WO2007045170A1 - Procede et systeme de partage de zone memoire de terminal mobile - Google Patents
Procede et systeme de partage de zone memoire de terminal mobile Download PDFInfo
- Publication number
- WO2007045170A1 WO2007045170A1 PCT/CN2006/002752 CN2006002752W WO2007045170A1 WO 2007045170 A1 WO2007045170 A1 WO 2007045170A1 CN 2006002752 W CN2006002752 W CN 2006002752W WO 2007045170 A1 WO2007045170 A1 WO 2007045170A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile terminal
- storage space
- network side
- side server
- shared storage
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Definitions
- the present invention relates to mobile communication technologies, and in particular, to a technology for a mobile terminal to share a storage space. Background technique
- GSM Global System for Mobile Communication
- CDMA Code Division Multiple Access
- GPRS General Packet Radio Service
- the main purpose of the present invention is to provide a mobile terminal sharing a storage space.
- the method and system enable the mobile terminal to apply for a shared file space on the network side for access by itself or other mobile terminals.
- the present invention provides a method for a mobile terminal to share a storage space, including:
- a first mobile terminal sends a first message requesting a shared storage space to the network side server
- the network side server allocates a corresponding shared storage space to the first mobile terminal and sets authentication information for accessing the shared storage space, according to the application in the first message.
- the first or other mobile terminal logs in to the network side server using the authentication information, and performs read and write access to the shared storage space.
- the method preferably includes:
- the network side server determines whether the Shenqi in the first message is valid, and if yes, proceeds to step B, otherwise responds to the rejected message.
- the authentication information includes a username and a password for accessing the shared storage space.
- the method also includes the network side server transmitting authentication information to the first mobile terminal.
- the method further includes:
- the network side server sends a second message to the first mobile terminal, requesting to provide the authentication information
- the first mobile terminal responds to the second message, and carries the authentication information input by the user in the response message.
- the method further includes: setting, by the first mobile terminal or the network side server, a duration of the shared storage space;
- the network side server actively releases the shared storage space and notifies the first mobile terminal.
- the method further includes:
- the first mobile terminal sends a fourth message requesting to release the shared storage space to the network side server, where the fourth message carries the identification information of the mobile terminal;
- the network side server releases the shared storage space according to the request in the fourth message.
- the method further includes:
- the first mobile terminal uploads an executable program to the network backup side server, and sends a fifth message requesting to run the executable program to the network side server;
- the executable program is run.
- the method further includes:
- the network side server When the network side server receives the login request of the mobile terminal, determining whether the login request is initiated by the first mobile terminal, and if yes, allowing the mobile terminal to perform the network side preset policy for the shared storage space. All operations, otherwise only the mobile terminal is allowed to operate on the shared storage space within the range specified by the first authority.
- the first authority includes one of the following operations or any combination thereof: creating a new file, reading a file, modifying a file, deleting a file, and "changing a file attribute.
- the first message includes one of the following or any combination thereof:
- the method further includes:
- the first mobile terminal sends a third message requesting to modify the authentication information to the network side server, where the third message carries the identification information of the mobile terminal;
- the network side server modifies the authentication information of the shared storage space according to the request in the third message.
- the invention also provides a system for sharing storage space of a mobile terminal, comprising a mobile terminal and a network side server, wherein the network side server further comprises a file management system for managing the local storage space and providing the other modules of the network side server.
- An interface for operating a local storage space the network side server further includes a remote access module, configured to exchange messages and numbers with the first mobile terminal
- the interface provided by the local file management system is used to allocate the shared storage space to the first mobile terminal and set the authentication information for accessing the shared storage space.
- the interface provided by the local file management system is invoked according to the operation command in the received message to perform the operation of the command on the shared storage space, and the operation result information is returned to the corresponding mobile terminal.
- the mobile terminal requests the shared storage space from the network side server, and if the application is valid, the network side server allocates the shared storage space and generates or generates from the mobile terminal.
- the authentication information is obtained. After the mobile terminal or other mobile terminal logs in to the network side server through the authentication information, the shared storage space can be read and written.
- the shared storage space may be preset with a duration. After the duration is exceeded, the network side server automatically releases the space; or the duration is not set, and the shared storage space is released when the mobile terminal applying for the space requests the release.
- Only mobile terminals applying for shared storage space can modify the authentication information or set access rights for other mobile terminals accessing the shared storage space.
- the executable program saved in the shared storage space can be run on the network side server according to the request of the mobile terminal, and must pass the harmless check before running.
- Innocent checks include, but are not limited to, searches for code segments that may be harmful.
- the difference in this technical solution brings about a more obvious beneficial effect, that is, it facilitates file exchange between mobile terminals. Since the shared storage space requested by one mobile terminal can be conveniently accessed by other mobile terminals, file exchange between the mobile terminals can be realized. Since the authentication is performed when accessing the shared storage space, and the authentication information is only known to the mobile terminal requesting the shared storage space and the related mobile terminal notified by it, the security of the file sharing is ensured. Because the shared storage space is on the network side, mobile terminals that exchange files through shared storage space are not limited by geographic location, and can be close to or within a thousand miles.
- the storage space of the mobile terminal is expanded.
- the shared storage space requested by the mobile terminal can also be used only by itself, which is equivalent to expanding the storage space of the mobile terminal. Since the cost of the network side storage space is much lower than that of the mobile terminal side, the mobile terminal can be obtained at a very low cost. Large storage space.
- the network side server can timely reclaim the shared storage space that is no longer used by the mobile terminal, and is particularly suitable for users who only want to perform temporary file exchange, and can effectively avoid the network side storage space caused by the user forgetting. waste.
- the user of the mobile terminal can have the ability to open the network application service by itself. Since the user is allowed to run the uploaded executable program on the network side server, the user of the mobile terminal can perform the application service for other mobile terminals by uploading the applet. Since the harmless check is performed in advance, the security of the network side server itself can be ensured.
- FIG. 1 is a structural diagram of a system for sharing a storage space of a mobile terminal according to the present invention
- FIG. 2 is a flow chart of a method for sharing a storage space of a mobile terminal according to the first embodiment of the present invention
- FIG. 3 is a flow chart of a method for a mobile terminal to share a storage space according to a second embodiment of the present invention
- FIG. 4 is a flow chart of a method for a mobile terminal to share a storage space according to a third embodiment of the present invention.
- the core of the present invention is that the mobile terminal requests the shared storage space from the network side server. If the application is valid, the network side server allocates a shared storage space and generates or obtains authentication information from the mobile terminal. Therefore, the mobile terminal passes the authentication. Information can be logged in to the network side server to operate on the requested storage space. If the mobile terminal allows other mobile terminals to access the storage space of the application, the mobile terminal needs to set the access rights of other mobile terminals. After the other mobile terminals log in to the network side server, only the operations within the authority can be performed.
- the system consists of two parts: a mobile terminal and a network side server.
- a file management system including a mobile terminal and a remote access of the mobile terminal in the mobile terminal Ask the module.
- the file management system is configured to manage the local storage space and provide an interface for operating the local storage space to other modules in the mobile terminal.
- the remote access module is used to call the interface function of the relevant file system, complete the reading and writing of various files and the setting of file attributes, and exchange signaling and data through the communication connection with the network side server, which can be built into the mobile terminal as a basic module. It can also be loaded into the mobile terminal as an additional module when it needs to access the shared storage space.
- this module is a module that is independent of the file system and spans the operating system platform.
- the network side server includes a network side file management system and a network side remote access module.
- the file management system is used to manage the local storage space and provide an interface for operating the local storage space to other modules of the network side server.
- the remote access module is configured to exchange messages and data with the mobile terminal and call an interface provided by the local file management system for the mobile terminal requesting the shared storage space, allocate the shared storage space for the mobile terminal, and set authentication information for accessing the shared storage space.
- the interface provided by the local file management system is invoked according to the operation command in the received message to perform the operation of the command on the shared storage space, and the operation result information is returned to the corresponding mobile terminal.
- the above describes the system structure of the shared storage space of the mobile terminal.
- the following describes the dynamic working process in the system.
- the remote access module in the mobile terminal sends a message requesting the shared storage space to the network side server.
- the remote access module of the network side server invokes an interface provided by the local file management system to allocate a shared storage space to the mobile terminal, and generates authentication information or sends a message requesting authentication information to the mobile terminal and moves on the mobile terminal.
- the authentication information is obtained in the response message of the terminal.
- the remote access module in the mobile terminal After the remote access module in the mobile terminal successfully logs in to the network side server through the communication connection, the remote access module on the network side invokes the interface provided by the local file management system according to the operation command in the received message to execute the command to the shared storage space. Operation, and return operation result information to the mobile terminal
- the communication mechanism between the mobile terminal and the remote access module in the network side server can be implemented by means of a proprietary protocol, that is, on the basis of the original communication link, the data and signaling interaction between the mobile terminals is completed by using a private request response mechanism; of course, the existing standard protocol can also be used. achieve.
- the present embodiment is applicable to the shared storage space applied by the mobile terminal in the network side server for its own use.
- step 210 after establishing a connection with the network side server through a wired or wireless access technology, the mobile terminal applies for a shared storage space to the network side server in an agreed format and a communication manner.
- the application shared storage space message sent by the mobile terminal to the network side server includes any combination or one of the size, time limit, application type, and identifier of the mobile terminal of the application.
- the network side server determines whether the application is valid. If the application is valid, proceed to step 230, the network side server allocates the shared storage space and sets the authentication information; if the application is invalid, proceeds to step 260, and the network side server responds to the mobile terminal with a message indicating rejection and ends the flow.
- the network side server allocates a corresponding shared storage space to the mobile terminal according to the application (or a policy preset in the network side server), and sets authentication information for accessing the shared storage space, where the authentication information includes User name and password used to access the shared storage space.
- the setting of the authentication information may be generated by the network side server or by the mobile terminal.
- the network side server may generate a username and password for accessing the shared storage space requested by the mobile terminal, and send the authentication information to the mobile terminal.
- the network side server may also send a request for authentication to the mobile terminal.
- the information message after receiving the message, the mobile terminal carries the i-person information input by the user in the response message.
- the mobile terminal logs in to the network side server by using the authentication information obtained in step 230, and performs operations on the applied shared storage space, including reading and writing access to the shared storage space, and uploading executable Program and modification of the authentication information of the shared storage space, and the like.
- Logins and use of shared storage are not necessarily immediately after the application, but can be applied first but not immediately, and after a period of time (for example, one day later), login and use.
- the mobile terminal After successfully logging in to the network side server and uploading the executable program to the network side server, the network side server also needs to send a message requesting to run the executable program, and after the network side server receives the message, check the Whether the execution of the program is harmful, if it is harmless, run the executable program.
- harmless inspection includes, but is not limited to, searching for code segments that may be harmful,
- the mobile terminal needs to send a message requesting to modify the authentication information to the network side server, where the message carries the identification information of the mobile terminal, such as an international mobile device identifier.
- the network side server After receiving the message, the network side server determines whether the mobile terminal identification information carried in the mobile terminal is consistent with the identification information of the mobile terminal applying for the shared storage space, and if yes, modifies the shared storage space according to the request in the message. Authentication information, otherwise the response indicates a rejected message.
- IMEI International Mobile Equipment Identity
- the process proceeds to step 250, and the network side server actively releases the shared storage space, and notifies the application for the shared storage. Space mobile terminal.
- the network side server pre-sets the duration, and when the shared storage space exceeds the duration, the network side server automatically releases the space, so that the network side server can timely reclaim the shared storage space that is no longer used by the mobile terminal. It is especially suitable for users who only want to store temporary files, which can effectively avoid the waste of network side storage space caused by user forgetting.
- the mobile terminal is used to share the storage space in the network side server, thereby expanding the storage space of the mobile terminal. Since the cost of the network side storage space is much lower than that of the mobile terminal side, the mobile terminal can obtain a large storage space at a very low cost.
- the user of the mobile terminal can also have the ability to open the network application service by itself. Since the user is allowed to run the uploaded executable program on the network side server, the user of the mobile terminal can perform the application service for other mobile terminals by uploading the applet. Since the harmless check is performed in advance, the security of the network side server itself can be ensured.
- step 310 after establishing a connection with the network side server through a wired or wireless access technology, the mobile terminal applies for a shared storage space to the network side server in an agreed format and a communication manner. This step is identical to step 210.
- the network side server determines whether the application is valid. If the application is valid, proceed to step 330, the network side server allocates the shared storage space and sets the authentication information; if the application is invalid, proceeds to step 390, and the network side server responds to the mobile terminal with a message indicating rejection and ends the flow.
- step 330 the network side server allocates a corresponding shared storage space and sets authentication information for accessing the shared storage space according to the application (or in combination with a policy preset in the network side server). This step is identical to step 230.
- the mobile terminal Shen Qian opens the shared storage space and sets the first permission.
- the shared storage space applied by the mobile terminal in the network side server can be used not only for itself but also for other mobile terminals. Therefore, the mobile terminal applying for the shared storage space needs to set the first permission of the other mobile terminal to access the shared storage space by interacting with the network side server, and the permission includes newly creating a file, reading a file, modifying a file, deleting a file, and ⁇ i Change any combination of file attributes or one of them.
- the mobile terminal or other mobile terminal applying for the shared storage space logs in to the network side server using the authentication information obtained in step 330, and operates the shared storage space.
- the network side server receives the login request of the mobile terminal, it first determines whether the mobile terminal that initiates the login request is a mobile terminal that requests the shared storage space. If yes, the mobile terminal is allowed to perform all operations allowed by the network side preset policy for the shared storage space, including performing read and write access to the shared storage space, uploading an executable program, and modifying authentication information of the shared storage space. Otherwise, the mobile terminal is only allowed to operate on the shared storage space within the range specified by the first authority.
- step 360 the mobile terminal that requests the shared storage space sends a message requesting to release the shared storage space to the network side server, where the message carries the identifier of the mobile terminal. information.
- the network side server determines whether the mobile terminal identification information carried therein is related to applying for the shared storage space.
- the identification information of the mobile terminal is consistent. If yes, proceed to step 380 to release the shared storage space according to the request in the message; if not, proceed to step 400 to respond to the mobile terminal transmitting the message with a message indicating rejection.
- the translation space is an important operation, so generally only the mobile terminal applying for the shared storage space is allowed to perform the operation.
- the shared storage space requested by the mobile terminal in the network side server can be used not only for itself but also for other mobile terminals. Therefore, not only the functions and effects of the first embodiment can be achieved, but also the file exchange between the mobile terminals is facilitated. Since the shared storage space requested by one mobile terminal can be conveniently accessed by other mobile terminals, file exchange between the mobile terminals can be realized. Because authentication is required when accessing the shared storage space, and the authentication information is only known to the mobile terminal requesting the shared storage space and the relevant mobile terminal notified by it, the security of file sharing is ensured. Because the shared storage space is on the network side, mobile terminals that interact with files through shared storage space are not limited by geographic location, and can be close to or within a thousand miles.
- a mobile terminal requesting a shared storage space designates a case where another mobile terminal uses the shared storage space of the application. Since the mobile terminal has applied for the shared storage space in the network side server in detail in the first and second embodiments, only the flow of using the shared storage space by other designated mobile terminals will be described in the present embodiment.
- step 410 the mobile terminal applying for the shared storage space requests the network side server to open the shared storage space, and specifies the number of the mobile terminal that can use the shared storage space.
- the network side server confirms that the application is successful, and feeds back a message to the mobile terminal that issued the application.
- step 430 the other mobile terminal accesses the server and enters an account number and password.
- the network side server extracts the number of the mobile terminal, and determines whether the mobile terminal is a designated mobile terminal or a mobile terminal that requests a shared storage space. If so, it is allowed to use the shared storage space, that is, enter step '450; if not, proceed to step 490, respond to the mobile terminal with a message indicating rejection, and end the process.
- step 450 the network side server shares information about the shared storage space, such as sharing.
- the size of the storage space, the time limit, the application type, and the like are fed back to the mobile terminal.
- the mobile terminal parses the feedback information obtained in step 450, and automatically sets the parsing result as a parameter constraint condition for data transmission.
- step 470 the mobile terminal uploads data.
- the network side server checks and judges the uploaded data, and stores the uploaded data that has passed the verification and the judgment into the shared storage space.
- the security of the files in the shared storage space can be effectively improved by the designation in step 410 and the determination in step 440. Since the dual identity check is set in the present embodiment, one is the username and password, and the other is the number of the login mobile terminal. If the user's mobile terminal is stolen or stolen, the thief cannot access the files in the shared storage space because the pirate generally does not know the user name and password of the shared storage space. It does not matter if the user accidentally reveals the username and password of the shared storage space, because the person who inadvertently knows the username and password may not be able to obtain the user mobile terminal or the designated mobile terminal.
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP06804971A EP1821555A4 (en) | 2005-10-21 | 2006-10-18 | METHOD AND SYSTEM FOR SHARING A STORAGE AREA OF A MOBILE TERMINAL |
US11/792,336 US20080043696A1 (en) | 2005-10-21 | 2006-10-18 | Method and System for Mobile Terminals to Share Storage Space |
CN2006800121141A CN101161000B (zh) | 2005-10-21 | 2006-10-18 | 移动终端共享存储空间的方法及系统 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100310564A CN100461875C (zh) | 2005-10-21 | 2005-10-21 | 移动终端共享存储空间的方法及其系统 |
CN200510031056.4 | 2005-10-21 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007045170A1 true WO2007045170A1 (fr) | 2007-04-26 |
Family
ID=37444307
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2006/002752 WO2007045170A1 (fr) | 2005-10-21 | 2006-10-18 | Procede et systeme de partage de zone memoire de terminal mobile |
Country Status (4)
Country | Link |
---|---|
US (1) | US20080043696A1 (zh) |
EP (1) | EP1821555A4 (zh) |
CN (2) | CN100461875C (zh) |
WO (1) | WO2007045170A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104007898A (zh) * | 2013-02-27 | 2014-08-27 | 联想(北京)有限公司 | 一种信息处理方法及电子设备 |
CN104717207A (zh) * | 2015-02-09 | 2015-06-17 | 惠州Tcl移动通信有限公司 | 一种信息共享的方法及服务器 |
Families Citing this family (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100192183A1 (en) * | 2009-01-29 | 2010-07-29 | At&T Intellectual Property I, L.P. | Mobile Device Access to Multimedia Content Recorded at Customer Premises |
CN102035869A (zh) * | 2009-09-30 | 2011-04-27 | 联想(北京)有限公司 | 一种使用移动终端实现文件共享的方法、装置和系统 |
CN102111732B (zh) * | 2009-12-25 | 2013-12-18 | 华为终端有限公司 | 无线终端间信息共享的方法和装置 |
CN102202075B (zh) * | 2010-03-26 | 2013-12-04 | 联想(北京)有限公司 | 数据共享方法及便携终端 |
TWI450558B (zh) * | 2010-04-15 | 2014-08-21 | Htc Corp | 對應多行動裝置之線上服務的提供方法與系統、伺服器、行動裝置與電腦程式產品 |
US9386098B2 (en) * | 2010-06-11 | 2016-07-05 | Fidelithon Systems, Llc | Smartphone management system and method |
KR20120123210A (ko) * | 2011-04-19 | 2012-11-08 | 삼성전자주식회사 | 애플리케이션의 저장 공간을 제공하기 위한 제어 방법과 그를 위한 단말 및 서버 |
CN102361479A (zh) * | 2011-06-24 | 2012-02-22 | 上海合合信息科技发展有限公司 | 指定信息获取方法及系统 |
GB2499787B (en) * | 2012-02-23 | 2015-05-20 | Liberty Vaults Ltd | Mobile phone |
CN102685724B (zh) * | 2012-05-28 | 2015-07-08 | 北京市大富智慧云技术有限公司 | 一种内容定制方法、服务器及系统 |
CN103595752B (zh) * | 2012-08-17 | 2021-03-16 | 北京三星通信技术研究有限公司 | 一种信息管理方法及设备 |
CN102801813B (zh) * | 2012-08-27 | 2015-11-25 | 广东利为网络科技有限公司 | 一种从终端设备自动上传影音文件的装置及方法 |
KR102028724B1 (ko) * | 2012-09-20 | 2019-10-07 | 삼성전자주식회사 | 사용자 단말 장치 및 그 디스플레이 방법 |
CN102904886A (zh) * | 2012-09-26 | 2013-01-30 | 曙光信息产业(北京)有限公司 | 实现文件共享的方法 |
US20140149529A1 (en) * | 2012-11-26 | 2014-05-29 | Blackberry Limited | Cloud-based nfc content sharing |
US9900172B2 (en) * | 2013-04-25 | 2018-02-20 | Qualcomm Incorporated | Coordinated resource sharing in machine-to-machine communication using a network-based group management and floor control mechanism |
US9614802B2 (en) * | 2013-08-02 | 2017-04-04 | Google Technology Holdings Inc. | Sharing content within an evolving content-sharing zone |
US20150089612A1 (en) * | 2013-09-20 | 2015-03-26 | Institute For Information Industry | Cloud storage server and management method thereof |
CN104571930B (zh) * | 2013-10-10 | 2018-01-30 | 中国移动通信集团公司 | 一种安全域存储空间的管理方法、系统和多应用开放平台装置 |
CN104580333A (zh) * | 2013-10-29 | 2015-04-29 | 中兴通讯股份有限公司 | 存储空间共享方法和装置 |
KR101810536B1 (ko) * | 2014-05-15 | 2017-12-20 | 에스케이테크엑스 주식회사 | 라이브러리 업데이트 방법, 이를 위한 단말 및 시스템 |
US10212562B2 (en) * | 2015-06-03 | 2019-02-19 | Pdffiller, Inc. | Method and systems to support dynamic reconfiguration of document devices |
CN105094902B (zh) * | 2015-07-13 | 2018-07-13 | 北京京东尚科信息技术有限公司 | 控制应用程序登录状态的系统和方法 |
CN108011913B (zh) * | 2016-12-29 | 2021-08-20 | 北京车和家信息技术有限责任公司 | 数据传输方法、车机显示装置、车辆多媒体设备及系统 |
KR101961644B1 (ko) * | 2017-05-19 | 2019-03-25 | 소프트캠프(주) | 데이터 분산형 통합 관리시스템 |
CN108536795A (zh) * | 2018-04-02 | 2018-09-14 | 深圳市华傲数据技术有限公司 | 一种提高图数据交互效率的方法、介质以及设备 |
CN109413647B (zh) * | 2018-10-18 | 2022-08-05 | 深圳壹账通智能科技有限公司 | 数据共享方法、装置、电子设备以及计算机可读存储介质 |
US11449815B2 (en) | 2018-11-08 | 2022-09-20 | Airslate, Inc. | Automated electronic document workflows |
US11811776B2 (en) * | 2020-06-30 | 2023-11-07 | Western Digital Technologies, Inc. | Accessing shared pariiiions on a storage drive of a remote device |
CN113051614B (zh) * | 2021-03-26 | 2022-07-05 | 支付宝(杭州)信息技术有限公司 | 信息访问处理方法、装置、设备及系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005057846A1 (en) * | 2003-12-08 | 2005-06-23 | Nokia Corporation | Method and device for sharing of content protected by digital rights management |
CN1642114A (zh) * | 2005-01-07 | 2005-07-20 | 刘惠山 | 手持移动终端用户定制信息的网络备份方法 |
KR20050083042A (ko) * | 2005-07-20 | 2005-08-24 | (주)스타모바일 | 휴대폰에 저장된 데이터 공유 방법 및 그 시스템 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7136903B1 (en) * | 1996-11-22 | 2006-11-14 | Mangosoft Intellectual Property, Inc. | Internet-based shared file service with native PC client access and semantics and distributed access control |
WO2000051034A2 (en) * | 1999-02-26 | 2000-08-31 | Click2Send.Com, Inc. | Method and apparatus for network file transfer |
US6351776B1 (en) * | 1999-11-04 | 2002-02-26 | Xdrive, Inc. | Shared internet storage resource, user interface system, and method |
AU2606801A (en) * | 1999-12-30 | 2001-07-16 | B4Bpartner, Inc. | Electronic safe deposit box |
WO2002027628A2 (en) * | 2000-09-29 | 2002-04-04 | Jill Fallon | Systems and methods for a personal, universal, integrated organizer for legacy planning and storage |
US7320033B2 (en) * | 2001-07-27 | 2008-01-15 | Intel Corporation | Dynamic local drive and printer sharing |
CN1158799C (zh) * | 2001-09-29 | 2004-07-21 | 华为技术有限公司 | 一种为移动终端用户提供扩展存储空间的方法 |
US7334124B2 (en) * | 2002-07-22 | 2008-02-19 | Vormetric, Inc. | Logical access block processing protocol for transparent secure file storage |
CN1266590C (zh) * | 2002-12-31 | 2006-07-26 | 上海科泰世纪科技有限公司 | 面向构件基于系统内核的进程池/线程池管理方法 |
WO2004075169A2 (en) * | 2003-02-19 | 2004-09-02 | Koninklijke Philips Electronics, N.V. | System for ad hoc sharing of content items between portable devices and interaction methods therefor |
JP2004260274A (ja) * | 2003-02-24 | 2004-09-16 | Nec Corp | 携帯端末データメモリ共有システム及び携帯端末データメモリ共有機能を実現させるためのプログラム |
US7124255B2 (en) * | 2003-06-30 | 2006-10-17 | Microsoft Corporation | Message based inter-process for high volume data |
JP4459594B2 (ja) * | 2003-10-28 | 2010-04-28 | 株式会社エヌ・ティ・ティ・ドコモ | ファイル共有管理サーバ装置、通信端末、ファイル共有システム、ファイル共有方法 |
US20050154784A1 (en) * | 2004-01-13 | 2005-07-14 | International Business Machines Corporation | Providing a shared storage space in association with a telephone call |
WO2006024230A1 (fr) * | 2004-08-31 | 2006-03-09 | Tencent Technology (Shenzhen) Company Limited | Systeme pour realiser un disque dur de reseau sur la base d'une plate-forme de communications en temps reel et procede correspondant |
US7676508B2 (en) * | 2004-11-10 | 2010-03-09 | Microsoft Corporation | Method and system for recording and replaying input-output requests issued by a user-mode program |
US7363454B2 (en) * | 2004-12-10 | 2008-04-22 | International Business Machines Corporation | Storage pool space allocation across multiple locations |
US7748047B2 (en) * | 2005-04-29 | 2010-06-29 | Verizon Business Global Llc | Preventing fraudulent internet account access |
US20070033139A1 (en) * | 2005-08-08 | 2007-02-08 | Brad Handler | Credit applicant and user authentication solution |
-
2005
- 2005-10-21 CN CNB2005100310564A patent/CN100461875C/zh active Active
-
2006
- 2006-10-18 EP EP06804971A patent/EP1821555A4/en not_active Ceased
- 2006-10-18 WO PCT/CN2006/002752 patent/WO2007045170A1/zh active Application Filing
- 2006-10-18 US US11/792,336 patent/US20080043696A1/en not_active Abandoned
- 2006-10-18 CN CN2006800121141A patent/CN101161000B/zh active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005057846A1 (en) * | 2003-12-08 | 2005-06-23 | Nokia Corporation | Method and device for sharing of content protected by digital rights management |
CN1642114A (zh) * | 2005-01-07 | 2005-07-20 | 刘惠山 | 手持移动终端用户定制信息的网络备份方法 |
KR20050083042A (ko) * | 2005-07-20 | 2005-08-24 | (주)스타모바일 | 휴대폰에 저장된 데이터 공유 방법 및 그 시스템 |
Non-Patent Citations (1)
Title |
---|
See also references of EP1821555A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104007898A (zh) * | 2013-02-27 | 2014-08-27 | 联想(北京)有限公司 | 一种信息处理方法及电子设备 |
CN104717207A (zh) * | 2015-02-09 | 2015-06-17 | 惠州Tcl移动通信有限公司 | 一种信息共享的方法及服务器 |
Also Published As
Publication number | Publication date |
---|---|
US20080043696A1 (en) | 2008-02-21 |
CN100461875C (zh) | 2009-02-11 |
CN101161000B (zh) | 2011-01-05 |
EP1821555A4 (en) | 2008-10-22 |
CN1870771A (zh) | 2006-11-29 |
EP1821555A1 (en) | 2007-08-22 |
CN101161000A (zh) | 2008-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007045170A1 (fr) | Procede et systeme de partage de zone memoire de terminal mobile | |
US9596220B2 (en) | Secure protocol for peer-to-peer network | |
CN101309272B (zh) | 认证服务器及虚拟专用网的移动通信终端接入控制方法 | |
US8839354B2 (en) | Mobile enterprise server and client device interaction | |
JP6515207B2 (ja) | インターネットアクセス認証方法およびクライアント、ならびにコンピュータ記憶媒体 | |
US20120297447A1 (en) | Authentication techniques | |
WO2011038628A1 (zh) | 数据获取方法、接入节点和系统 | |
WO2017041562A1 (zh) | 一种识别终端设备用户身份的方法和装置 | |
WO2006015537A1 (fr) | Systeme et procede pour la gestion de securite sur un reseau mobile 3g | |
WO2013185675A1 (zh) | 一种数据卡apn锁定状态的控制方法及装置、数据卡 | |
WO2009000214A1 (fr) | Procédé et dispositif pour configurer des données de configuration du réseau d'accès utilisateur | |
WO2016165505A1 (zh) | 连接控制方法及装置 | |
WO2020248284A1 (zh) | 一种访问控制方法、装置及存储介质 | |
CN113221093B (zh) | 一种基于区块链的单点登录系统、方法、设备和产品 | |
WO2008089692A1 (fr) | Procédé et système de synchronisation de données | |
WO2020057585A1 (zh) | 接入认证 | |
CN102891863A (zh) | 数据读写方法 | |
CN100391168C (zh) | 一种管理同步标记语言终端设备的方法、系统及终端 | |
WO2021143028A1 (zh) | 物联网设备认证方法、电子装置及存储介质 | |
CN103888511A (zh) | 一种基于动态代理的远程访问控制方法 | |
WO2019029183A1 (zh) | 存储设备的访问方法、装置、存储介质及处理器 | |
WO2009052735A1 (fr) | Procédé, système et dispositif de gestion destinés à un paquet d'apparence | |
US11228938B2 (en) | Data transmission method, apparatus, network-side device, terminal, and computer-readable storage medium | |
CN107959584B (zh) | 信息配置方法及装置 | |
WO2021035740A1 (zh) | 访问控制方法、服务器、访问设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 11792336 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006804971 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 2006804971 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200680012114.1 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 11792336 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |