KR20180007629A - File Searching Method using Identification Number - Google Patents
File Searching Method using Identification Number Download PDFInfo
- Publication number
- KR20180007629A KR20180007629A KR1020160088913A KR20160088913A KR20180007629A KR 20180007629 A KR20180007629 A KR 20180007629A KR 1020160088913 A KR1020160088913 A KR 1020160088913A KR 20160088913 A KR20160088913 A KR 20160088913A KR 20180007629 A KR20180007629 A KR 20180007629A
- Authority
- KR
- South Korea
- Prior art keywords
- identification number
- file
- terminal
- server
- user
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/11—File system administration, e.g. details of archiving or snapshots
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/176—Support for shared access to files; File sharing support
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention relates to a file search method using an identification number.
A method for searching a file using an identification number according to the present invention includes the steps of: assigning a personal identification number of a user; assigning a file identification number to a file corresponding to the user; A step of inputting a search expression including the personal identification number, a special symbol, and the file identification number in a first terminal, an input step of inputting a file corresponding to the search expression among the files stored in the server, And transmitting the detected file to the first terminal by the server.
Description
The present invention relates to a file search method using an identification number.
Recently, mobile communication technology has provided a simple voice call function. Recently, however, various service functions including a short message service have been added to the mobile communication technology, , The use of wireless Internet using smart terminals such as a smart phone, a smart pad, and a smart TV has become popular, and various application programs based on such wireless Internet and wireless communication technology ) Have been developed and used.
Accordingly, technologies for enabling the use of the wireless Internet or application programs as fast as possible using a mobile communication terminal such as a smart terminal have been developed.
Conventionally, when a file stored in a cloud folder is to be downloaded to a mobile communication terminal, an address of a page providing a cloud service has to be input to access the corresponding page, and a desired file must be directly searched on the accessed page.
According to this conventional technology, there is a problem that it takes a relatively long time to download a desired file, and the retrieval method is complicated.
An object of the present invention is to provide a method of searching for a desired file using an identification number and a special symbol, and a method of searching for a file using an identification number that can be downloaded.
A method for searching a file using an identification number according to the present invention includes the steps of: assigning a personal identification number of a user; assigning a file identification number to a file corresponding to the user; A step of inputting a search expression including the personal identification number, a special symbol, and the file identification number in a first terminal, an input step of inputting a file corresponding to the search expression among the files stored in the server, And transmitting the detected file to the first terminal by the server.
In the searching formula, the special symbol may be located between the personal identification number and the file identification number.
In addition, the special symbols may include at least one of a shop (#) and a star.
The input step may include inputting the search expression into a dial input window of the first terminal, and selecting a call key in a state where the search expression is input to the dial input window.
In addition, the personal identification number may include at least one of a resident registration number, a telephone number, and a social security number.
The method may further include setting security by assigning authentication information to a file corresponding to the user.
The method may further include inputting the authentication information to access the secured file in the first terminal.
The file searching method using the identification number according to the present invention can search for and download a desired file with only a combination of the identification number and the special symbol so that the search is easy and the time required for the search can be reduced.
1 and 2 are views for explaining a search system to which a file search method using an identification number according to the present invention is applied.
3 to 11 are diagrams for explaining a file search method using an identification number according to the present invention.
12 to 16 are diagrams for explaining a file searching method using a folder identification number.
17 to 20 are diagrams for explaining a method of using authentication information.
Hereinafter, a file search method using an identification number according to the present invention will be described in detail with reference to the accompanying drawings.
While the invention is susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It is to be understood that the present invention is not intended to be limited to the specific embodiments but includes all changes, equivalents, and alternatives falling within the spirit and scope of the present invention.
In describing the present invention, the terms first, second, etc. may be used to describe various components, but the components may not be limited by the terms. The terms may only be used for the purpose of distinguishing one element from another. For example, without departing from the scope of the present invention, the first component may be referred to as a second component, and similarly, the second component may also be referred to as a first component.
The term " and / or " may include any combination of a plurality of related listed items or any of a plurality of related listed items.
When an element is referred to as being "connected" or "connected" to another element, it may be directly connected or connected to the other element, but other elements may be present in between Can be understood. On the other hand, when it is mentioned that an element is "directly connected" or "directly connected" to another element, it can be understood that no other element exists in between.
The terminology used in this application is used only to describe a specific embodiment and is not intended to limit the invention. The singular expressions may include plural expressions unless the context clearly dictates otherwise.
In the present application, the terms "comprises", "having", and the like are used interchangeably to designate one or more of the features, numbers, steps, operations, elements, components, But do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, parts, or combinations thereof.
Unless otherwise defined, all terms used herein, including technical or scientific terms, may have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Terms such as those defined in commonly used dictionaries can be interpreted as having a meaning consistent with the meaning in the context of the relevant art and are, unless expressly defined in the present application, interpreted in an ideal or overly formal sense .
In addition, the following embodiments are provided to explain more fully to the average person skilled in the art. The shapes and sizes of the elements in the drawings and the like can be exaggerated for clarity.
The various embodiments described below may be implemented in a recording medium readable by a computer or similar device using software, hardware, or a combination thereof.
In accordance with a hardware implementation, embodiments of the present invention may be implemented in a processor, such as application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays may be implemented using at least one of processors, controllers, micro-controllers, microprocessors, and electrical units for performing functions.
On the other hand, according to a software implementation, embodiments such as procedures or functions in the present invention may be implemented with separate software modules that perform at least one function or operation.
Hereinafter, 'A and / or B' can be interpreted as 'at least one of A and B.'
1 and 2 are views for explaining a search system to which a file search method using an identification number according to the present invention is applied.
Referring to FIG. 1, a
The
The
The file stored in the
In contrast, the
Of course, it is possible for the
Hereinafter, for convenience of explanation, the
That is, the
A user of the
The user of the
A user who wishes to upload a file can access the
A user who wishes to download a file can set a search time using the
Then, the
The
2, the
The
The authentication
The identification
Also, the identification
The
The
The receiver identification
The
The memory unit 181 can store data and programs necessary for file search. The memory unit 181 may store information on the file, information on the file uploader (user of the first terminal 200), and information on the file downloader (user of the second terminal 300).
The control unit 182 can control the overall operation and function of the
A file search method using an identification number applied to the
3 to 11 are diagrams for explaining a file search method using an identification number according to the present invention. In the following, description of the parts described above may be omitted.
3, the user of the
In addition, the user of the
Then, in the
For example, as in the case of FIG. 4, the
This personal identification number can be set manually by the user. Alternatively, the
Then, the user of the
Then, the
For example, as in the case of Fig. 5, the file identification number is assigned to the authorized
Thereafter, the
The search expression may include a personal identification number, a special symbol, and a file identification number. In addition, the special symbol may include at least one of a shop (#) and a star. The special designations applicable in the present invention may not be limited to the shop (#) and the star.
It may be desirable for the special symbol in the search expression to be located between the personal identification number and the file identification number. In this case, the
In addition, the search formula may be input to a dial input window of the
6, a search expression composed of a
If the call key CK is selected in the state that the search expression is input to the dial input window DIW, the search function can be transmitted to the
Then, the
For example, the
In addition, the
Then, as in the case of FIG. 7, information about the file corresponding to the search formula may be displayed on the screen of the second terminal 300 (S190).
On the other hand, the order of the personal identification number and the file identification number in the search formula may be changed. For example, as in the case of FIG. 8, it is possible that the
In the above description, a method of searching for a product by selecting a call key (CK) in a state that a search expression is input in the dial input window DIW has been described, but the present invention is not limited thereto.
For example, as in the case of FIG. 9, it is possible to search for a desired commodity by selecting a search key (LMK) for retrieving a commodity in a state in which a search expression is input to the dial input window DIW.
It is possible to create a search expression using only the personal identification number and the special symbols. In this case, information on the user corresponding to the personal identification number can be displayed on the
For example, assume that a search expression of 1234 # is input to the dial input window DIW of the
In this case, as shown in FIG. 10B, the
For example, information about the files stored in the storage space set by the user corresponding to the
In this situation, the user of the
The personal identification number may also be set based on information that can identify the user.
For example, as in the case of Fig. 11, the personal identification number may include at least one of a resident registration number, a telephone number, and a social security number.
If the telephone number is used as a personal identification number, a search expression such as 01088888888 # 88 may be used.
If the
12 to 16 are diagrams for explaining a file searching method using a folder identification number. In the following, description of the parts described above may be omitted.
As shown in FIG. 12, the folder stored in the storage space corresponding to the user A (user) may include a contract folder, a business file folder, and a miscellaneous folder.
In addition,
As described above, it is possible to allocate at least one folder to the storage space of the A user allocated to the
Alternatively, it is also possible that a predetermined file is immediately stored in the storage space of the A user allocated to the
A folder identification number can be assigned to each folder. For example, as in the case of Fig. 13, it is possible to assign a folder identification number of 001 to a contract folder, a folder identification number of 002 to a business folder, and a folder identification number of 003 to a miscellaneous folder .
In addition, the folder identification number can be stored in the
In this case, the search expression may include a personal identification number, a folder identification number, a special symbol, and an eight-mile identification number.
The special symbols may include a first special symbol and a second special symbol to distinguish the personal identification number, the folder identification number, and the file identification number.
For example, as in the case of FIG. 14A, a predetermined user may be able to input a search expression of 1234 # 001 # 03 into the dial input window DIW of the
When the search expression of 1234 # 001 # 03 is analyzed, the file identification number stored in the folder having the
Alternatively, the search formula may be configured in a different order from that of FIG. 14 (A). For example, as shown in FIG. 14B, the search formula includes a
As such, the first special symbol in the search expression may be located between the personal identification number and the folder identification number to distinguish the personal identification number and the folder identification number.
The second special symbol may be located between the folder identification number and the file identification number to distinguish the folder identification number from the file identification number.
At least one of the first special symbol and the second special symbol may include at least one of a shop (#) and a star.
For example, as shown in FIG. 15A, the first special symbol may be a shop (#), and the second special symbol may be an asterisk.
Conversely, as shown in FIG. 15B, the first special symbol may be an asterisk and the second special symbol may be a shop (#).
It is possible to create a search expression with a personal identification number and a first special symbol. In this case, information on at least one folder stored in the storage space allocated to the user corresponding to the personal identification number may be displayed on the screen of the
For example, assume that a search expression of 1234 # is input to the dial input window DIW of the
In this case, as shown in FIG. 16B, information on at least one folder included in the storage space allocated to the user corresponding to the
The user may be able to download the desired file by searching at least one folder displayed on the screen of the
17 to 20 are diagrams for explaining a method of using authentication information. In the following, description of the parts described above may be omitted.
Referring to FIG. 17, in step S230, the
Here, the authentication information can be regarded as information for setting security in a predetermined file, a predetermined folder, or an entire storage space allocated to a user. Such authentication information may include at least one of an ID and a password.
That is, setting the authentication information means that the security is set by using the authentication information.
18, the
18 can be regarded as a case where the authentication information includes the password having the value '1111'. As described above, the authentication information can be connected to the search formula through a predetermined special symbol.
Then, the
If the authentication information transmitted from the second terminal 300 matches the authentication information set by the
As described above, when the authentication information is used, the user of the
Meanwhile, the
19, the
If it is determined in step S300 that security is set, the
In this case, an input window for inputting authentication information may be displayed on the screen of the
When the user of the
As a result of the determination in step S330, if a match is found, a file corresponding to the search formula input by the
On the other hand, if it is determined as a result of the determination in step S330 that no matching is performed, another predetermined function (Default 1) may be performed (S340). For example, it is possible to transmit to the
As described above, it is to be understood that the technical structure of the present invention can be embodied in other specific forms without departing from the spirit and essential characteristics of the present invention.
It should be understood, therefore, that the embodiments described above are to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than the foregoing description, And all changes or modifications derived from equivalents thereof should be construed as being included within the scope of the present invention.
Claims (7)
Assigning a file identification number to a file corresponding to the user;
Storing the personal identification number, the file identification number, and the file in a server;
An input step of inputting a search expression including the personal identification number, the special symbol, and the file identification number in the first terminal;
Detecting a file corresponding to the search formula among the files stored in the server; And
The server transmitting the detected file to the first terminal;
The file management method comprising:
Wherein the special symbol in the search expression is located between the personal identification number and the file identification number.
Wherein the special symbols include at least one of a shop (#) and a star.
The input step
Inputting the search expression into a dial input window of the first terminal; And
Selecting a call key in a state where the search expression is input to the dial input window;
≪ / RTI >
Wherein the personal identification number comprises at least one of a resident registration number, a telephone number, and a social security number.
Further comprising setting security by assigning authentication information to a file corresponding to the user.
Further comprising inputting the authentication information to access the secured file at the first terminal.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160088913A KR20180007629A (en) | 2016-07-13 | 2016-07-13 | File Searching Method using Identification Number |
PCT/KR2016/007653 WO2018012649A1 (en) | 2016-07-13 | 2016-07-14 | File search method using identification number |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160088913A KR20180007629A (en) | 2016-07-13 | 2016-07-13 | File Searching Method using Identification Number |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20180007629A true KR20180007629A (en) | 2018-01-23 |
Family
ID=60952107
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020160088913A KR20180007629A (en) | 2016-07-13 | 2016-07-13 | File Searching Method using Identification Number |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR20180007629A (en) |
WO (1) | WO2018012649A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102243130B1 (en) * | 2020-08-19 | 2021-04-22 | 주식회사 잉크와오피스 | Unmanned print processing system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102833294B (en) * | 2011-06-17 | 2015-05-20 | 阿里巴巴集团控股有限公司 | File processing method and system based on cloud storage, and server cluster system |
CN103685337B (en) * | 2012-08-31 | 2018-03-27 | 腾讯科技(深圳)有限公司 | Method, terminal device and the transfer server of shared file |
KR20150080722A (en) * | 2014-01-02 | 2015-07-10 | 주식회사 마이드라이브스 | Apparatus and Method for managing files |
KR101590554B1 (en) * | 2014-09-25 | 2016-02-01 | 이주형 | Method and apparatus for uploading or downloading file based on tag |
KR20150013095A (en) * | 2014-09-29 | 2015-02-04 | 주식회사 제이투엔 | Method and user device for code-based access to other device |
-
2016
- 2016-07-13 KR KR1020160088913A patent/KR20180007629A/en not_active Application Discontinuation
- 2016-07-14 WO PCT/KR2016/007653 patent/WO2018012649A1/en active Application Filing
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102243130B1 (en) * | 2020-08-19 | 2021-04-22 | 주식회사 잉크와오피스 | Unmanned print processing system |
Also Published As
Publication number | Publication date |
---|---|
WO2018012649A1 (en) | 2018-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105610949B (en) | Resource data use permission sharing method, device and system | |
JP6568355B2 (en) | Method and apparatus for mutual communication of accounts between apps | |
US20160232374A1 (en) | Permission control method and apparatus | |
EP3229400B1 (en) | Password push method, push system, and terminal device | |
RU2673401C2 (en) | Method and device for obtaining certification document | |
US20140250105A1 (en) | Reliable content recommendations | |
CN105721425B (en) | information processing method and electronic equipment | |
CN105207985A (en) | Application program login method and mobile terminal | |
CN110581835A (en) | Vulnerability detection method and device and terminal equipment | |
CN111651749A (en) | Method and device for finding account based on password, computer equipment and storage medium | |
US10162488B1 (en) | Browser-based media scan | |
US9430625B1 (en) | Method and system for voice match based data access authorization | |
US9591056B2 (en) | Techniques for contact exporting | |
US10070308B2 (en) | Systems and methods for protecting mobile contact information | |
KR20180007629A (en) | File Searching Method using Identification Number | |
WO2017080217A1 (en) | Method of recommending video via bluetooth, mobile terminal and in-car video player | |
US9998609B2 (en) | System and method for detecting and alerting risks of inputting incorrect account information in refill transactions | |
CN105354506A (en) | File hiding method and apparatus | |
US10764301B2 (en) | Method and system for user authentication based on a visual representation of user location | |
CN112256654B (en) | Document sharing method and device | |
WO2015081834A1 (en) | Method and apparatus for distinguishing software types | |
KR20180007630A (en) | File Searching Method using Identification Number | |
EP3029584A1 (en) | Content providing system and content providing method thereof | |
EP2795469B1 (en) | Methods, nodes, and computer programs for activating remote access | |
US20150302059A1 (en) | Content recommendation apparatus and the method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |