understood that by means of online obtaining the sharing authorization information of the designated account, the sharing authorization information of the designated account does not need to be stored in the local or server of the client, so that on one hand, occupation of storage resources of the local or server of the client can be reduced, on the other hand, leakage of the sharing authorization information of the designated account can be avoided, safety of the sharing authorization information is improved, and safety of sharing files is further improved.
Embodiment two: and acquiring the sharing authorization information of the designated account offline.
As shown in fig. 3, in this embodiment, the step S22 includes the following step S223 or step S224:
in step S223, sharing authorization information of the designated account stored in advance is read locally.
The client corresponding to the target account may locally store the sharing authorization information of the designated account in advance, where the sharing authorization information may be sent to the client corresponding to the target account in advance after the designated account confirms the permission granted to the target account to share the first file.
In step S224, the sharing authorization information of the designated account is obtained from the server.
And the sharing authorization information is uploaded to the server for storage after the designated account confirms authorization.
For example, the client corresponding to the target account may send a sharing authorization request carrying respective account information of the target account and the designated account to the server, and the server checks the target account based on the account information of the target account, reads the sharing authorization information of the designated account after the verification is passed, and returns the sharing authorization information to the client corresponding to the target account. It can be appreciated that the sharing authorization information of the designated account is stored in the server for the client to download and use from the server when needed, and compared with the sharing authorization information of the designated account stored locally in the client, the sharing authorization information can reduce occupation of local storage resources of the client.
It can be appreciated that in this embodiment, by storing the sharing authorization information of the designated account in the client local or server in advance, so that the client can read locally or download from the server when needed, compared with an online acquisition mode, the problem that the sharing authorization information of the designated account cannot be acquired timely due to untimely response of the designated account can be avoided, and the time waiting for online authorization of the designated account is reduced, thereby improving the efficiency of sharing files.
Embodiment III: and generating sharing authorization information of the designated account.
In some practical application scenarios, for example, the target account is urgent to share the first file with the designated account, but the designated account is offline and cannot respond to the sharing authorization request of the target account in time, and the designated account does not send the sharing authorization information to the client local or the server in advance, for which, the embodiment may be used to generate the sharing authorization information of the designated account. Specifically, as shown in fig. 3, the step S22 may include:
in step S225, social relationship information between the target account and the designated account is obtained.
In step S226, sharing authorization information of the designated account is generated based on the social relationship information.
For example, if the obtained social relationship information between the target account and the designated account indicates that the target account and the designated account are in a friend relationship, sharing authorization information of the designated account may be generated.
For example, the account a (i.e. the target account) is urgent to share the target file with the accounts B to D (i.e. the designated accounts), and the designated accounts are all offline, and the account a and the designated accounts are all in a friend relationship, and the respective sharing authorization information of the designated accounts may be generated and the target file may be shared with the designated accounts based on the respective sharing authorization information of the designated accounts in response to the sharing request of the account a for the target file.
It can be understood that, through the embodiment, on one hand, the sharing authorization information of the designated account does not need to be stored in the local client side and the server in advance, so that occupation of storage resources of the local client side and the server can be reduced, and the sharing authorization information of the designated account can be prevented from being revealed; on the other hand, the online authorization of the appointed account is not required to be waited, so that the problem that sharing authorization information of the appointed account cannot be timely obtained due to untimely response of the appointed account can be avoided, the time for waiting the online authorization of the appointed account is reduced, and the file sharing efficiency is further improved.
It should be noted that, in the specific implementation, any one of the above three embodiments for obtaining the sharing authorization information of the specified account may be adopted, or a combination of one or more embodiments may also be adopted. For each designated account of the first file to be shared, whether the sharing authorization information of the designated account is stored in the local client or the server or not can be queried, and if yes, the sharing authorization information of the designated account is directly read from the local client or the server; if not, sending a sharing authorization request to the appointed account, and receiving sharing authorization information returned by the appointed account. If the sharing authorization information returned by the designated account is not received within the preset time after the sharing authorization request is sent, acquiring social relation information between the target account and the designated account, and generating the sharing authorization information of the designated account based on the social relation information.
Finally, with respect to step S23, in an alternative embodiment, the sharing authorization information of the designated account may include encryption information of the first file by the designated account, where the encryption information may include, for example, but not limited to: a key, an authorization code, a fingerprint of the owner of the designated account, a facial image, and the like. Accordingly, as shown in fig. 3, the step S23 may include:
in step S231, the first file is encrypted based on the encryption information of each of all the designated accounts to be shared with the first file.
In step S232, the encrypted first file is shared with the designated account.
In the embodiment, the files shared by the target accounts are encrypted and then are shared based on the encryption information of all the designated accounts, so that the files shared by the target accounts can be decrypted and checked only by collecting the encryption information of all the designated accounts, and further all the designated accounts sharing the files participate in the file sharing decryption process, and the method does not depend on the triggering party of the shared files any more, and improves the safety of the file checking process.
In other embodiments of the disclosure, the target account may be used as a sharer to share the file according to the file sharing method described in the foregoing embodiments, or may be used as a sharee to receive the file shared by the sharee. The process of receiving and viewing files shared by other accounts by the target account is described in detail below.
Specifically, as shown in fig. 4, the file sharing method according to the embodiment of the disclosure further includes:
step S24, receiving a second file shared by any account through the target account.
Any account may be an account having a friend relationship with the target account (i.e. an account in a friend list China), may be an account in the same group as the target account, or may be an account having no relation with the target account, which is not limited in the embodiment of the present disclosure.
The second file is a file shared by any account, and may include, for example, but not limited to, one or more of a document, a picture, video, audio, and the like.
Step S25, obtaining the sharing authorization information of all the designated accounts of the second file.
Step S26, processing the second file according to the sharing authorization information of each of all the designated accounts of the second file, so as to view through the target account.
In the embodiment of the disclosure, the file viewing is realized by triggering the designated users sharing the file to provide the sharing authorization information, so that all user accounts sharing the file participate in the file viewing process, and the method and the device are not only dependent on the triggering party of the sharing file, thereby improving the safety of the file viewing process.
In the step S25, the sharing authorization information of all the designated accounts of the second file may be obtained in both an online manner and an offline manner. Next, these two modes will be described respectively.
Embodiment one: on-line acquisition mode
In this embodiment, as shown in fig. 5, step S25 may include:
in step S251, for each designated account of the second file, the designated account is requested to obtain the sharing authorization information of the designated account.
Optionally, the client corresponding to the target account may directly send the sharing authorization request to the client corresponding to the designated account through a peer-to-peer communication manner, or the sharing authorization request may be sent to a server, and the server forwards the sharing authorization request to the client corresponding to the designated account, so as to verify the identity of the target account through the designated account and set the sharing authorization information for the second file after the verification is passed.
In step S252, an authorization response returned by the designated account is received, where the authorization response includes account information and encryption information of the designated account.
Optionally, the client corresponding to the target account may also receive the sharing authorization information of the designated account returned by the client corresponding to the designated account through a peer-to-peer communication manner, or may receive the sharing authorization information of the designated account forwarded by the server.
By the method for acquiring the sharing authorization information of the designated account on line, the sharing authorization information of the designated account does not need to be stored in the local or server of the client, so that the occupation of storage resources of the local or server of the client can be reduced, the sharing authorization information of the designated account can be prevented from being revealed, the security of the sharing authorization information is improved, and the security of the sharing file is further enhanced.
Embodiment two: off-line acquisition mode
In this embodiment, as shown in fig. 5, step S25 may include step S253 or step S254 described below.
In step S253, the sharing authorization information of each of all the designated accounts of the locally stored second file is read.
The client sides corresponding to all the target accounts can locally store sharing authorization information of all the designated accounts in advance, and the sharing authorization information can be sent to the client sides corresponding to the target accounts in advance after the designated accounts confirm the permission granted to the target accounts to view the second files.
In step S254, the sharing authorization information of each of all the designated accounts of the second file is acquired from the server.
And the sharing authorization information is uploaded to the server for storage after the assigned account confirms authorization.
The client may send an authorization decryption request carrying account information of the target account and all designated accounts to the server, and the server checks the target account based on the account information of the target account, reads the shared authorization information of each designated account after the verification is passed, and returns the shared authorization information to the client corresponding to the target account. It can be appreciated that the sharing authorization information of each of all the designated accounts is stored in the server, so that the client can download and use the sharing authorization information from the server when needed, and compared with the method that the sharing authorization information of each of all the designated accounts is stored locally in the client, the method can reduce occupation of local storage resources of the client.
It can be appreciated that in this embodiment, by storing the sharing authorization information of each of all the designated accounts in the local or server of the client in advance, so that the client can directly read from the local or download from the server when needed, compared with an online acquisition mode, the problem that the sharing authorization information of the designated account cannot be acquired in time due to untimely response of the designated account can be avoided, and the time for waiting for online authorization decryption of the designated account is reduced, thereby improving the viewing efficiency of the shared file.
Accordingly, the manner of obtaining the sharing authorization information of the designated account in the step S25 is different, and the step S26 may process the second file according to different embodiments.
In an alternative embodiment, for the sharing authorization information of the designated account acquired in the online manner, as shown in fig. 5, the step S26 may include:
in step S261, the account information and the encryption information in the received authorization response are verified based on the locally stored encryption information of the designated account.
In the implementation, the account information in the received authorization response and the pre-stored account information of the designated account can be subjected to consistency comparison so as to judge whether the designated account is authorized or not. And comparing the encryption information in the received authorization response with the prestored encryption information of the appointed account in a consistency manner so as to judge whether the encryption key is correct or not.
In step S262, if the account information and the encryption information in the received authorization response are verified, the second file is decrypted based on the encryption information of each of all the designated accounts of the second file.
Accordingly, if the account information in the received authorization response is consistent with the prestored account information of the designated account and the encryption information in the authorization response is consistent with the prestored encryption information of the designated account, determining that the account information and the encryption information in the authorization response pass the verification.
And if authorization responses returned by all the designated accounts are received and account information and encryption information in the authorization responses are checked to pass, decrypting the second file based on the respective encryption information of all the designated accounts.
It can be understood that, by the embodiment, after the authorization response returned to all the designated accounts passes the verification, the second file is decrypted based on the respective encryption information of all the designated accounts, so that the content of the second file can be prevented from being stolen by an illegal account, and the security of the second file is further enhanced.
In another alternative embodiment, for the sharing authorization information of the designated account acquired in the offline manner, as shown in fig. 5, the step S26 may include:
in step S263, for each designated account of the second file, a social relationship between the designated account and the target account is obtained.
In step S264, if the social relationship between each designated account of the second file and the target account accords with the social relationship permitted to be authorized by the designated account, the second file is decrypted based on the encryption information of each designated account corresponding to the second file, where the sharing authorization information of the designated account further includes the social relationship permitted to be authorized by the designated account.
Wherein the designated account allows authorized social relationships may include, for example, one or more of relationships, group relationships (i.e., in the same group), and the like. For example, the designated account may set the social relationship allowing authorization as a friend relationship, that is, the account having a friend relationship with the designated account is granted with permission to view the second file, and if the target account and the designated account are friend relationships, the target account is confirmed to be authorized by the designated account, so that encryption information of the designated account may be read to decrypt the second file.
If the social relationship between the target account and each designated account meets the social relationship allowed to be authorized by the designated account, the target account can be confirmed to obtain the permission granted by all the designated accounts to view the second file, and then the encryption information of each designated account can be read and the second file can be decrypted based on the encryption information so as to view the content of the second file through the target account.
It can be appreciated that in this embodiment, whether the target account obtains the permission of viewing the second file granted by the designated account is determined by the preset social relationship allowing authorization of the designated account, compared with a mode of waiting for each designated account to return an authorization response to process the second file based on the authorization response, the method of avoiding the fact that the second file cannot be processed in time due to untimely response of the designated account can be avoided, the time of waiting for response of the designated account is reduced, the processing time of the second file is further shortened, and the file viewing efficiency is improved. And the social relation between the target account and the appointed account is introduced in the decryption process, so that the relation between the second file and all related accounts is further enhanced.
It should be noted that the two embodiments of step S25 and step S26 may be adopted at the same time. Specifically, for each designated account of the second file, the social relationship allowed to be authorized by the designated account may be queried first, and whether the social relationship between the target account and the designated account and the target account accords with the social relationship allowed to be authorized by the designated account is determined; and if the social relationship between the target account and the designated account and the social relationship between the target account and the designated account are in accordance with the permission of the designated account for authorization, confirming that the designated account is authorized by the target account. If the social relationship between the target account and the designated account does not accord with the social relationship allowed to be authorized by the designated account, sending an authorization decryption request to the designated account to request the designated account to authorize to view the second file, and receiving an authorization response returned by the designated account; and then, checking the account information and the encryption information in the authorization response based on the pre-stored account information and the encryption information of the designated account, and if the verification is passed, confirming that the target account is authorized by the designated account. And under the condition that the target account is authorized by all the designated accounts, decrypting the second file based on the encryption information of each designated account.
Fig. 6 is a flowchart of a file sharing method according to another exemplary embodiment, which is illustrated by the application of the file sharing method to a server, where the server may be the server 20 in the implementation environment shown in fig. 1. Referring to fig. 6, the file sharing method may include the steps of:
in step S61, a sharing request of a target account for a target file is received, where the sharing request carries account information of at least one designated account to share the target file.
The target file is a file to be shared by the target account, and may include, for example, but not limited to, one or more of a document, a picture, a video, an audio, and the like.
In step S62, sharing authorization information of the designated account is obtained based on the account information of the designated account.
In step S63, the target file is shared with the designated account according to the sharing authorization information.
In embodiments of the present disclosure, the sharing authorization information of the designated account may include encryption information of the designated account, the authorized social relationship may include one or more of a key, an authorization code, a fingerprint of an owner of the designated account, a face image, and other biometric information, and the social relationship may include, for example, but not limited to: friend relationships, group relationships, praise relationships, and the like.
According to the file sharing method, file sharing is achieved by triggering the designated account of the file to be shared to provide sharing authorization information, all user accounts sharing the file participate in the file sharing authorization process, the triggering party of the file sharing is not relied, and the safety of the file sharing process is improved.
In order to enable those skilled in the art to better understand the technical solution provided by the embodiments of the present disclosure, a detailed description is provided below of the file sharing method provided by the embodiments of the present disclosure.
First, for the above step S62, the sharing authorization information of the designated account may be obtained through three modes of online obtaining, offline obtaining and self-generating. These three modes are described in detail below.
Embodiment one: and obtaining the sharing authorization of the appointed account on line.
As shown in fig. 7, in this embodiment, the step S62 may include:
in step S621, a sharing authorization request is sent to the client running the designated account based on the account information of the designated account, where the sharing authorization request is used to request the designated account to set the sharing authorization information for the target file.
The sharing authorization request may carry account information of the target account and file information of the target file (such as ID of the target file), so as to set sharing authorization information of the target file through the designated account.
In step S622, sharing authorization information of the designated account returned by the client running the designated account is received.
It can be understood that by means of online obtaining the sharing authorization information of the designated account, the sharing authorization information of the designated account does not need to be stored in the server in advance, so that on one hand, occupation of storage resources of the server can be reduced, on the other hand, leakage of the sharing authorization information of the designated account can be avoided, safety of the sharing authorization information is improved, and safety of sharing files is further improved.
For example, as shown in FIG. 8, account A (i.e., the target account) uploads the target file to the server and requests that the target file be shared with Account B through Account D (i.e., the designated account). After receiving the sharing request of the account A on the target file, the server respectively sends sharing authorization requests to clients running the designated accounts so as to request to acquire the sharing authorization information of each designated account. And the clients corresponding to the designated accounts respectively respond to the sharing authorization request, set the sharing authorization information of the designated accounts respectively and return the sharing authorization information to the server. And the server receives the sharing authorization information of each designated account to process the target file, and shares the target file with the designated accounts.
Embodiment two: and acquiring the sharing authorization information of the designated account offline.
As shown in fig. 7, in this embodiment, the step S62 may include:
in step S623, the locally stored sharing authorization information of the designated account is read based on the account information of the designated account.
The sharing authorization information of the designated account is preset and uploaded to the server.
It can be appreciated that in this embodiment, by storing the sharing authorization information of the designated account in the server in advance, so as to be directly read and used when needed, compared with an online acquisition mode, the method can avoid the problem that the sharing authorization information of the designated account cannot be acquired in time due to untimely response of the designated account, and reduce the time of waiting for authorized sharing of the designated account, thereby improving the efficiency of sharing files.
Embodiment III: and generating sharing authorization information of the designated account.
In some practical application scenarios, for example, the target account is urgent to share the first file with the designated account, but the designated account is offline and cannot respond to the sharing authorization request of the target account in time, and the designated account does not send the sharing authorization information to the server in advance, for which the embodiment may be used to generate the sharing authorization information of the designated account. Specifically, as shown in fig. 7, the step S62 may include:
In step S624, a social relationship between the designated account and the target account is obtained based on the account information of the designated account.
In step S625, sharing authorization information of the designated account is generated based on the social relationship between the designated account and the target account.
For example, if the obtained social relationship information between the target account and the designated account indicates that the target account and the designated account are in a friend relationship, sharing authorization information of the designated account may be generated.
For example, the account a (i.e. the target account) is urgent to share the target file with the accounts B to D (i.e. the designated accounts), and the designated accounts are all offline, and the account a and the designated accounts are all in a friend relationship, and the server may generate the respective sharing authorization information of the designated accounts and share the target file with the designated accounts based on the respective sharing authorization information of the designated accounts in response to the sharing request of the account a for the target file.
It can be appreciated that, through the embodiment, on one hand, the sharing authorization information of the designated account does not need to be stored in the server in advance, so that occupation of storage resources of the server can be reduced, and the sharing authorization information of the designated account can be prevented from being revealed; on the other hand, the online authorization of the appointed account is not required to be waited, so that the problem that sharing authorization information of the appointed account cannot be timely obtained due to untimely response of the appointed account can be avoided, the time for waiting the online authorization of the appointed account is reduced, and the file sharing efficiency is further improved.
It should be noted that, in the specific implementation, any one of the above three embodiments for obtaining the shared authorization information of the specified account may be adopted, or a combination of one or more embodiments may be adopted. For each designated account to be shared with the first file, whether the sharing authorization information of the designated account is stored in the server or not may be queried, and if yes, the sharing authorization information of the designated account is directly read; if not, sending a sharing authorization request to the appointed account, and receiving sharing authorization information returned by the appointed account. If the sharing authorization information returned by the designated account is not received within the preset time after the sharing authorization request is sent, acquiring social relation information between the target account and the designated account, and generating the sharing authorization information of the designated account based on the social relation information.
Next, with respect to the above step S63, in an alternative embodiment, as shown in fig. 7, the above step S63 may include:
in step S631, the target file is stored after being encrypted based on the encryption information of each of all the designated accounts to share the target file.
In step S632, the encrypted sharing message of the target file is sent to the client running the designated account.
In the embodiment, the files shared by the target accounts are encrypted and then are shared based on the encryption information of all the designated accounts, so that the files shared by the target accounts can be decrypted and checked only by collecting the encryption information of all the designated accounts, and further all the designated accounts sharing the files participate in the file sharing decryption process, and the method does not depend on the triggering party of the shared files any more, and improves the safety of the file checking process.
In other embodiments of the present disclosure, as shown in fig. 9, the method further includes:
in step S64, a request for viewing the target file by any account is received.
Any account may be a designated account of the target file, or may be other accounts other than the designated account, for example, other accounts in a friend list of the target account, or other accounts in the same group with the target account, or may be other accounts having no relation with the target account, which is not limited in the embodiments of the present disclosure.
In step S65, the respective sharing authorization information of all the designated accounts to be shared with the target file is obtained.
In step S66, the target file is processed according to the sharing authorization information of each of all the designated accounts of the target file, and the processed target file is returned to the account requesting to view the target file.
In the embodiment of the disclosure, the designated user triggering the shared file provides the sharing authorization information to realize file viewing, so that all user accounts sharing the file participate in the file viewing process, and the method does not depend on the triggering party of the shared file any more, thereby improving the safety of the file viewing process.
In the step S65, the sharing authorization information of all the designated accounts of the target file may be obtained in both an online manner and an offline manner. Next, these two modes will be described respectively.
Embodiment one: on-line acquisition mode
In this embodiment, as shown in fig. 10, step S65 may include:
in step S651, for each designated account in which the target file is to be shared, an authorized decryption request is sent to the client running the designated account.
In step S652, an authorization response returned by the client running the specified account is received, the authorization response including account information of the specified account and encryption information of the target file.
It should be noted that, the implementation process of this embodiment is similar to that of the embodiment shown in fig. 5, and in particular, please refer to the description of the embodiment shown in fig. 5, for redundancy reduction, no further description is given here.
By the method for acquiring the sharing authorization information of the designated account on line, the sharing authorization information of the designated account does not need to be stored in the server in advance, so that the occupation of storage resources of the server can be reduced, the sharing authorization information of the designated account can be prevented from being revealed, the safety of the sharing authorization information is improved, and the safety of the sharing file is further enhanced.
Embodiment two: off-line acquisition mode
In this embodiment, as shown in fig. 10, step S65 may include:
in step S653, the sharing authorization information of each of all the designated accounts of the locally stored target file is read.
And the sharing authorization information is uploaded to the server for storage after the assigned account confirms authorization.
It should be noted that, the implementation process of this embodiment is similar to that of the embodiment shown in fig. 5, and in particular, please refer to the description of the embodiment shown in fig. 5, for redundancy reduction, no further description is given here.
It can be appreciated that in this embodiment, by storing the respective sharing authorization information of all the designated accounts in the server in advance, so that the server can directly read the sharing authorization information from the local when needed, compared with an online acquisition mode, the problem that the sharing authorization information of the designated accounts cannot be acquired in time due to untimely response of the designated accounts can be avoided, and the time for waiting for authorization decryption of the designated accounts is reduced, so that the viewing efficiency of the shared file is improved.
In an alternative embodiment, for the sharing authorization information of the designated account acquired in the online manner, as shown in fig. 10, the step S66 may include:
in step S661, the account information and the encryption information in the received authorization response are verified based on the locally stored encryption information of the designated account.
In step S662, if the account information and the encryption information in the received authorization response are verified, the target file is decrypted based on the encryption information of each of all the designated accounts of the target file.
It should be noted that, the implementation process of this embodiment is similar to that of the embodiment shown in fig. 5, and in particular, please refer to the description of the embodiment shown in fig. 5, for redundancy reduction, no further description is given here.
It can be understood that, through the embodiment, the target file is decrypted based on the respective encryption information of all the designated accounts after the authorization response returned by all the designated accounts passes the verification, so that the content of the target file can be prevented from being stolen by an illegal account, and the security of the target file is further enhanced.
In another alternative embodiment, for the sharing authorization information of the designated account acquired in the offline manner, as shown in fig. 10, the step S66 may include:
in step S663, for each designated account in which the target file is to be shared, a social relationship between the designated account and the account requesting to view the target file is obtained.
In step S664, if the social relationship between each designated account to be shared with the target file and the account requesting to view the target file conforms to the social relationship of the designated account, decrypting the target file based on the encryption information of each designated account corresponding to the target file, wherein the sharing authorization information of the designated account further includes the social relationship permitted to be authorized by the designated account.
It should be noted that, the implementation process of this embodiment is similar to that of the embodiment shown in fig. 5, and in particular, please refer to the description of the embodiment shown in fig. 5, for redundancy reduction, no further description is given here.
It can be appreciated that in this embodiment, whether the target account obtains the permission of viewing the second file granted by the designated account is determined by the preset social relationship allowing authorization of the designated account, compared with a mode of waiting for each designated account to return an authorization response to process the second file based on the authorization response, the method of avoiding the fact that the second file cannot be processed in time due to untimely response of the designated account can be avoided, the time of waiting for response of the designated account is reduced, the processing time of the second file is further shortened, and the file viewing efficiency is improved. And the social relation between the target account and the appointed account is introduced in the decryption process, so that the relation between the second file and all related accounts is further enhanced.
It should be noted that the two embodiments of step S65 and step 66 may be adopted at the same time. For example, as shown in fig. 8, an account B requests to view a target file shared by an account a (i.e., a target account), and a server responds to a file viewing request of the account B for the target file, and checks the social relationship allowed by each of three designated accounts, namely an account B, an account C and an account D, corresponding to the target file. If the account C is queried to set the authorized social relationship as a friend relationship and the social relationship between the account B and the account C is a friend relationship, the account B can be determined to acquire the authority granted by the account C to view the target file, so that an authorization decryption request is not required to be sent to the account C. The server also sends an authorization decryption request to account B and account D, respectively, to request permission to be granted to view the target file. Then, the server receives an authorization response returned by the account B aiming at the authorization decryption request, verifies the account information and the encryption information in the authorization response returned by the account B based on the pre-stored account information and the encryption information of the account B, and if the verification is passed, the account B can be determined to acquire the authority granted by the account B for checking the target file; meanwhile, the server also receives an authorization response returned by the account D for the authorization decryption request, checks the account information and the encryption information in the authorization response returned by the account D based on the pre-stored account information and the encryption information of the account D, and if the account information and the encryption information pass the check, the account B can be determined to acquire the authority granted by the account D for viewing the target file. And under the condition that the account B is determined to acquire the authority granted by all the designated accounts for viewing the target file, decrypting the target file based on the encryption information of all the designated accounts, and returning the decrypted target file to the account B. Further, the server may also return the decrypted target file to account C and account D.
The present disclosure further provides a file sharing device, and fig. 11 is a block diagram of a file sharing device according to an exemplary embodiment, where the embodiment is illustrated by applying the file sharing device to a client, and the client may be the client 10 in the implementation environment shown in fig. 1. Referring to fig. 11, the file sharing apparatus 1100 may include: a first determination unit 1101, a first acquisition unit 1102, and a first sharing unit 1103.
The first determining unit 1101 is configured to perform determining at least one designated account to share the first file in response to a sharing request of the target account to the first file;
the first obtaining unit 1102 is configured to obtain sharing authorization information of the designated account;
the first sharing unit 1103 is configured to perform sharing of the first file with the designated account according to the sharing authorization information.
Optionally, the first obtaining unit 1102 is further configured to perform: sending a sharing authorization request to the designated account, wherein the sharing authorization request is used for requesting the designated account to set sharing authorization information of the first file;
and receiving the sharing authorization information returned by the appointed account.
Optionally, the first obtaining unit 1102 is further configured to perform: reading pre-stored sharing authorization information of the designated account from the local; or alternatively, the process may be performed,
and obtaining the sharing authorization information of the designated account from a server, wherein the sharing authorization information is uploaded to the server for storage after the designated account is authorized.
Optionally, the first obtaining unit 1102 is further configured to perform: acquiring social relation information of the target account and the designated account;
and generating sharing authorization information of the designated account based on the social relation information.
Optionally, the sharing authorization information of the designated account includes encryption information of the designated account on the first file; the first sharing unit 1103 is further configured to perform:
encrypting the first file based on the respective encryption information of all designated accounts to be shared with the first file;
and sharing the encrypted first file with the designated account.
Optionally, as shown in fig. 12, the apparatus 1100 further includes:
a file receiving unit 1104 configured to execute receiving a second file shared by any account through the target account;
A first authorization decryption obtaining unit 1105 further configured to perform obtaining the sharing authorization information of all designated accounts of the second file;
the first processing unit 1106 is further configured to execute processing the second file for viewing through the target account according to the sharing authorization information of each of all designated accounts of the second file.
Optionally, the first authorized-decryption obtaining unit 1105 is further configured to perform:
for each designated account of the second file, requesting to acquire sharing authorization information of the designated account from the designated account;
and receiving an authorization response returned by the designated account, wherein the authorization response comprises account information and encryption information of the designated account.
Optionally, the first processing unit 1106 is further configured to perform:
verifying the account information and the encryption information in the received authorization response based on the locally stored encryption information of the designated account;
and if the account information and the encryption information in the received authorization response pass verification, decrypting the second file based on the encryption information of all the designated accounts of the second file.
Optionally, the first authorized-decryption obtaining unit 1105 is further configured to perform:
Reading sharing authorization information of each designated account of the locally stored second file; or alternatively, the process may be performed,
and obtaining sharing authorization information of all the designated accounts of the second file from a server, wherein the sharing authorization information is uploaded to the server for storage after the designated accounts confirm authorization.
Optionally, the sharing authorization information of the designated account further includes a social relationship that the designated account allows authorization;
the first processing unit 1106 is further configured to perform:
for each designated account of the second file, acquiring a social relationship between the designated account and the target account;
and if the social relationship between each designated account of the second file and the target account accords with the social relationship allowed to be authorized by the designated account, decrypting the second file based on the encryption information of all designated accounts corresponding to the second file.
Optionally, the first determining unit 1101 is further configured to perform:
determining an account in a target group where the target account is located as the designated account; and/or the number of the groups of groups,
and determining the account in the friend list of the target account as the designated account.
The specific manner in which the individual units perform the operations in relation to the apparatus of the above embodiments has been described in detail in relation to the embodiments of the method and will not be described in detail here.
Fig. 13 is a block diagram of a file sharing device according to an exemplary embodiment, which is illustrated by the application of the file sharing device to a server, where the client may be the server 20 in the implementation environment shown in fig. 1. Referring to fig. 13, the file sharing apparatus 1300 may include: a first receiving unit 1301, a second acquiring unit 1302, and a first transmitting unit 1303.
The first receiving unit 1301 is configured to perform receiving a sharing request of a target account on a target file, where the sharing request carries account information of at least one designated account to share the target file.
The second obtaining unit 1302 is configured to obtain the sharing authorization information of the designated account based on the account information of the designated account.
The first sending unit 1303 is configured to perform sharing the target file to the designated account according to the sharing authorization information.
Optionally, the second obtaining unit 1302 is further configured to perform:
Sending a sharing authorization request to a client running the designated account based on the account information of the designated account, wherein the sharing authorization request is used for requesting the designated account to set the sharing authorization information of the target file;
and receiving sharing authorization information of the designated account returned by the client running the designated account.
Optionally, the second obtaining unit 1302 is further configured to perform:
and reading locally stored sharing authorization information of the designated account based on the account information of the designated account, wherein the sharing authorization information of the designated account is preset by the designated account and uploaded to the server.
Optionally, the second obtaining unit 1302 is further configured to perform:
acquiring social relations between the designated account and the target account based on account information of the designated account;
and generating sharing authorization information of the designated account based on the social relationship between the designated account and the target account.
Optionally, the sharing authorization information of the designated account includes encryption information of the designated account on the target file;
the first transmitting unit 1303 is further configured to perform:
Encrypting and storing the target file based on the encryption information of all designated accounts to be shared;
and sending the encrypted sharing message of the target file to the client running the designated account.
Optionally, as illustrated in fig. 14, the apparatus 1300 further includes:
a viewing request receiving unit 1304 configured to perform receiving a viewing request of any account for the target file;
a second authorization decryption obtaining unit 1305 configured to obtain the respective sharing authorization information of all the designated accounts of the target file to be shared;
a second processing unit 1306 configured to perform processing of the target file according to the sharing authorization information of each of all designated accounts of the target file, and return the processed target file to an account requesting to view the target file.
Optionally, the second authorization decryption obtaining unit 1305 is further configured to perform:
for each designated account to be shared with the target file, sending an authorized decryption request to a client running the designated account;
and receiving an authorization response returned by the client running the designated account, wherein the authorization response comprises account information of the designated account and encryption information of the target file.
Optionally, the second processing unit 1306 is further configured to perform:
verifying the account information and the encryption information in the received authorization response based on the locally stored encryption information of the designated account;
and if the account information and the encryption information in the received authorization response pass verification, decrypting the target file based on the respective encryption information of all the designated accounts of the target file.
Optionally, the second authorization decryption obtaining unit 1305 is further configured to perform: and reading the sharing authorization information of each designated account of the target file stored locally.
Optionally, the sharing authorization information of the designated account further includes a social relationship that the designated account allows authorization;
the second processing unit 1306 is further configured to perform:
for each designated account of the target file to be shared, acquiring a social relationship between the designated account and an account requesting to view the target file;
and if the social relationship between each designated account to be shared with the target file and the account requesting to view the target file accords with the social relationship of the designated account, decrypting the target file based on the encryption information of all designated accounts corresponding to the target file.
The specific manner in which the individual units perform the operations in relation to the apparatus of the above embodiments has been described in detail in relation to the embodiments of the method and will not be described in detail here.
Fig. 15 is a block diagram of a client 1500, according to an example embodiment. As shown in fig. 15, the client 1500 may include: a processor 1501, a memory 1502. The client 1500 can also include one or more of a multimedia component 1503, an i/O interface 1504, and a communication component 1505.
The processor 1501 is configured to control the overall operation of the client 1500 to complete all or part of the steps in the file sharing method described above. The memory 1502 is used to store various types of data to support operation at the client 1500, which may include, for example, instructions for any application or method operating on the client 1500, as well as application related data, such as contact data, messages sent and received, pictures, audio, video, and the like. The Memory 1502 may be implemented by any type or combination of volatile or non-volatile Memory devices, such as static random access Memory (Static Random Access Memory, SRAM for short), electrically erasable programmable Read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM for short), erasable programmable Read-Only Memory (Erasable Programmable Read-Only Memory, EPROM for short), programmable Read-Only Memory (Programmable Read-Only Memory, PROM for short), read-Only Memory (ROM for short), magnetic Memory, flash Memory, magnetic disk, or optical disk. The multimedia component 1503 may include a screen and an audio component. Wherein the screen may be, for example, a touch screen, the audio component being for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signals may be further stored in the memory 1502 or transmitted through the communication component 1505. The audio assembly further comprises at least one speaker for outputting audio signals. The I/O interface 1504 provides an interface between the processor 1501 and other interface modules, which may be a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. Communication component 1505 is used for wired or wireless communication between the client 1500 and other devices. Wireless communication, such as Wi-Fi, bluetooth, near field communication (Near Field Communication, NFC for short), 2G, 3G or 4G, or a combination of one or more thereof, and accordingly the communication component 1505 may comprise: wi-Fi module, bluetooth module, NFC module.
In an exemplary embodiment, the client 1500 may be implemented by one or more application specific integrated circuits (Application Specific Integrated Circuit, abbreviated as ASIC), digital signal processor (Digital Signal Processor, abbreviated as DSP), digital signal processing device (Digital Signal Processing Device, abbreviated as DSPD), programmable logic device (Programmable Logic Device, abbreviated as PLD), field programmable gate array (Field Programmable Gate Array, abbreviated as FPGA), controller, microcontroller, microprocessor, or other electronic component for performing the file sharing method described above.
In another exemplary embodiment, a computer readable storage medium is also provided, which includes program instructions that, when executed by a processor, implement the steps of the file sharing method described above. For example, the computer readable storage medium may be the memory 1502 including program instructions described above, which are executable by the processor 1501 of the client 1500 to perform the file sharing method described above.
Embodiments of the present disclosure also provide a computer program product comprising instructions that, when executed by a computer, cause the computer to perform the above-described file sharing method. For example, file sharing includes the steps of:
Responding to a sharing request of a target account on a first file, and determining at least one designated account to be shared with the first file;
obtaining sharing authorization information of the designated account;
and sharing the first file to the designated account according to the sharing authorization information.
The disclosed embodiments also provide a server, which may be server 20 in fig. 1. Fig. 16 is a block diagram of a server, according to an example embodiment. Referring to fig. 16, the server includes a processing component 1601 that further includes one or more processors and memory resources represented by a memory 1602 for storing instructions, such as applications, executable by the processing component 1601. The application program stored in memory 1602 may include one or more modules each corresponding to a set of instructions. Further, the processing component 1601 is configured to execute instructions to perform the file sharing method described above. For example, the file sharing method includes the following steps:
receiving a sharing request of a target account on a target file, wherein the sharing request carries account information of at least one designated account to be shared with the target file;
Acquiring sharing authorization information of the designated account based on the account information of the designated account;
and sharing the target file to the designated account according to the sharing authorization information.
The server may also include a power component 1603 configured to perform power management of the server, a wired or wireless network interface 1604 configured to connect the server to a network, and an input output (I/O) interface 1605. The server may operate based on an operating system stored in memory 1602, such as Windows Server, mac OS XTM, unixTM, linuxTM, freeBSDTM, or the like.
In an exemplary embodiment, a storage medium is also provided, such as a memory 1602, that includes instructions executable by a processor of the server 1600 to perform the file sharing method described above. For example, the file sharing method includes the following steps:
receiving a sharing request of a target account on a target file, wherein the sharing request carries account information of at least one designated account to be shared with the target file;
acquiring sharing authorization information of the designated account based on the account information of the designated account;
and sharing the target file to the designated account according to the sharing authorization information.
Alternatively, the storage medium may be a non-transitory computer readable storage medium, which may be, for example, ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.
Embodiments of the present disclosure also provide a computer program product comprising instructions that, when executed by a computer, cause the computer to perform the above-described file sharing method. For example, file sharing includes the steps of:
receiving a sharing request of a target account on a target file, wherein the sharing request carries account information of at least one designated account to be shared with the target file;
acquiring sharing authorization information of the designated account based on the account information of the designated account;
and sharing the target file to the designated account according to the sharing authorization information.
The embodiment of the disclosure also provides a file sharing system, which comprises the client and the server according to the embodiment of the disclosure. The client is used for responding to a sharing request of a target account on a target file, determining at least one designated account to be shared with the target file, and uploading account information of the target file and the at least one designated account to the server;
The server is configured to receive the target file and account information of the at least one designated account uploaded by the client, obtain sharing authorization information of the designated account based on the account information of the designated account, and share the target file with the designated account according to the sharing authorization information.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (26)

1. A method for sharing files, the method comprising:
Responding to a sharing request of a target account on a first file, and determining at least one designated account to be shared with the first file;
obtaining sharing authorization information of the designated account;
sharing the first file to the designated account according to the sharing authorization information;
the obtaining the sharing authorization information of the designated account includes:
sending a sharing authorization request to the designated account, wherein the sharing authorization request is used for requesting the designated account to set sharing authorization information of the first file; receiving sharing authorization information returned by the designated account, wherein the sharing authorization information comprises encryption information of the designated account on the first file;
if the sharing authorization information returned by the designated account is not received within a preset time after the sharing authorization request is sent, acquiring social relation information of the target account and the designated account, and generating the sharing authorization information of the designated account based on the social relation information, wherein the social relation information is used for verifying whether the social relation between the target account and the designated account meets the social relation allowing authorization.
2. The method of claim 1, wherein the obtaining the shared authorization information for the designated account comprises:
reading pre-stored sharing authorization information of the designated account from the local; or alternatively, the process may be performed,
and obtaining the sharing authorization information of the designated account from a server, wherein the sharing authorization information is uploaded to the server for storage after the designated account is authorized.
3. The method of claim 1, wherein the obtaining the shared authorization information for the designated account comprises:
acquiring social relation information of the target account and the designated account;
and generating sharing authorization information of the designated account based on the social relation information.
4. The method of claim 1, wherein the shared authorization information for the designated account includes encryption information for the first file by the designated account;
and sharing the first file to the designated account according to the sharing authorization information, including:
encrypting the first file based on the respective encryption information of all designated accounts to be shared with the first file;
and sharing the encrypted first file with the designated account.
5. The method according to claim 4, wherein the method further comprises:
receiving a second file shared by any account through the target account;
acquiring the sharing authorization information of all designated accounts of the second file;
and processing the second file according to the sharing authorization information of each of all the designated accounts of the second file so as to be checked through the target account.
6. The method of claim 5, wherein the obtaining the sharing authorization information for all designated accounts of the second file comprises:
for each designated account of the second file, requesting to acquire sharing authorization information of the designated account from the designated account;
and receiving an authorization response returned by the designated account, wherein the authorization response comprises account information and encryption information of the designated account.
7. The method of claim 6, wherein the processing the second file according to the sharing authorization information of each of all designated accounts of the second file comprises:
verifying the account information and the encryption information in the received authorization response based on the locally stored encryption information of the designated account;
And if the account information and the encryption information in the received authorization response pass verification, decrypting the second file based on the encryption information of all the designated accounts of the second file.
8. The method of claim 5, wherein the obtaining the sharing authorization information for all designated accounts of the second file comprises:
reading sharing authorization information of each designated account of the locally stored second file; or alternatively, the process may be performed,
and obtaining sharing authorization information of all the designated accounts of the second file from a server, wherein the sharing authorization information is uploaded to the server for storage after the designated accounts confirm authorization.
9. The method of claim 8, wherein the shared authorization information for the specified account further comprises a social relationship that the specified account allows authorization;
and processing the second file according to the sharing authorization information of each of all the designated accounts of the second file, including:
for each designated account of the second file, acquiring a social relationship between the designated account and the target account;
and if the social relationship between each designated account of the second file and the target account accords with the social relationship allowed to be authorized by the designated account, decrypting the second file based on the encryption information of all designated accounts corresponding to the second file.
10. The method of any of claims 1 to 9, wherein the determining at least one designated account to share the first file comprises:
determining an account in a target group where the target account is located as the designated account; and/or the number of the groups of groups,
and determining the account in the friend list of the target account as the designated account.
11. A method for sharing files, the method comprising:
receiving a sharing request of a target account on a target file, wherein the sharing request carries account information of at least one designated account to be shared with the target file;
acquiring sharing authorization information of the designated account based on the account information of the designated account;
sharing the target file to the designated account according to the sharing authorization information;
the obtaining the sharing authorization information of the designated account based on the account information of the designated account includes:
sending a sharing authorization request to a client running the designated account based on the account information of the designated account, wherein the sharing authorization request is used for requesting the designated account to set the sharing authorization information of the target file; receiving sharing authorization information of the designated account returned by a client running the designated account, wherein the sharing authorization information comprises encryption information of the designated account on the target file;
If the sharing authorization information returned by the client running the designated account is not received within a preset time after the sharing authorization request is sent, acquiring social relation information of the target account and the designated account based on the account information of the designated account, and generating the sharing authorization information of the designated account based on the social relation information, wherein the social relation information is used for verifying whether the social relation between the target account and the designated account meets the social relation allowing authorization.
12. The method of claim 11, wherein the obtaining the shared authorization information for the designated account based on the account information for the designated account comprises:
and reading locally stored sharing authorization information of the designated account based on the account information of the designated account, wherein the sharing authorization information of the designated account is preset by the designated account and uploaded to a server.
13. The method of claim 11, wherein the obtaining the shared authorization information for the designated account based on the account information for the designated account comprises:
acquiring social relations between the designated account and the target account based on account information of the designated account;
And generating sharing authorization information of the designated account based on the social relationship between the designated account and the target account.
14. The method of claim 11, wherein the shared authorization information for the designated account includes encryption information for the target file by the designated account;
and sharing the target file to the designated account according to the sharing authorization information, including:
encrypting and storing the target file based on the encryption information of all designated accounts to be shared;
and sending the encrypted sharing message of the target file to the client running the designated account.
15. The method of claim 14, wherein after the sending the encrypted sharing message of the target file to the client running the designated account, the method further comprises:
receiving a viewing request of any account for the target file;
acquiring respective sharing authorization information of all designated accounts of the target file to be shared;
and processing the target file according to the sharing authorization information of all the designated accounts of the target file, and returning the processed target file to the account requesting to view the target file.
16. The method of claim 15, wherein the obtaining the respective sharing authorization information of all designated accounts to share the target file comprises:
for each designated account to be shared with the target file, sending an authorized decryption request to a client running the designated account;
and receiving an authorization response returned by the client running the designated account, wherein the authorization response comprises account information of the designated account and encryption information of the target file.
17. The method of claim 16, wherein the processing the target file according to the sharing authorization information for each of all designated accounts of the target file comprises:
verifying the account information and the encryption information in the received authorization response based on the locally stored encryption information of the designated account;
and if the account information and the encryption information in the received authorization response pass verification, decrypting the target file based on the respective encryption information of all the designated accounts of the target file.
18. The method of claim 15, wherein the obtaining the respective sharing authorization information of all designated accounts to share the target file comprises:
And reading the sharing authorization information of each designated account of the target file stored locally.
19. The method of claim 18, wherein the shared authorization information for the specified account further comprises a social relationship that the specified account allows authorization;
the processing the target file according to the sharing authorization information of each of all designated accounts of the target file includes:
for each designated account of the target file to be shared, acquiring a social relationship between the designated account and an account requesting to view the target file;
and if the social relationship between each designated account to be shared with the target file and the account requesting to view the target file accords with the social relationship of the designated account, decrypting the target file based on the encryption information of all designated accounts corresponding to the target file.
20. A file sharing apparatus, the apparatus comprising:
the first determining unit is configured to execute a sharing request of a target account on a first file, and determine at least one designated account to share the first file;
the first acquisition unit is configured to acquire sharing authorization information of the designated account;
The first sharing unit is configured to perform sharing of the first file to the designated account according to the sharing authorization information;
the first acquisition unit is further configured to perform: sending a sharing authorization request to the designated account, wherein the sharing authorization request is used for requesting the designated account to set sharing authorization information of the first file; receiving sharing authorization information returned by the designated account, wherein the sharing authorization information comprises encryption information of the designated account on the first file; if the sharing authorization information returned by the designated account is not received within a preset time after the sharing authorization request is sent, acquiring social relation information of the target account and the designated account, and generating the sharing authorization information of the designated account based on the social relation information, wherein the social relation information is used for verifying whether the social relation between the target account and the designated account meets the social relation allowing authorization.
21. A file sharing apparatus, the apparatus comprising:
the first receiving unit is configured to execute receiving a sharing request of a target account to a target file, wherein the sharing request carries account information of at least one designated account to be shared with the target file;
A second acquisition unit configured to perform acquisition of sharing authorization information of the designated account based on account information of the designated account;
the first sending unit is configured to perform sharing of the target file to the designated account according to the sharing authorization information;
the second acquisition unit is further configured to perform:
sending a sharing authorization request to a client running the designated account based on the account information of the designated account, wherein the sharing authorization request is used for requesting the designated account to set the sharing authorization information of the target file; receiving sharing authorization information of the designated account returned by a client running the designated account, wherein the sharing authorization information comprises encryption information of the designated account on the target file;
if the sharing authorization information returned by the client running the designated account is not received within a preset time after the sharing authorization request is sent, acquiring social relation information of the target account and the designated account based on the account information of the designated account, and generating the sharing authorization information of the designated account based on the social relation information, wherein the social relation information is used for verifying whether the social relation between the target account and the designated account meets the social relation allowing authorization.
22. A client, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the file sharing method of any of claims 1 to 10.
23. A storage medium, which when executed by a processor of a client, enables the client to perform the file sharing method of any one of claims 1 to 10.
24. A server, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the file sharing method of any of claims 11 to 19.
25. A storage medium, which when executed by a processor of a server, enables the server to perform the file sharing method of any one of claims 11 to 19.
26. A file sharing system, comprising:
the client of claim 22;
the server of claim 24;
the client is used for responding to a sharing request of a target account on a target file, determining at least one designated account to be shared with the target file, and uploading account information of the target file and the at least one designated account to the server;
The server is configured to receive the target file and account information of the at least one designated account uploaded by the client, obtain sharing authorization information of the designated account based on the account information of the designated account, and share the target file with the designated account according to the sharing authorization information, where the obtaining the sharing authorization information of the designated account based on the account information of the designated account includes: sending a sharing authorization request to a client running the designated account based on the account information of the designated account, wherein the sharing authorization request is used for requesting the designated account to set the sharing authorization information of the target file, receiving the sharing authorization information of the designated account returned by the client running the designated account, and the sharing authorization information comprises the encryption information of the designated account on the target file; if the sharing authorization information returned by the client running the designated account is not received within a preset time after the sharing authorization request is sent, acquiring social relation information of the target account and the designated account based on the account information of the designated account, and generating the sharing authorization information of the designated account based on the social relation information, wherein the social relation information is used for verifying whether the social relation between the target account and the designated account meets the social relation allowing authorization.
CN201911110131.4A 2019-11-13 2019-11-13 File sharing method, device, system, client, server and storage medium Active CN111049726B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911110131.4A CN111049726B (en) 2019-11-13 2019-11-13 File sharing method, device, system, client, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911110131.4A CN111049726B (en) 2019-11-13 2019-11-13 File sharing method, device, system, client, server and storage medium

Publications (2)

Publication Number Publication Date
CN111049726A CN111049726A (en) 2020-04-21
CN111049726B true CN111049726B (en) 2023-06-30

Family

ID=70231919

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911110131.4A Active CN111049726B (en) 2019-11-13 2019-11-13 File sharing method, device, system, client, server and storage medium

Country Status (1)

Country Link
CN (1) CN111049726B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112100041A (en) * 2020-08-03 2020-12-18 联想(北京)有限公司 Processing method and device and electronic equipment
CN112163398A (en) * 2020-09-30 2021-01-01 金蝶软件(中国)有限公司 Chart sharing method and related equipment thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103002030A (en) * 2012-11-26 2013-03-27 北京百度网讯科技有限公司 File sharing method and system
CN104809406A (en) * 2015-04-30 2015-07-29 努比亚技术有限公司 Method and device for safe file sharing
CN107395558A (en) * 2012-07-03 2017-11-24 脸谱公司 For the method for communication, system and computer-readable non-transitory storage medium
CN109327534A (en) * 2018-11-07 2019-02-12 厦门美图移动科技有限公司 A kind of document transmission method, device, terminal and storage medium
CN110427146A (en) * 2019-06-18 2019-11-08 中国平安财产保险股份有限公司 Quick sharing method, mobile terminal and storage medium

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102420821B (en) * 2011-11-28 2015-05-27 飞天诚信科技股份有限公司 Method and system for improving transmission security of file
CN103297484B (en) * 2012-03-05 2017-07-11 腾讯科技(深圳)有限公司 resource sharing method and device
US20130283060A1 (en) * 2012-04-23 2013-10-24 Raghavendra Kulkarni Seamless Remote Synchronization and Sharing of Uniformly Encrypted Data for Diverse Platforms and Devices
CN103067465B (en) * 2012-12-20 2016-03-02 广东一一五科技股份有限公司 Sharing files method and system
US20140244736A1 (en) * 2013-02-22 2014-08-28 Artases OIKONOMIDIS File Sharing in a Social Network
CN104168320B (en) * 2014-08-19 2018-01-26 三星电子(中国)研发中心 The method and system that a kind of user data is shared
CN104410680A (en) * 2014-11-20 2015-03-11 北京奇虎科技有限公司 Method, client terminal, server and system of sharing file/file folder
CN104410679B (en) * 2014-11-20 2018-05-25 北京奇虎科技有限公司 Share extracting method, client, server and the system of file/folder
US20170353410A1 (en) * 2015-05-06 2017-12-07 Matt Gonzales Messaging Sharing System and Method of Use
CN106254467A (en) * 2016-08-05 2016-12-21 北京小米移动软件有限公司 Sharing files method and device
CN107181754A (en) * 2017-06-06 2017-09-19 江苏信源久安信息科技有限公司 A kind of method that many people of network file encryption and decryption mandate are shared
CN109005199A (en) * 2018-09-28 2018-12-14 哈尔滨百香果科技有限公司 A kind of quick encipher-decipher method when sharing files
CN109471844B (en) * 2018-10-10 2022-02-18 深圳市达仁基因科技有限公司 File sharing method and device, computer equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395558A (en) * 2012-07-03 2017-11-24 脸谱公司 For the method for communication, system and computer-readable non-transitory storage medium
CN103002030A (en) * 2012-11-26 2013-03-27 北京百度网讯科技有限公司 File sharing method and system
CN104809406A (en) * 2015-04-30 2015-07-29 努比亚技术有限公司 Method and device for safe file sharing
CN109327534A (en) * 2018-11-07 2019-02-12 厦门美图移动科技有限公司 A kind of document transmission method, device, terminal and storage medium
CN110427146A (en) * 2019-06-18 2019-11-08 中国平安财产保险股份有限公司 Quick sharing method, mobile terminal and storage medium

Also Published As

Publication number Publication date
CN111049726A (en) 2020-04-21

Similar Documents

Publication Publication Date Title
US10084789B2 (en) Peer to peer enterprise file sharing
CN109274652B (en) Identity information verification system, method and device and computer storage medium
US20170155660A1 (en) Controlling Electronically Communicated Resources
US8751809B2 (en) Method and device for securely sharing images across untrusted channels
CN113196702A (en) System and method for distributed data storage and transfer using blockchains
CN109815684B (en) Identity authentication method, system, server and storage medium
US10375064B2 (en) Method, apparatus, and system for remotely accessing cloud applications
CN107528830B (en) Account login method, system and storage medium
US9584508B2 (en) Peer to peer enterprise file sharing
US9571288B2 (en) Peer to peer enterprise file sharing
CN109831435B (en) Database operation method, system, proxy server and storage medium
CN112883366A (en) Account sharing login method, device, system, electronic equipment and storage medium
CN111049726B (en) File sharing method, device, system, client, server and storage medium
CN115412269A (en) Service processing method, device, server and storage medium
CN113422679A (en) Key generation method, device and system, encryption method, electronic device and computer-readable storage medium
KR102439776B1 (en) System and method for remote control, and client for executing the same
CN114760112B (en) Wireless local area network-oriented intelligent home equipment networking method, system, equipment and storage medium
CN110602075A (en) File stream processing method, device and system for encryption access control
CN115834051A (en) DID (digital information device) certificate data based secure storage method and device, authorization method and device, electronic equipment and storage medium
CN113051611B (en) Authority control method of online file and related product
CN112165381B (en) Key management system and method
CN109543367B (en) Quantum encryption-based software authorization method and device and storage medium
CN112182620B (en) Authorization method, terminal, WEB server and computer storage medium
CN110248166B (en) Video information processing method, client, electronic device and storage medium
CN115280718B (en) Method and system for secure private key distribution between authorized instances

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant