WO2007045170A1 - Procede et systeme de partage de zone memoire de terminal mobile - Google Patents

Procede et systeme de partage de zone memoire de terminal mobile Download PDF

Info

Publication number
WO2007045170A1
WO2007045170A1 PCT/CN2006/002752 CN2006002752W WO2007045170A1 WO 2007045170 A1 WO2007045170 A1 WO 2007045170A1 CN 2006002752 W CN2006002752 W CN 2006002752W WO 2007045170 A1 WO2007045170 A1 WO 2007045170A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
storage space
network side
side server
shared storage
Prior art date
Application number
PCT/CN2006/002752
Other languages
English (en)
French (fr)
Inventor
Pengliang Yang
Yong Zhang
Guiwen Li
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Priority to EP06804971A priority Critical patent/EP1821555A4/en
Priority to US11/792,336 priority patent/US20080043696A1/en
Priority to CN2006800121141A priority patent/CN101161000B/zh
Publication of WO2007045170A1 publication Critical patent/WO2007045170A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Definitions

  • the present invention relates to mobile communication technologies, and in particular, to a technology for a mobile terminal to share a storage space. Background technique
  • GSM Global System for Mobile Communication
  • CDMA Code Division Multiple Access
  • GPRS General Packet Radio Service
  • the main purpose of the present invention is to provide a mobile terminal sharing a storage space.
  • the method and system enable the mobile terminal to apply for a shared file space on the network side for access by itself or other mobile terminals.
  • the present invention provides a method for a mobile terminal to share a storage space, including:
  • a first mobile terminal sends a first message requesting a shared storage space to the network side server
  • the network side server allocates a corresponding shared storage space to the first mobile terminal and sets authentication information for accessing the shared storage space, according to the application in the first message.
  • the first or other mobile terminal logs in to the network side server using the authentication information, and performs read and write access to the shared storage space.
  • the method preferably includes:
  • the network side server determines whether the Shenqi in the first message is valid, and if yes, proceeds to step B, otherwise responds to the rejected message.
  • the authentication information includes a username and a password for accessing the shared storage space.
  • the method also includes the network side server transmitting authentication information to the first mobile terminal.
  • the method further includes:
  • the network side server sends a second message to the first mobile terminal, requesting to provide the authentication information
  • the first mobile terminal responds to the second message, and carries the authentication information input by the user in the response message.
  • the method further includes: setting, by the first mobile terminal or the network side server, a duration of the shared storage space;
  • the network side server actively releases the shared storage space and notifies the first mobile terminal.
  • the method further includes:
  • the first mobile terminal sends a fourth message requesting to release the shared storage space to the network side server, where the fourth message carries the identification information of the mobile terminal;
  • the network side server releases the shared storage space according to the request in the fourth message.
  • the method further includes:
  • the first mobile terminal uploads an executable program to the network backup side server, and sends a fifth message requesting to run the executable program to the network side server;
  • the executable program is run.
  • the method further includes:
  • the network side server When the network side server receives the login request of the mobile terminal, determining whether the login request is initiated by the first mobile terminal, and if yes, allowing the mobile terminal to perform the network side preset policy for the shared storage space. All operations, otherwise only the mobile terminal is allowed to operate on the shared storage space within the range specified by the first authority.
  • the first authority includes one of the following operations or any combination thereof: creating a new file, reading a file, modifying a file, deleting a file, and "changing a file attribute.
  • the first message includes one of the following or any combination thereof:
  • the method further includes:
  • the first mobile terminal sends a third message requesting to modify the authentication information to the network side server, where the third message carries the identification information of the mobile terminal;
  • the network side server modifies the authentication information of the shared storage space according to the request in the third message.
  • the invention also provides a system for sharing storage space of a mobile terminal, comprising a mobile terminal and a network side server, wherein the network side server further comprises a file management system for managing the local storage space and providing the other modules of the network side server.
  • An interface for operating a local storage space the network side server further includes a remote access module, configured to exchange messages and numbers with the first mobile terminal
  • the interface provided by the local file management system is used to allocate the shared storage space to the first mobile terminal and set the authentication information for accessing the shared storage space.
  • the interface provided by the local file management system is invoked according to the operation command in the received message to perform the operation of the command on the shared storage space, and the operation result information is returned to the corresponding mobile terminal.
  • the mobile terminal requests the shared storage space from the network side server, and if the application is valid, the network side server allocates the shared storage space and generates or generates from the mobile terminal.
  • the authentication information is obtained. After the mobile terminal or other mobile terminal logs in to the network side server through the authentication information, the shared storage space can be read and written.
  • the shared storage space may be preset with a duration. After the duration is exceeded, the network side server automatically releases the space; or the duration is not set, and the shared storage space is released when the mobile terminal applying for the space requests the release.
  • Only mobile terminals applying for shared storage space can modify the authentication information or set access rights for other mobile terminals accessing the shared storage space.
  • the executable program saved in the shared storage space can be run on the network side server according to the request of the mobile terminal, and must pass the harmless check before running.
  • Innocent checks include, but are not limited to, searches for code segments that may be harmful.
  • the difference in this technical solution brings about a more obvious beneficial effect, that is, it facilitates file exchange between mobile terminals. Since the shared storage space requested by one mobile terminal can be conveniently accessed by other mobile terminals, file exchange between the mobile terminals can be realized. Since the authentication is performed when accessing the shared storage space, and the authentication information is only known to the mobile terminal requesting the shared storage space and the related mobile terminal notified by it, the security of the file sharing is ensured. Because the shared storage space is on the network side, mobile terminals that exchange files through shared storage space are not limited by geographic location, and can be close to or within a thousand miles.
  • the storage space of the mobile terminal is expanded.
  • the shared storage space requested by the mobile terminal can also be used only by itself, which is equivalent to expanding the storage space of the mobile terminal. Since the cost of the network side storage space is much lower than that of the mobile terminal side, the mobile terminal can be obtained at a very low cost. Large storage space.
  • the network side server can timely reclaim the shared storage space that is no longer used by the mobile terminal, and is particularly suitable for users who only want to perform temporary file exchange, and can effectively avoid the network side storage space caused by the user forgetting. waste.
  • the user of the mobile terminal can have the ability to open the network application service by itself. Since the user is allowed to run the uploaded executable program on the network side server, the user of the mobile terminal can perform the application service for other mobile terminals by uploading the applet. Since the harmless check is performed in advance, the security of the network side server itself can be ensured.
  • FIG. 1 is a structural diagram of a system for sharing a storage space of a mobile terminal according to the present invention
  • FIG. 2 is a flow chart of a method for sharing a storage space of a mobile terminal according to the first embodiment of the present invention
  • FIG. 3 is a flow chart of a method for a mobile terminal to share a storage space according to a second embodiment of the present invention
  • FIG. 4 is a flow chart of a method for a mobile terminal to share a storage space according to a third embodiment of the present invention.
  • the core of the present invention is that the mobile terminal requests the shared storage space from the network side server. If the application is valid, the network side server allocates a shared storage space and generates or obtains authentication information from the mobile terminal. Therefore, the mobile terminal passes the authentication. Information can be logged in to the network side server to operate on the requested storage space. If the mobile terminal allows other mobile terminals to access the storage space of the application, the mobile terminal needs to set the access rights of other mobile terminals. After the other mobile terminals log in to the network side server, only the operations within the authority can be performed.
  • the system consists of two parts: a mobile terminal and a network side server.
  • a file management system including a mobile terminal and a remote access of the mobile terminal in the mobile terminal Ask the module.
  • the file management system is configured to manage the local storage space and provide an interface for operating the local storage space to other modules in the mobile terminal.
  • the remote access module is used to call the interface function of the relevant file system, complete the reading and writing of various files and the setting of file attributes, and exchange signaling and data through the communication connection with the network side server, which can be built into the mobile terminal as a basic module. It can also be loaded into the mobile terminal as an additional module when it needs to access the shared storage space.
  • this module is a module that is independent of the file system and spans the operating system platform.
  • the network side server includes a network side file management system and a network side remote access module.
  • the file management system is used to manage the local storage space and provide an interface for operating the local storage space to other modules of the network side server.
  • the remote access module is configured to exchange messages and data with the mobile terminal and call an interface provided by the local file management system for the mobile terminal requesting the shared storage space, allocate the shared storage space for the mobile terminal, and set authentication information for accessing the shared storage space.
  • the interface provided by the local file management system is invoked according to the operation command in the received message to perform the operation of the command on the shared storage space, and the operation result information is returned to the corresponding mobile terminal.
  • the above describes the system structure of the shared storage space of the mobile terminal.
  • the following describes the dynamic working process in the system.
  • the remote access module in the mobile terminal sends a message requesting the shared storage space to the network side server.
  • the remote access module of the network side server invokes an interface provided by the local file management system to allocate a shared storage space to the mobile terminal, and generates authentication information or sends a message requesting authentication information to the mobile terminal and moves on the mobile terminal.
  • the authentication information is obtained in the response message of the terminal.
  • the remote access module in the mobile terminal After the remote access module in the mobile terminal successfully logs in to the network side server through the communication connection, the remote access module on the network side invokes the interface provided by the local file management system according to the operation command in the received message to execute the command to the shared storage space. Operation, and return operation result information to the mobile terminal
  • the communication mechanism between the mobile terminal and the remote access module in the network side server can be implemented by means of a proprietary protocol, that is, on the basis of the original communication link, the data and signaling interaction between the mobile terminals is completed by using a private request response mechanism; of course, the existing standard protocol can also be used. achieve.
  • the present embodiment is applicable to the shared storage space applied by the mobile terminal in the network side server for its own use.
  • step 210 after establishing a connection with the network side server through a wired or wireless access technology, the mobile terminal applies for a shared storage space to the network side server in an agreed format and a communication manner.
  • the application shared storage space message sent by the mobile terminal to the network side server includes any combination or one of the size, time limit, application type, and identifier of the mobile terminal of the application.
  • the network side server determines whether the application is valid. If the application is valid, proceed to step 230, the network side server allocates the shared storage space and sets the authentication information; if the application is invalid, proceeds to step 260, and the network side server responds to the mobile terminal with a message indicating rejection and ends the flow.
  • the network side server allocates a corresponding shared storage space to the mobile terminal according to the application (or a policy preset in the network side server), and sets authentication information for accessing the shared storage space, where the authentication information includes User name and password used to access the shared storage space.
  • the setting of the authentication information may be generated by the network side server or by the mobile terminal.
  • the network side server may generate a username and password for accessing the shared storage space requested by the mobile terminal, and send the authentication information to the mobile terminal.
  • the network side server may also send a request for authentication to the mobile terminal.
  • the information message after receiving the message, the mobile terminal carries the i-person information input by the user in the response message.
  • the mobile terminal logs in to the network side server by using the authentication information obtained in step 230, and performs operations on the applied shared storage space, including reading and writing access to the shared storage space, and uploading executable Program and modification of the authentication information of the shared storage space, and the like.
  • Logins and use of shared storage are not necessarily immediately after the application, but can be applied first but not immediately, and after a period of time (for example, one day later), login and use.
  • the mobile terminal After successfully logging in to the network side server and uploading the executable program to the network side server, the network side server also needs to send a message requesting to run the executable program, and after the network side server receives the message, check the Whether the execution of the program is harmful, if it is harmless, run the executable program.
  • harmless inspection includes, but is not limited to, searching for code segments that may be harmful,
  • the mobile terminal needs to send a message requesting to modify the authentication information to the network side server, where the message carries the identification information of the mobile terminal, such as an international mobile device identifier.
  • the network side server After receiving the message, the network side server determines whether the mobile terminal identification information carried in the mobile terminal is consistent with the identification information of the mobile terminal applying for the shared storage space, and if yes, modifies the shared storage space according to the request in the message. Authentication information, otherwise the response indicates a rejected message.
  • IMEI International Mobile Equipment Identity
  • the process proceeds to step 250, and the network side server actively releases the shared storage space, and notifies the application for the shared storage. Space mobile terminal.
  • the network side server pre-sets the duration, and when the shared storage space exceeds the duration, the network side server automatically releases the space, so that the network side server can timely reclaim the shared storage space that is no longer used by the mobile terminal. It is especially suitable for users who only want to store temporary files, which can effectively avoid the waste of network side storage space caused by user forgetting.
  • the mobile terminal is used to share the storage space in the network side server, thereby expanding the storage space of the mobile terminal. Since the cost of the network side storage space is much lower than that of the mobile terminal side, the mobile terminal can obtain a large storage space at a very low cost.
  • the user of the mobile terminal can also have the ability to open the network application service by itself. Since the user is allowed to run the uploaded executable program on the network side server, the user of the mobile terminal can perform the application service for other mobile terminals by uploading the applet. Since the harmless check is performed in advance, the security of the network side server itself can be ensured.
  • step 310 after establishing a connection with the network side server through a wired or wireless access technology, the mobile terminal applies for a shared storage space to the network side server in an agreed format and a communication manner. This step is identical to step 210.
  • the network side server determines whether the application is valid. If the application is valid, proceed to step 330, the network side server allocates the shared storage space and sets the authentication information; if the application is invalid, proceeds to step 390, and the network side server responds to the mobile terminal with a message indicating rejection and ends the flow.
  • step 330 the network side server allocates a corresponding shared storage space and sets authentication information for accessing the shared storage space according to the application (or in combination with a policy preset in the network side server). This step is identical to step 230.
  • the mobile terminal Shen Qian opens the shared storage space and sets the first permission.
  • the shared storage space applied by the mobile terminal in the network side server can be used not only for itself but also for other mobile terminals. Therefore, the mobile terminal applying for the shared storage space needs to set the first permission of the other mobile terminal to access the shared storage space by interacting with the network side server, and the permission includes newly creating a file, reading a file, modifying a file, deleting a file, and ⁇ i Change any combination of file attributes or one of them.
  • the mobile terminal or other mobile terminal applying for the shared storage space logs in to the network side server using the authentication information obtained in step 330, and operates the shared storage space.
  • the network side server receives the login request of the mobile terminal, it first determines whether the mobile terminal that initiates the login request is a mobile terminal that requests the shared storage space. If yes, the mobile terminal is allowed to perform all operations allowed by the network side preset policy for the shared storage space, including performing read and write access to the shared storage space, uploading an executable program, and modifying authentication information of the shared storage space. Otherwise, the mobile terminal is only allowed to operate on the shared storage space within the range specified by the first authority.
  • step 360 the mobile terminal that requests the shared storage space sends a message requesting to release the shared storage space to the network side server, where the message carries the identifier of the mobile terminal. information.
  • the network side server determines whether the mobile terminal identification information carried therein is related to applying for the shared storage space.
  • the identification information of the mobile terminal is consistent. If yes, proceed to step 380 to release the shared storage space according to the request in the message; if not, proceed to step 400 to respond to the mobile terminal transmitting the message with a message indicating rejection.
  • the translation space is an important operation, so generally only the mobile terminal applying for the shared storage space is allowed to perform the operation.
  • the shared storage space requested by the mobile terminal in the network side server can be used not only for itself but also for other mobile terminals. Therefore, not only the functions and effects of the first embodiment can be achieved, but also the file exchange between the mobile terminals is facilitated. Since the shared storage space requested by one mobile terminal can be conveniently accessed by other mobile terminals, file exchange between the mobile terminals can be realized. Because authentication is required when accessing the shared storage space, and the authentication information is only known to the mobile terminal requesting the shared storage space and the relevant mobile terminal notified by it, the security of file sharing is ensured. Because the shared storage space is on the network side, mobile terminals that interact with files through shared storage space are not limited by geographic location, and can be close to or within a thousand miles.
  • a mobile terminal requesting a shared storage space designates a case where another mobile terminal uses the shared storage space of the application. Since the mobile terminal has applied for the shared storage space in the network side server in detail in the first and second embodiments, only the flow of using the shared storage space by other designated mobile terminals will be described in the present embodiment.
  • step 410 the mobile terminal applying for the shared storage space requests the network side server to open the shared storage space, and specifies the number of the mobile terminal that can use the shared storage space.
  • the network side server confirms that the application is successful, and feeds back a message to the mobile terminal that issued the application.
  • step 430 the other mobile terminal accesses the server and enters an account number and password.
  • the network side server extracts the number of the mobile terminal, and determines whether the mobile terminal is a designated mobile terminal or a mobile terminal that requests a shared storage space. If so, it is allowed to use the shared storage space, that is, enter step '450; if not, proceed to step 490, respond to the mobile terminal with a message indicating rejection, and end the process.
  • step 450 the network side server shares information about the shared storage space, such as sharing.
  • the size of the storage space, the time limit, the application type, and the like are fed back to the mobile terminal.
  • the mobile terminal parses the feedback information obtained in step 450, and automatically sets the parsing result as a parameter constraint condition for data transmission.
  • step 470 the mobile terminal uploads data.
  • the network side server checks and judges the uploaded data, and stores the uploaded data that has passed the verification and the judgment into the shared storage space.
  • the security of the files in the shared storage space can be effectively improved by the designation in step 410 and the determination in step 440. Since the dual identity check is set in the present embodiment, one is the username and password, and the other is the number of the login mobile terminal. If the user's mobile terminal is stolen or stolen, the thief cannot access the files in the shared storage space because the pirate generally does not know the user name and password of the shared storage space. It does not matter if the user accidentally reveals the username and password of the shared storage space, because the person who inadvertently knows the username and password may not be able to obtain the user mobile terminal or the designated mobile terminal.

Description

移动终端共享存储空间的方法及系统
技术领域
本发明涉及移动通信技术, 特别涉及移动终端共享存储空间的技术。 背景技术
移动通信在近年来一直保持高速发展的势头, 新的移动通信技术层出 不穷。 目前国内的主流移动通信系统是全球移动通信系统( Global System for mobile Communication,简称 "GSM" )、码分多址( Code Division Multiple Access, 筒称 "CDMA" ) 系统。 这两个系统主要提供语音通话服务。 为了 增加数据传输功能, 增加了通用分组无线业务 (General Packet Radio Service, 简称 "GPRS" )等 2.5G的功能。 在不远的将来第三代移动通信
( The Third Generation, 简称" 3G,,)时代的宽带码分多址( Wideband Code Division Multiple Access, 简称 "WCDMA" )、 CDMA 2000, 和时分同步码 分多址 ( Time Division Synchronous Code Division Multiple Access, 简称
"TD-SCDMA" )等系统将纷纷投入商用。 随着移动通信技术的发展, 以 手机为代表的移动终端日益普及。 移动终端除了传统的语音通话用途外, 还被广泛地用于上网、 收发邮件、 短信等数据通信。 特别是在 3G普及以 后, 视频等大数据量的数据通信会逐渐增多。 数据通信时常需要在移动终 端上保留相关的数据, 如邮件、 视频数据等, 这些数据通常以文件的形式 保存, 并可以在移动终端上通过内部的文件管理系统进行管理。 常见的管 理操作如打开、 查询、 修改、 删除、 保存、 复制、 和移动等等。 如果移动 终端带有摄像头等可以产生新数据的部件, 则管理诸如照片之类文件的机 会将更多。 这些日益增多的文件给使用者也带来了日益增多的烦恼:
一方面, 这些文件的存放需要大量的存储空间, 特別是视频等多媒体 文件的体积更是庞大。 另一方面, 如何方便地将一个移动终端上的文件与 另一个移动终端共享也是一个问题, 特别是当两个移动终端不在同一地 点, 无法用有线方式连接或交换存储卡时。 另外, 共享文件时的安全性必 须被考虑, 应当能够有效地防止未经 4曼权的访问。
发明内容
有鉴于此, 本发明的主要目的在于提供一种移动终端共享存储空间的 方法及系统, 使得移动终端可在网络侧申请共享文件空间, 供自身或其它 移动终端访问。
为实现上述目的, 本发明提供了一种移动终端共享存储空间的方法, 包括:
A第一移动终端向网络侧服务器发送申请共享存储空间的第一消息;
B 所述网络侧服务器至少部分地根据第一消息中的申请,为第一移动 终端分配相应的共享存储空间并设置访问该共享存储空间的认证信息;
C 第一或其它移动终端使用该认证信息登录到所述网络侧服务器,并 对该共享存储空间进行读写访问。
所述方法好包括:
所述网络侧服务器判断所述第一消息中的申奇是否有效, 如果有效则 进入步骤 B, 否则回应表示拒绝的消息。
此外在所述方法中, 所述认证信息中包含用于访问所述共享存储空间 的用户名和密码。
所述方法还包括, 所述网络侧服务器将认证信息发送到所述第一移动 终端。
此外所述方法还包括:
所述网络侧服务器向所述第一移动终端发送第二消息, 请求提供所述 认证信息;
该第一移动终端响应该第二消息, 在回应消息中携带用户输入的认证 信息。
所述方法还包括, 所述第一移动终端或所述网絡侧服务器设定所述共 享存储空间的存续时间; 以及,
当超过所述共享存储空间的存续时间时, 所述网络侧服务器主动释放 该共享存储空间, 并通知所述第一移动终端。
所述方法还包括:
所述第一移动终端向所述网络侧服务器发送请求释放所述共享存储 空间的第四消息, 所述第四消息中携带有本移动终端的标识信息;
如果所述第四消息中携带的移动终端标识信息与申请所述共享存储 空间的移动终端的标识信息一致, 所述网络侧服务器根据该第四消息中的 请求释放该共享存储空间。
所述方法还包括:
所述第一移动终端向该网备侧服务器上传可执行程序 , 并向该网络侧 服务器发送请求运行该可执行程序的第五消息;
该网络侧服务器收到第五消息后, 运行该可执行程序。
所述方法还包括:
所述第一移动终端在所述网络侧服务器设置其它移动终端访问所述 共享存储空间的第一权限;
当所述网絡侧服务器收到移动终端的登录请求时, 判断发起该登录请 求的是否为所述第一移动终端, 如果是则允许该移动终端对该共享存储空 间进行网络侧预置策略所允许的所有操作, 否则只允许该移动终端在所述 第一权限规定的范围内对该共享存储空间进行操作。
此外在所述方法中, 所述第一权限包含以下操作之一或其任意组合: 新建文件、 读取文件、 修改文件、 删除文件、 以及 "改文件的属性。 此外在所述方法中, 所述第一消息中包含以下内容之一或其任意组 合:
申请的共享存储空间的大小、 时间限制、 应用类型、 所述第一移动终 端的标识。
所述方法还包括:
所述第一移动终端向所述网络侧服务器发送请求修改所述认证信息 的第三消息, 所述第三消息中携带有本移动终端的标识信息;
如果所述第三消息中携带的移动终端标识信息与申请所述共享存储 空间的移动终端的标识信息一致, 所述网络侧服务器根据该第三消息中的 请求修改该共享存储空间的认证信息。
本发明还提供了一种移动终端共享存储空间的系统, 包含移动终端和 网络侧服务器, 网络侧服务器中还包含文件管理系统, 用于管理本地的存 储空间并向该网络侧服务器的其它模块提供操作本地存储空间的接口, 网 络侧服务器中还包含远程访问模块, 用于与第一移动终端交互消息和数 据, 收到申请共享存储空间的第一消息时, 调用本地文件管理系统所提供 的接口为第一移动终端分配共享存储空间并设置访问该共享存储空间的 认证信息, 对于登录成功的移动终端, 根据收到的消息中的操作命令调用 本地文件管理系统所提供的接口以执行该命令对共享存储空间的操作, 并 向相应移动终端返回操作结果信息。 通过比较可以发现, 本发明的技术方案与现有技术的主要区别在于, 移动终端向网络侧服务器申请共享存储空间 , 如申请有效则网络侧服务器 为其分配共享存储空间并生成或从该移动终端获得认证信息, 该移动终端 或其它移动终端通过该认证信息登录到网络侧服务器后, 可对该共享存储 空间进行读写。
共享存储空间可以预先设定存续时间, 超过该存续时间后由网絡侧服 务器自动释放该空间; 也可以不设定存续时间, 在申请该空间的移动终端 提出释放请求时释放该共享存储空间。
只有申请共享存储空间的移动终端才可以修改认证信息、 或为访问该 共享存储空间的其它移动终端设置访问权限。
在共享存储空间中保存的可执行程序可以根据移动终端的请求而在 网絡侧服务器运行, 运行前要先通过无害检查。 无害检查包括但不限于对 可能有危害的代码段的搜索。
这种技术方案上的区别, 带来了较为明显的有益效果, 即方便了移动 终端之间的文件交换。 因为一台移动终端申请的共享存储空间可以被其它 移动终端方便地访问, 所以可以实现移动终端之间的文件交换。 因为访问 共享存储空间时要通过认证, 而认证信息只有申请共享存储空间的移动终 端和被其告知的相关移动终端知道, 所以保证了文件共享的安全性。 因为 共享存储空间在网络侧 , 所以通过共享存储空间交互文件的移动终端不受 地理位置的限制, 既可以近在咫尺, 也可以远在千里。
扩展了移动终端的存储空间。 移动终端申请的共享存储空间也可以仅 由自身使用, 此时相当于扩展了该移动终端的存储空间。 因为网絡侧存储 空间的成本远低于移动终端侧, 所以可以使移动终端以很低的成本获得很 大的存储空间。
通过存续时间的设定, 可以使网络侧服务器及时回收不再被移动终端 使用的共享存储空间, 特别适合只想进行临时文件交换的用户, 可以有效 避免因为用户遗忘而导致的网络侧存储空间的浪费。
可以使移动终端的用户拥有自行开通网络应用服务的能力。 因为允许 用户在网络侧服务器运行上传的可执行程序, 所以移动终端的用户可以通 过上传小程序而为其它移动终端开展应用业务。 因为事先进行了无害检 查, 所以可以保证网络侧服务器自身的安全。
附图说明
图 1是根据本发明的移动终端共享存储空间的系统实施例结构图; 图 2是根据本发明第一实施方式的移动终端共享存储空间的方法流程 图;
图 3是根据本发明第二实施方式的移动终端共享存储空间的方法流程 图;
图 4是根据本发明第三实施方式的移动终端共享存储空间的方法流程 图。
具体实施方式
为使本发明的目的、 技术方案和优点更加清楚, 下面将结合附图对本 发明作进一步地详细描述。
本发明的核心在于, 移动终端向网络侧服务器申请共享存储空间, 如 果申请有效, 则网络侧服务器为其分配共享存储空间并生成或从该移动终 端获得认证信息, 因此, 该移动终端通过该认证信息可以登录到网络侧服 务器, 对申请的存储空间进行操作。 如果该移动终端允许其他移动终端访 问其申请的存储空间, 则该移动终端需要设置其他移动终端的访问权限, 其他移动终端登录到网络侧服务器后, 只能进行该权限内的操作。
下面结合附图, 对本发明的移动终端共享存储空间的系统结构进行说 明。
如图 1所示, 本系统中包含两部分: 移动终端与网络侧服务器。 在移动终端中包含移动终端的文件管理系统以及移动终端的远程访 问模块。 其中, 文件管理系统用于管理本地的存储空间并向该移动终端中 的其它模块提供操作本地存储空间的接口。 远程访问模块用于调用相关文 件系统的接口函数, 完成对各种文件的读写和文件属性的设置并且通过与 网络侧服务器间的通信连接交互信令和数据, 可以作为基本模块内置于移 动终端, 也可以作为附加模块在需要访问共享存储空间时加载到移动终端 内, 可以采用 JAVA形式、 无线应用下载( Binary Runtime Environment for Wireless, 简称 "BREW" )标准接口等方式在 PALM OS、 WINDOWS CE 等操作系统中实现, 该模块是独立于文件系统并且跨越操作系统平台的模 块。
在网络侧服务器中包含网络侧的文件管理系统和网络侧的远程访问 模块。 其中, 文件管理系统用于管理本地的存储空间并向该网络侧服务器 的其它模块提供操作本地存储空间的接口。 远程访问模块用于与移动终端 交互消息和数据并为申请共享存储空间的移动终端调用本地文件管理系 统所提供的接口 , 为该移动终端分配共享存储空间并设置访问该共享存储 空间的认证信息。 对于登录成功的移动终端, 根据收到的消息中的操作命 令调用本地文件管理系统所提供的接口以执行该命令对共享存储空间的 操作, 并向相应移动终端返回操作结果信息。
以上对移动终端共享存储空间的系统结构进行了说明, 下面对该系统 中的动态工作过程进行简单说明。
移动终端中的远程访问模块向网络侧服务器发送申请共享存储空间 的消息。 网络侧服务器的远程访问模块接收到该消息后, 调用本地文件管 理系统所提供的接口为该移动终端分配共享存储空间, 并生成认证信息或 向该移动终端发送请求认证信息的消息并在该移动终端的回应消息中得 到该认证信息。
移动终端中的远程访问模块通过通信连接成功登录到网络侧服务器 后, 网络侧的远程访问模块根据收到的消息中的操作命令调用本地文件管 理系统所提供的接口以执行该命令对共享存储空间的操作, 并向该移动终 端返回操作结果信息
需要说明的是, 移动终端与网络侧服务器内远程访问模块的通信机制 可以采用私有协议的方式来实现, 即在原有通信链路的基础上, 釆用私自 定义的请求应答机制来完成移动终端间数据和信令的交互; 当然, 也可以 采用现有的标准协议来实现。
下面结合附图, 对本发明的第一实施方式进行详细说明, 本实施方式 应用于移动终端在网络侧服务器中申请的共享存储空间仅供自身使用。
如图 2所示, 在步骤 210中, 移动终端通过有线或无线的接入技术与 网络侧服务器建立连接后, 以约定格式和通信方式向网络侧服务器申请共 享存储空间。 移动终端向网络侧服务器发送的申请共享存储空间消息中包 含申请的共享存储空间的大小、 时间限制、 应用类型、 该移动终端的标识 任意组合或其中之一。
接着, 进入步骤 220, 网络侧服务器判断该申请是否有效。 如果该申 请有效, 则进入步骤 230, 网络侧服务器分配共享存储空间并设置认证信 息; 如果该申请无效, 则进入步骤 260, 网洛侧服务器向该移动终端回应 表示拒绝的消息并结束本流程。
在步骤 230中, 网络侧服务器根据该申请(或结合网络侧服务器中预 置的策略), 为该移动终端分配相应的共享存储空间并设置访问该共享存 储空间的认证信息, 该认证信息中包含用于访问该共享存储空间的用户名 和密码等。 认证信息的设置可以通过网络侧服务器生成, 也可以由该移动 终端提供。 比如说, 网络侧服务器可以生成包含用于访问移动终端所申请 的共享存储空间的用户名和密码, 并将该认证信息发送给该移动终端; 也 可以由网络侧服务器向该移动终端发送请求提供认证信息的消息, 该移动 终端接收到该消息后, 在回应消息中携带用户输入的 i人证信息。
接着, 进入步骤 240, 该移动终端使用在步骤 230中得到的认证信息 登录到该网络侧服务器, 并对所申请的共享存储空间进行操作, 包括对该 共享存储空间进行读写访问、上传可执行程序以及修改该共享存储空间的 认证信息等。 登录及对共享存储空间的使用并不一定紧接在申请之后, 可 以先申请但并不马上使用, 过一段时间 (例如一天以后), 进行登录和使 用。
如果该移动终端所执行的操作是上传可执行程序, 那么, 该移动终端 在成功登录到网络侧服务器并向该网络侧服务器上传可执行程序后, 还需 向该网络侧服务器发送请求运行该可执行程序的消息, 当该网络侧服务器 收到该消息后, 检查该可执行程序是否有害, 如果无害则运行该可执行程 序。 其中, 无害检查包括但不限于对可能有危害的代码段的搜索,
如果该移动终端所执行的操作是修改所申请的共享存储空间的认证 信息, 则需要认证该移动终端是否申请共享存储空间的移动终端。 具体地 说, 该移动终端需向网络侧服务器发送请求修改认证信息的消息, 在该消 息中携带有该移动终端的标识信息, 例如国际移动设备识別码
( International Mobile Equipment Identity, 简称 "IMEI" )或手机号码等。 当网络侧月 务器收到该消息后, 判断其中携带的移动终端标识信息是否与 申请该共享存储空间的移动终端的标识信息一致, 如果是则根据该消息中 的请求修改该共享存储空间的认证信息 , 否则回应表示拒绝的消息。
当网絡侧月 I务器才 M居预置策略设定的共享存储空间的存续时间(例如 3 天)到期后, 进入步骤 250, 网络侧服务器主动释放共享存储空间, 并 通知申请该共享存储空间的移动终端。 在本步骤中, 通过网络侧服务器预 先设定存续时间, 当共享存储空间超过该存续时间后由网络侧服务器自动 释放该空间, 使得网络侧服务器能及时回收不再被移动终端使用的共享存 储空间, 特别适合只想进行临时文件存储的用户, 可以有效避免因为用户 遗忘而导致的网络侧存储空间的浪费。
在本实施方式中, 通过移动终端在网络侧服务器中申请共享存储空 间, 扩展了移动终端的存储空间。 因为网络侧存储空间的成本远低于移动 终端侧, 所以可以使移动终端以很低的成本获得很大的存储空间。 另外, 也可以使移动终端的用户拥有自行开通网络应用服务的能力。 因为允许用 户在网絡侧服务器运行上传的可执行程序, 所以移动终端的用户可以通过 上传小程序而为其它移动终端开展应用业务。 因为事先进行了无害检查, 所以可以保证网络侧服务器自身的安全。
下面结合附图, 对本发明的第二实施方式进行说明, 本实施方式应用 于移动终端在网絡侧服务器中申请的共享存储空间不仅可以供自身使用, 也可以供其他移动终端使用的情况。 如图 3所示, 在步驟 310中, 移动终端通过有线或无线的接入技术与 网络侧服务器建立连接后, 以约定格式和通信方式向网络侧服务器申请共 享存储空间。 本步骤与步骤 210完全相同。
接着, 进入步骤 320, 网络侧服务器判断该申请是否有效。 如果该申 清有效, 则进入步骤 330, 网络侧服务器分配共享存储空间并设置认证信 息; 如果该申请无效, 则进入步驟 390, 网络侧服务器向该移动终端回应 表示拒绝的消息并结束本流程。
在步驟 330中, 网络侧服务器根据该申请(或结合网络侧服务器中预 置的策略), 为该移动终端分配相应的共享存储空间并设置访问该共享存 储空间的认证信息。 本步骤与步骤 230完全相同。
接着, 进入步骤 340, 该移动终端申倩开放共享存储空间并设置第一 权限。 由于在本实施方式中, 移动终端在网络侧服务器中申请的共享存储 空间不仅可以供自身使用, 也可以供其他移动终端使用。 因此, 申请共享 存储空间的移动终端需要通过与网络侧服务器的交互, 设置其它移动终端 访问该共享存储空间的第一权限, 该权限包含新建文件、 读取文件、 修改 文件、 删除文件、 以及^ i 改文件属性的任意组合或其中之一。
接着, 进入步骤 350, 申请共享存储空间的移动终端或其它移动终端 使用在步骤 330中得到的认证信息登录到该网络侧服务器, 并对该共享存 储空间进行操作。 当网络侧服务器收到移动终端的登录请求时, 首先判断 发起该登录倚求的是否为申请共享存储空间的移动终端。 如果是, 则允许 该移动终端对该共享存储空间进行网络侧预置策略所允许的所有操作, 包 括对该共享存储空间进行读写访问、 上传可执行程序以及修改该共享存储 空间的认证信息等; 否则只允许该移动终端在第一权限规定的范围内对该 共享存储空间进行操作。
当移动终端不再需要所申请的共享存储空间时, 进入步骤 360, 由申 请共享存储空间的移动终端向网络侧服务器发送请求释放该共享存储空 间的消息, 该消息中携带有该移动终端的标识信息。
接着, 进入步骤 370, 网络侧服务器收到请求释放该共享存储空间的 消息后, 判断其中携带的移动终端标识信息是否与申请该共享存储空间的 移动终端的标识信息一致, 如果是, 则进入步骤 380, 根据该消息中的请 求释放该共享存储空间; 如果不是, 则进入步骤 400, 向发送该消息的移 动终端回应表示拒绝的消息。 译放空间是比较重要的操作, 所以一般仅允 许申请共享存储空间的移动终端执行该操作。
在本实施方式中, 由于移动终端在网络侧服务器中申请的共享存储空 间不仅可以供自身使用, 也可以供其他移动终端使用。 因此, 不但能达到 第一实施方式的作用与效果, 还方便了移动终端之间的文件交换。 因为一 台移动终端申请的共享存储空间可以被其它移动终端方便地访问, 所以可 以实现移动终端之间的文件交换。 因为访问共享存储空间时要通过认证, 而认证信息只有申请共享存储空间的移动终端和被其告知的相关移动终 端知道, 所以保证了文件共享的安全性。 因为共享存储空间在网络侧, 所 以通过共享存储空间交互文件的移动终端不受地理位置的限制, 既可以近 在咫尺, 也可以远在千里。
本发明的第三实施方式是在第一、 第二实施方式的基础上, 由申请共 享存储空间的移动终端指定其他移动终端使用该申请的共享存储空间的 情况。 由于在第一、 第二实施方式中已详细说明移动终端如何在网络侧服 务器中申请共享存储空间, 因此, 在本实施方式中仅对其他指定的移动终 端使用该共享存储空间的流程进行说明。
如图 4所示, 在步骤 410中, 申请共享存储空间的移动终端向网络侧 服务器申请开放该共享存储空间, 并指定可以使用该共享存储空间的移动 终端的号码。
接着, 进入步骤 420, 网络侧服务器接收到申请后, 确认申请成功, 并反馈消息给发出该申请的移动终端。
在步驟 430中, 其他移动终端访问服务器并输入帐号与密码。
在步骤 440中, 网络侧服务器提取该移动终端的号码, 判断该移动终 端是否为指定的移动终端或申请共享存储空间的移动终端。 如果是, 允许 其使用该共享存储空间,也就是进入步 '骤 450;如果不是,则进入步骤 490, 向该移动终端回应表示拒绝的消息, 并结束本流程。
在步骤 450中, 网络侧服务器将该共享存储空间的相关信息, 如共享 存储空间的大小、 时间限制、 应用类型等, 反馈给该移动终端。
接着, 进入步骤 460, 该移动终端对在步骤 450中得到的反馈信息进 行解析, 并 居解析结果自动设定作为数据传输的参数约束条件。
在步驟 470中, 该移动终端上传数据。
接着, 进入步骤 480, 网络侧服务器接收到上传的数据后, 对该上传 数据进行检验和判断, 将通过检验和判断的上传数据存储到该共享存储空 间中。
在本实施方式中, 通过步驟 410中的指定和步骤 440中的判断, 可以 有效地提高共享存储空间内文件的安全性。 因为本实施方式中设置了双重 的身份检验, 一个是用户名和密码, 另一个是登录移动终端的号码。 如果 用户的移动终端失窃或被盗用, 因为盗用者一般不知道共享存储空间的用 户名和密码, 所以无法访问共享存储空间中的文件。 如果用户不小心泄露 了共享存储空间的用户名和密码也不要紧, 因为无意中知道该用户名和密 码的人不一定能得到用户移动终端或被指定的移动终端。
虽然通过参照本发明的某些优选实施方式, 已经对本发明进行了图示 和描述, 但本领域的普通技术人员应该明白, 可以在形式上和细节上对其 作各种改变, 而不偏离本发明的精神和范围。

Claims

权 利 要 求
1. 一种移动终端共享存储空间的方法, 其特征在于包括:
A第一移动终端向网絡侧服务器发送申请共享存储空间的第一消息; B 所述网絡侧服务器至少部分地根据第一消息中的申请,为第一移动 终端分配相应的共享存储空间, 并设置访问该共享存储空间的认证信息; C 第一或其它移动终端使用该认证信息登录到所述网络侧服务器,并 对该共享存储空间进行读写访问。
2. 根据权利要求 1 所述的移动终端共享存储空间的方法, 其特征在 于, 还包含以下步骤:
所述网络侧服务器判断所述第一消息中的申请是否有效, 如果有效则 进入步骤 B, 否则回应表示拒绝的消息。
3. 根据权利要求 1 所述的移动终端共享存储空间的方法, 其特征在 于, 所述认证信息中包含用于访问所述共享存储空间的用户名和密码。
4. 根据权利要求 3 所述的移动终端共享存储空间的方法, 其特征在 于还包括, 所述网络侧服务器将认证信息发送到所述第一移动终端。
5. 根据权利要求 4所述的移动终端共享存储空间的方法, 其特征在 于还包括:
所述网络侧服务器向所述第一移动终端发送第二消息, 请求提供所述 认证信息;
该第一移动终端响应该第二消息, 在回应消息中携带用户输入的认证 信息。
6. 根据权利要求 1 所述的移动终端共享存储空间的方法, 其特征在 于还包括, 所述第一移动终端或所述网络侧服务器设定所述共享存储空间 的存续时间; 以及,
当超过所述共享存储空间的存续时间时, 所述网络侧服务器主动释放 该共享存储空间, 并通知所述第一移动终端。
7. 根据权利要求 1 所述的移动终端共享存储空间的方法, 其特征在 于还包括:
所述第一移动终端向所述网络侧服务器发送请求释放所述共享存储 空间的第四消息, 所述笫四消息中携带有该第一移动终端的标识信息; 如果所述第四消息中携带的移动终端标识信息与申请所述共享存储 空间的移动终端的标识信息一致, 所述网络侧服务器根据该第四消息中的 请求释放该共享存储空间。
8. 根据权利要求 1至 6中任一项所述的移动终端共享存储空间的方 法, 其特征在于还包括:
所述第一移动终端向该网络侧服务器上传可执行程序, 并向该网络侧 服务器发送请求运行该可执行程序的第五消息;
该网络侧服务器收到第五消息后, 运行该可执行程序。
9. 根据权利要求 1至 6中任一项所述的移动终端共享存储空间的方 法, 其特征在于还包括:
所述第一移动终端在所述网络侧服务器设置其它移动终端访问所述 共享存储空间的第一权限;
当所述网络侧服务器收到移动终端的登录请求时, 判断发起该登录请 求的是否为所述第一移动终端, 如果是则允许该移动终端对该共享存储空 间进行网络侧预置策略所允许的所有操作 , 否则只允许该移动终端在所述 第一权限规定的范围内对该共享存储空间进行操作。
10. 根据权利要求 9所述的移动终端共享存储空间的方法, 其特征在 于, 所述第一权限包含以下操作之一或其任意组合:
新建文件、 读取文件、 修改文件、 删除文件、 以及修改文件的属性。
11. 根据权利要求 1至 6中任一项所述的移动终端共享存储空间的方 法, 其特征在于, 所述第一消息中包含以下内容之一或其任意组合: 申请的共享存储空间的大小、 时间限制、 应用类型、 所迷第一移动终 端的标识。
12. 根据权利要求 1至 6中任一项所述的移动终端共享存储空间的方 法, 其特征在于还包括:
所述第一移动终端向所述
Figure imgf000015_0001
的第三消息, 所述第三消息中携带有该第一移动终端的标识信息;
如果第三消息中携带的移动终端标识信息与申请所述共享存储空间 的移动终端的标识信息一致, 所述网络侧服务器根据该第三消息中的请求 修改该共享存储空间的认证信息。
13. 一种移动终端共享存储空间的系统, 包含移动终端和网络侧服务 器, 网络侧服务器中还包含文件管理系统, 用于管理本地的存储空间并向 该网络侧服务器的其它模块提供操作本地存储空间的接口 , 其特征在于, 网络侧服务器中还包含远程访问模块, 用于与第一移动终端交互消息和数 据, 收到申请共享存储空间的第一消息时, 调用本地文件管理系统所提供 的接口为第一移动终端分配共享存储空间并设置访问该共享存储空间的 认证信息, 对于登录成功的移动终端, 根据收到的消息中的操作命令调用 本地文件管理系统所提供的接口以执行该命令对共享存储空间的操作, 并 向相应移动终端返回操作结果信息。
PCT/CN2006/002752 2005-10-21 2006-10-18 Procede et systeme de partage de zone memoire de terminal mobile WO2007045170A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP06804971A EP1821555A4 (en) 2005-10-21 2006-10-18 METHOD AND SYSTEM FOR SHARING A STORAGE AREA OF A MOBILE TERMINAL
US11/792,336 US20080043696A1 (en) 2005-10-21 2006-10-18 Method and System for Mobile Terminals to Share Storage Space
CN2006800121141A CN101161000B (zh) 2005-10-21 2006-10-18 移动终端共享存储空间的方法及系统

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNB2005100310564A CN100461875C (zh) 2005-10-21 2005-10-21 移动终端共享存储空间的方法及其系统
CN200510031056.4 2005-10-21

Publications (1)

Publication Number Publication Date
WO2007045170A1 true WO2007045170A1 (fr) 2007-04-26

Family

ID=37444307

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2006/002752 WO2007045170A1 (fr) 2005-10-21 2006-10-18 Procede et systeme de partage de zone memoire de terminal mobile

Country Status (4)

Country Link
US (1) US20080043696A1 (zh)
EP (1) EP1821555A4 (zh)
CN (2) CN100461875C (zh)
WO (1) WO2007045170A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104007898A (zh) * 2013-02-27 2014-08-27 联想(北京)有限公司 一种信息处理方法及电子设备
CN104717207A (zh) * 2015-02-09 2015-06-17 惠州Tcl移动通信有限公司 一种信息共享的方法及服务器

Families Citing this family (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100192183A1 (en) * 2009-01-29 2010-07-29 At&T Intellectual Property I, L.P. Mobile Device Access to Multimedia Content Recorded at Customer Premises
CN102035869A (zh) * 2009-09-30 2011-04-27 联想(北京)有限公司 一种使用移动终端实现文件共享的方法、装置和系统
CN102111732B (zh) * 2009-12-25 2013-12-18 华为终端有限公司 无线终端间信息共享的方法和装置
CN102202075B (zh) * 2010-03-26 2013-12-04 联想(北京)有限公司 数据共享方法及便携终端
TWI450558B (zh) * 2010-04-15 2014-08-21 Htc Corp 對應多行動裝置之線上服務的提供方法與系統、伺服器、行動裝置與電腦程式產品
US9386098B2 (en) * 2010-06-11 2016-07-05 Fidelithon Systems, Llc Smartphone management system and method
KR20120123210A (ko) * 2011-04-19 2012-11-08 삼성전자주식회사 애플리케이션의 저장 공간을 제공하기 위한 제어 방법과 그를 위한 단말 및 서버
CN102361479A (zh) * 2011-06-24 2012-02-22 上海合合信息科技发展有限公司 指定信息获取方法及系统
GB2499787B (en) * 2012-02-23 2015-05-20 Liberty Vaults Ltd Mobile phone
CN102685724B (zh) * 2012-05-28 2015-07-08 北京市大富智慧云技术有限公司 一种内容定制方法、服务器及系统
CN103595752B (zh) * 2012-08-17 2021-03-16 北京三星通信技术研究有限公司 一种信息管理方法及设备
CN102801813B (zh) * 2012-08-27 2015-11-25 广东利为网络科技有限公司 一种从终端设备自动上传影音文件的装置及方法
KR102028724B1 (ko) * 2012-09-20 2019-10-07 삼성전자주식회사 사용자 단말 장치 및 그 디스플레이 방법
CN102904886A (zh) * 2012-09-26 2013-01-30 曙光信息产业(北京)有限公司 实现文件共享的方法
US20140149529A1 (en) * 2012-11-26 2014-05-29 Blackberry Limited Cloud-based nfc content sharing
US9900172B2 (en) * 2013-04-25 2018-02-20 Qualcomm Incorporated Coordinated resource sharing in machine-to-machine communication using a network-based group management and floor control mechanism
US9614802B2 (en) * 2013-08-02 2017-04-04 Google Technology Holdings Inc. Sharing content within an evolving content-sharing zone
US20150089612A1 (en) * 2013-09-20 2015-03-26 Institute For Information Industry Cloud storage server and management method thereof
CN104571930B (zh) * 2013-10-10 2018-01-30 中国移动通信集团公司 一种安全域存储空间的管理方法、系统和多应用开放平台装置
CN104580333A (zh) * 2013-10-29 2015-04-29 中兴通讯股份有限公司 存储空间共享方法和装置
KR101810536B1 (ko) * 2014-05-15 2017-12-20 에스케이테크엑스 주식회사 라이브러리 업데이트 방법, 이를 위한 단말 및 시스템
US10212562B2 (en) * 2015-06-03 2019-02-19 Pdffiller, Inc. Method and systems to support dynamic reconfiguration of document devices
CN105094902B (zh) * 2015-07-13 2018-07-13 北京京东尚科信息技术有限公司 控制应用程序登录状态的系统和方法
CN108011913B (zh) * 2016-12-29 2021-08-20 北京车和家信息技术有限责任公司 数据传输方法、车机显示装置、车辆多媒体设备及系统
KR101961644B1 (ko) * 2017-05-19 2019-03-25 소프트캠프(주) 데이터 분산형 통합 관리시스템
CN108536795A (zh) * 2018-04-02 2018-09-14 深圳市华傲数据技术有限公司 一种提高图数据交互效率的方法、介质以及设备
CN109413647B (zh) * 2018-10-18 2022-08-05 深圳壹账通智能科技有限公司 数据共享方法、装置、电子设备以及计算机可读存储介质
US11449815B2 (en) 2018-11-08 2022-09-20 Airslate, Inc. Automated electronic document workflows
US11811776B2 (en) * 2020-06-30 2023-11-07 Western Digital Technologies, Inc. Accessing shared pariiiions on a storage drive of a remote device
CN113051614B (zh) * 2021-03-26 2022-07-05 支付宝(杭州)信息技术有限公司 信息访问处理方法、装置、设备及系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005057846A1 (en) * 2003-12-08 2005-06-23 Nokia Corporation Method and device for sharing of content protected by digital rights management
CN1642114A (zh) * 2005-01-07 2005-07-20 刘惠山 手持移动终端用户定制信息的网络备份方法
KR20050083042A (ko) * 2005-07-20 2005-08-24 (주)스타모바일 휴대폰에 저장된 데이터 공유 방법 및 그 시스템

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7136903B1 (en) * 1996-11-22 2006-11-14 Mangosoft Intellectual Property, Inc. Internet-based shared file service with native PC client access and semantics and distributed access control
WO2000051034A2 (en) * 1999-02-26 2000-08-31 Click2Send.Com, Inc. Method and apparatus for network file transfer
US6351776B1 (en) * 1999-11-04 2002-02-26 Xdrive, Inc. Shared internet storage resource, user interface system, and method
AU2606801A (en) * 1999-12-30 2001-07-16 B4Bpartner, Inc. Electronic safe deposit box
WO2002027628A2 (en) * 2000-09-29 2002-04-04 Jill Fallon Systems and methods for a personal, universal, integrated organizer for legacy planning and storage
US7320033B2 (en) * 2001-07-27 2008-01-15 Intel Corporation Dynamic local drive and printer sharing
CN1158799C (zh) * 2001-09-29 2004-07-21 华为技术有限公司 一种为移动终端用户提供扩展存储空间的方法
US7334124B2 (en) * 2002-07-22 2008-02-19 Vormetric, Inc. Logical access block processing protocol for transparent secure file storage
CN1266590C (zh) * 2002-12-31 2006-07-26 上海科泰世纪科技有限公司 面向构件基于系统内核的进程池/线程池管理方法
WO2004075169A2 (en) * 2003-02-19 2004-09-02 Koninklijke Philips Electronics, N.V. System for ad hoc sharing of content items between portable devices and interaction methods therefor
JP2004260274A (ja) * 2003-02-24 2004-09-16 Nec Corp 携帯端末データメモリ共有システム及び携帯端末データメモリ共有機能を実現させるためのプログラム
US7124255B2 (en) * 2003-06-30 2006-10-17 Microsoft Corporation Message based inter-process for high volume data
JP4459594B2 (ja) * 2003-10-28 2010-04-28 株式会社エヌ・ティ・ティ・ドコモ ファイル共有管理サーバ装置、通信端末、ファイル共有システム、ファイル共有方法
US20050154784A1 (en) * 2004-01-13 2005-07-14 International Business Machines Corporation Providing a shared storage space in association with a telephone call
WO2006024230A1 (fr) * 2004-08-31 2006-03-09 Tencent Technology (Shenzhen) Company Limited Systeme pour realiser un disque dur de reseau sur la base d'une plate-forme de communications en temps reel et procede correspondant
US7676508B2 (en) * 2004-11-10 2010-03-09 Microsoft Corporation Method and system for recording and replaying input-output requests issued by a user-mode program
US7363454B2 (en) * 2004-12-10 2008-04-22 International Business Machines Corporation Storage pool space allocation across multiple locations
US7748047B2 (en) * 2005-04-29 2010-06-29 Verizon Business Global Llc Preventing fraudulent internet account access
US20070033139A1 (en) * 2005-08-08 2007-02-08 Brad Handler Credit applicant and user authentication solution

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005057846A1 (en) * 2003-12-08 2005-06-23 Nokia Corporation Method and device for sharing of content protected by digital rights management
CN1642114A (zh) * 2005-01-07 2005-07-20 刘惠山 手持移动终端用户定制信息的网络备份方法
KR20050083042A (ko) * 2005-07-20 2005-08-24 (주)스타모바일 휴대폰에 저장된 데이터 공유 방법 및 그 시스템

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1821555A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104007898A (zh) * 2013-02-27 2014-08-27 联想(北京)有限公司 一种信息处理方法及电子设备
CN104717207A (zh) * 2015-02-09 2015-06-17 惠州Tcl移动通信有限公司 一种信息共享的方法及服务器

Also Published As

Publication number Publication date
US20080043696A1 (en) 2008-02-21
CN100461875C (zh) 2009-02-11
CN101161000B (zh) 2011-01-05
EP1821555A4 (en) 2008-10-22
CN1870771A (zh) 2006-11-29
EP1821555A1 (en) 2007-08-22
CN101161000A (zh) 2008-04-09

Similar Documents

Publication Publication Date Title
WO2007045170A1 (fr) Procede et systeme de partage de zone memoire de terminal mobile
US9596220B2 (en) Secure protocol for peer-to-peer network
CN101309272B (zh) 认证服务器及虚拟专用网的移动通信终端接入控制方法
US8839354B2 (en) Mobile enterprise server and client device interaction
JP6515207B2 (ja) インターネットアクセス認証方法およびクライアント、ならびにコンピュータ記憶媒体
US20120297447A1 (en) Authentication techniques
WO2011038628A1 (zh) 数据获取方法、接入节点和系统
WO2017041562A1 (zh) 一种识别终端设备用户身份的方法和装置
WO2006015537A1 (fr) Systeme et procede pour la gestion de securite sur un reseau mobile 3g
WO2013185675A1 (zh) 一种数据卡apn锁定状态的控制方法及装置、数据卡
WO2009000214A1 (fr) Procédé et dispositif pour configurer des données de configuration du réseau d'accès utilisateur
WO2016165505A1 (zh) 连接控制方法及装置
WO2020248284A1 (zh) 一种访问控制方法、装置及存储介质
CN113221093B (zh) 一种基于区块链的单点登录系统、方法、设备和产品
WO2008089692A1 (fr) Procédé et système de synchronisation de données
WO2020057585A1 (zh) 接入认证
CN102891863A (zh) 数据读写方法
CN100391168C (zh) 一种管理同步标记语言终端设备的方法、系统及终端
WO2021143028A1 (zh) 物联网设备认证方法、电子装置及存储介质
CN103888511A (zh) 一种基于动态代理的远程访问控制方法
WO2019029183A1 (zh) 存储设备的访问方法、装置、存储介质及处理器
WO2009052735A1 (fr) Procédé, système et dispositif de gestion destinés à un paquet d'apparence
US11228938B2 (en) Data transmission method, apparatus, network-side device, terminal, and computer-readable storage medium
CN107959584B (zh) 信息配置方法及装置
WO2021035740A1 (zh) 访问控制方法、服务器、访问设备及存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 11792336

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2006804971

Country of ref document: EP

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWP Wipo information: published in national office

Ref document number: 2006804971

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 200680012114.1

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 11792336

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE