CN114745372A - File sending method and related equipment - Google Patents

File sending method and related equipment Download PDF

Info

Publication number
CN114745372A
CN114745372A CN202210504324.3A CN202210504324A CN114745372A CN 114745372 A CN114745372 A CN 114745372A CN 202210504324 A CN202210504324 A CN 202210504324A CN 114745372 A CN114745372 A CN 114745372A
Authority
CN
China
Prior art keywords
target
certificate
original file
sending
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210504324.3A
Other languages
Chinese (zh)
Inventor
杨殿卿
秦涛
司马云瑞
邵俊骏
张文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Nanjing Coolpad Software Technology Co Ltd
Original Assignee
Coolpad Xinzhi Technology Nanjing Co ltd
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Nanjing Coolpad Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Coolpad Xinzhi Technology Nanjing Co ltd, Yulong Computer Telecommunication Scientific Shenzhen Co Ltd, Nanjing Coolpad Software Technology Co Ltd filed Critical Coolpad Xinzhi Technology Nanjing Co ltd
Priority to CN202210504324.3A priority Critical patent/CN114745372A/en
Publication of CN114745372A publication Critical patent/CN114745372A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The embodiment of the application discloses a file sending method and related equipment, which are used for improving the file sending efficiency. The method of the embodiment of the application comprises the following steps: responding to a sending instruction of a target original file, at least determining a target certificate and a receiving terminal corresponding to the target original file, wherein the target original file is stored in a server, and the target certificate at least comprises related storage information of the target original file in the server; and sending the target certificate to the receiving terminal so that the receiving terminal acquires the target original file from the server according to the target certificate.

Description

File sending method and related equipment
Technical Field
The embodiment of the application relates to the technical field of terminals, in particular to a file sending method and related equipment.
Background
With the continuous development of computer technology, the storage requirements of various intelligent terminals are gradually increased. At present, the user equipment can store the original file in a cloud and locally store the thumbnail of the original file, so that the local storage space of the user equipment can be released.
Generally, when the user equipment a needs to send a picture to the user equipment B and the user equipment a only stores a thumbnail of the picture, the user equipment a first needs to download the picture from the cloud. Then, the user equipment a sends the local picture to the user equipment B.
The process of acquiring the picture by the user equipment B is as follows: the method comprises two steps of downloading the picture from the cloud end by the user equipment A and sending the picture to the user equipment B by the user equipment A, and the sending efficiency is low.
Disclosure of Invention
The embodiment of the application provides a file sending method and related equipment, which are used for improving the file sending efficiency.
A first aspect of the embodiments of the present application provides a file sending method, applied to a sending terminal, including:
responding to a sending instruction of a target original file, at least determining a target certificate and a receiving terminal corresponding to the target original file, wherein the target original file is stored in a server, and the target certificate at least comprises related storage information of the target original file in the server;
and sending the target certificate to the receiving terminal so that the receiving terminal acquires the target original file from the server according to the target certificate.
In a specific implementation manner, before the determining a target credential corresponding to the target original file, the method further includes:
uploading the target original file to the server, so that the server generates a target certificate of the target original file according to the target original file;
receiving a target certificate of the target original file sent by the server, and storing the target certificate locally;
the determining of the target credential corresponding to the target original file includes:
and determining the target certificate of the target original file from local.
In a specific implementation manner, the sending the target credential to the receiving terminal so that the receiving terminal obtains the target original file from the server according to the target credential includes:
encrypting the target certificate according to the public key of the receiving terminal to obtain a target encryption certificate;
and sending the target encryption certificate to the receiving terminal, so that the receiving terminal decrypts the target encryption certificate according to a private key of the receiving terminal to obtain the target certificate and obtains the target original file from the server according to the target certificate.
In a specific implementation manner, the sending instruction of the target original file includes an acquisition time limit for the receiving terminal to acquire the target original file from the server;
the sending the target certificate to the receiving terminal so that the receiving terminal obtains the target original file from the server according to the target certificate includes:
filling the acquisition time limit in the target certificate to obtain a target time limit certificate;
and sending the target time limit certificate to the receiving terminal, so that the receiving terminal acquires the target original file from the server according to the target time limit certificate in the acquisition time limit.
In a specific implementation manner, the target credential includes a terminal identifier of the sending terminal, and the terminal identifier of the sending terminal is used by the server to determine a receiving terminal related to the target original file according to the terminal identifier in the target credential.
A second aspect of the embodiments of the present application provides a file sending method, applied to a receiving terminal, including:
receiving a target certificate sent by a sending terminal, wherein the target certificate at least comprises related storage information of a target original file in a server;
and sending the target certificate to the server so that the server searches the target original file according to the target certificate.
In a specific implementation manner, the target certificate is a target certificate encrypted according to a public key of the receiving terminal;
the sending the target certificate to the server so that the server searches the target original file according to the target certificate comprises:
decrypting the encrypted target certificate according to a private key of the receiving terminal;
and sending the decrypted target certificate to the server so that the server searches the target original file according to the decrypted target certificate.
In a specific implementation manner, the target certificate is a target certificate including an acquisition time limit;
the sending the target credential to the server includes:
and sending the target certificate to the server within the acquisition time limit.
A third aspect of the embodiments of the present application provides a transmitting terminal, including:
the system comprises a determining unit, a receiving unit and a processing unit, wherein the determining unit is used for responding to a sending instruction of a target original file, and at least determining a target certificate and a receiving terminal which correspond to the target original file, the target original file is stored in a server, and the target certificate at least comprises related storage information of the target original file in the server;
and the sending unit is used for sending the target certificate to the receiving terminal so that the receiving terminal acquires the target original file from the server according to the target certificate.
In a specific implementation manner, the sending terminal further includes: an uploading unit and a receiving unit;
the uploading unit is used for uploading the target original file to the server so that the server generates a target certificate of the target original file according to the target original file;
the receiving unit is used for receiving a target certificate of the target original file sent by the server and storing the target certificate in the local;
the determining unit is specifically configured to determine a target credential of the target original file from a local location.
In a specific implementation manner, the sending unit is specifically configured to encrypt the target credential according to a public key of the receiving terminal to obtain a target encryption credential;
and sending the target encryption certificate to the receiving terminal, so that the receiving terminal decrypts the target encryption certificate according to a private key of the receiving terminal to obtain the target certificate and obtains the target original file from the server according to the target certificate.
In a specific implementation manner, the sending instruction of the target original file includes an acquisition time limit for the receiving terminal to acquire the target original file from the server;
the sending unit is specifically configured to fill the acquisition time limit in the target credential to obtain a target time limit credential;
and sending the target time limit certificate to the receiving terminal, so that the receiving terminal acquires the target original file from the server according to the target time limit certificate in the acquisition time limit.
In a specific implementation manner, the target credential includes a terminal identifier of the sending terminal, and the terminal identifier of the sending terminal is used by the server to determine a receiving terminal related to the target original file according to the terminal identifier in the target credential.
A fourth aspect of the embodiments of the present application provides a receiving terminal, including:
the receiving unit is used for receiving a target certificate sent by a sending terminal, wherein the target certificate at least comprises related storage information of a target original file in a server;
and the sending unit is used for sending the target certificate to the server so that the server searches the target original file according to the target certificate.
In a specific implementation manner, the target certificate is a target certificate encrypted according to a public key of the receiving terminal;
the sending unit is specifically configured to decrypt the encrypted target credential according to a private key of the receiving terminal;
and sending the decrypted target certificate to the server so that the server searches the target original file according to the decrypted target certificate.
In a specific implementation manner, the target certificate is a target certificate including an acquisition time limit;
the sending unit is specifically configured to send the target credential to the server within the acquisition time limit.
A fifth aspect of the embodiments of the present application provides a file sending apparatus, including:
the system comprises a central processing unit, a memory and an input/output interface;
the memory is a transient memory or a persistent memory;
the central processor is configured to communicate with the memory and execute the instructions in the memory to perform the method of the first or second aspect.
A sixth aspect of embodiments of the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method according to the first or second aspect.
A seventh aspect of embodiments of the present application provides a computer storage medium having instructions stored therein, which when executed on a computer, cause the computer to perform the method according to the first or second aspect.
According to the technical scheme, the embodiment of the application has the following advantages: the sending terminal only needs to acquire the target certificate without downloading the target original file, and saves time, flow and power consumption caused by CPU load under the condition that the size of the target certificate is not larger than that of the target original file. Meanwhile, the time from the sending terminal responding to the sending instruction of the target original file to the receiving terminal for locally obtaining the target original file is shortened, and the file sending efficiency is effectively improved.
Drawings
Fig. 1 is a system architecture diagram of a document sending method disclosed in an embodiment of the present application;
fig. 2 is a schematic flowchart of a file sending method disclosed in an embodiment of the present application;
fig. 3 is another schematic flow chart of a file sending method disclosed in the embodiment of the present application;
fig. 4 is another schematic flow chart of a file sending method disclosed in the embodiment of the present application;
fig. 5 is a schematic structural diagram of a transmitting terminal disclosed in an embodiment of the present application;
FIG. 6 is a schematic structural diagram of a server according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of a document sending apparatus disclosed in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application provides a file sending method and related equipment, which are used for improving the file sending efficiency.
Referring to fig. 1, in order to better implement the file sending method provided by the present application, an embodiment of the present application provides a file sending system. The file delivery system may include at least one server 101, at least one delivery terminal 102, and at least one receiving terminal 103. The server 101 may be used to store application data and image data generated by different types of applications of the transmitting terminal 102 or the receiving terminal 103. The server 101 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, a cloud server providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), a big data and artificial intelligence platform, and the like. Different types of applications can be installed on the sending terminal 102, for example, an instant messaging application, a live application, a conference communication application, etc. can be installed on the sending terminal 102; the sending terminal 102 may be a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart car, etc. It is to be appreciated that the receiving terminal 103 may be a terminal device similar to the transmitting terminal 102, and will not be described herein. In addition, the sending terminal 102 and the receiving terminal 103 may be the same or different terminal devices, and this embodiment is not limited in particular.
Based on the file sending method and the file sending system provided above, please refer to fig. 2, and fig. 2 is a schematic flow chart of a file sending method provided in an embodiment of the present application. The file method may be performed by the server 101, the transmitting terminal 102, and/or the receiving terminal 103 described above. The file sending method may include the following steps 201-205:
201. and the sending terminal responds to the sending instruction of the target original file and at least determines a target certificate and a receiving terminal corresponding to the target original file.
And at least determining a target certificate and a receiving terminal corresponding to the target original file based on the sending instruction aiming at the target original file, wherein the target original file is stored in the server, and the target certificate at least comprises the related storage information of the target original file in the server. Specifically, the related storage information may include at least one of an upload user, a file name, a storage path, and upload time of the original file in the server, which is not limited in this embodiment. The uploading user may be represented by a user identifier or a user equipment identifier, which is not limited herein.
In practical application, the sending terminal may initiate a sending instruction for the target original file by determining a target thumbnail corresponding to the target original file that needs to be sent to the receiving terminal from at least one local thumbnail.
Specifically, if the sending terminal needs to send the target original file to the receiving terminal, and the target original file is stored in the server, and the sending terminal locally stores only the target thumbnail corresponding to the target original file, the sending terminal determines the target thumbnail corresponding to the original file which needs to be sent to the receiving terminal from at least one local thumbnail. Each original file has a unique corresponding thumbnail, each original file in the server has a corresponding unique certificate identifier, and the certificate at least records related storage information of the original file stored in the server. In addition, the original file may be any media file that can be distinguished by thumbnails, such as video, audio, picture, and document, and the embodiment is not particularly limited.
Specifically, the target thumbnail may be any thumbnail selected by the user from at least one thumbnail of the sending terminal or at least one thumbnail of the sending terminal in a local default, and the embodiment does not specifically limit the determination manner of the target thumbnail.
After the target thumbnail is confirmed, the sending terminal can obtain a target certificate of the target original file corresponding to the target thumbnail. The target certificate records the related storage information of the target original file in the server. It can be known that the target credential can be obtained from the server or from the local of the sending terminal, and the embodiment does not limit the obtaining object of the target credential.
Specifically, after the target thumbnail is determined, the sending terminal may respond to a sending instruction for the target original file to determine at least a target credential and a target original file corresponding to the target original file. The sending instruction may be initiated by the user through the sending terminal or initiated by the sending terminal, and the generation manner of the sending instruction is not limited here.
202. The sending terminal sends the target credential to the receiving terminal.
After acquiring the target certificate of the target original file corresponding to the target thumbnail, the sending terminal can send the target certificate to the receiving terminal, so that the receiving terminal can acquire the corresponding target original file from the server according to the target certificate.
203. The receiving terminal sends the target certificate to the server.
After receiving the target certificate sent by the sending terminal, the receiving terminal can send the target certificate to the server, so that the server searches for the target original file according to the target certificate.
In some specific embodiments, the server that the receiving terminal sends the target credential in step 203 and the server that the receiving terminal obtains the target credential in step 201 (which refers to the situation that the target credential needs to be determined to the server in step 201) in this embodiment may be the same or different servers, and this embodiment is not limited in this embodiment.
204. And the server acquires a target original file corresponding to the target certificate.
After receiving the target original file sent by the receiving terminal, the server can search and acquire the target original file corresponding to the target certificate in the server according to the related storage information of the target certificate record.
In practical applications, the server receiving the target credential and the server storing the target original file may be the same or different servers, and are not limited herein. For example, the server a receives the target certificate sent by the receiving terminal, and then the server a obtains the target original file from the server B according to the relevant storage information recorded in the target certificate.
205. And the server sends the target original file to the receiving terminal.
After determining the target original file corresponding to the target credential, the server may send the target original file to the receiving terminal in step 204, and if the receiving terminal receives the target original file, the file sending is ended.
In the embodiment of the present application, only the case of one receiving terminal is described. It can be known that, in practical applications, the instruction sent by the sending terminal to the target original file may further include a plurality of receiving terminals, and each receiving terminal performs the operations performed by the receiving terminal in the embodiments described in steps 201 to 205, which are not described herein again.
In addition, the sending terminal and the receiving terminal described above and below in the embodiments of the present application are relatively speaking, in a single sending process of the target certificate, a sender of the target certificate is considered as the sending terminal, and a receiver of the target certificate is considered as the receiving terminal.
In the embodiment, the sending terminal only needs to acquire the target certificate without downloading the target original file, and saves time, flow and power consumption caused by CPU load under the condition that the size of the target certificate is not larger than that of the target original file. Meanwhile, the time from the sending terminal responding to the sending instruction of the target original file to the receiving terminal for locally obtaining the target original file is shortened, and the file sending efficiency is effectively improved.
Referring to fig. 3, further, on the basis of the embodiment of fig. 2, before the step 202, the embodiment of the present application further includes the following steps 301 and 302:
301. and the sending terminal uploads the target original file.
And the sending terminal uploads the target original file to the server, and after the uploading is determined to be completed, the sending terminal deletes the target original file in the local storage of the sending terminal and acquires and stores the thumbnail of the target original file for inquiring.
It can be known that the sending terminal uploading the target original file may be the same as or different from the sending terminal in the foregoing embodiment of fig. 2, and if the sending terminal uploading the target original file is different from the sending terminal in the foregoing embodiment of fig. 2, the sending terminal a may also upload the device identifier of the sending terminal a or the user identifier of the user using the sending terminal a when uploading the target original file, so that other sending terminals except the sending terminal a may obtain the thumbnail of the target original file according to the device identifier of the sending terminal a or the user identifier of the user uploading the target original file using the sending terminal a, and may execute any step in this embodiment of the application.
302. The server generates and saves the target credential.
And the server generates and stores the target certificate in a local storage according to the related storage information of the target original file.
In practical applications, before determining the target credential corresponding to the target original file, the method further includes: the sending terminal uploads the target original file to the server so that the server generates a target certificate of the target original file according to the target original file; the sending terminal receives a target certificate of a target original file sent by the server and stores the target certificate locally; the method for determining the target certificate corresponding to the target original file by the sending terminal comprises the following steps: the sending terminal determines the target certificate of the target original file from the local. The target certificate does not need to be acquired from the server, so that the file sending time is reduced.
Specifically, the certificate of the target original file may be generated and stored in the local storage of the sending terminal by the sending terminal in step 301 according to the related storage information (in this case, the target certificate determined in step 201 may be directly determined locally from the sending terminal), or the certificate may be generated and sent to the server by the sending terminal so that the server stores the target certificate.
The foregoing step 202 may also be implemented by: and the sending terminal acquires a target certificate of the target original file from the server.
Specifically, if the target certificate is stored in the server, the sending terminal obtains the target certificate of the target original file from the server. If the terminal storing the target certificate in step 302 is another terminal (including the sending terminal described in step 301), the terminal obtains the target certificate from another terminal storing the target certificate, which is not limited in this embodiment. Specifically, the target credential may be obtained according to a device identifier of the sending terminal or a user identifier of the user, which is not limited herein.
In this embodiment, before obtaining the target credential, when the sending terminal uploads the target original file to the server, the server may generate and store the target credential of the target original file according to the target original file, and then, when the sending terminal responds to the sending instruction, the sending terminal may obtain the target credential from the server. And storing the target certificate in the server and acquiring the target certificate through the corresponding identifier, so that the local storage resource of the sending terminal is released.
On the basis of the foregoing fig. 2 and/or fig. 3 embodiment, after uploading the target original file to the server, the embodiment of the present application further includes the following steps: the sending terminal obtains file information of the target original file.
Specifically, after the target original file is uploaded to the server, the sending terminal needs to delete the target original file in the local storage, and determine and save the file information of the target original file and the thumbnail of the target original file. The file information can be used for searching a certificate of an original file; the thumbnail may be used to confirm the target thumbnail. In addition, the file information of the original file may be any information that can be used to find a corresponding original file in the server and only one corresponding original file can be found by one file information. Such as: the file information may include a file name and/or a file path, etc., and is not limited herein. It can be known that the file information of different original files may be partially identical but not completely identical, such as: the file information includes a file name and a file path, and the original file a and the original file B may be two original files located in the same file path but having different file names, or the original file a and the original file B may be two original files located in different file paths but having the same file name.
On this basis, the sending terminal in the foregoing steps may also obtain the target credential of the target original file from the server by: and the sending terminal acquires the target certificate from the server according to the file information of the target original file.
Specifically, when a sending instruction is responded, a target original file can be selected based on the thumbnail, then a target certificate can be obtained from the server according to file information corresponding to the target original file, namely the file information of the target original file obtained from the file information of the target original file is obtained by the sending terminal according to the steps, the server can find the target certificate of the corresponding target original file according to the file information, and the target certificate is sent to the sending terminal for sending the file information of the target original file.
In this embodiment, by obtaining and storing the file information of the target original file in the sending terminal, it is ensured that the sending terminal can obtain the target certificate of the target original file from the server according to the file information of the target original file, and the implementability of the scheme is improved.
In some embodiments, the credentials and the target credentials of the embodiments of the present application may further include: at least one of a time limit, a terminal identification and/or a session identification is obtained.
The acquisition time limit can be confirmed by related information in the sending instruction of the target original file, and the sending terminal can also fill the acquisition time limit in the target certificate to obtain the target time limit certificate after receiving the sending instruction of the target original file containing the acquisition time limit. And then, the target time limit certificate is sent to a receiving terminal corresponding to the receiving terminal identification indicated by the sending instruction of the target original file, so that the corresponding receiving terminal obtains the target original file from the server according to the target time limit certificate in the obtaining time limit. The server can also judge according to the acquisition time limit contained in the certificate (which can be a target certificate containing the acquisition time limit or a target time limit certificate) sent by the receiving terminal, and if the time for acquiring the certificate is within the acquisition time limit, the server acquires the target original file corresponding to the certificate; if the time for acquiring the certificate is outside the acquisition time limit, the target original file is not transmitted to the receiving terminal that transmits the certificate, or information that cannot be acquired due to timeout is transmitted to the receiving terminal that transmits the certificate, which is not specifically limited herein. It can be known that the acquisition time limit may be an interval or a time point, and the acquisition time limit is considered to be within the acquisition time limit in the interval or before the time point, otherwise, the acquisition time limit is not within the acquisition time limit. Considering that the acquisition time limit only allows the receiving terminal to acquire the target original file within the acquisition time limit, the reliability of the receiving terminal for acquiring the target original file is further ensured.
In addition, the terminal identification of the sending terminal can be filled when the sending terminal sends the target certificate to the receiving terminal. It can be known that, after the receiving terminal acquires the target original file, if the target credential is locally stored, the receiving terminal (here, acting as a sending terminal) may further fill a corresponding terminal identifier (of the receiving terminal) in the target credential and send the target credential to another terminal (here, acting as a receiving terminal), so that the other terminal (here, acting as a receiving terminal) may acquire the target original file from the server according to the credential sent by the receiving terminal (here, acting as a sending terminal), the credential received by the server may include the terminal identifiers of the receiving terminals (i.e., of the sending terminal and the receiving terminal) related to the target original file, the terminal that acquired the target credential may be determined according to the terminal identifiers, and the search of the terminal that acquired the target credential is achieved.
If the certificate and the target certificate also contain the session identifier, the server is required to identify each session initiated with the terminal. When the sending terminal or the server generates the target certificate of the target original file, the session identifier of the session between the sending terminal which uploads the target original file and the server when the sending terminal uploads the target original file can be filled in, and when the server receives the target certificate containing the session identifier, the server can quickly acquire the target original file of the session, namely the original file corresponding to the target certificate according to the session identifier.
It should be understood that the credentials and the target credentials described in the embodiments of the present application may also include any other stored information related to the target original document in the server, which is not limited herein.
Further, on the basis of the foregoing embodiment, in order to ensure the security of the credential, the credential may be encrypted symmetrically or asymmetrically, or the acquisition right is added to allow only the designated receiving terminal to use the credential, and the receiving terminal that is not within the designated range cannot use the credential, which is not specifically limited herein. It should be noted that, in the embodiment of the present application, any two of the receiving terminal, the sending terminal, and the server may encrypt the transmission process through http or https, which is not specifically limited herein. By encrypting the certificate and the transmission process, the safety of the original document in the server is also ensured on the basis of protecting the certificate.
In some embodiments, the encryption may be implemented in such a way that the sending terminal encrypts the target certificate according to the public key of the receiving terminal to obtain a target encryption certificate; the sending terminal sends a target encryption certificate to the receiving terminal; the receiving terminal decrypts the encrypted target certificate according to the private key of the receiving terminal; the receiving terminal sends the decrypted target certificate to the server; and the server searches the target original file according to the decrypted target certificate.
Referring to fig. 4, for convenience of understanding, the following describes, in combination with a specific service scenario, a process in which a user 1 (through a user device 1, that is, a sending terminal) sends a target credential to a user 2 (through a user device 2, that is, a receiving terminal), and the user 2 (through the receiving terminal) obtains a target original file from a server according to the target credential:
firstly, in the process of uploading an original image (target original file) of a user 1 to a cloud disk (server), the server can synthesize various information (a creator, a file name, a file path, uploading time, a session identifier, a check value, a sender, sending time, acquisition authority and the like to generate a certificate (target certificate) and send the certificate (the target certificate) to the user 1 for storage (specifically, communication and certificate storage are carried out through a terminal of the user 1), wherein the creator, the file name, the path, the uploading time, a session id and the check value cannot be changed along with the change of the sender, namely, when the user 1 sends the certificate to the user 2 and the user 2 sends the certificate to the user 3, only the sender and the sending time can be changed, and the sender, the sending time and the acquisition authority are filled in the certificate generated by the server when the sender, the target certificate and the target certificate are sent by the sending terminal, Both the transmission time and the acquisition right are null. In addition, the check value may be any value used to check the integrity of the target original file, such as MD5, SHA1, or SHA256, which is not limited herein. Meanwhile, the server may encrypt the session identifier. The specific server-generated credentials may be as follows:
Encrypted Download Certificate{
creater user 1
File Name:1643278990299.jpg
File Size:56K
Path:sdcard/Pictures/WeiXin
Upload time:2022-3-28 17:47
Session ID:ddd3496b-fd35-48b3-8a39-cc4750d8b963
MD5:b6 25 31 26 42 8c 70 2a b3 c4 49 58 ee ae 92 ac
Sender:null
Send Time:null}
When the user 1 responds to the sending instruction of the original image, the sender and the sending time are updated to form a new certificate, and the new certificate is sent to the user 2. The specific update may be updated by the sending terminal or the server, and the new credential may be as follows:
Encrypted Download Certificate{
creater user 1
File Name:1643278990299.jpg
File Size:56K
Path:sdcard/Pictures/WeiXin
Upload time:2022-3-28 17:47
Session ID:ddd3496b-fd35-48b3-8a39-cc4750d8b963
MD5:b6 25 31 26 42 8c 70 2a b3 c4 49 58 ee ae 92 ac
A Sender: user 1
Send Time:2022-3-29 13:27
}
When the terminal (i.e. receiving terminal) of the user 2 receives the new certificate, the new certificate is sent to the server; the server analyzes the internal information (such as a decryption session identifier) of the new certificate and confirms the legality of downloading (by acquiring the authority); and then the server acquires the original image according to the session identifier and sends the original image back to the terminal of the user 2, so that the user 2 can check the original image through the terminal. .
Ideally, assuming a 10M artwork, the download and generation rate is 2M/S. In the prior art, 5 seconds are needed for the user 1 to download the original image, 5 seconds are needed for the user 2 to send the original image, and 10 seconds are needed for the user to finish the original image downloading. In this embodiment, it takes 1 second for the user 1 to send the credential to the user 2, and it takes 5 seconds, only 6 seconds to complete the original image downloading by the user 2, so that the speed is increased by 40%. The user 1 does not need to download the original image, and the terminal of the user 1 saves time, flow and power consumption caused by CPU load. Meanwhile, the file sending method of the embodiment of the application can be implemented by the user 1 selecting the original image to send on the user terminal 1, the user terminal 1 responds to the sending instruction of the target original file, the steps of the embodiment are executed, the whole file sending process is not perceived by the user, and the file sending process perceived by the user through the user terminal is not different from the prior art.
Referring to fig. 5, an embodiment of the present application further provides a sending terminal, including:
a determining unit 501, configured to determine, in response to a sending instruction of a target original file, at least a target credential and a receiving terminal that correspond to the target original file, where the target original file is stored in a server, and the target credential at least includes related storage information of the target original file in the server;
a sending unit 502, configured to send the target credential to the receiving terminal, so that the receiving terminal obtains the target original file from the server according to the target credential.
In a specific implementation manner, the sending terminal further includes: an uploading unit and a receiving unit;
the uploading unit is used for uploading the target original file to the server so that the server generates a target certificate of the target original file according to the target original file;
the receiving unit is used for receiving a target certificate of a target original file sent by the server and storing the target certificate in the local;
the determining unit 501 is specifically configured to determine a target credential of a target original file from local.
In a specific implementation manner, the sending unit 502 is specifically configured to encrypt the target credential according to a public key of the receiving terminal to obtain a target encryption credential;
and sending the target encryption certificate to the receiving terminal so that the receiving terminal decrypts the target encryption certificate according to a private key of the receiving terminal to obtain the target certificate and obtains a target original file from the server according to the target certificate.
In a specific implementation manner, the sending instruction of the target original file comprises an acquisition time limit for the receiving terminal to acquire the target original file from the server;
a sending unit 502, specifically configured to fill an acquisition time limit in the target credential to obtain a target time limit credential;
and sending the target time limit certificate to the receiving terminal so that the receiving terminal acquires the target original file from the server according to the target time limit certificate within the acquisition time limit.
In a specific implementation manner, the target certificate includes a terminal identifier of the sending terminal, and the terminal identifier of the sending terminal is used for the server to determine a receiving terminal related to the target original file according to the terminal identifier in the target certificate.
Referring to fig. 6, an embodiment of the present application further provides a receiving terminal, including:
a receiving unit 601, configured to receive a target credential sent by a sending terminal, where the target credential at least includes related storage information of a target original file in a server;
a sending unit 602, configured to send the target credential to the server, so that the server searches for the target original file according to the target credential.
In a specific implementation, the target certificate is encrypted according to a public key of the receiving terminal;
a sending unit 602, specifically configured to decrypt the encrypted target credential according to the private key of the receiving terminal;
and sending the decrypted target certificate to the server so that the server searches the target original file according to the decrypted target certificate.
In one specific implementation, the target credential is a target credential including an acquisition time limit;
the sending unit 602 is specifically configured to send the target credential to the server within the acquisition time limit.
Fig. 7 is a schematic structural diagram of a file sending apparatus according to an embodiment of the present disclosure, where the file sending apparatus 700 may include one or more Central Processing Units (CPUs) 701 and a memory 705, where the memory 705 stores one or more applications or data.
The memory 705 may be volatile storage or persistent storage, among others. The program stored in the memory 705 may include one or more modules, each of which may include a sequence of instructions for operating on the file sending apparatus. Further, the central processor 701 may be configured to communicate with the memory 705, and execute a series of instruction operations in the memory 705 on the file transmitting apparatus 700.
The file sending device 700 may also include one or more power supplies 702, one or more wired or wireless network interfaces 703, one or more input-output interfaces 704, and/or one or more operating systems, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
The central processing unit 701 may perform the operations performed by the file sending apparatus in the embodiments shown in fig. 1 to fig. 6, which are not described herein again. The file sending device may be a server, a sending terminal and/or a receiving terminal in the embodiment of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like.

Claims (10)

1. A file sending method is applied to a sending terminal and comprises the following steps:
responding to a sending instruction of a target original file, at least determining a target certificate and a receiving terminal which correspond to the target original file, wherein the target original file is stored in a server, and the target certificate at least comprises relevant storage information of the target original file in the server;
and sending the target certificate to the receiving terminal so that the receiving terminal acquires the target original file from the server according to the target certificate.
2. The method of claim 1, wherein prior to said determining a target credential corresponding to the target proto-file, the method further comprises:
uploading the target original file to the server, so that the server generates a target certificate of the target original file according to the target original file;
receiving a target certificate of the target original file sent by the server, and storing the target certificate locally;
the determining a target credential corresponding to the target original file includes:
and determining the target certificate of the target original file from the local.
3. The method according to claim 1, wherein the sending the target credential to the receiving terminal so that the receiving terminal obtains the target original file from the server according to the target credential comprises:
encrypting the target certificate according to the public key of the receiving terminal to obtain a target encryption certificate;
and sending the target encryption certificate to the receiving terminal, so that the receiving terminal decrypts the target encryption certificate according to a private key of the receiving terminal to obtain the target certificate and obtains the target original file from the server according to the target certificate.
4. The method according to claim 1, wherein the transmission instruction of the target original file includes an acquisition time limit for the receiving terminal to acquire the target original file from the server;
the sending the target certificate to the receiving terminal so that the receiving terminal obtains the target original file from the server according to the target certificate includes:
filling the acquisition time limit in the target certificate to obtain a target time limit certificate;
and sending the target time limit certificate to the receiving terminal, so that the receiving terminal acquires the target original file from the server according to the target time limit certificate in the acquisition time limit.
5. The method according to claim 1, wherein the target certificate includes a terminal identifier of the sending terminal, and the terminal identifier of the sending terminal is used by the server to determine a receiving terminal related to the target original file according to the terminal identifier in the target certificate.
6. A file sending method is applied to a receiving terminal and comprises the following steps:
receiving a target certificate sent by a sending terminal, wherein the target certificate at least comprises related storage information of a target original file in a server;
and sending the target certificate to the server so that the server searches the target original file according to the target certificate.
7. The method according to claim 6, wherein the target credential is a target credential encrypted according to a public key of the receiving terminal;
the sending the target credential to the server so that the server searches the target original file according to the target credential includes:
decrypting the encrypted target certificate according to a private key of the receiving terminal;
and sending the decrypted target certificate to the server so that the server searches the target original file according to the decrypted target certificate.
8. The method of claim 6, wherein the target credential is a target credential that includes an acquisition time limit;
the sending the target credential to the server includes:
and sending the target certificate to the server within the acquisition time limit.
9. A file transmission apparatus, comprising:
the system comprises a central processing unit, a memory and an input/output interface;
the memory is a transient memory or a persistent memory;
the central processor is configured to communicate with the memory and execute instructions in the memory to perform the method of any of claims 1-5 or claims 6-8.
10. A computer storage medium having stored therein instructions that, when executed on a computer, cause the computer to perform the method of any one of claims 1 to 5 or claims 6 to 8.
CN202210504324.3A 2022-05-10 2022-05-10 File sending method and related equipment Pending CN114745372A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210504324.3A CN114745372A (en) 2022-05-10 2022-05-10 File sending method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210504324.3A CN114745372A (en) 2022-05-10 2022-05-10 File sending method and related equipment

Publications (1)

Publication Number Publication Date
CN114745372A true CN114745372A (en) 2022-07-12

Family

ID=82284923

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210504324.3A Pending CN114745372A (en) 2022-05-10 2022-05-10 File sending method and related equipment

Country Status (1)

Country Link
CN (1) CN114745372A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102970380A (en) * 2012-12-20 2013-03-13 青岛海信传媒网络技术有限公司 Method for acquiring media data of cloud storage files and cloud storage server
US8930475B1 (en) * 2012-03-30 2015-01-06 Signiant Inc. Systems and methods for secure cloud-based media file sharing
CN110602075A (en) * 2019-08-15 2019-12-20 中国人民银行数字货币研究所 File stream processing method, device and system for encryption access control
CN111479265A (en) * 2020-03-09 2020-07-31 珠海格力电器股份有限公司 Information dissemination method and device, computer equipment and storage medium
CN114257562A (en) * 2021-12-16 2022-03-29 北京天融信网络安全技术有限公司 Instant messaging method, instant messaging device, electronic equipment and computer readable storage medium
CN114363094A (en) * 2022-03-17 2022-04-15 北京百度网讯科技有限公司 Data sharing method, device, equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8930475B1 (en) * 2012-03-30 2015-01-06 Signiant Inc. Systems and methods for secure cloud-based media file sharing
CN102970380A (en) * 2012-12-20 2013-03-13 青岛海信传媒网络技术有限公司 Method for acquiring media data of cloud storage files and cloud storage server
CN110602075A (en) * 2019-08-15 2019-12-20 中国人民银行数字货币研究所 File stream processing method, device and system for encryption access control
CN111479265A (en) * 2020-03-09 2020-07-31 珠海格力电器股份有限公司 Information dissemination method and device, computer equipment and storage medium
CN114257562A (en) * 2021-12-16 2022-03-29 北京天融信网络安全技术有限公司 Instant messaging method, instant messaging device, electronic equipment and computer readable storage medium
CN114363094A (en) * 2022-03-17 2022-04-15 北京百度网讯科技有限公司 Data sharing method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110049016B (en) Data query method, device, system, equipment and storage medium of block chain
US9825924B2 (en) File sharing method and apparatus
JP6878609B2 (en) Data backup methods and data backup devices, storage media and servers
US20170195417A1 (en) Data files synchronization with cloud storage service
WO2019015598A1 (en) Hybrid-cloud data storage method and apparatus, related device, and cloud system
CN112019541B (en) Data transmission method and device, computer equipment and storage medium
US20140082376A1 (en) System, Method and Apparatus for Securely Saving/Retrieving Data on a Data Storage
CN109495251B (en) Anti-quantum-computation intelligent home cloud storage method and system based on key fob
CN109639819B (en) File transmission method, client, server and system
CN113032357A (en) File storage method and device and server
US20170193032A1 (en) Method and apparatus for deduplicating encrypted data
CN107113314B (en) Method and device for heterogeneous data storage management in cloud computing
US10116442B2 (en) Data storage apparatus, data updating system, data processing method, and computer readable medium
CN109525388B (en) Combined encryption method and system with separated keys
CN115146285A (en) File encryption and decryption method and device
KR101952329B1 (en) Method for generating address information used in transaction of cryptocurrency based on blockchain, electronic apparatus and computer readable recording medium
CN111970114A (en) File encryption method, system, server and storage medium
US9332405B2 (en) Short message backup method, mobile terminal, and server
JP2013239989A (en) Information processing device, data generation method, information processing method, and information processing system
CN112307504A (en) Secure multi-party computing method and device, electronic equipment and storage medium
CN114257562B (en) Instant messaging method, device, electronic equipment and computer readable storage medium
CN112637300B (en) Block chain-based distributed storage and acquisition method and device for video information
CN111427860B (en) Distributed storage system and data processing method thereof
CN110602132A (en) Data encryption and decryption processing method
TW201317823A (en) Cloud secured storage system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20221027

Address after: Unit 1701-1704, 17/F, Building A, Jindiwei New Yuhua Innovation Center, 23 Andemen Street, Yuhuatai District, Nanjing, Jiangsu, 210000

Applicant after: NANJING COOLPAD SOFTWARE TECHNOLOGY Co.,Ltd.

Applicant after: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd.

Address before: Unit 1701-1704, 17th floor, building a, jindiwei xinyuhua innovation center, No. 23 Andemen street, Yuhuatai District, Nanjing, Jiangsu 210012

Applicant before: NANJING COOLPAD SOFTWARE TECHNOLOGY Co.,Ltd.

Applicant before: Coolpad Xinzhi Technology (Nanjing) Co.,Ltd.

Applicant before: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd.