CN116149876A - Resource sharing method and device, electronic equipment and computer readable storage medium - Google Patents

Resource sharing method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN116149876A
CN116149876A CN202310139717.3A CN202310139717A CN116149876A CN 116149876 A CN116149876 A CN 116149876A CN 202310139717 A CN202310139717 A CN 202310139717A CN 116149876 A CN116149876 A CN 116149876A
Authority
CN
China
Prior art keywords
resource
identifier
terminal
sharing
resource information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310139717.3A
Other languages
Chinese (zh)
Inventor
李友洪
李汇腾
赵春
刘畅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202310139717.3A priority Critical patent/CN116149876A/en
Publication of CN116149876A publication Critical patent/CN116149876A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/544Buffers; Shared memory; Pipes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)

Abstract

The disclosure provides a resource sharing method and device, electronic equipment and a computer readable storage medium, which can be applied to the fields of computer technology, cloud computing technology, big data technology and finance. The resource sharing method comprises the following steps: in response to detecting a change operation of the first terminal on any resource information in the at least one resource information, determining resource information to be shared, a resource sharing type and a terminal type of the first terminal, wherein the resource information to be shared comprises at least one target resource information; the resource information to be shared is sent to the second terminal, so that the second terminal can verify the at least one target resource information respectively, and verification results corresponding to the at least one target resource information respectively are obtained; and responding to the verification result to represent that the target resource information corresponding to the verification result passes verification, and carrying out resource sharing on the resources to be shared corresponding to the target resource information according to the resource sharing type and the terminal type.

Description

Resource sharing method and device, electronic equipment and computer readable storage medium
Technical Field
The present disclosure relates to the fields of computer technology, cloud computing technology, big data technology, and finance, and more particularly, to a resource sharing method and apparatus, an electronic device, a computer-readable storage medium, and a computer program product.
Background
With the development of computer technology, cloud computing technology and big data technology are increasingly widely used. Cloud desktop is an important component of cloud computing, and the demand for remote offices based on cloud desktop is also increasing.
The remote office needs to realize the resource sharing among heterogeneous systems under the condition of traceability of resources. Resources may refer to software, hardware, and data resources in a network. Sharing may refer to users in a network being able to use these resources in part or in whole.
In the process of implementing the disclosed concept, the inventor finds that at least the following problems exist in the related art: the efficiency and the safety of resource sharing among heterogeneous systems cannot be guaranteed.
Disclosure of Invention
In view of this, the present disclosure provides a resource sharing method and apparatus, an electronic device, a computer-readable storage medium, and a computer program product.
According to one aspect of the present disclosure, there is provided a resource sharing method, applied to a server, including:
determining resource information to be shared, a resource sharing type and a terminal type of the first terminal in response to detecting a change operation of the first terminal on any resource information in at least one resource information, wherein the resource information to be shared comprises at least one target resource information, and the at least one target resource information corresponds to a resource to be shared;
The resource information to be shared is sent to a second terminal, so that the second terminal can verify the at least one target resource information respectively, and verification results corresponding to the at least one target resource information respectively are obtained; and
and responding to the verification result to represent that the target resource information corresponding to the verification result passes verification, and carrying out resource sharing on the resources to be shared corresponding to the target resource information according to the resource sharing type and the terminal type.
According to an embodiment of the present disclosure, the resource sharing method further includes, before determining the resource information to be shared, the resource sharing type, and the terminal type of the first terminal, in response to detecting a change operation of the first terminal on any resource information in the at least one resource information, the method includes:
in response to receiving a resource sharing request from the first terminal, acquiring candidate resources corresponding to at least one resource identifier in the resource sharing request according to the at least one resource identifier;
processing the candidate resources corresponding to the at least one resource identifier respectively to obtain resource information corresponding to the at least one resource identifier respectively; and
And sending the resource information corresponding to the at least one resource identifier to the first terminal so that the first terminal can process the resource information corresponding to the at least one resource identifier.
According to an embodiment of the present disclosure, the processing the candidate resources corresponding to each of the at least one resource identifier to obtain resource information corresponding to each of the at least one resource identifier includes:
for each of the candidate resources respectively corresponding to the at least one resource identification,
scanning the candidate resources to obtain sharing authority information, occupied space information and resource sensitivity information corresponding to the candidate resources;
determining a permission identifier according to the sharing permission information;
determining an occupied space identifier according to the occupied space information;
determining a security mark according to the resource sensitivity information; and
and determining resource information corresponding to the candidate resource according to the authority identifier, the occupied space identifier and the security identifier.
According to an embodiment of the present disclosure, characterizing, in response to the verification result, that target resource information corresponding to the verification result passes verification, and performing resource sharing on the resource to be shared corresponding to the target resource information according to the resource sharing type and the terminal type includes:
Responding to the verification result to represent that target resource information corresponding to the verification result passes verification, and matching the resource sharing type with the terminal type according to a preset mapping relation to obtain a resource sharing scheme corresponding to the resource information to be shared; and
according to the resource sharing scheme, carrying out resource sharing on the resources to be shared corresponding to the target resource information;
the preset mapping relationship includes at least one preset sharing rule and a preset resource sharing scheme corresponding to the at least one preset sharing rule.
According to an embodiment of the present disclosure, the resource sharing types include resource copy sharing and resource migration sharing, and the terminal types include physical terminals and cloud terminals.
According to an embodiment of the present disclosure, the above-mentioned preset mapping relationship is determined by:
determining a first preset resource sharing scheme under the condition that the terminal type is the physical terminal and the resource sharing type is the resource copy sharing;
determining a second preset resource sharing scheme under the condition that the terminal type is the physical terminal and the resource sharing type is the resource migration sharing;
Determining a third preset resource sharing scheme under the condition that the terminal type is the cloud terminal and the resource sharing type is the resource copy sharing; and
and determining a fourth preset resource sharing scheme under the condition that the terminal type is the cloud terminal and the resource sharing type is the resource migration sharing.
According to an embodiment of the present disclosure, the determining, in response to detecting a change operation of the first terminal on any resource information in the at least one resource information, the resource information to be shared, the resource sharing type, and the terminal type of the first terminal includes:
in response to detecting a change operation of the first terminal on any resource information in the at least one resource information, determining the resource sharing type, the terminal type and at least one changed resource identifier corresponding to the change operation;
acquiring change resource information corresponding to each of the at least one change resource identifier according to the at least one change resource identifier; and
and determining the at least one target resource information according to the resource information corresponding to the at least one resource identifier and the changed resource information corresponding to the at least one changed resource identifier.
According to one aspect of the present disclosure, there is provided a resource sharing method applied to a first terminal, including:
in response to receiving resource information from a server and corresponding to at least one resource identifier, determining a permission identifier, an occupied space identifier and a security class identifier corresponding to the at least one resource identifier;
determining at least one changed resource identifier from the at least one resource identifier according to the authority identifier, the occupied space identifier and the security class identifier which are respectively corresponding to the at least one resource identifier; and
and changing the resource information corresponding to each of the at least one changed resource identifier according to the at least one changed resource identifier to obtain changed resource information corresponding to each of the at least one changed resource identifier.
According to one aspect of the present disclosure, there is provided a resource sharing method applied to a second terminal, including:
in response to receiving the resource information to be shared from the server, determining authority identification, occupied space identification and security class identification corresponding to at least one target resource identification according to the target resource information corresponding to the at least one target resource identification in the resource information to be shared;
Respectively verifying the authority identification, the occupied space identification and the security identification corresponding to the at least one target resource identification according to a preset verification rule to obtain verification results corresponding to the at least one target resource identification; and
and sending the verification results corresponding to the at least one target resource identifier to the server so that the server can share resources according to the verification results.
According to an embodiment of the present disclosure, the verifying, according to a preset verification rule, the authority identifier, the occupied space identifier, and the security class identifier, which respectively correspond to the at least one target resource identifier, respectively, to obtain a verification result respectively corresponding to the at least one target resource identifier includes:
for a target resource identification of the at least one target resource identification,
matching the authority identification, the occupied space identification and the security identification corresponding to the target resource identification with the preset verification rule to obtain a matching result;
under the condition that the right identification, the occupied space identification, the security identification and the preset verification rule are consistent, the verification result representing that the target resource information corresponding to the target resource identification passes the verification is obtained; and
And obtaining the verification result representing that the target resource information corresponding to the target resource identifier fails to pass verification under the condition that the authority identifier, the occupied space identifier, the security identifier and the preset verification rule which are characterized by the matching result are inconsistent.
According to another aspect of the present disclosure, there is provided a resource sharing device, applied to a server, including:
the first determining module is used for determining resource information to be shared, a resource sharing type and a terminal type of the first terminal in response to detecting the change operation of the first terminal on any resource information in at least one resource information, wherein the resource information to be shared comprises at least one target resource information, and the at least one target resource information corresponds to resources to be shared respectively;
the first sending module is used for sending the resource information to be shared to a second terminal so that the second terminal can verify the at least one target resource information respectively to obtain verification results corresponding to the at least one target resource information respectively; and
and the resource sharing module is used for responding to the verification result to represent that the target resource information corresponding to the verification result passes verification, and carrying out resource sharing on the resources to be shared corresponding to the target resource information according to the resource sharing type and the terminal type.
According to another aspect of the present disclosure, there is provided a resource sharing apparatus applied to a first terminal, including:
the second determining module is used for determining authority identifiers, occupied space identifiers and security class identifiers corresponding to at least one resource identifier respectively in response to receiving the resource information corresponding to the at least one resource identifier respectively from the server;
a third determining module, configured to determine at least one changed resource identifier from the at least one resource identifier according to the permission identifier, the occupied space identifier, and the security class identifier corresponding to the at least one resource identifier; and
and the change module is used for changing the resource information corresponding to each of the at least one change resource identifier according to the at least one change resource identifier to obtain change resource information corresponding to each of the at least one change resource identifier.
According to another aspect of the present disclosure, there is provided a resource sharing apparatus applied to a second terminal, including:
a fourth determining module, configured to determine, in response to receiving resource information to be shared from a server, a permission identifier, an occupied space identifier, and a security level identifier corresponding to each of at least one target resource identifier according to target resource information corresponding to each of the at least one target resource identifier in the resource information to be shared;
The verification module is used for verifying the authority identifier, the occupied space identifier and the security identifier which are respectively corresponding to the at least one target resource identifier according to a preset verification rule to obtain verification results respectively corresponding to the at least one target resource identifier; and
and the second sending module is used for sending the verification results corresponding to the at least one target resource identifier to the server so that the server can share resources according to the verification results.
According to another aspect of the present disclosure, there is provided an electronic device including:
one or more processors;
a memory for storing one or more instructions,
wherein the one or more instructions, when executed by the one or more processors, cause the one or more processors to implement a method as described in the present disclosure.
According to another aspect of the present disclosure, there is provided a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to implement a method as described in the present disclosure.
According to another aspect of the present disclosure, there is provided a computer program product comprising computer executable instructions which, when executed, are adapted to carry out the method as described in the present disclosure.
According to the embodiment of the disclosure, since the verification result is obtained by respectively verifying at least one target resource information by the second terminal, and the at least one target resource information is determined by the server detecting the change operation of the first terminal on any resource information, the verification result can represent whether the target resource information passes the verification. On the basis, according to the resource sharing type and the terminal type, the resource sharing among heterogeneous systems can be realized, so that the technical problem that the efficiency and the safety of the resource sharing among the heterogeneous systems cannot be guaranteed in the related art is at least partially solved, and the resource sharing is realized through interaction among the server, the first terminal and the second terminal, so that the efficiency of the resource sharing among the heterogeneous systems is improved, and the safety of the resource sharing is further improved.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent from the following description of embodiments thereof with reference to the accompanying drawings in which:
FIG. 1 schematically illustrates a system architecture in which a resource sharing method may be applied according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of a resource sharing method according to an embodiment of the disclosure;
FIG. 3 schematically illustrates an example schematic diagram of a process of respectively processing candidate resources respectively corresponding to at least one resource identifier to obtain resource information respectively corresponding to at least one resource identifier according to an embodiment of the disclosure;
fig. 4 schematically illustrates an example schematic diagram of a process of determining a preset mapping relationship according to an embodiment of the present disclosure;
FIG. 5 schematically illustrates a flow chart of a method of resource sharing in accordance with another embodiment of the present disclosure;
FIG. 6 schematically illustrates a flow chart of a method of resource sharing in accordance with another embodiment of the present disclosure;
FIG. 7 schematically illustrates an example schematic diagram of a resource sharing process according to an embodiment of the disclosure;
FIG. 8 schematically illustrates a block diagram of a resource sharing device according to an embodiment of the present disclosure;
FIG. 9 schematically illustrates a block diagram of a resource sharing apparatus according to another embodiment of the present disclosure;
FIG. 10 schematically illustrates a block diagram of a resource sharing apparatus according to another embodiment of the present disclosure; and
fig. 11 schematically illustrates a block diagram of an electronic device adapted to implement a resource sharing method according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where expressions like at least one of "A, B and C, etc. are used, the expressions should generally be interpreted in accordance with the meaning as commonly understood by those skilled in the art (e.g.," a system having at least one of A, B and C "shall include, but not be limited to, a system having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a formulation similar to at least one of "A, B or C, etc." is used, in general such a formulation should be interpreted in accordance with the ordinary understanding of one skilled in the art (e.g. "a system with at least one of A, B or C" would include but not be limited to systems with a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the related personal information of the user all conform to the regulations of related laws and regulations, necessary security measures are taken, and the public order harmony is not violated.
In the technical scheme of the disclosure, the authorization or consent of the user is obtained before the personal information of the user is obtained or acquired.
A computer network may include several computers interconnected to each other by a communication network, where a user on each computer may use resources on other computers for resource sharing. For example, device sharing may be performed so that a user may use an external device such as a printer; the data sharing can be performed, so that the user can access the shared database; file sharing may be performed so that a user may access file resources on a shared server, etc.
In the related art, since the storage capacity required for the resources to be shared may be large, the efficiency of resource sharing is easily caused to be low. In addition, since part of the resources have special formats, the resource security level cannot be correctly identified, and thus the security of resource sharing is low easily.
In order to at least partially solve the technical problems existing in the related art, the present disclosure provides a resource sharing method and apparatus, an electronic device, and a computer-readable storage medium, which can be applied to the fields of computer technology, cloud computing technology, big data technology, and finance. The resource sharing method comprises the following steps: determining resource information to be shared, a resource sharing type and a terminal type of the first terminal in response to detecting a change operation of the first terminal on any resource information in the at least one resource information, wherein the resource information to be shared comprises at least one target resource information, and the at least one target resource information corresponds to a resource to be shared; the resource information to be shared is sent to the second terminal, so that the second terminal can verify the at least one target resource information respectively, and verification results corresponding to the at least one target resource information respectively are obtained; and responding to the verification result to represent that the target resource information corresponding to the verification result passes verification, and carrying out resource sharing on the resources to be shared corresponding to the target resource information according to the resource sharing type and the terminal type.
It should be noted that, the resource sharing method and device provided by the embodiments of the present disclosure may be used in the fields of computer technology, cloud computing technology, big data technology, and finance, for example, in the field of internet technology. The resource sharing method and device provided by the embodiment of the disclosure can also be used in any field except the fields of computer technology, cloud computing technology, big data technology and finance, for example, in the field of information security technology. The application fields of the resource sharing method and the device provided by the embodiment of the disclosure are not limited.
Fig. 1 schematically illustrates a system architecture to which a resource sharing method may be applied according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a system architecture to which embodiments of the present disclosure may be applied to assist those skilled in the art in understanding the technical content of the present disclosure, but does not mean that embodiments of the present disclosure may not be used in other devices, systems, environments, or scenarios.
As shown in fig. 1, a system architecture 100 according to this embodiment may include a first terminal device 101, a second terminal device 102, a third terminal device 103, a network 104, and a server 105. The network 104 is a medium used to provide a communication link between the first terminal device 101, the second terminal device 102, the third terminal device 103, and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 through the network 104 using at least one of the first terminal device 101, the second terminal device 102, the third terminal device 103, to receive or send messages, etc. Various communication client applications, such as a shopping class application, a web browser application, a search class application, an instant messaging tool, a mailbox client, social platform software, etc. (by way of example only) may be installed on the first terminal device 101, the second terminal device 102, and the third terminal device 103.
The first terminal device 101, the second terminal device 102, the third terminal device 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (by way of example only) providing support for websites browsed by the user using the first terminal device 101, the second terminal device 102, and the third terminal device 103. The background management server may analyze and process the received data such as the user request, and feed back the processing result (e.g., the web page, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that, the resource sharing method provided by the embodiments of the present disclosure may be generally performed by the server 105. Accordingly, the resource sharing device provided by the embodiments of the present disclosure may be generally disposed in the server 105. The resource sharing method provided by the embodiments of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the first terminal device 101, the second terminal device 102, the third terminal device 103, and/or the server 105. Accordingly, the resource sharing apparatus provided by the embodiments of the present disclosure may also be provided in a server or a server cluster that is different from the server 105 and is capable of communicating with the first terminal device 101, the second terminal device 102, the third terminal device 103, and/or the server 105.
Alternatively, the resource sharing method provided by the embodiment of the present disclosure may also be performed by the first terminal device 101, the second terminal device 102, or the third terminal device 103, or may also be performed by other terminal devices different from the first terminal device 101, the second terminal device 102, or the third terminal device 103. Accordingly, the resource sharing apparatus provided by the embodiments of the present disclosure may also be provided in the first terminal device 101, the second terminal device 102, or the third terminal device 103, or in other terminal devices different from the first terminal device 101, the second terminal device 102, or the third terminal device 103.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
It should be noted that the sequence numbers of the respective operations in the following methods are merely representative of the operations for the purpose of description, and should not be construed as representing the order of execution of the respective operations. The method need not be performed in the exact order shown unless explicitly stated.
Fig. 2 schematically illustrates a flow chart of a resource sharing method according to an embodiment of the present disclosure.
As shown in fig. 2, the method 200 includes operations S210 to S230.
In operation S210, in response to detecting a change operation of the first terminal on any resource information in the at least one resource information, determining resource information to be shared, a resource sharing type and a terminal type of the first terminal, where the resource information to be shared includes at least one target resource information, and the at least one target resource information corresponds to a resource to be shared.
In operation S220, the resource information to be shared is sent to the second terminal, so that the second terminal can verify the at least one target resource information respectively, and a verification result corresponding to the at least one target resource information respectively is obtained.
In operation S230, in response to the verification result characterizing that the target resource information corresponding to the verification result passes the verification, the resource to be shared corresponding to the target resource information is shared according to the resource sharing type and the terminal type.
According to an embodiment of the present disclosure, the resource sharing process may include at least one of the following steps: resource scanning, resource processing, resource uploading, resource approval and resource issuing. The resource sharing method 200 can be applied to a server. The server may refer to a terminal that implements resource scanning and resource delivery. The first terminal may refer to a terminal used by a user initiating resource sharing. For example, the first terminal may refer to a terminal that implements resource processing and resource uploading. The second terminal may refer to a terminal used by a user who reviews the resources to be shared. For example, the second terminal may refer to a terminal that implements resource approval.
According to embodiments of the present disclosure, resource information may be used to characterize information related to a resource. The resources may include at least one of: static resources and dynamic resources. The static resources may include at least one of: HTML (Hyper Text Markup Language), JS (i.e., javaScript) resources, CSS (Cascading Style Sheets, cascading style sheet) resources, TXT (i.e., text document) resources, picture resources, and video resources. The dynamic resources may include at least one of: servlet (Servlet Applet, service connector) resources and JSP (Java Server Pages, java server page) resources.
According to an embodiment of the present disclosure, the resource information may include at least one of: the system comprises a resource identifier, a permission identifier corresponding to the resource identifier, an occupied space identifier corresponding to the resource identifier and a security level identifier corresponding to the resource identifier. The rights identification may be used to characterize shared rights information corresponding to the resource identification. The occupancy identification may be used to characterize occupancy information corresponding to the resource identification. The security class identification may be used to characterize resource sensitivity information corresponding to the resource identification.
According to an embodiment of the present disclosure, the altering operation may include at least one of: add (i.e., add) operations, update (i.e., update) operations, delete (i.e., delete) operations, and Reload (i.e., reload) operations. In response to detecting a change operation of the first terminal on any resource information in the at least one resource information, the resource information to be shared, the resource sharing type and the terminal type of the first terminal can be determined.
According to an embodiment of the present disclosure, the resource information to be shared may include at least one target resource information. The target resource information may be obtained by processing the resource information corresponding to the change operation based on the change resource information corresponding to the change operation. Each of the at least one target resource information may correspond to a resource to be shared, respectively. The at least one resource to be shared may each correspond to a resource identification. The resources to be shared and the target resource information may be associated based on the resource identification.
According to an embodiment of the present disclosure, the resource sharing type may include at least one of: resource copy sharing and resource migration sharing. Resource copy sharing may refer to resource sharing by copying resources to be shared. Resource migration sharing may refer to resource sharing of resources to be shared by migration.
According to an embodiment of the present disclosure, the terminal type may include at least one of: physical terminals (i.e., computer Terminal), virtual terminals (i.e., virtual terminals), and Pseudo terminals (i.e., pseudo terminals). A physical terminal may refer to an input-output device connected to a computer system. For example, the physical terminal may include at least one of: display, keyboard and mouse. A virtual terminal may refer to a terminal virtually implemented by software attached to a physical terminal. For example, the virtual terminal may include at least one of: graphic terminals and character terminals. A pseudo terminal may refer to a pair of logical terminal devices. For example, the pseudo terminal may include at least one of: and the Linux server is remotely connected based on an SSH protocol and Telnet.
According to the embodiment of the disclosure, after the resource information to be shared is obtained, the resource information to be shared may be transmitted to the second terminal. After receiving the information of the resource to be shared from the server, the second terminal can perform resource approval on the information of the resource to be shared. For example, the second terminal may verify the at least one target resource information respectively, to obtain verification results corresponding to the at least one target resource information respectively. The verification result may be used to characterize whether target resource information corresponding to the verification result passes verification.
According to the embodiment of the disclosure, when the verification result characterizes that the target resource information corresponding to the verification result fails verification, the resource sharing process of the resource to be shared corresponding to the target resource information can be ended. When the verification result characterizes that the target resource information corresponding to the verification result passes the verification, the resource sharing scheme corresponding to the resource sharing type and the terminal type can be determined according to the resource sharing type and the terminal type. And carrying out resource sharing on the resources to be shared corresponding to the target resource information according to a resource sharing scheme corresponding to the resource sharing type and the terminal type.
According to the embodiment of the disclosure, since the verification result is obtained by respectively verifying at least one target resource information by the second terminal, and the at least one target resource information is determined by the server detecting the change operation of the first terminal on any resource information, the verification result can represent whether the target resource information passes the verification. On the basis, according to the resource sharing type and the terminal type, the resource sharing among heterogeneous systems can be realized, so that the technical problem that the efficiency and the safety of the resource sharing among the heterogeneous systems cannot be guaranteed in the related art is at least partially solved, and the resource sharing is realized through interaction among the server, the first terminal and the second terminal, so that the efficiency of the resource sharing among the heterogeneous systems is improved, and the safety of the resource sharing is further improved.
A resource sharing method 200 according to an embodiment of the present invention is further described below with reference to fig. 3 and 4.
According to an embodiment of the present disclosure, the resource sharing method 200 may further include the following operations.
And responding to the received resource sharing request from the first terminal, and acquiring candidate resources corresponding to at least one resource identifier respectively according to at least one resource identifier in the resource sharing request. And processing the candidate resources corresponding to the at least one resource identifier respectively to obtain resource information corresponding to the at least one resource identifier respectively. And transmitting the resource information corresponding to each of the at least one resource identifier to the first terminal so that the first terminal can process the resource information corresponding to each of the at least one resource identifier.
According to the embodiment of the disclosure, the code for generating the resource sharing request can be written in the script in advance, and the first terminal can run the script to generate the resource sharing request message in response to detecting the resource sharing operation initiated by the target user by using the first terminal. The resource sharing request message can be sent to the server side, so that the server side can process the resource sharing request corresponding to the resource sharing operation according to the resource sharing request message.
According to an embodiment of the present disclosure, the resource sharing request message may include at least one resource identification. Each of the at least one resource identifier may each correspond to a candidate resource. Candidate resources may refer to electronic files to be shared. The candidate resources may include one of: text files, image files, graphics files, video files, audio files, hypermedia link files, program files, and data files. After receiving the resource sharing request message, candidate resources corresponding to at least one resource identifier can be obtained according to at least one resource identifier in the resource sharing request message.
According to the embodiment of the disclosure, after the candidate resources corresponding to the at least one resource identifier are obtained, the at least one candidate resource may be scanned respectively to obtain the resource information corresponding to the at least one resource identifier. The resource information may include at least one of: the system comprises a resource identifier, a permission identifier corresponding to the resource identifier, an occupied space identifier corresponding to the resource identifier and a security level identifier corresponding to the resource identifier.
According to an embodiment of the present disclosure, after obtaining the resource information corresponding to each of the at least one resource identifier, the resource information corresponding to each of the at least one resource identifier may be transmitted to the first terminal. The first terminal may perform resource processing on the resource information after receiving the resource information corresponding to each of the at least one resource identifier. For example, the first terminal may perform the modification processing on the resource information corresponding to each of the at least one modified resource identifier.
According to an embodiment of the present disclosure, processing candidate resources respectively corresponding to at least one resource identifier, to obtain resource information respectively corresponding to at least one resource identifier may include the following operations.
And scanning the candidate resources aiming at each candidate resource in the candidate resources corresponding to the at least one resource identifier to obtain sharing authority information, occupied space information and resource sensitivity information corresponding to the candidate resources. And determining the permission identification according to the shared permission information. And determining the occupied space identification according to the occupied space information. And determining the security level identification according to the resource sensitivity information. And determining resource information corresponding to the candidate resources according to the authority identification, the occupied space identification and the security identification.
According to the embodiment of the disclosure, the scanning processing manner may be set according to actual service requirements, which is not limited herein. For example, the scanning process may include at least one of: resource name scanning, sharing permission scanning, occupied space scanning and resource sensitivity scanning. By performing resource name scanning on the candidate resources, resource names corresponding to the candidate resources can be obtained. By carrying out sharing authority scanning on the candidate resources, sharing authority information corresponding to the candidate resources can be obtained. By performing space occupation scanning on the candidate resources, space occupation information corresponding to the candidate resources can be obtained. By performing resource sensitivity scanning on the candidate resources, resource sensitivity information corresponding to the candidate resources can be obtained.
According to embodiments of the present disclosure, after the shared rights information is obtained, the rights identification may be determined from the shared rights information. The specific form of the permission identifier may be set according to actual service requirements, which is not limited herein. For example, where the shared rights information characterizes that the candidate resource does not possess shared rights, it may be determined that the rights are identified as non-rights.
According to the embodiment of the disclosure, after the occupation space information is obtained, the occupation space identification can be determined according to the occupation space information. The specific form of the occupied space identifier can be set according to actual service requirements, and is not limited herein. For example, in the event that the occupancy information is greater than a preset threshold, it may be determined that the occupancy is identified as being large.
According to embodiments of the present disclosure, after obtaining the resource sensitivity information, the security class identification may be determined according to the resource sensitivity information. The specific form of the security level identifier may be set according to the actual service requirement, which is not limited herein. For example, where the resource sensitivity information characterizes that the candidate resource includes sensitive information, the security level identification may be determined to be more sensitive.
According to embodiments of the present disclosure, after obtaining the rights identification, the occupied space identification, and the security level identification, a resource information table may be generated. The resource information table may include resource information corresponding to each of the at least one resource identifier. For example, the authority identifier, the occupied space identifier and the security class identifier corresponding to the resource identifier can be associated according to the resource identifier to obtain a resource information table.
Fig. 3 schematically illustrates an example schematic diagram of a process of respectively processing candidate resources corresponding to each of at least one resource identifier to obtain resource information corresponding to each of the at least one resource identifier according to an embodiment of the present disclosure.
As shown in fig. 3, in 300, in response to receiving a resource sharing request 301 from a first terminal, candidate resources 302 corresponding to each of the at least one resource identifier 301_1 may be acquired according to the at least one resource identifier 301_1 in the resource sharing request 301.
After obtaining the candidate resources 302 corresponding to each of the at least one resource identifier 301_1, the candidate resources 302 may be subjected to a scanning process to obtain sharing right information 303_1, occupied space information 303_2, and resource sensitivity information 303_3 corresponding to the candidate resources 302.
After the shared right information 303_1, the occupied space information 303_2, and the resource sensitivity information 303_3 corresponding to the candidate resource 302 are obtained, the right identification 304 may be determined from the shared right information 303_1. From the occupancy information 303_2, the occupancy identity 305 is determined. From the resource sensitivity information 303_3, the security class identification 306 is determined.
After obtaining the resource sensitivity information 303_3 and determining the security class identifier 306, the resource information 307 corresponding to the candidate resource may be determined according to the rights identifier 304, the occupied space identifier 305, and the security class identifier 306.
According to an embodiment of the present disclosure, operation S210 may include the following operations.
And determining the resource sharing type, the terminal type and at least one changed resource identifier corresponding to the change operation in response to detecting the change operation of the first terminal on any resource information in the at least one resource information. And acquiring the change resource information corresponding to the at least one change resource identifier according to the at least one change resource identifier. And determining at least one target resource information according to the resource information corresponding to the at least one resource identifier and the changed resource information corresponding to the at least one changed resource identifier.
According to the embodiment of the disclosure, for each resource identifier in at least one resource identifier, the first terminal may determine whether to change the resource information corresponding to the resource identifier according to the authority identifier, the occupied space identifier and the security class identifier corresponding to the resource identifier in the resource information.
According to the embodiment of the disclosure, the first terminal may perform the changing operation when it is determined that the resource information corresponding to the resource identifier needs to be changed. After the first terminal executes the change operation, the change resource information corresponding to the resource identifier can be obtained through clicking and uploading. After detecting that the first terminal performs a change operation on any resource information in the at least one resource information, the server side can determine a resource sharing type, a terminal type and at least one change resource identifier corresponding to the change operation.
According to the embodiment of the disclosure, after obtaining the at least one change resource identifier, the server may obtain change resource information corresponding to each of the at least one change resource identifier according to the at least one change resource identifier. The change resource information may be obtained by changing the resource information corresponding to each of the at least one change resource identifier according to the at least one change resource identifier.
According to the embodiment of the disclosure, after obtaining the change resource information corresponding to each of the at least one change resource identifier, the resource information corresponding to each of the at least one resource identifier may be processed according to the change resource information corresponding to each of the at least one change resource identifier, so as to obtain at least one target resource information.
According to an embodiment of the present disclosure, the preset mapping relationship may be determined as follows.
And determining a first preset resource sharing scheme under the condition that the terminal type is a physical terminal and the resource sharing type is resource copy sharing. And determining a second preset resource sharing scheme under the condition that the terminal type is a physical terminal and the resource sharing type is resource migration sharing. And determining a third preset resource sharing scheme under the condition that the terminal type is a cloud terminal and the resource sharing type is resource copy sharing. And determining a fourth preset resource sharing scheme under the condition that the terminal type is a cloud terminal and the resource sharing type is resource migration sharing.
According to embodiments of the present disclosure, resource sharing types may include resource copy sharing and resource migration sharing. The terminal types may include physical terminals and cloud terminals.
According to an embodiment of the present disclosure, the preset mapping relationship may include at least one preset key value pair. Each of the at least one preset key value pair may be determined according to a preset sharing rule and a preset resource sharing scheme. The preset sharing rule may be determined according to the terminal type and the resource sharing type and the preset resource sharing.
According to the embodiment of the disclosure, since the resource sharing operation is not required to be limited in the case that the terminal type is a physical terminal, when the preset sharing rule characterizes that the terminal type is a physical terminal and the resource sharing type is resource copy sharing, the first preset resource sharing scheme may be determined as follows: and carrying out format conversion processing on the resources to be shared, and copying the resources to a portable storage medium to finish resource sharing. Under the condition that the preset sharing rule characterizes that the terminal type is a physical terminal and the resource sharing type is resource migration sharing, a second preset resource sharing scheme can be determined as follows: and downloading the resources to be shared to complete the resource sharing.
According to an embodiment of the present disclosure, in a case where the preset sharing rule characterizes that the terminal type is a cloud terminal and the resource sharing type is resource copy sharing, it may be determined that the third preset resource sharing scheme is: and reminding the user to transfer to the physical terminal operation to complete resource sharing. Under the condition that the preset sharing rule characterizes that the terminal type is a cloud terminal and the resource sharing type is resource migration sharing, a fourth preset resource sharing scheme can be determined as follows: and downloading the resources to be shared to complete the resource sharing.
Fig. 4 schematically illustrates an example schematic diagram of a process of determining a preset mapping relationship according to an embodiment of the present disclosure.
As shown in fig. 4, in 400, operation S410 may be performed. In operation S410, the terminal type is physical terminal?
If so, operation S420 may be performed.
In operation S420, is the resource sharing type a resource copy sharing? If so, a first preset resource sharing scheme 401 may be determined. If not, a second preset resource sharing scheme 402 may be determined.
If not, operation S430 may be performed.
In operation S430, the resource sharing type is resource copy sharing? If so, a third preset resource sharing scheme 403 may be determined. If not, a fourth preset resource sharing scheme 404 may be determined.
According to an embodiment of the present disclosure, operation S230 may include the following operations.
And responding to the verification result to represent that the target resource information corresponding to the verification result passes verification, and matching the resource sharing type with the terminal type according to a preset mapping relation to obtain a resource sharing scheme corresponding to the resource information to be shared. And according to the resource sharing scheme, carrying out resource sharing on the resources to be shared, which correspond to the target resource information.
According to an embodiment of the present disclosure, the preset mapping relationship may include at least one preset sharing rule and preset resource sharing schemes corresponding to the at least one preset sharing rule, respectively.
According to the embodiment of the disclosure, when the verification result represents that the target resource information corresponding to the verification result passes verification, the resource sharing type and the terminal type can be matched according to at least one preset sharing rule in the preset mapping relation, and the preset sharing rule matched with the resource sharing type and the terminal type is determined. And determining a preset resource sharing scheme corresponding to the preset sharing rule as a resource sharing scheme corresponding to the resource information to be shared. After the resource sharing scheme is obtained, the resource to be shared corresponding to the target resource information can be shared according to the resource sharing scheme.
The above is only an exemplary embodiment, but not limited thereto, and other resource sharing methods known in the art may be included as long as efficiency and security of resource sharing between heterogeneous systems can be improved.
Fig. 5 schematically illustrates a flow chart of a resource sharing method according to another embodiment of the present disclosure.
As shown in FIG. 5, the method 500 includes operations S510-S530.
In operation S510, in response to receiving the resource information corresponding to each of the at least one resource identifier from the server, a permission identifier, an occupied space identifier, and a security class identifier corresponding to each of the at least one resource identifier are determined.
In operation S520, at least one modified resource identifier is determined from the at least one resource identifier according to the authority identifier, the occupied space identifier, and the security class identifier, which correspond to the at least one resource identifier, respectively.
In operation S530, the resource information corresponding to each of the at least one changed resource identifier is changed according to the at least one changed resource identifier, and changed resource information corresponding to each of the at least one changed resource identifier is obtained.
According to an embodiment of the present disclosure, the resource sharing method 500 may be applied to a first terminal. The first terminal may refer to a terminal used by a user initiating resource sharing. For example, the first terminal may refer to a terminal that implements resource processing and resource uploading.
According to the embodiment of the disclosure, after receiving the resource information corresponding to the at least one resource identifier from the server, the first terminal may determine the authority identifier, the occupied space identifier and the security class identifier corresponding to the at least one resource identifier. The first terminal may determine at least one modified resource identifier according to the authority identifier, the occupied space identifier, and the security class identifier corresponding to the at least one resource identifier.
According to embodiments of the present disclosure, for example, in the case where the authority identifier is not authority, the resource identifier corresponding to the authority identifier may be determined as the changed resource identifier. Alternatively, in the case where the occupied space identifier is larger, the resource identifier corresponding to the occupied space identifier may be determined as the change resource identifier. Alternatively, in the case that the security class identifier is more sensitive, the resource identifier corresponding to the security class identifier may be determined as the change resource identifier.
According to the embodiment of the disclosure, for each of at least one changed resource identifier, for example, in the case that the authority identifier is not authority, the resource information corresponding to the changed resource identifier may be deleted or submitted again after applying the authority to the document author through the anti-disclosure system. Alternatively, in the case where the occupied space identifier is larger, the resource information corresponding to the changed resource identifier may be deleted or marked as continuing to be uploaded to the shared server. Alternatively, in the case that the security level identifier is more sensitive, the security level identifier corresponding to the changed resource identifier may be subjected to custom adjustment.
According to the embodiment of the disclosure, as the change resource information is obtained by changing the resource information corresponding to at least one change resource identifier according to at least one change resource identifier, the change resource identifier is determined in at least one resource identifier according to the authority identifier, the occupied space identifier and the security class identifier corresponding to at least one resource identifier, thereby improving the accuracy of the change resource information and further guaranteeing the efficiency and the safety of resource sharing.
Fig. 6 schematically illustrates a flow chart of a method of resource sharing according to another embodiment of the present disclosure.
As shown in fig. 6, the method 600 includes operations S610 to S630.
In operation S610, in response to receiving the resource information to be shared from the server, the permission identifier, the occupied space identifier, and the security level identifier corresponding to each of the at least one target resource identifier are determined according to the target resource information corresponding to each of the at least one target resource identifier in the resource information to be shared.
In operation S620, the authority identifier, the occupied space identifier, and the security class identifier corresponding to each of the at least one target resource identifier are respectively verified according to a preset verification rule, so as to obtain verification results corresponding to each of the at least one target resource identifier.
In operation S630, the verification results corresponding to the at least one target resource identifier are sent to the server, so that the server performs resource sharing according to the verification results.
According to an embodiment of the present disclosure, the resource sharing method 600 may be applied to a second terminal. The second terminal may refer to a terminal used by a user who reviews the resources to be shared. For example, the second terminal may refer to a terminal that implements resource approval.
According to the embodiment of the disclosure, after receiving the to-be-shared resource information from the server, the second terminal may respectively approve the target resource information corresponding to each of the at least one target resource identifier in the to-be-shared resource information according to a preset verification rule, so as to obtain a verification result corresponding to each of the at least one target resource identifier. The verification result may be used to characterize whether target resource information corresponding to the verification result passes verification. After the verification result is obtained, the second terminal can send the verification result to the server side, so that the server side can share resources according to the verification result.
According to the embodiment of the disclosure, since the verification result is obtained by respectively verifying the authority identifier, the occupied space identifier and the security identifier corresponding to at least one target resource identifier according to the preset verification rule by the second terminal, the verification result can represent whether the target resource information passes the verification. On the basis, the verification results corresponding to the at least one target resource identifier are sent to the server, so that the subsequent server can share the resources among heterogeneous systems according to the resource sharing type and the terminal type.
According to an embodiment of the present disclosure, operation S620 may include the following operations.
And matching the authority identification, the occupied space identification and the security identification corresponding to the target resource identification with a preset verification rule aiming at the target resource identification in at least one target resource identification to obtain a matching result. And under the condition that the matching result is determined to be consistent with the permission identification, the occupied space identification, the security identification and the preset verification rule, obtaining a verification result of verifying that the target resource information corresponding to the target resource identification is characterized. And under the condition that the authority identification, the occupied space identification, the security identification and the preset verification rule of the matching result representation are inconsistent, obtaining a verification result that the target resource information corresponding to the target resource identification is characterized to be not verified.
According to embodiments of the present disclosure, the resource information to be shared may further include resource usage information and a resource item number. The preset verification rule may be set according to actual service requirements, which is not limited herein. For example, the preset validation rules may include at least one of: resource usage rules, resource item numbering rules, and resource sensitivity rules.
According to an embodiment of the present disclosure, the resource usage rules may include at least one of: providing and receiving business to and from the authority and sending the business to and from the cooperator. The resource usage information corresponding to the target resource identification may be matched according to a resource usage rule. Under the condition that the resource usage information is determined to belong to the service provided or received by the authorized organization, the security class identifier corresponding to the target resource identifier can be matched according to the resource sensitivity degree rule.
According to the embodiment of the disclosure, in the case that the resource usage information is determined not to belong to the service provided and received to the authority and the service sent out to the partner, the security class identifier corresponding to the target resource identifier can be matched according to the resource sensitivity degree rule.
According to the embodiment of the disclosure, when it is determined that the resource usage information belongs to the transmission to the partner, the resource item number corresponding to the target resource identifier may be matched according to the resource item number rule. The resource item numbering rules may include at least one valid item number. And under the condition that the resource item number is determined not to belong to the valid item number, obtaining a verification result indicating that the target resource information corresponding to the target resource identifier fails to pass verification.
According to the embodiment of the disclosure, in the case that the resource item number is determined to belong to the valid item number, the security class identifier corresponding to the target resource identifier can be matched according to the resource sensitivity degree rule.
According to an embodiment of the present disclosure, the resource sensitivity rule may include at least one of: high sensitivity rules and more sensitivity rules. Under the condition that the security level identification is determined to be highly sensitive, the authority identification and the occupied space identification corresponding to the target resource identification can be matched based on a high-sensitivity degree rule. Under the condition that the security level identification is determined to be more sensitive, the authority identification and the occupied space identification corresponding to the target resource identification can be matched based on a more sensitive degree rule.
Fig. 7 schematically illustrates an example schematic diagram of a resource sharing process according to an embodiment of the disclosure.
As shown in fig. 7, in 700, the resource sharing procedure may include operations S701 to S716.
In operation S701, the first terminal may transmit a resource sharing request to the server.
In operation S702, the server may obtain candidate resources corresponding to at least one resource identifier according to at least one resource identifier in the resource sharing request from the first terminal.
In operation S703, the server may process the candidate resources corresponding to each of the at least one resource identifier, respectively, to obtain resource information corresponding to each of the at least one resource identifier.
In operation S704, the server may transmit resource information corresponding to each of the at least one resource identifier to the first terminal.
In operation S705, the first terminal may determine, according to the resource information from the server, the rights identifier, the occupied space identifier, and the security level identifier corresponding to the at least one resource identifier, respectively.
In operation S706, the first terminal may determine at least one changed resource identifier from among the at least one resource identifiers according to the authority identifier, the occupied space identifier, and the security class identifier, which respectively correspond to the at least one resource identifier.
In operation S707, the first terminal may change the resource information corresponding to each of the at least one changed resource identifier according to the at least one changed resource identifier, to obtain changed resource information corresponding to each of the at least one changed resource identifier.
In operation S708, the first terminal may transmit, to the server, change resource information corresponding to each of the at least one change resource identifier.
In operation S709, the server may obtain, according to at least one change resource identifier from the first terminal, change resource information corresponding to each of the at least one change resource identifier.
In operation S710, the server may determine resource information to be shared, a resource sharing type, and a terminal type of the first terminal.
The server may transmit the resource information to be shared to the second terminal in operation S711.
In operation S712, the second terminal may receive the resource information to be shared from the server.
In operation S713, the second terminal may determine the authority identifier, the occupied space identifier, and the security class identifier corresponding to each of the at least one target resource identifier according to the target resource information corresponding to each of the at least one target resource identifier in the resource information to be shared.
In operation S714, the second terminal may verify the authority identifier, the occupied space identifier, and the security identifier corresponding to each of the at least one target resource identifier according to a preset verification rule, so as to obtain a verification result corresponding to each of the at least one target resource identifier.
In operation S715, the second terminal may send the verification results corresponding to the at least one target resource identifier to the server.
In operation S716, the server may characterize, in response to the verification result from the second terminal, that the target resource information corresponding to the verification result passes the verification, and perform resource sharing on the resource to be shared corresponding to the target resource information according to the resource sharing type and the terminal type.
Fig. 8 schematically illustrates a block diagram of a resource sharing apparatus according to an embodiment of the present disclosure.
As shown in fig. 8, the resource sharing device 800 applied to a server may include a first determining module 810, a first sending module 820, and a resource sharing module 830.
The first determining module 810 is configured to determine, in response to detecting a change operation of the first terminal on any resource information in the at least one resource information, resource information to be shared, a resource sharing type, and a terminal type of the first terminal, where the resource information to be shared includes at least one target resource information, and the at least one target resource information corresponds to a resource to be shared.
The first sending module 820 is configured to send the resource information to be shared to the second terminal, so that the second terminal verifies the at least one target resource information respectively, and obtains verification results corresponding to the at least one target resource information respectively.
The resource sharing module 830 is configured to characterize, in response to the verification result, that the target resource information corresponding to the verification result passes verification, and perform resource sharing on the resource to be shared corresponding to the target resource information according to the resource sharing type and the terminal type.
According to an embodiment of the present disclosure, the resource sharing apparatus 800 may include an acquisition module, a processing module, and a third transmission module.
And the acquisition module is used for responding to the received resource sharing request from the first terminal and acquiring candidate resources corresponding to at least one resource identifier respectively according to at least one resource identifier in the resource sharing request.
And the processing module is used for respectively processing the candidate resources corresponding to the at least one resource identifier to obtain resource information corresponding to the at least one resource identifier.
And the third sending module is used for sending the resource information corresponding to each of the at least one resource identifier to the first terminal so that the first terminal can process the resource information corresponding to each of the at least one resource identifier.
According to an embodiment of the present disclosure, the processing module may include a first processing unit, a first determining unit, a second determining unit, a third determining unit, and a fourth determining unit.
The first processing unit is used for scanning the candidate resources for each candidate resource in the candidate resources corresponding to the at least one resource identifier, and obtaining sharing authority information, occupied space information and resource sensitivity information corresponding to the candidate resources.
And the first determining unit is used for determining the permission identification according to the shared permission information.
And the second determining unit is used for determining the occupied space identification according to the occupied space information.
And the third determining unit is used for determining the security level identification according to the resource sensitivity information.
And the fourth determining unit is used for determining resource information corresponding to the candidate resources according to the authority identification, the occupied space identification and the security level identification.
According to an embodiment of the present disclosure, the resource sharing module 830 may include a first matching unit and a resource sharing unit.
The first matching unit is used for responding to the verification result to represent that the target resource information corresponding to the verification result passes verification, and matching the resource sharing type with the terminal type according to a preset mapping relation to obtain a resource sharing scheme corresponding to the resource information to be shared.
And the resource sharing unit is used for carrying out resource sharing on the resources to be shared corresponding to the target resource information according to the resource sharing scheme.
According to an embodiment of the present disclosure, the preset mapping relationship includes at least one preset sharing rule and preset resource sharing schemes corresponding to the at least one preset sharing rule, respectively.
According to an embodiment of the present disclosure, the resource sharing type includes resource copy sharing and resource migration sharing, and the terminal type includes a physical terminal and a cloud terminal.
According to an embodiment of the present disclosure, the preset mapping relationship may be determined as follows.
And determining a first preset resource sharing scheme under the condition that the terminal type is a physical terminal and the resource sharing type is resource copy sharing.
And determining a second preset resource sharing scheme under the condition that the terminal type is a physical terminal and the resource sharing type is resource migration sharing.
And determining a third preset resource sharing scheme under the condition that the terminal type is a cloud terminal and the resource sharing type is resource copy sharing.
And determining a fourth preset resource sharing scheme under the condition that the terminal type is a cloud terminal and the resource sharing type is resource migration sharing.
According to an embodiment of the present disclosure, the first determining module 810 may include a fifth determining unit, an acquiring unit, and a sixth determining unit.
And a fifth determining unit, configured to determine, in response to detecting a change operation performed by the first terminal on any resource information in the at least one resource information, a resource sharing type, a terminal type, and at least one changed resource identifier corresponding to the change operation.
And the acquisition unit is used for acquiring the change resource information corresponding to the at least one change resource identifier according to the at least one change resource identifier.
And a sixth determining unit, configured to determine at least one target resource information according to the resource information corresponding to each of the at least one resource identifier and the changed resource information corresponding to each of the at least one changed resource identifier.
Fig. 9 schematically illustrates a block diagram of a resource sharing apparatus according to another embodiment of the present disclosure.
As shown in fig. 9, the resource sharing apparatus 900 is applied to the first terminal, and may include a second determining module 910, a third determining module 920, and a changing module 930.
A second determining module 910, configured to determine, in response to receiving the resource information corresponding to each of the at least one resource identifier from the server, a permission identifier, an occupied space identifier, and a security class identifier corresponding to each of the at least one resource identifier.
A third determining module 920, configured to determine at least one changed resource identifier from the at least one resource identifier according to the authority identifier, the occupied space identifier, and the security class identifier corresponding to the at least one resource identifier.
And a changing module 930, configured to change the resource information corresponding to each of the at least one changed resource identifier according to the at least one changed resource identifier, so as to obtain changed resource information corresponding to each of the at least one changed resource identifier.
Fig. 10 schematically illustrates a block diagram of a resource sharing apparatus according to another embodiment of the present disclosure.
As shown in fig. 10, the resource sharing apparatus 1000 is applied to the second terminal, and may include a fourth determination module 1010, an authentication module 1020, and a second transmission module 1030.
And a fourth determining module 1010, configured to determine, in response to receiving the resource information to be shared from the server, a permission identifier, an occupied space identifier, and a security class identifier corresponding to each of the at least one target resource identifier according to target resource information corresponding to each of the at least one target resource identifier in the resource information to be shared.
And the verification module 1020 is configured to verify the authority identifier, the occupied space identifier and the security identifier corresponding to the at least one target resource identifier respectively according to a preset verification rule, so as to obtain a verification result corresponding to the at least one target resource identifier respectively.
And the second sending module 1030 is configured to send verification results corresponding to the at least one target resource identifier to the server, so that the server performs resource sharing according to the verification results.
According to an embodiment of the present disclosure, the verification module 1020 may include a second matching unit, a seventh determining unit, and an eighth determining unit.
The second matching unit is used for matching the authority identification, the occupied space identification and the security level identification corresponding to the target resource identification with a preset verification rule aiming at the target resource identification in the at least one target resource identification, so as to obtain a matching result.
And the seventh determining unit is used for obtaining a verification result for representing that the target resource information corresponding to the target resource identifier passes verification under the condition that the matching result is determined to be consistent with the authority identifier, the occupied space identifier, the security identifier and the preset verification rule.
And the eighth determining unit is used for obtaining a verification result that the target resource information corresponding to the characterization target resource identifier fails verification under the condition that the permission identifier, the occupied space identifier, the security identifier and the preset verification rule of the characterization matching result are inconsistent.
Any number of modules, sub-modules, units, sub-units, or at least some of the functionality of any number of the sub-units according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented as split into multiple modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system-on-chip, a system-on-substrate, a system-on-package, an Application Specific Integrated Circuit (ASIC), or in any other reasonable manner of hardware or firmware that integrates or encapsulates the circuit, or in any one of or a suitable combination of three of software, hardware, and firmware. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be at least partially implemented as computer program modules, which when executed, may perform the corresponding functions.
For example, any of the first determining module 810, the first transmitting module 820, and the resource sharing module 830 may be combined in one module/unit/sub-unit, or any of the modules/units/sub-units may be split into a plurality of modules/units/sub-units. Alternatively, at least some of the functionality of one or more of these modules/units/sub-units may be combined with at least some of the functionality of other modules/units/sub-units and implemented in one module/unit/sub-unit. According to embodiments of the present disclosure, at least one of the first determination module 810, the first transmission module 820, and the resource sharing module 830 may be implemented at least in part as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable way of integrating or packaging circuitry, or in any one of or a suitable combination of three of software, hardware, and firmware. Alternatively, at least one of the first determining module 810, the first transmitting module 820 and the resource sharing module 830 may be at least partially implemented as a computer program module, which when executed, may perform the corresponding functions.
Alternatively, any of the second determination module 910, the third determination module 920, and the modification module 930 may be combined into one module/unit/subunit to be implemented, or any of the modules/units/subunits may be split into a plurality of modules/units/subunits. Alternatively, at least some of the functionality of one or more of these modules/units/sub-units may be combined with at least some of the functionality of other modules/units/sub-units and implemented in one module/unit/sub-unit. According to embodiments of the present disclosure, at least one of the second determination module 910, the third determination module 920, and the altering module 930 may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable way of integrating or packaging the circuits, or in any one of or a suitable combination of three of software, hardware, and firmware. Alternatively, at least one of the second determination module 910, the third determination module 920, and the change module 930 may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
Alternatively, any of the fourth determination module 1010, the verification module 1020, and the second transmission module 1030 may be combined in one module/unit/sub-unit or any of them may be split into a plurality of modules/units/sub-units. Alternatively, at least some of the functionality of one or more of these modules/units/sub-units may be combined with at least some of the functionality of other modules/units/sub-units and implemented in one module/unit/sub-unit. According to embodiments of the present disclosure, at least one of the fourth determination module 1010, the validation module 1020, and the second transmission module 1030 may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable way of integrating or packaging the circuits, or in any one of or a suitable combination of three of software, hardware, and firmware. Alternatively, at least one of the fourth determination module 1010, the authentication module 1020 and the second transmission module 1030 may be at least partially implemented as a computer program module which, when executed, may perform the corresponding functions.
It should be noted that, in the embodiment of the present disclosure, the resource sharing device portion corresponds to the resource sharing method portion in the embodiment of the present disclosure, and the description of the resource sharing device portion specifically refers to the resource sharing method portion, which is not described herein.
Fig. 11 schematically illustrates a block diagram of an electronic device adapted to implement a resource sharing method according to an embodiment of the disclosure. The electronic device shown in fig. 11 is merely an example, and should not impose any limitations on the functionality and scope of use of embodiments of the present disclosure.
As shown in fig. 11, a computer electronic device 1100 according to an embodiment of the present disclosure includes a processor 1101 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 1102 or a program loaded from a storage section 1109 into a Random Access Memory (RAM) 1103. The processor 1101 may comprise, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 1101 may also include on-board memory for caching purposes. The processor 1101 may comprise a single processing unit or a plurality of processing units for performing the different actions of the method flow according to embodiments of the present disclosure.
In the RAM 1103, various programs and data necessary for the operation of the electronic device 1100 are stored. The processor 1101, ROM 1102, and RAM 1103 are connected to each other by a bus 1104. The processor 1101 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 1102 and/or the RAM 1103. Note that the program may be stored in one or more memories other than the ROM 1102 and the RAM 1103. The processor 1101 may also perform various operations of the method flow according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the disclosure, the electronic device 1100 may also include an input/output (I/O) interface 1105, the input/output (I/O) interface 1105 also being connected to the bus 1104. The electronic device 1100 may also include one or more of the following components connected to the I/O interface 1105: an input section 1106 including a keyboard, a mouse, and the like; an output portion 1107 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 1108 including a hard disk or the like; and a communication section 1109 including a network interface card such as a LAN card, a modem, and the like. The communication section 1109 performs communication processing via a network such as the internet. The drive 1110 is also connected to the I/O interface 1105 as needed. Removable media 1111, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like, is installed as needed in drive 1110, so that a computer program read therefrom is installed as needed in storage section 1108.
According to embodiments of the present disclosure, the method flow according to embodiments of the present disclosure may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program can be downloaded and installed from a network via the communication portion 1109, and/or installed from the removable media 1111. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 1101. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium. Examples may include, but are not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 1102 and/or RAM 1103 described above and/or one or more memories other than ROM 1102 and RAM 1103.
Embodiments of the present disclosure also include a computer program product comprising a computer program comprising program code for performing the methods provided by the embodiments of the present disclosure, the program code for causing an electronic device to implement the resource sharing methods provided by the embodiments of the present disclosure when the computer program product is run on the electronic device.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 1101. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program can also be transmitted, distributed over a network medium in the form of signals, downloaded and installed via the communication portion 1109, and/or installed from the removable media 1111. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be combined in various combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (15)

1. A resource sharing method is applied to a server and comprises the following steps:
determining resource information to be shared, a resource sharing type and a terminal type of the first terminal in response to detecting a change operation of the first terminal on any resource information in at least one resource information, wherein the resource information to be shared comprises at least one target resource information, and the at least one target resource information corresponds to a resource to be shared;
the resource information to be shared is sent to a second terminal, so that the second terminal can verify the at least one target resource information respectively, and verification results corresponding to the at least one target resource information respectively are obtained; and
And responding to the verification result to represent that target resource information corresponding to the verification result passes verification, and carrying out resource sharing on the resources to be shared corresponding to the target resource information according to the resource sharing type and the terminal type.
2. The method of claim 1, further comprising, prior to the determining the resource information to be shared, the resource sharing type, and the terminal type of the first terminal in response to detecting a change operation of any of the at least one resource information by the first terminal:
in response to receiving a resource sharing request from the first terminal, acquiring candidate resources corresponding to at least one resource identifier in the resource sharing request according to the at least one resource identifier;
processing the candidate resources corresponding to the at least one resource identifier respectively to obtain resource information corresponding to the at least one resource identifier respectively; and
and sending the resource information corresponding to the at least one resource identifier to the first terminal so that the first terminal can process the resource information corresponding to the at least one resource identifier.
3. The method of claim 2, wherein the processing the candidate resources corresponding to the at least one resource identifier respectively, to obtain resource information corresponding to the at least one resource identifier respectively includes:
for each of the candidate resources corresponding to each of the at least one resource identities,
scanning the candidate resources to obtain sharing authority information, occupied space information and resource sensitivity information corresponding to the candidate resources;
determining a permission identification according to the sharing permission information;
determining an occupied space identifier according to the occupied space information;
determining a security identifier according to the resource sensitivity information; and
and determining resource information corresponding to the candidate resource according to the authority identification, the occupied space identification and the security identification.
4. A method according to any one of claims 1 to 3, wherein the characterizing, in response to the verification result, that target resource information corresponding to the verification result is verified, the resource to be shared corresponding to the target resource information according to the resource sharing type and the terminal type includes:
Responding to the verification result to represent that target resource information corresponding to the verification result passes verification, and matching the resource sharing type with the terminal type according to a preset mapping relation to obtain a resource sharing scheme corresponding to the resource information to be shared; and
according to the resource sharing scheme, carrying out resource sharing on the resources to be shared, which correspond to the target resource information;
the preset mapping relation comprises at least one preset sharing rule and preset resource sharing schemes corresponding to the at least one preset sharing rule.
5. The method of claim 4, wherein the resource sharing type includes resource copy sharing and resource migration sharing, and the terminal type includes a physical terminal and a cloud terminal;
the preset mapping relation is determined by the following method:
determining a first preset resource sharing scheme under the condition that the terminal type is the physical terminal and the resource sharing type is the resource copy sharing;
determining a second preset resource sharing scheme under the condition that the terminal type is the physical terminal and the resource sharing type is the resource migration sharing;
Determining a third preset resource sharing scheme under the condition that the terminal type is the cloud terminal and the resource sharing type is the resource copy sharing; and
and determining a fourth preset resource sharing scheme under the condition that the terminal type is the cloud terminal and the resource sharing type is the resource migration sharing.
6. A method according to any one of claims 1 to 3, wherein the determining, in response to detecting a change operation of the first terminal to any of the at least one resource information, resource information to be shared, a resource sharing type, and a terminal type of the first terminal includes:
in response to detecting a change operation of the first terminal on any resource information in the at least one resource information, determining the resource sharing type, the terminal type and at least one changed resource identifier corresponding to the change operation;
acquiring change resource information corresponding to each of the at least one change resource identifier according to the at least one change resource identifier; and
and determining the at least one target resource information according to the resource information corresponding to the at least one resource identifier and the changed resource information corresponding to the at least one changed resource identifier.
7. A resource sharing method is applied to a first terminal and comprises the following steps:
in response to receiving resource information from a server, wherein the resource information corresponds to at least one resource identifier respectively, determining a right identifier, an occupied space identifier and a security class identifier corresponding to the at least one resource identifier respectively;
determining at least one changed resource identifier in the at least one resource identifier according to the authority identifier, the occupied space identifier and the security class identifier which are respectively corresponding to the at least one resource identifier; and
and changing the resource information corresponding to each of the at least one changed resource identifier according to the at least one changed resource identifier to obtain changed resource information corresponding to each of the at least one changed resource identifier.
8. A resource sharing method is applied to a second terminal and comprises the following steps:
in response to receiving resource information to be shared from a server, determining authority identification, occupied space identification and security class identification corresponding to at least one target resource identification according to target resource information corresponding to the at least one target resource identification in the resource information to be shared;
respectively verifying the authority identification, the occupied space identification and the security identification corresponding to the at least one target resource identification according to a preset verification rule to obtain verification results corresponding to the at least one target resource identification; and
And sending the verification results corresponding to the at least one target resource identifier to the server so that the server can share resources according to the verification results.
9. The method of claim 8, wherein the verifying the authority identifier, the occupied space identifier, and the security class identifier, which respectively correspond to the at least one target resource identifier, according to a preset verification rule, respectively, to obtain a verification result respectively corresponding to the at least one target resource identifier includes:
for a target resource identification of the at least one target resource identification,
matching the authority identification, the occupied space identification and the security identification corresponding to the target resource identification with the preset verification rule to obtain a matching result;
under the condition that the matching result is determined to represent the authority identifier, the occupied space identifier, the security identifier and the preset verification rule to be consistent, obtaining a verification result representing that target resource information corresponding to the target resource identifier passes verification; and
and under the condition that the authority identification, the occupied space identification, the security level identification and the preset verification rule, which are characterized by the matching result, are inconsistent, obtaining the verification result that the target resource information corresponding to the target resource identification is characterized to be not verified.
10. A resource sharing device is applied to a server and comprises:
the first determining module is used for determining resource information to be shared, a resource sharing type and a terminal type of the first terminal in response to detecting a change operation of the first terminal on any resource information in at least one resource information, wherein the resource information to be shared comprises at least one target resource information, and the at least one target resource information corresponds to resources to be shared respectively;
the first sending module is used for sending the resource information to be shared to a second terminal so that the second terminal can verify the at least one target resource information respectively to obtain verification results corresponding to the at least one target resource information respectively; and
and the resource sharing module is used for responding to the verification result to represent that target resource information corresponding to the verification result passes verification, and carrying out resource sharing on the resources to be shared corresponding to the target resource information according to the resource sharing type and the terminal type.
11. A resource sharing device is applied to a first terminal and comprises:
the second determining module is used for determining authority identifiers, occupied space identifiers and security class identifiers corresponding to at least one resource identifier respectively in response to receiving the resource information corresponding to the at least one resource identifier respectively from the server;
The third determining module is used for determining at least one changed resource identifier in the at least one resource identifier according to the authority identifier, the occupied space identifier and the security class identifier which are respectively corresponding to the at least one resource identifier; and
and the change module is used for changing the resource information corresponding to each of the at least one change resource identifier according to the at least one change resource identifier to obtain change resource information corresponding to each of the at least one change resource identifier.
12. A resource sharing device is applied to a second terminal, and comprises:
a fourth determining module, configured to determine, in response to receiving resource information to be shared from a server, a permission identifier, an occupied space identifier, and a security level identifier corresponding to at least one target resource identifier according to target resource information corresponding to the at least one target resource identifier in the resource information to be shared;
the verification module is used for verifying the authority identifier, the occupied space identifier and the security identifier which are respectively corresponding to the at least one target resource identifier according to a preset verification rule to obtain verification results respectively corresponding to the at least one target resource identifier; and
And the second sending module is used for sending the verification results corresponding to the at least one target resource identifier to the server so that the server can share resources according to the verification results.
13. An electronic device, comprising:
one or more processors;
a memory for storing one or more instructions,
wherein the one or more instructions, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1 to 9.
14. A computer readable storage medium having stored thereon executable instructions which when executed by a processor cause the processor to implement the method of any of claims 1 to 9.
15. A computer program product comprising computer executable instructions for implementing the method of any one of claims 1 to 9 when executed.
CN202310139717.3A 2023-02-13 2023-02-13 Resource sharing method and device, electronic equipment and computer readable storage medium Pending CN116149876A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310139717.3A CN116149876A (en) 2023-02-13 2023-02-13 Resource sharing method and device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310139717.3A CN116149876A (en) 2023-02-13 2023-02-13 Resource sharing method and device, electronic equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN116149876A true CN116149876A (en) 2023-05-23

Family

ID=86350418

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310139717.3A Pending CN116149876A (en) 2023-02-13 2023-02-13 Resource sharing method and device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN116149876A (en)

Similar Documents

Publication Publication Date Title
US10032037B1 (en) Establishing application trust levels using taint propagation as a service
CN110879903A (en) Evidence storage method, evidence verification method, evidence storage device, evidence verification device, evidence storage equipment and evidence verification medium
CN112434818B (en) Model construction method, device, medium and electronic equipment
US10574699B1 (en) Load balancer request processing
CN111914262A (en) Test method, device, system, electronic equipment and storage medium
US10592068B1 (en) Graphic composer for service integration
CN110708335A (en) Access authentication method and device and terminal equipment
CA3152810A1 (en) Connecting web publisher inventory to programmatic exchanges without third-party cookies
CN115587575A (en) Data table creation method, target data query method, device and equipment
CN113572763B (en) Data processing method and device, electronic equipment and storage medium
US10049222B1 (en) Establishing application trust levels using taint propagation
CN107634942B (en) Method and device for identifying malicious request
CN112905990A (en) Access method, client, server and access system
CN114428661A (en) Mirror image management method and device
CN114422586B (en) Event notification method, event notification device, computer equipment and storage medium
CN113609516B (en) Information generation method and device based on abnormal user, electronic equipment and medium
US20200036749A1 (en) Web browser incorporating social and community features
US9749304B1 (en) System and methods for accessing multiple resources via one identifier
CN116149876A (en) Resource sharing method and device, electronic equipment and computer readable storage medium
CN114546370A (en) Data docking method and related device
CN109543398B (en) Application program account migration method and device and electronic equipment
CN113641966B (en) Application integration method, system, equipment and medium
CN115086321B (en) Multi-cluster traffic forwarding method and device and electronic equipment
US20240187431A1 (en) System and method for monitoring user actions with respect to a resource presented by a web browser
US9159078B2 (en) Managing identifiers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination