CN113568882A - OSS-based resource sharing method and system - Google Patents

OSS-based resource sharing method and system Download PDF

Info

Publication number
CN113568882A
CN113568882A CN202110887518.1A CN202110887518A CN113568882A CN 113568882 A CN113568882 A CN 113568882A CN 202110887518 A CN202110887518 A CN 202110887518A CN 113568882 A CN113568882 A CN 113568882A
Authority
CN
China
Prior art keywords
sharing
space
shared
user
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110887518.1A
Other languages
Chinese (zh)
Inventor
陈佳
向黎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Cangzhou Network Technology Co ltd
Original Assignee
Chongqing Cangzhou Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Cangzhou Network Technology Co ltd filed Critical Chongqing Cangzhou Network Technology Co ltd
Priority to CN202110887518.1A priority Critical patent/CN113568882A/en
Publication of CN113568882A publication Critical patent/CN113568882A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9554Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to the technical field of file sharing, and particularly discloses a resource sharing method and system based on oss. Generating an exclusive personal space for a user with an account on an oss cloud server, uploading resources to the personal space by a sharer, selecting the resources to be shared from the personal space, setting sharing time and whether encryption is carried out, and randomly generating a sharing code after the encryption is selected. And generating a shared space on the oss cloud service, adding the resources selected by the sharer to the shared space, and generating the two-dimensional code and the access link. The receiver can access the shared space through the two-dimensional code or the access link, and when the sharer selects encryption, the sharer can access the shared space only by inputting the sharing code. Compared with the prior art, the two-dimension code and the access link are adopted simultaneously, the shared space can be accessed through any one of the two modes, the two-dimension code is convenient to use, the two-dimension code can be directly scanned to enter the shared space, and the two-dimension code is easy to store.

Description

OSS-based resource sharing method and system
Technical Field
The invention relates to the technical field of file sharing, in particular to a resource sharing method and system based on oss.
Background
With the development and popularization of networks, the network disk technology is more and more widely applied, and the network disk, also called a network U disk and a network hard disk, is an online storage service provided by internet companies. A certain disk space is divided for a user through a server, and file management functions such as storage, access, backup and sharing of files are provided for the user.
When the sharer shares the resources in the network disk at present, the access link of the shared resources is usually sent to the receiver, but the mode that the receiver extracts the resources through the access link is complex, and the access link is not easy to store.
Disclosure of Invention
The invention aims to provide a sharing method based on oss resources, so that a receiver can extract and share more conveniently.
The basic scheme provided by the invention is as follows: an oss-based resource sharing method comprising the steps of:
resource uploading step: generating a special personal space for a user with an account in an oss cloud server, and receiving resources uploaded by the user;
resource sharing step: recording users providing shared resources as sharers, and acquiring the shared resources selected by the sharers and the set sharing rules;
time setting step: the method comprises the steps of obtaining sharing time of sharing resources set by a sharer, and obtaining the sharing time set by the sharer for each sharing resource when a plurality of sharing resources are selected by the sharer;
a verification setting step: acquiring whether a sharer encrypts shared resources, and if so, randomly generating a sharing code;
a link generation step: generating a shared space on the oss cloud server, adding shared resources to the shared space, generating a two-dimensional code and an access link, deleting the shared resources from the shared space after the set sharing time is reached, and deleting the shared space from the oss cloud server when the last shared resource in the shared space is deleted;
a block sharing step: packaging and uploading the two-dimensional code, the access link and the sharing code to a block chain node, and generating a node access key;
a link acquisition step: acquiring a two-dimensional code, an access link and a packaged file of a sharing code from a block link point according to an acquisition request sent by a user through an access key;
a resource obtaining step: the method comprises the steps of obtaining a request of accessing a shared space sent by a user through a two-dimension code or an access link, allowing the user sending the request to enter the shared space, and if a shared resource is encrypted, allowing the user sending the request to enter the shared space after obtaining a correct shared code input by the user sending the request.
The principle and the advantages of the invention are as follows: each user with an account has an exclusive personal space on the oss cloud server, the user can upload resources to the personal space for storage, a sharer selects a file to be shared from the personal space, a shared space is generated, shared resources are added to the shared space, and a two-dimensional code and an access link are generated. And the sharing time and whether the sharing time is encrypted can be selected, when a plurality of sharing resources exist, the sharing time can be set for each sharing resource, the sharing resources are deleted from the sharing space after the sharing time is up, and the sharing space is deleted from the oss cloud server after no file exists in the sharing space. The two-dimensional code, the access link and the sharing code are packaged and uploaded to the block chain node, an access key is generated, and the user can obtain the two-dimensional code, the access link and the sharing code from the block chain node through the access key. The user can enter the shared space by scanning the two-dimensional code or clicking the sharing link, and if the sharer selects encryption, the user can enter the shared space only by inputting the correct sharing code. Compared with the prior art, the two-dimension code and the access link are adopted at the same time, the shared space can be accessed through any one of the two modes, the two-dimension code is convenient to use, the two-dimension code can enter the shared space by directly scanning the two-dimension code and is easy to store, the two-dimension code, the access link and the shared code are uploaded to the block chain, and the safety of the two-dimension code, the access link and the shared code is ensured by utilizing the distributed storage of the block chain; by utilizing the non-tamper property of the block chain, the authenticity of the two-dimensional code, the access link and the sharing code is ensured, and the condition of false two-dimensional code, access link and sharing code is avoided; when the user shares, only the access key needs to be sent to the shared object instead of sending the two-dimensional code, the access link and the sharing code one by one, so that the method is more convenient.
Further, the method also comprises the following steps:
and identity binding step: each user account corresponds to a unique identity ID, the identity ID of a sharing target user of a sharer is obtained while the sharing resource selected by the sharer is obtained, the sharing target of the sharer is marked as a receiver, and a receiver identity ID list is generated;
a mirror image generation step: generating a mirror image space on an oss cloud server while generating a shared space, and generating mirror image resources with the same format and the same name as the shared resources in the mirror image space, wherein the content of the mirror image resources is empty;
and (3) identity authentication: when a request for accessing the shared space is sent by a user through a two-dimensional code or an access link, the identity ID of the current access user is obtained, whether the identity ID of the current access user exists in a receiver identity ID list or not is checked, if yes, the current access user enters the shared space, and if not, the current access user enters a mirror space.
Each user account corresponds to a unique identity ID, a sharer inputs the identity ID of a receiver during sharing, a mirror image space is generated, and a mirror image resource which has the same name and the same format as the shared resource but has empty content is generated in the mirror image space. After a user accesses the shared space through the access link or the two-dimensional code and inputs a correct shared code, whether the identity ID of the user is the identity ID of a receiver or not is judged, if yes, the user enters the shared space, and if not, the user enters the mirror space. Therefore, the two-dimension code, the access link and the sharing code are revealed in time, and a user who is not a receiver cannot acquire the content of the shared resource. And for the phenomenon that the web crawler crawls resources, after the web crawler crawls the leaked access links and sharing codes, the web crawler enters a mirror space, and the crawled mirror files are mirror files with empty contents. The mirror image file has the effects that when a web crawler crawls resources, if the web crawler directly refuses access, the web crawler can crawl all the time, the load of a server is increased, and when the web crawler crawls empty mirror image files, the web crawler directly leaves, and meanwhile, if the web crawler enters a space, a real user can judge whether the resources are needed through a file name file format.
Further, the step of authenticating further comprises the steps of:
the method comprises the following steps: an application channel is arranged in the mirror image space and used for acquiring a sharing application and an identity ID of a user entering the mirror image space;
step two: sending the sharing application and the user identity ID sending the sharing application to a sharer;
step three: and acquiring whether the sharer passes the sharing application, if so, adding the received identity ID into a receiver identity list, sending a permission notice to the user sending the sharing application, and if not, sending a refusal notice to the user sending the sharing application, and directly refusing to access when the user sends a request for accessing the shared space next time.
If it is the web crawler to get into the mirror image space, just can leave after it crawls mirror image resource, if it is real user to get into the mirror image space, it has certain demand to the resource in the shared space, search on the internet, just find the two-dimensional code revealed, visit link and share the code, set up application channel in the mirror image space, the user that has the demand can send share application and own ID to the sharer through the application channel in mirror image space, the sharer can choose whether to add the receiver to this user, after joining, this user just can get into the shared space. Thereby allowing users who have a need for the shared resource but are not the recipient to have an opportunity to apply for access rights to the shared resource.
Further, the step of authenticating further comprises the steps of:
step three: recording once when a user enters a mirror image space;
step four: according to a preset time threshold value, acquiring a user identity ID of which the time of entering the mirror space exceeds the time threshold value in unit time, adding an abnormal label to the identity ID, and refusing access to a user with the abnormal label in the identity ID when the user accesses any shared space.
For a user who normally acquires resources, the user only acquires the resources that the user currently wants to acquire when acquiring the resources, and therefore the number of times the user enters the mirror space does not exceed the number threshold. And the user who abnormally obtains the resource can search the two-dimensional code, the access link and the sharing code of various resource sharing spaces when obtaining the resource, the base number of the sharing application is increased in a broad-casting network mode, and the user who possibly does not know can obtain the application of the resource user through the abnormal. Therefore, an abnormal tag is added to the identity ID of which the number of times of entering the mirror space exceeds the number threshold in unit time, so that the identity ID refuses to access any shared space when accessing any shared space, the identity ID can not send a sharing application to a sharer, and the identity ID can not enter the shared space even if the sharer passes the sharing application.
Further, the method also comprises the following steps:
and (3) permission setting step: acquiring operation authority of a sharer for different receivers, and binding the set operation authority with the identity ID of the receiver;
and the authority implementation step: and after the receiver enters the shared space, providing the operation authority to the shared resource for the receiver according to the operation authority bound with the ID of the receiver.
The method comprises the steps of setting operation authorities for receivers, binding the operation authorities with identity IDs of the receivers, setting different operation authorities for different receivers, and when the operation authorities of shared resource storages provided by sharers for a plurality of receivers are intersected, generating a shared space for each receiver is not needed, only all shared resources are needed to be placed in one shared space, and setting operation authorities for different receivers.
The permission setting step includes the steps of:
the method comprises the following steps: acquiring operation permissions of different parts of a sharer on a single shared resource and set for different receivers;
step two: the method comprises the steps of obtaining the operation authority of a sharer on a plurality of shared resources, and setting one or more shared resources for different receivers.
For different receivers, the operation authority can be set for the local part of a single shared resource, and the operation authority can be set for one or more shared resources in a plurality of shared resources.
Further, the method also comprises the following resource integration steps: according to a preset time period and a source threshold value, when the identity ID of a user is added into a receiver identity ID list of a plurality of sharers in the time period and the number of the added receiver identity ID lists is larger than the source threshold value, an integration space is generated, sharing resources authorized by all the sharers to the user are added into the integration space, and the user can enter the integration space through a two-dimensional code or an access link of any sharer.
The time period is limited through the time period, the number of sharers is limited by the source threshold value, in one time period, a plurality of sharers share the same receiver, an integration space is generated, resources authorized by all the sharers to the receiver are added to the integration space, when the number of the sharers is too large, the number of the two-dimensional codes and the number of the access links received by the receiver are too large, it is troublesome to access each sharing space independently to extract the resources, errors are prone to occur, the sharing resources of all the sharers are added to the integration space, and the receivers can acquire all the sharing resources when entering the integration space.
The invention also provides a resource sharing method and system based on oss, wherein the system uses the resource sharing method based on oss and comprises the following contents:
the oss-based resource sharing system comprises an oss cloud server and a client, wherein the client comprises a resource sharing module of a resource uploading module and a resource acquiring module, and the oss cloud server comprises a space generating module, a time setting module, a resource deleting module, a verification encryption module, a block uploading module, a link acquiring module and a resource acquiring module;
the resource uploading module: for uploading resources to a personal space;
the resource sharing module: the system is used for selecting shared resources from the personal space and setting sharing rules;
a space generation module: the system comprises a sharing space, a two-dimension code and an access link, wherein the sharing space is used for generating a sharing space when resources are shared, the sharing resources are added to the sharing space, and the two-dimension code and the access link are generated;
the time setting module is used for setting sharing time during sharing;
the resource deleting module is used for deleting the shared resources from the shared space after the sharing time is reached;
verifying the encryption module: the method is used for setting whether to encrypt the shared resource, if so, a sharing code is randomly generated, and when the shared space is accessed through the two-dimensional code or the access link, the user can enter the shared space only if the correct sharing code is input;
a block uploading module: the system comprises a block chain node, a two-dimensional code, an access link and a sharing code, wherein the block chain node is used for transmitting the two-dimensional code, the access link and the sharing code to the block chain node in a packaging mode and generating a node access key;
a link acquisition module: the system comprises a block chain node, a block key and a sharing code, wherein the block chain node is used for acquiring a two-dimensional code, an access link and a packaging file of the sharing code through an acquisition request sent by the access key;
a resource acquisition module: the system is used for accessing the shared space through the two-dimension code or the access link and adding the shared resources in the shared space to the personal space or directly downloading the shared resources.
The sharer uploads the resources to the personal space through the resource uploading module, selects the shared resources from the personal space through the resource sharing module, and sets the sharing rule. The space generation module generates a shared space in the oss cloud server, adds shared resources to the shared space, generates the two-dimensional code and the access link, and can enter the shared space through the two-dimensional code or the access link. The sharing time is set through the time setting module, and when a plurality of sharing resources are selected, different sharing times can be set for different resources. And deleting the shared resources from the shared space by the resource deleting module after the set sharing time is reached. And encrypting the shared resource through the verification encryption module, and randomly generating a sharing code. The user needs to enter the correct sharing code to enter the shared space. Compared with the prior art, the two-dimension code and the access link are adopted simultaneously, the shared space can be accessed through any one of the two modes, the two-dimension code is convenient to use, the two-dimension code can be directly scanned to enter the shared space, and the two-dimension code is easy to store.
Furthermore, the oss cloud server further comprises an identity binding module, a mirror image space management module, an identity verification module, a login recording module and an abnormal marking module, and the client further comprises an identity input module and an application management module;
an identity binding module: the system comprises a user account, a server and a server, wherein the user account is used for generating a unique identity ID for the user account;
an identity input module: the system comprises a sharing server, a receiving server and a sharing server, wherein the sharing server is used for inputting the identity ID of a receiver and generating a receiver identity ID list when sharing;
the space generation module is also used for generating a mirror space while generating the shared space;
mirror image space management module: the method comprises the steps of generating a mirror image resource with the same format and the same name as shared resources in a mirror image space, wherein the content of the mirror image resource is empty;
an identity verification module: when a user accesses a shared space through a two-dimensional code or an access link and inputs a correct shared code, acquiring the identity ID of the user, comparing whether the identity ID of the user exists in a receiver identity ID list, if so, entering the shared space, and if not, entering a mirror space;
the mirror image space management module is also used for generating an application channel in the mirror image space, and the application channel is used for sending a sharing application and a user Identity (ID) to a sharer;
applying for a management module: the sharing server is used for selecting whether the sharing application passes or not after receiving the sharing application;
the log-in recording module: the mirror image space management system is used for recording the times of entering the mirror image space by a user;
abnormal marking module: and a time threshold is preset and is used for binding the user identity ID with the time exceeding the time threshold when the user identity ID enters the mirror space within the unit time.
And generating a unique identity ID for each user through an identity binding module, inputting the identity ID of a receiver through an identity input module when a sharer shares, and generating a receiver identity ID list. The space generation module generates a mirror space while generating the shared space, and generates empty mirror resources in the mirror space. After the user inputs the correct sharing code, the identity ID of the current user is obtained, whether the identity ID of the current user exists in the identity ID list of the receiver or not is judged, if yes, the user enters the sharing space, and if not, the user enters the mirror space. And an application channel is arranged in the mirror image space, and the sharing application and the identity ID of the sharer can be sent to the sharer through the application channel. The sharer receives the sharing application through the application management module and selects whether to pass or not. And the logging-in recording module records once when the user enters the execution space once, and the abnormal marking module is used for binding the user identity ID of which the times of entering the mirror space in unit time exceeds the time threshold with the abnormal label according to the preset time threshold.
By setting the mirror space, the two-dimensional code, the access link and the sharing code are leaked out in time, and a user who is not a receiver cannot acquire the content of the shared resource. And after crawling the leaked access link and sharing code, the web crawler enters a mirror space, and the crawled mirror file is also the mirror file with empty content. And if the web crawler enters the mirror space, the web crawler leaves after crawling the mirror resources, if the real user enters the mirror space, the web crawler has a certain requirement on the resources in the shared space, the two-dimensional code, the access link and the shared code which are leaked are found after searching on the Internet, and through setting the application channel, the user who has a requirement on the shared resources but is not a receiver has a chance to apply for the access permission of the shared resources.
For a user who normally acquires resources, the user only acquires the resources that the user currently wants to acquire when acquiring the resources, and therefore the number of times the user enters the mirror space does not exceed the number threshold. And the user who abnormally acquires the resource can search the two-dimensional codes, the access links and the sharing codes of various resource sharing spaces when acquiring the resource, so that an abnormal label is added to the identity ID of which the number of times of entering the mirror space exceeds the number threshold value in unit time, the user refuses to access any sharing space when accessing the sharing space, the user cannot send a sharing application to a sharer, and the user cannot enter the sharing space even if the sharer passes the sharing application.
Furthermore, the client also comprises an authority setting module, and the authority setting module comprises a single authority setting module and a plurality of authority setting modules;
the authority setting module: the system comprises a sharing server, a sharing server and a server, wherein the sharing server is used for setting operation authority to shared resources for a receiver and binding the operation authority with the ID of the receiver;
a single permission setting module: the system is used for setting operation authority for a single resource and setting operation authority for different receivers for different parts of the same shared resource;
a plurality of permission setting modules: the system comprises a plurality of sharing resources, a plurality of application servers and a plurality of application servers, wherein the application servers are used for setting operation permissions for the plurality of resources and setting the operation permissions for one or more sharing resources in the plurality of sharing resources for different receivers;
the server also comprises an integration module, a time period and a source threshold value are preset, when the ID of the user is added into the ID lists of the receivers of the plurality of sharers in the time period, and the number of the added ID lists of the receivers is larger than the source threshold value, the shared resources authorized by all the sharers for the user are integrated, and the space generation module generates an integration space when the shared resources are integrated and stores the integrated resources.
And setting different operation authorities for different receivers through the authority setting module. And for different receivers, the operation authority can be set for the local part of a single shared resource, and the operation authority can be set for one or more shared resources in a plurality of shared resources.
The sharing resources are integrated through the integration module, when a plurality of sharers share the resources with the same receiver, the number of the sharers is increased, the number of the two-dimensional codes and the number of the access links received by the receiver are increased, the resource extraction in each sharing space is troublesome to access independently, and errors are easy to occur, so that the sharing resources of each sharer are added to the integration space, and the receiver can obtain all the sharing resources after entering the integration space.
Drawings
FIG. 1 is a schematic flow chart illustrating a method for sharing resources based on oss according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a mirror space of an oss-based resource sharing method according to an embodiment of the present invention.
Detailed Description
The following is further detailed by way of specific embodiments:
the embodiment is basically as shown in the attached figure 1:
in the oss-based resource sharing method of the embodiment, an exclusive personal space is generated in an oss cloud server for a user with an account, the user can upload resources to the personal space, when a sharer shares the resources in the personal space, the resource to be shared is selected in the personal space and a sharing rule is set, and one or more resources can be simultaneously selected for sharing, the sharing rule setting includes time setting and verification setting, the time setting is set to be sharing time for sharing the resources, in the embodiment, the time selectable by the sharing time includes 7 days, 30 days and no deadline, and when the shared resources selected by the sharer are multiple, the sharer can also set sharing time for each shared resource. The verification setting is that whether the sharer needs to encrypt or not is set, and if the selection is yes, a sharing code consisting of numbers and letters is randomly generated. After the sharing rule is set, a sharing space is generated on the oss cloud server, the sharing resources selected by the sharer are added to the sharing space, and the two-dimensional code and the access link are generated.
And then the two-dimensional code, the access link and the sharing code are packaged and uploaded to a block chain node, an access key is generated, a sharer sends the access key to a receiver, when the sharer obtains access by the access key, the two-dimensional code, the access link and the sharing code are obtained from the block chain node, the receiver can access the sharing space by scanning the two-dimensional code or clicking the access link, and the sharing resource in the sharing space is downloaded or added to the personal space of the receiver. And deleting the shared resources from the shared space after the set period of the sharing time is reached, and deleting the shared space from the oss cloud server after the last shared resource is deleted from the shared space.
In addition, in order to ensure that the resource shared by the sharer is not leaked, as shown in fig. 2, the present invention further provides that each user account corresponds to a unique identity ID, in this embodiment, the identity ID is a digital ID, and when the sharer selects encryption, the sharer needs to input the identity ID of the receiver and generate a receiver identity ID list. And generating a mirror image space while generating the shared space, and generating mirror image resources which have the same format and the same name as the shared resources but have empty contents in the mirror image space, wherein the sequencing and the file architecture of the mirror image resources in the mirror image space are the same as the sequencing and the file architecture of the shared resources in the shared space.
When a user accesses the space through the two-dimension code or the access link and inputs a correct sharing code, acquiring the identity ID of the currently accessed user, comparing whether the identity ID exists in the identity ID list of the receiver, if so, entering the sharing space, and if not, entering the sharing space. Therefore, the two-dimensional code or the access link and the sharing code are prevented from entering the shared space but entering the mirror space when being leaked. And by setting the mirror image resource with empty content in the mirror image space, when a web crawler acquires the leaked access link and the sharing code from the internet and crawls the sharing resource, the mirror image resource with empty content is only crawled from the mirror image space.
In addition, an application channel is further arranged in the mirror image space, and a user entering the mirror image space can send the own identity ID to a sharer through the application channel and share the application, so that the reason and reason for obtaining the resources are explained. If the real user enters the mirror space and has a certain requirement on the shared resource in the shared space, the real user obtains the two-dimensional code or the access link and the shared code of the shared space after searching on the internet in a certain mode, and therefore an application channel is set, and the real user applies for the access permission to the sharer. And if the web crawler enters the mirror image space, the web crawler directly crawls to an empty mirror image file and then directly leaves. Therefore, a channel for acquiring resources is added for users with requirements.
After receiving the sharing application, the sharer can select whether to add the user sending the sharing application into the receiver identity ID list, and if so, the sharer adds the identity ID of the user to the receiver identity ID list and sends a permission notice to the user. If not, a rejection notice is sent to the user, and the user directly rejects the access when accessing through the two-dimensional code or the access link again.
And when the user enters the mirror image space once, recording once, acquiring the user identity ID of which the number of times of entering the mirror image space exceeds the number threshold in unit time according to the preset number threshold, adding an abnormal label to the user identity ID, and directly refusing access to the user with the abnormal label when the user identity ID accesses any shared space. In this embodiment, the unit time is one hour, and the number threshold is 6 times. For a user who normally obtains resources, after entering a mirror space and sending a sharing application, firstly, the user waits for a processing result of a sharer, if the user passes the application, the user does not search for access links or two-dimensional codes of other sharing spaces, and if the user does not pass the application, the user continues to search, and time for waiting feedback of the sharer is provided between the user and the sharer, so that the number of times of entering the mirror space within one hour does not exceed a number threshold. For users who abnormally acquire resources, the users continuously enter the mirror space through the two-dimensional codes or the access links, share applications are sent, more resources are acquired by increasing the base number of the request, and therefore the number of times that the users who abnormally acquire resources enter the mirror space within one hour exceeds the threshold value. The user identity ID which enters the shared space for more than six times in one hour is added with the abnormal label, so that the user can not access any shared space, and even if an unknown sharer passes through the sharing application of the user who abnormally obtains the resource, the user who abnormally obtains the resource can not enter the shared space to obtain the resource.
The embodiment also discloses an oss-based resource sharing system using the oss-based resource sharing method, which includes the following contents:
the system comprises an oss cloud server and a client, wherein the client comprises a resource sharing module and a resource acquisition module of a resource uploading module, and the oss cloud server comprises a space generation module, a time setting module, a resource deletion module, a verification encryption module, a block uploading module, a link acquisition module and a resource acquisition module;
the resource uploading module: for uploading resources to a personal space;
the resource sharing module: the system is used for selecting shared resources from the personal space and setting sharing rules;
a space generation module: the system comprises a sharing space, a two-dimension code and an access link, wherein the sharing space is used for generating a sharing space when resources are shared, the sharing resources are added to the sharing space, and the two-dimension code and the access link are generated;
the time setting module is used for setting sharing time during sharing;
the resource deleting module is used for deleting the shared resources from the shared space after the sharing time is reached;
verifying the encryption module: the method is used for setting whether to encrypt the shared resource, if so, a sharing code is randomly generated, and when the shared space is accessed through the two-dimensional code or the access link, the user can enter the shared space only if the correct sharing code is input;
a block uploading module: the system comprises a block chain node, a two-dimensional code, an access link and a sharing code, wherein the block chain node is used for transmitting the two-dimensional code, the access link and the sharing code to the block chain node in a packaging mode and generating a node access key;
a link acquisition module: the system comprises a block chain node, a block key and a sharing code, wherein the block chain node is used for acquiring a two-dimensional code, an access link and a packaging file of the sharing code through an acquisition request sent by the access key;
a resource acquisition module: the system is used for accessing the shared space through the two-dimension code or the access link and adding the shared resources in the shared space to the personal space or directly downloading the shared resources.
The oss cloud server further comprises an identity binding module, a mirror image space management module, an identity verification module, a login recording module and an abnormal marking module, and the client further comprises an identity input module and an application management module;
an identity binding module: the system comprises a user account, a server and a server, wherein the user account is used for generating a unique identity ID for the user account;
an identity input module: the system comprises a sharing server, a receiving server and a sharing server, wherein the sharing server is used for inputting the identity ID of a receiver and generating a receiver identity ID list when sharing;
the space generation module is also used for generating a mirror space while generating the shared space;
mirror image space management module: the method comprises the steps of generating a mirror image resource with the same format and the same name as shared resources in a mirror image space, wherein the content of the mirror image resource is empty;
an identity verification module: when a user accesses a shared space through a two-dimensional code or an access link and inputs a correct shared code, acquiring the identity ID of the user, comparing whether the identity ID of the user exists in a receiver ID list, if so, entering the shared space, and if not, entering a mirror space;
the mirror image space management module is also used for generating an application channel in the mirror image space, and the application channel is used for sending a sharing application and a user Identity (ID) to a sharer;
applying for a management module: the sharing server is used for selecting whether the sharing application passes or not after receiving the sharing application;
the log-in recording module: the mirror image space management system is used for recording the times of entering the mirror image space by a user;
abnormal marking module: and a time threshold is preset and is used for binding the user identity ID with the time exceeding the time threshold when the user identity ID enters the mirror space within the unit time.
Example two
The difference between this embodiment and the first embodiment is that when setting the sharing rule, the sharer may further set an operation right of the receiver to the shared resource, in this embodiment, the operation right includes a storage right and a modification right, and the storage right is that the receiver can only download the shared resource from the shared space or add the shared resource to the personal space; the modification authority is that the receiver can modify the shared resource in the shared space.
And the sharer can set operation authority for a single shared resource, and set operation authority of different parts for the same shared resource for different receivers, for example, for a total 20 pages of document resources, the receiver includes a user a, a user B and a user C, the sharer sets storage authority for the user a in the whole text, sets modification authority for the user B in the first 10 pages, and sets modification authority for the user C in the last 10 pages.
In addition, the sharer can set operation permissions for the multiple shared resources, and set operation permissions of one or more shared resources of the multiple shared resources for different sharers, for example, the sharer shares three shared resources including a first resource, a second resource, and a third resource, sets storage permissions of the first resource and the second resource for the user a, sets modification permissions of the second resource and the third resource for the user B, and sets storage permissions of the third resource for the user C. Therefore, when the sharer has intersection for the resources shared by a plurality of receivers, only one two-dimensional code and access link are needed instead of a plurality of two-dimensional codes and access links.
The embodiment also discloses an oss-based resource sharing system using the oss-based resource sharing method, which includes the following contents:
the client also comprises an authority setting module, and the authority setting module comprises a single authority setting module and a plurality of authority setting modules;
the authority setting module: the system comprises a sharing server, a sharing server and a server, wherein the sharing server is used for setting operation authority to shared resources for a receiver and binding the operation authority with the ID of the receiver;
a single permission setting module: the system is used for setting operation authority for a single resource and setting operation authority for different receivers for different parts of the same shared resource;
a plurality of permission setting modules: the method is used for setting operation authority for a plurality of resources and setting operation authority for one or more shared resources in a plurality of shared resources for different receivers.
EXAMPLE III
The difference between the embodiment and the second embodiment is that a time period and a source threshold are set, in the time period, the identity ID of the user is added to the recipient ID lists of the multiple sharers, and when the number of the added recipient ID lists is greater than the source threshold, an integration space is generated, the sharing resources authorized by all the sharers for the user are added to the integration space, and the user can enter the integration space through the two-dimensional code or the access link of any one sharer.
Specifically, in this embodiment, the time period is three days, the source threshold is 10, when in three days, more than ten sharers share the same receiver, and at this time, the receiver needs to enter 10 shared spaces to operate the shared resources, which is troublesome and prone to error, so that an integrated space is generated, all the sharers add the shared resources authorized by the receiver to the integrated space, for example, the shared space of one sharer has three shared resources, and the sharer sets a storage right only for the first resource, and only adds the first resource to the integrated space. After the resource is added to the integration space, the receiver accesses the sharing space through the two-dimensional code or the access link of any sharer, and the sharing space is accessed to the integration space. Thereby reducing the intermediary process of the receiver entering multiple shared spaces for operation.
The embodiment also discloses an oss-based resource sharing system using the oss-based resource sharing method, which includes the following contents:
the server also comprises an integration module, a time period and a source threshold value are preset, when the ID of the user is added into the ID lists of the receivers of the plurality of sharers in the time period, and the number of the added ID lists of the receivers is larger than the source threshold value, the shared resources authorized by all the sharers for the user are integrated, and the space generation module generates an integration space when the shared resources are integrated and stores the integrated resources.
The foregoing are merely exemplary embodiments of the present invention, and no attempt is made to show structural details of the invention in more detail than is necessary for the fundamental understanding of the art, the description taken with the drawings making apparent to those skilled in the art how the several forms of the invention may be embodied in practice with the teachings of the invention. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (10)

1. The oss-based resource sharing method is characterized by comprising the following steps: the method comprises the following steps:
resource uploading step: generating a special personal space for a user with an account in an oss cloud server, and receiving resources uploaded by the user;
resource sharing step: recording users providing shared resources as sharers, and acquiring the shared resources selected by the sharers and the set sharing rules;
time setting step: the method comprises the steps of obtaining sharing time of sharing resources set by a sharer, and obtaining the sharing time set by the sharer for each sharing resource when a plurality of sharing resources are selected by the sharer;
a verification setting step: acquiring whether a sharer encrypts shared resources, and if so, randomly generating a sharing code;
a link generation step: generating a shared space on the oss cloud server, adding shared resources to the shared space, generating a two-dimensional code and an access link, deleting the shared resources from the shared space after the set sharing time is reached, and deleting the shared space from the oss cloud server when the last shared resource in the shared space is deleted;
a block sharing step: packaging and uploading the two-dimensional code, the access link and the sharing code to a block chain node, and generating a node access key;
a link acquisition step: acquiring a two-dimensional code, an access link and a packaged file of a sharing code from a block link point according to an acquisition request sent by a user through an access key;
a resource obtaining step: the method comprises the steps of obtaining a request of accessing a shared space sent by a user through a two-dimension code or an access link, allowing the user sending the request to enter the shared space, and if a shared resource is encrypted, allowing the user sending the request to enter the shared space after obtaining a correct shared code input by the user sending the request.
2. The oss-based resource sharing method according to claim 1, wherein: further comprising the steps of:
and identity binding step: each user account corresponds to a unique identity ID, the identity ID of a sharing target user of a sharer is obtained while the sharing resource selected by the sharer is obtained, the sharing target of the sharer is marked as a receiver, and a receiver identity ID list is generated;
a mirror image generation step: generating a mirror image space on an oss cloud server while generating a shared space, and generating mirror image resources with the same format and the same name as the shared resources in the mirror image space, wherein the content of the mirror image resources is empty;
and (3) identity authentication: when a request for accessing the shared space is sent by a user through a two-dimensional code or an access link, the identity ID of the current access user is obtained, whether the identity ID of the current access user exists in a receiver identity ID list or not is checked, if yes, the current access user enters the shared space, and if not, the current access user enters a mirror space.
3. The oss-based resource sharing method according to claim 2, wherein: the step of authenticating further comprises the steps of:
the method comprises the following steps: an application channel is arranged in the mirror image space and used for acquiring a sharing application and an identity ID of a user entering the mirror image space;
step two: sending the sharing application and the user identity ID sending the sharing application to a sharer;
step three: and acquiring whether the sharer passes the sharing application, if so, adding the received identity ID into a receiver identity list, sending a permission notice to the user sending the sharing application, and if not, sending a refusal notice to the user sending the sharing application, and directly refusing to access when the user sends a request for accessing the shared space next time.
4. The oss-based resource sharing method according to claim 3, wherein: the step of authenticating further comprises the steps of:
step three: recording once when a user enters a mirror image space;
step four: according to a preset time threshold value, acquiring a user identity ID of which the time of entering the mirror space exceeds the time threshold value in unit time, adding an abnormal label to the identity ID, and refusing access to a user with the abnormal label in the identity ID when the user accesses any shared space.
5. The oss-based resource sharing method according to claim 4, wherein: further comprising the steps of:
and (3) permission setting step: acquiring operation authority of a sharer for different receivers, and binding the set operation authority with the identity ID of the receiver;
and the authority implementation step: and after the receiver enters the shared space, providing the operation authority to the shared resource for the receiver according to the operation authority bound with the ID of the receiver.
6. The oss-based resource sharing method according to claim 5, wherein:
the permission setting step includes the steps of:
the method comprises the following steps: acquiring operation permissions of different parts of a sharer on a single shared resource and set for different receivers;
step two: the method comprises the steps of obtaining the operation authority of a sharer on a plurality of shared resources, and setting one or more shared resources for different receivers.
7. The oss-based resource sharing method according to claim 6, wherein:
the method also comprises the following resource integration steps: according to a preset time period and a source threshold value, when the identity ID of a user is added into a receiver identity ID list of a plurality of sharers in the time period and the number of the added receiver identity ID lists is larger than the source threshold value, an integration space is generated, sharing resources authorized by all the sharers to the user are added into the integration space, and the user can enter the integration space through a two-dimensional code or an access link of any sharer.
8. An os-based resource sharing system using the os-based resource sharing method according to claim 7, wherein: the system comprises an oss cloud server and a client, wherein the client comprises a resource sharing module and a resource acquisition module of a resource uploading module, and the oss cloud server comprises a space generation module, a time setting module, a resource deletion module, a verification encryption module, a block uploading module, a link acquisition module and a resource acquisition module;
the resource uploading module: for uploading resources to a personal space;
the resource sharing module: the system is used for selecting shared resources from the personal space and setting sharing rules;
a space generation module: the system comprises a sharing space, a two-dimension code and an access link, wherein the sharing space is used for generating a sharing space when resources are shared, the sharing resources are added to the sharing space, and the two-dimension code and the access link are generated;
the time setting module is used for setting sharing time during sharing;
the resource deleting module is used for deleting the shared resources from the shared space after the sharing time is reached;
verifying the encryption module: the method is used for setting whether to encrypt the shared resource, if so, a sharing code is randomly generated, and when the shared space is accessed through the two-dimensional code or the access link, the user can enter the shared space only if the correct sharing code is input;
a block uploading module: the system comprises a block chain node, a two-dimensional code, an access link and a sharing code, wherein the block chain node is used for transmitting the two-dimensional code, the access link and the sharing code to the block chain node in a packaging mode and generating a node access key;
a link acquisition module: the system comprises a block chain node, a block key and a sharing code, wherein the block chain node is used for acquiring a two-dimensional code, an access link and a packaging file of the sharing code through an acquisition request sent by the access key;
a resource acquisition module: the system is used for accessing the shared space through the two-dimension code or the access link and adding the shared resources in the shared space to the personal space or directly downloading the shared resources.
9. The oss-based resource sharing system according to claim 8, wherein: the oss cloud server further comprises an identity binding module, a mirror image space management module, an identity verification module, a login recording module and an abnormal marking module, and the client further comprises an identity input module and an application management module;
an identity binding module: the system comprises a user account, a server and a server, wherein the user account is used for generating a unique identity ID for the user account;
an identity input module: the system comprises a sharing server, a receiving server and a sharing server, wherein the sharing server is used for inputting the identity ID of a receiver and generating a receiver identity ID list when sharing;
the space generation module is also used for generating a mirror space while generating the shared space;
mirror image space management module: the method comprises the steps of generating a mirror image resource with the same format and the same name as shared resources in a mirror image space, wherein the content of the mirror image resource is empty;
an identity verification module: when a user accesses a shared space through a two-dimensional code or an access link and inputs a correct shared code, acquiring the identity ID of the user, comparing whether the identity ID of the user exists in a receiver identity ID list, if so, entering the shared space, and if not, entering a mirror space;
the mirror image space management module is also used for generating an application channel in the mirror image space, and the application channel is used for sending a sharing application and a user Identity (ID) to a sharer;
applying for a management module: the sharing server is used for selecting whether the sharing application passes or not after receiving the sharing application;
the log-in recording module: the mirror image space management system is used for recording the times of entering the mirror image space by a user;
abnormal marking module: and a time threshold is preset and is used for binding the user identity ID with the time exceeding the time threshold when the user identity ID enters the mirror space within the unit time.
10. The oss-based resource sharing system according to claim 9, wherein: the client also comprises an authority setting module, and the authority setting module comprises a single authority setting module and a plurality of authority setting modules;
the authority setting module: the system comprises a sharing server, a sharing server and a server, wherein the sharing server is used for setting operation authority to shared resources for a receiver and binding the operation authority with the ID of the receiver;
a single permission setting module: the system is used for setting operation authority for a single resource and setting operation authority for different receivers for different parts of the same shared resource;
a plurality of permission setting modules: the system comprises a plurality of sharing resources, a plurality of application servers and a plurality of application servers, wherein the application servers are used for setting operation permissions for the plurality of resources and setting the operation permissions for one or more sharing resources in the plurality of sharing resources for different receivers;
the server also comprises an integration module, a time period and a source threshold value are preset, when the ID of the user is added into the ID lists of the receivers of the plurality of sharers in the time period, and the number of the added ID lists of the receivers is larger than the source threshold value, the shared resources authorized by all the sharers for the user are integrated, and the space generation module generates an integration space when the shared resources are integrated and stores the integrated resources.
CN202110887518.1A 2021-08-03 2021-08-03 OSS-based resource sharing method and system Pending CN113568882A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110887518.1A CN113568882A (en) 2021-08-03 2021-08-03 OSS-based resource sharing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110887518.1A CN113568882A (en) 2021-08-03 2021-08-03 OSS-based resource sharing method and system

Publications (1)

Publication Number Publication Date
CN113568882A true CN113568882A (en) 2021-10-29

Family

ID=78170099

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110887518.1A Pending CN113568882A (en) 2021-08-03 2021-08-03 OSS-based resource sharing method and system

Country Status (1)

Country Link
CN (1) CN113568882A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113868201A (en) * 2021-12-02 2021-12-31 天津联想协同科技有限公司 Method, device and storage medium for sharing file by cooperation of multiple persons
CN115118516A (en) * 2022-07-18 2022-09-27 浪潮卓数大数据产业发展有限公司 Method, system and medium for integrated resource management
CN117056950A (en) * 2023-08-09 2023-11-14 淮安瀚唐信息技术有限公司 Man-machine interaction system and method based on information sharing

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771532A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Method, device and system for realizing resource sharing
CN103095852A (en) * 2013-02-27 2013-05-08 上海够快网络科技有限公司 Cloud storage file sharing method based on two-dimensional code
CN106815297A (en) * 2016-12-09 2017-06-09 宁波大学 A kind of academic resources recommendation service system and method
CN107566405A (en) * 2017-10-18 2018-01-09 成都索贝数码科技股份有限公司 A kind of quick memory resource pool method for accessing and copying
CN108462568A (en) * 2018-02-11 2018-08-28 西安电子科技大学 A kind of secure file storage and sharing method based on block chain
US10182046B1 (en) * 2015-06-23 2019-01-15 Amazon Technologies, Inc. Detecting a network crawler
CN109768987A (en) * 2019-02-26 2019-05-17 重庆邮电大学 A kind of storage of data file security privacy and sharing method based on block chain
CN111245838A (en) * 2020-01-13 2020-06-05 四川坤翔科技有限公司 Method for protecting key information by anti-crawler
CN112749315A (en) * 2021-01-15 2021-05-04 大连海关技术中心 Topic portal website crawler method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771532A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Method, device and system for realizing resource sharing
CN103095852A (en) * 2013-02-27 2013-05-08 上海够快网络科技有限公司 Cloud storage file sharing method based on two-dimensional code
US10182046B1 (en) * 2015-06-23 2019-01-15 Amazon Technologies, Inc. Detecting a network crawler
CN106815297A (en) * 2016-12-09 2017-06-09 宁波大学 A kind of academic resources recommendation service system and method
CN107566405A (en) * 2017-10-18 2018-01-09 成都索贝数码科技股份有限公司 A kind of quick memory resource pool method for accessing and copying
CN108462568A (en) * 2018-02-11 2018-08-28 西安电子科技大学 A kind of secure file storage and sharing method based on block chain
CN109768987A (en) * 2019-02-26 2019-05-17 重庆邮电大学 A kind of storage of data file security privacy and sharing method based on block chain
CN111245838A (en) * 2020-01-13 2020-06-05 四川坤翔科技有限公司 Method for protecting key information by anti-crawler
CN112749315A (en) * 2021-01-15 2021-05-04 大连海关技术中心 Topic portal website crawler method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113868201A (en) * 2021-12-02 2021-12-31 天津联想协同科技有限公司 Method, device and storage medium for sharing file by cooperation of multiple persons
CN113868201B (en) * 2021-12-02 2022-03-15 天津联想协同科技有限公司 Method, device and storage medium for sharing file by cooperation of multiple persons
CN115118516A (en) * 2022-07-18 2022-09-27 浪潮卓数大数据产业发展有限公司 Method, system and medium for integrated resource management
CN115118516B (en) * 2022-07-18 2024-08-27 浪潮卓数大数据产业发展有限公司 Method, system and medium for integrated resource management
CN117056950A (en) * 2023-08-09 2023-11-14 淮安瀚唐信息技术有限公司 Man-machine interaction system and method based on information sharing
CN117056950B (en) * 2023-08-09 2024-05-17 淮安瀚唐信息技术有限公司 Man-machine interaction system and method based on information sharing

Similar Documents

Publication Publication Date Title
CN113568882A (en) OSS-based resource sharing method and system
US7640578B2 (en) System and method for providing secure communication between computer systems
US8788803B2 (en) Self-encryption process
CN105516110B (en) Mobile device security data transmission method
CN102483792B (en) For the method and apparatus of shared document
US7774611B2 (en) Enforcing file authorization access
US20200382474A1 (en) System And Method For Encryption, Storage And Transmission Of Digital Information
US20140053252A1 (en) System and Method for Secure Document Distribution
CN103051600A (en) File access control method and system
CN105450750A (en) Secure interaction method for intelligent terminal
CN101681333A (en) Checking is to the method and system of the permission of remote computer system accessed web page
EP3185465A1 (en) A method for encrypting data and a method for decrypting data
Kügler An analysis of gnunet and the implications for anonymous, censorship-resistant networks
CN111414647A (en) Tamper-proof data sharing system and method based on block chain technology
CN114547209B (en) Data sharing interaction method and system based on block chain
KR20190111261A (en) Security Management System using Block Chain Technology and Method thereof
US9325679B2 (en) Method and apparatus for communicating information between devices
CN111767551A (en) Browsing permission control method and system based on block chain
KR102154292B1 (en) Method for processing Query between Clients connected to a Blockchain and Service Provider
CN112818401A (en) Block chain health file management system
CN118679477A (en) Secure collaboration using file encryption at download
CN115022090A (en) Data sharing method and system, electronic equipment and computer storage medium
Ghutugade et al. Privacy preserving auditing for shared data in cloud
JP7361384B2 (en) Electronic application assistance method, electronic application assistance system, electronic application assistance system program and its recording medium
Waldman et al. The architecture of robust publishing systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination